mirror of https://gogs.blitter.com/RLabs/xs
				
				
				
			Update 'README.md'
This commit is contained in:
		
							parent
							
								
									ec9b4fe2f4
								
							
						
					
					
						commit
						136f37e209
					
				
							
								
								
									
										14
									
								
								README.md
								
								
								
								
							
							
						
						
									
										14
									
								
								README.md
								
								
								
								
							| 
						 | 
					@ -44,10 +44,12 @@ Currently supported session algorithms:
 | 
				
			||||||
* Blowfish-64
 | 
					* Blowfish-64
 | 
				
			||||||
* CryptMTv1 (64bit) (https://eprint.iacr.org/2005/165.pdf)
 | 
					* CryptMTv1 (64bit) (https://eprint.iacr.org/2005/165.pdf)
 | 
				
			||||||
* ChaCha20 (https://github.com/aead/chacha20)
 | 
					* ChaCha20 (https://github.com/aead/chacha20)
 | 
				
			||||||
 | 
					* HOPSCOTCH (https://gogs.blitter.com/Russtopia/hopscotch)
 | 
				
			||||||
 | 
					
 | 
				
			||||||
[HMAC]
 | 
					[HMAC]
 | 
				
			||||||
* HMAC-SHA256
 | 
					* HMAC-SHA256
 | 
				
			||||||
* HMAC-SHA512
 | 
					* HMAC-SHA512
 | 
				
			||||||
 | 
					* WHIRLPOOL
 | 
				
			||||||
 | 
					
 | 
				
			||||||
***
 | 
					***
 | 
				
			||||||
**A Note on 'cryptographic agility'**
 | 
					**A Note on 'cryptographic agility'**
 | 
				
			||||||
| 
						 | 
					@ -92,18 +94,6 @@ KYBER IND-CCA-2 KEM
 | 
				
			||||||
 | 
					
 | 
				
			||||||
As of this time (Oct 2018) Kyber is one of the candidate algorithms submitted to the [NIST post-quantum cryptography project](https://csrc.nist.gov/Projects/Post-Quantum-Cryptography). The authors recommend using it in "... so-called hybrid mode in combination with established "pre-quantum" security; for example in combination with elliptic-curve Diffie-Hellman." THIS PROJECT DOES NOT DO THIS (in case you didn't notice yet, THIS PROJECT IS EXPERIMENTAL.)
 | 
					As of this time (Oct 2018) Kyber is one of the candidate algorithms submitted to the [NIST post-quantum cryptography project](https://csrc.nist.gov/Projects/Post-Quantum-Cryptography). The authors recommend using it in "... so-called hybrid mode in combination with established "pre-quantum" security; for example in combination with elliptic-curve Diffie-Hellman." THIS PROJECT DOES NOT DO THIS (in case you didn't notice yet, THIS PROJECT IS EXPERIMENTAL.)
 | 
				
			||||||
 | 
					
 | 
				
			||||||
### Dependencies:
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
* Recent version of go (tested, at various times, with go-1.9 to go-1.12.4)
 | 
					 | 
				
			||||||
* [github.com/mattn/go-isatty](http://github.com/mattn/go-isatty) //terminal tty detection
 | 
					 | 
				
			||||||
* [github.com/kr/pty](http://github.com/kr/pty) //unix pty control (server pty connections)
 | 
					 | 
				
			||||||
* [github.com/jameskeane/bcrypt](http://github.com/jameskeane/bcrypt) //password storage/auth
 | 
					 | 
				
			||||||
* [blitter.com/go/goutmp](https://gogs.blitter.com/RLabs/goutmp) // wtmp/lastlog C bindings for user accounting
 | 
					 | 
				
			||||||
* [https://gitlab.com/yawning/kyber](https://gogs.blitter.com/RLabs/kyber) // golang Kyber KEM
 | 
					 | 
				
			||||||
* [https://gitlab.com/yawning/kyber](https://gogs.blitter.com/RLabs/newhope) // golang NEWHOPE,NEWHOPE-SIMPLE KEX
 | 
					 | 
				
			||||||
* [blitter.com/go/mtwist](https://gogs.blitter.com/RLabs/mtwist) // 64-bit Mersenne Twister PRNG
 | 
					 | 
				
			||||||
* [blitter.com/go/cryptmt](https://gogs.blitter.com/RLabs/cryptmt) // CryptMTv1 stream cipher
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
 | 
					
 | 
				
			||||||
### Installing
 | 
					### Installing
 | 
				
			||||||
 | 
					
 | 
				
			||||||
| 
						 | 
					
 | 
				
			||||||
		Loading…
	
		Reference in New Issue