* GOST R 34.12-2015 64-bit block cipher Магма (Magma)
* GOST R 34.13-2015 padding methods and block cipher modes of operation
(ECB, CTR, OFB, CBC, CFB, MAC)
* GOST R 34.12-2015 64-bit block cipher Магма (Magma)
* GOST R 34.13-2015 padding methods and block cipher modes of operation
(ECB, CTR, OFB, CBC, CFB, MAC)
* PEP247-compatible hash/MAC functions
Known problems: low performance and non time-constant calculations.
* PEP247-compatible hash/MAC functions
Known problems: low performance and non time-constant calculations.
>>> from pygost.gost3410 import CURVES
>>> curve = CURVES["id-tc26-gost-3410-12-512-paramSetA"]
>>> from os import urandom
>>> from pygost.gost3410 import CURVES
>>> curve = CURVES["id-tc26-gost-3410-12-512-paramSetA"]
>>> from os import urandom
>>> from pygost.gost3410 import public_key
>>> pub = public_key(curve, prv)
>>> from pygost.gost3410 import pub_marshal
>>> from pygost.utils import hexenc
>>> print "Public key is:", hexenc(pub_marshal(pub))
>>> from pygost.gost3410 import public_key
>>> pub = public_key(curve, prv)
>>> from pygost.gost3410 import pub_marshal
>>> from pygost.utils import hexenc
>>> print "Public key is:", hexenc(pub_marshal(pub))
- >>> verify(curve, pub, dgst, signature, mode=2012)
+ >>> verify(curve, pub, dgst, signature)
You can read about GOST algorithms more: http://www.gost.cypherpunks.ru/
Please send questions, bug reports and patches to
You can read about GOST algorithms more: http://www.gost.cypherpunks.ru/
Please send questions, bug reports and patches to
-https://lists.cypherpunks.ru/mailman/listinfo/gost
-mailing list. Announcements also go to this mailing list.
+http://lists.cypherpunks.ru/gost.html mailing list.
+Announcements also go to this mailing list.