X-Git-Url: http://www.git.cypherpunks.ru/?a=blobdiff_plain;f=README;h=1594ebfa5e34237d12ac7b2a5cd2a1045530c9ae;hb=d8c0ee105efe2ddbab428299ef5f21f905ee3179;hp=da5a58e4bee8c8413a1fee77fd6b5b7640b15575;hpb=34c9c9a4f95eecfee75fc36d75d2ee45d1054a25;p=pygost.git diff --git a/README b/README index da5a58e..1594ebf 100644 --- a/README +++ b/README @@ -6,39 +6,58 @@ GOST is GOvernment STandard of Russian Federation (and Soviet Union). CBC (RFC 4357) modes of operation * various 28147-89-related S-boxes included * GOST R 34.11-94 hash function (RFC 5831) +* GOST R 34.11-94 based PBKDF2 function * GOST R 34.11-2012 Стрибог (Streebog) hash function (RFC 6986) +* GOST R 34.11-2012 based PBKDF2 function (Р 50.1.111-2016) * GOST R 34.10-2001 (RFC 5832) public key signature function * GOST R 34.10-2012 (RFC 7091) public key signature function * various 34.10 curve parameters included -* VKO 34.10-2001 Diffie-Hellman function (RFC 4357) +* VKO GOST R 34.10-2001 key agreement function (RFC 4357) +* VKO GOST R 34.10-2012 key agreement function (RFC 7836) * 28147-89 and CryptoPro key wrapping (RFC 4357) * 28147-89 CryptoPro key meshing for CFB mode (RFC 4357) * RFC 4491 (using GOST algorithms with X.509) compatibility helpers * GOST R 34.12-2015 128-bit block cipher Кузнечик (Kuznechik) (RFC 7801) -* GOST R 34.13-2015 padding methods +* GOST R 34.12-2015 64-bit block cipher Магма (Magma) +* GOST R 34.13-2015 padding methods and block cipher modes of operation + (ECB, CTR, OFB, CBC, CFB, MAC) * PEP247-compatible hash/MAC functions Known problems: low performance and non time-constant calculations. -Example X.509 compatible 34.10-2012 keypair generation, signing and -verifying its signature: - - >>> from pygost import x509 - >>> prv, pub = x509.keypair_gen(urandom(64), mode=2012) - >>> data = b'some data' - >>> signature = x509.sign(prv, data, mode=2012) - >>> x509.verify(pub, data, signature, mode=2012) +Example 34.10-2012 keypair generation, signing and verifying: + + >>> from pygost.gost3410 import CURVE_PARAMS + >>> from pygost.gost3410 import GOST3410Curve + >>> curve = GOST3410Curve(*CURVE_PARAMS["GostR3410_2012_TC26_ParamSetA"]) + >>> from os import urandom + >>> prv_raw = urandom(32) + >>> from pygost.gost3410 import prv_unmarshal + >>> prv = prv_unmarshal(prv_raw) + >>> from pygost.gost3410 import public_key + >>> pub = public_key(curve, prv) + >>> from pygost.gost3410 import pub_marshal + >>> from pygost.utils import hexenc + >>> print "Public key is:", hexenc(pub_marshal(pub)) + >>> from pygost import gost34112012256 + >>> data_for_signing = b"some data" + >>> dgst = gost34112012256.new(data_for_signing).digest() + >>> from pygost.gost3410 import sign + >>> signature = sign(curve, prv, dgst, mode=2012) + >>> from pygost.gost3410 import verify + >>> verify(curve, pub, dgst, signature, mode=2012) True -Other examples can be found in docstrings. +Other examples can be found in docstrings and unittests. PyGOST is free software: see the file COPYING for copying conditions. -PyGOST'es home page is: http://www.cypherpunks.ru/pygost/ +PyGOST'es home page is: http://pygost.cypherpunks.ru/ +You can read about GOST algorithms more: http://gost.cypherpunks.ru/ Please send questions, bug reports and patches to https://lists.cypherpunks.ru/mailman/listinfo/gost mailing list. Announcements also go to this mailing list. Development Git source code repository currently is located here: -http://git.cypherpunks.ru/cgit.cgi/pygost.git/ +https://git.cypherpunks.ru/cgit.cgi/pygost.git/