X-Git-Url: http://www.git.cypherpunks.ru/?a=blobdiff_plain;f=README;h=d703323e63e95ef5255b5222232920fd400028b6;hb=b208f7c151d6efdaf0589832e4f1487575e21e50;hp=1594ebfa5e34237d12ac7b2a5cd2a1045530c9ae;hpb=212bb9852fd66cf0b1ac054ed36408fd29752c62;p=pygost.git diff --git a/README b/README index 1594ebf..d703323 100644 --- a/README +++ b/README @@ -12,10 +12,12 @@ GOST is GOvernment STandard of Russian Federation (and Soviet Union). * GOST R 34.10-2001 (RFC 5832) public key signature function * GOST R 34.10-2012 (RFC 7091) public key signature function * various 34.10 curve parameters included +* Coordinates conversion from twisted Edwards to Weierstrass form and + vice versa * VKO GOST R 34.10-2001 key agreement function (RFC 4357) * VKO GOST R 34.10-2012 key agreement function (RFC 7836) * 28147-89 and CryptoPro key wrapping (RFC 4357) -* 28147-89 CryptoPro key meshing for CFB mode (RFC 4357) +* 28147-89 CryptoPro key meshing for CFB and CBC modes (RFC 4357) * RFC 4491 (using GOST algorithms with X.509) compatibility helpers * GOST R 34.12-2015 128-bit block cipher Кузнечик (Kuznechik) (RFC 7801) * GOST R 34.12-2015 64-bit block cipher Магма (Magma) @@ -27,9 +29,8 @@ Known problems: low performance and non time-constant calculations. Example 34.10-2012 keypair generation, signing and verifying: - >>> from pygost.gost3410 import CURVE_PARAMS - >>> from pygost.gost3410 import GOST3410Curve - >>> curve = GOST3410Curve(*CURVE_PARAMS["GostR3410_2012_TC26_ParamSetA"]) + >>> from pygost.gost3410 import CURVES + >>> curve = CURVES["id-tc26-gost-3410-12-512-paramSetA"] >>> from os import urandom >>> prv_raw = urandom(32) >>> from pygost.gost3410 import prv_unmarshal