X-Git-Url: http://www.git.cypherpunks.ru/?a=blobdiff_plain;f=en%2Fmeshing.texi;h=2521f7147a8e078105b8ab64dd5d233fa2e04620;hb=c24c446ba9bbf0fcc611e36ade7ade0ae2ccf713;hp=ff3292b050ddbd819869eb73461fb3e597784798;hpb=4076f508b6702bd4b8abf037543e962903ed5ff4;p=gost-www.git diff --git a/en/meshing.texi b/en/meshing.texi index ff3292b..2521f71 100644 --- a/en/meshing.texi +++ b/en/meshing.texi @@ -10,6 +10,14 @@ developers tell that it is intended to resist side-channel attacks. Implementation is rather simple and uses two crypt/decrypt operations over the key and initialization vector. +@verbatim +# for each KiB of data +def mesh(old_key, old_iv): + new_key = ecb_decrypt(old_key, MESH_CONST) + new_iv = ecb_encrypt(old_key, old_iv) + return new_key, new_iv +@end verbatim + It has already showed usefulness: there is @url{https://sweet32.info/, Sweet32} attack on all 64-bit blockciphers, that is not applicable to when key meshing used.