mirror of
https://github.com/Sneed-Group/Poodletooth-iLand
synced 2024-12-29 06:32:40 -06:00
84 lines
3.4 KiB
Python
84 lines
3.4 KiB
Python
|
# -*- coding: utf-8 -*-
|
||
|
#
|
||
|
# ===================================================================
|
||
|
# The contents of this file are dedicated to the public domain. To
|
||
|
# the extent that dedication to the public domain is not available,
|
||
|
# everyone is granted a worldwide, perpetual, royalty-free,
|
||
|
# non-exclusive license to exercise all rights associated with the
|
||
|
# contents of this file for any purpose whatsoever.
|
||
|
# No rights are reserved.
|
||
|
#
|
||
|
# THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND,
|
||
|
# EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF
|
||
|
# MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND
|
||
|
# NONINFRINGEMENT. IN NO EVENT SHALL THE AUTHORS OR COPYRIGHT HOLDERS
|
||
|
# BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER LIABILITY, WHETHER IN AN
|
||
|
# ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, OUT OF OR IN
|
||
|
# CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE
|
||
|
# SOFTWARE.
|
||
|
# ===================================================================
|
||
|
|
||
|
"""Symmetric- and asymmetric-key encryption algorithms.
|
||
|
|
||
|
Encryption algorithms transform plaintext in some way that
|
||
|
is dependent on a key or key pair, producing ciphertext.
|
||
|
|
||
|
Symmetric algorithms
|
||
|
--------------------
|
||
|
|
||
|
Encryption can easily be reversed, if (and, hopefully, only if)
|
||
|
one knows the same key.
|
||
|
In other words, sender and receiver share the same key.
|
||
|
|
||
|
The symmetric encryption modules here all support the interface described in PEP
|
||
|
272, "API for Block Encryption Algorithms".
|
||
|
|
||
|
If you don't know which algorithm to choose, use AES because it's
|
||
|
standard and has undergone a fair bit of examination.
|
||
|
|
||
|
======================== ======= ========================
|
||
|
Module name Type Description
|
||
|
======================== ======= ========================
|
||
|
`Crypto.Cipher.AES` Block Advanced Encryption Standard
|
||
|
`Crypto.Cipher.ARC2` Block Alleged RC2
|
||
|
`Crypto.Cipher.ARC4` Stream Alleged RC4
|
||
|
`Crypto.Cipher.Blowfish` Block Blowfish
|
||
|
`Crypto.Cipher.CAST` Block CAST
|
||
|
`Crypto.Cipher.DES` Block The Data Encryption Standard.
|
||
|
Very commonly used in the past,
|
||
|
but today its 56-bit keys are too small.
|
||
|
`Crypto.Cipher.DES3` Block Triple DES.
|
||
|
`Crypto.Cipher.XOR` Stream The simple XOR cipher.
|
||
|
======================== ======= ========================
|
||
|
|
||
|
|
||
|
Asymmetric algorithms
|
||
|
---------------------
|
||
|
|
||
|
For asymmetric algorithms, the key to be used for decryption is totally
|
||
|
different and cannot be derived in a feasible way from the key used
|
||
|
for encryption. Put differently, sender and receiver each own one half
|
||
|
of a key pair. The encryption key is often called ``public`` whereas
|
||
|
the decryption key is called ``private``.
|
||
|
|
||
|
========================== =======================
|
||
|
Module name Description
|
||
|
========================== =======================
|
||
|
`Crypto.Cipher.PKCS1_v1_5` PKCS#1 v1.5 encryption, based on RSA key pairs
|
||
|
`Crypto.Cipher.PKCS1_OAEP` PKCS#1 OAEP encryption, based on RSA key pairs
|
||
|
========================== =======================
|
||
|
|
||
|
:undocumented: __revision__, __package__, _AES, _ARC2, _ARC4, _Blowfish
|
||
|
_CAST, _DES, _DES3, _XOR
|
||
|
"""
|
||
|
|
||
|
__all__ = ['AES', 'ARC2', 'ARC4',
|
||
|
'Blowfish', 'CAST', 'DES', 'DES3',
|
||
|
'XOR',
|
||
|
'PKCS1_v1_5', 'PKCS1_OAEP'
|
||
|
]
|
||
|
|
||
|
__revision__ = "$Id$"
|
||
|
|
||
|
|