Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

updated the draft crypto principles to match today's cryptographic standards, and fixed grammatical issues #348

Closed
wants to merge 5 commits into from

Conversation

pUrGe12
Copy link
Collaborator

@pUrGe12 pUrGe12 commented Feb 2, 2025

Summary :

This is a fix for issue #346 which called for a revision of principles of cryptography section to match today's standards. The major changes have been listen in the next section.

Following the discussion on #347 I have added the changes in the draft and reverted the changes in the release file.
Description for the changelog :

I have made the following major changes.

Stream cipher examples, RC4 to ChaCha20 (because the RC4 algorithm has many vulnerabilities like biases in the key scheduling algorithm)
Updated with TLS version 1.3 being the recommended one
Updated with note on DES not being a standard, and added AEAD schemes.
Corrected spelling errors and other grammatical issues
Added link to the cryptographic storage cheat sheet.
Other info :

@jgadsden jgadsden self-requested a review February 2, 2025 20:03
Copy link
Collaborator

@jgadsden jgadsden left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Thanks for the update @pUrGe12 , could you refer to the contributing guide to fix the tests

@@ -182,7 +184,7 @@ which is only used for the duration of the encrypted communication.
This random session key is then encrypted using an asymmetric cipher and the recipient's private key.
The plaintext data itself is encrypted with the session key.
Then the entire bundle (encrypted session key and encrypted message) is all sent together.
Both [TLS][tls] and S/MIME are common cryptosystems using hybrid cryptography.
Both [TLS 1.3][tls] and S/MIME are common cryptosystems using hybrid cryptography today.
Copy link
Collaborator

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

we should not provide a version for TLS here, this may go out of date so it is better to not version it

Copy link
Collaborator Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

ahh yes, I'll edit this properly. My bad, I'll fix my tests.

@jgadsden jgadsden marked this pull request as draft February 3, 2025 07:09
@pUrGe12
Copy link
Collaborator Author

pUrGe12 commented Feb 3, 2025

okay I see the issue, lemme try again with a new PR. (ps, sorry about doing this again and again, I'm trying to get this right)

@pUrGe12 pUrGe12 closed this Feb 3, 2025
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

2 participants