Skip to content

Commit

Permalink
Update README.md (#80)
Browse files Browse the repository at this point in the history
  • Loading branch information
kigawas authored Aug 10, 2019
1 parent 7c74306 commit e433970
Showing 1 changed file with 3 additions and 1 deletion.
4 changes: 3 additions & 1 deletion README.md
Original file line number Diff line number Diff line change
Expand Up @@ -230,7 +230,7 @@ Then, the shared key between `k1` and `k2` is the `sha256` hash of the **compres
You may want to ask, what if no hash? Briefly, hash can:

1. Make the shared key's length fixed;
2. Make it safer since hash functions can remove "weak bits" in the original computed key. Check the introduction section of this [paper](http://cacr.uwaterloo.ca/techreports/1998/corr98-05.pdf) to know more.
2. Make it safer since hash functions can remove "weak bits" in the original computed key. Check the introduction section of this [paper](http://cacr.uwaterloo.ca/techreports/1998/corr98-05.pdf) for more details.

### AES

Expand All @@ -247,6 +247,8 @@ Now we have the shared key, and we can use the `nonce` and `tag` to decrypt. Thi
b'helloworld'
```

> Strictly speaking, `nonce` != `iv`, but this is a little bit off topic, if you are curious, you can check [the comment in `utils.py`](https://github.com/kigawas/eciespy/blob/master/ecies/utils.py#L223).
## Release Notes

### 0.2.0
Expand Down

0 comments on commit e433970

Please sign in to comment.