From b11c06b5d4673f3c20e0177e84336772e6ebfa8b Mon Sep 17 00:00:00 2001 From: Evan Su <48808396+HACKERALERT@users.noreply.github.com> Date: Fri, 13 Aug 2021 11:59:04 -0400 Subject: [PATCH] Details --- Internals.md | 6 +++--- 1 file changed, 3 insertions(+), 3 deletions(-) diff --git a/Internals.md b/Internals.md index 4ff188b..ddf07f4 100644 --- a/Internals.md +++ b/Internals.md @@ -4,8 +4,8 @@ If you're wondering about how Picocrypt handles cryptography, you've come to the # Core Cryptography Picocrypt uses the following cryptographic primitives: - XChaCha20 (cascaded with Serpent for paranoid mode) -- HMAC-SHA3 for normal mode, keyed-BLAKE2b for fast mode (512 bits) -- HKDF-SHA3 for deriving a subkey used with the MAC above +- HMAC-SHA3 for normal mode, keyed-BLAKE2b for fast mode (256-bit key, 512-bit digest) +- HKDF-SHA3-256 for deriving a subkey used with the MAC above - Argon2id (8 passes, 1 GiB memory, 8 threads) for normal mode, (4 passes, 128 MiB memory, 4 threads) for fast mode -All algorithms used are from the well-known golang.org/x/crypto module. +All primitives used are from the well-known golang.org/x/crypto module.