aboutsummaryrefslogtreecommitdiffstats
path: root/docs/hazmat/primitives/symmetric-encryption.rst
diff options
context:
space:
mode:
authorPaul Kehrer <paul.l.kehrer@gmail.com>2013-10-31 17:15:03 -0500
committerPaul Kehrer <paul.l.kehrer@gmail.com>2013-10-31 17:15:03 -0500
commit3446d8103af433b0241b93850f2ff140eaf3cb11 (patch)
treefe8e6fcfed6aa267d0f1f1b26f508c5ba4f3d17c /docs/hazmat/primitives/symmetric-encryption.rst
parent5df0abe1fe49c13d628a088c0caee2f6eed88a99 (diff)
downloadcryptography-3446d8103af433b0241b93850f2ff140eaf3cb11.tar.gz
cryptography-3446d8103af433b0241b93850f2ff140eaf3cb11.tar.bz2
cryptography-3446d8103af433b0241b93850f2ff140eaf3cb11.zip
move blowfish docs to new weak ciphers section, linkify aes
Diffstat (limited to 'docs/hazmat/primitives/symmetric-encryption.rst')
-rw-r--r--docs/hazmat/primitives/symmetric-encryption.rst12
1 files changed, 11 insertions, 1 deletions
diff --git a/docs/hazmat/primitives/symmetric-encryption.rst b/docs/hazmat/primitives/symmetric-encryption.rst
index 94d58eee..31ceea8a 100644
--- a/docs/hazmat/primitives/symmetric-encryption.rst
+++ b/docs/hazmat/primitives/symmetric-encryption.rst
@@ -107,11 +107,21 @@ Ciphers
``56`` bits long), they can simply be concatenated to
produce the full key. This must be kept secret.
+Weak Ciphers
+------------
+
+.. warning::
+
+ These ciphers are considered weak for a variety of reasons. New
+ applications should avoid their use and existing applications should
+ strongly consider migrating away.
+
.. class:: Blowfish(key)
Blowfish is a block cipher developed by Bruce Schneier. It is known to be
susceptible to attacks when using weak keys. The author has recommended
- that users of Blowfish move to newer algorithms like AES.
+ that users of Blowfish move to newer algorithms like
+ :class:`AES`.
:param bytes key: The secret key, 32-448 bits in length (in increments of
8). This must be kept secret.