mirror of
https://github.com/octoleo/restic.git
synced 2025-01-02 22:50:19 +00:00
Design.md: Minor fixes
This commit is contained in:
parent
2dad4fba3a
commit
53e66a4935
@ -34,7 +34,7 @@ the encrypted data is secured by an Poly1305-AES signature.
|
|||||||
In the first 16 bytes of each encrypted file the initialisation vector (IV) is
|
In the first 16 bytes of each encrypted file the initialisation vector (IV) is
|
||||||
stored. It is followed by the encrypted data and completed by the 16 byte MAC
|
stored. It is followed by the encrypted data and completed by the 16 byte MAC
|
||||||
signature. The format is: `IV || CIPHERTEXT || MAC`. The complete encryption
|
signature. The format is: `IV || CIPHERTEXT || MAC`. The complete encryption
|
||||||
overhead is 48 byte. For each file, a new random IV is selected.
|
overhead is 32 byte. For each file, a new random IV is selected.
|
||||||
|
|
||||||
The basic layout of a sample restic repository is shown below:
|
The basic layout of a sample restic repository is shown below:
|
||||||
|
|
||||||
@ -78,7 +78,7 @@ bytes are read from a cryptographically secure pseudorandom number generator as
|
|||||||
a random nonce. This is used both as the IV for counter mode and the nonce for
|
a random nonce. This is used both as the IV for counter mode and the nonce for
|
||||||
Poly1305. This operation needs three keys: A 32 byte for AES-256 for
|
Poly1305. This operation needs three keys: A 32 byte for AES-256 for
|
||||||
encryption, a 16 byte AES key and a 16 byte key for Poly1305. For details see
|
encryption, a 16 byte AES key and a 16 byte key for Poly1305. For details see
|
||||||
the original paper[The Poly1305-AES message-authentication
|
the original paper [The Poly1305-AES message-authentication
|
||||||
code](http://cr.yp.to/mac/poly1305-20050329.pdf) by Dan Bernstein.
|
code](http://cr.yp.to/mac/poly1305-20050329.pdf) by Dan Bernstein.
|
||||||
The data is then encrypted with AES-256 and afterwards the MAC is computed over
|
The data is then encrypted with AES-256 and afterwards the MAC is computed over
|
||||||
the ciphertext, everything is then stored as IV || CIPHERTEXT || MAC.
|
the ciphertext, everything is then stored as IV || CIPHERTEXT || MAC.
|
||||||
|
Loading…
Reference in New Issue
Block a user