Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Usage of random_bytes in non-extended-nonce #16

Open
inkeliz opened this issue Apr 30, 2018 · 0 comments
Open

Usage of random_bytes in non-extended-nonce #16

inkeliz opened this issue Apr 30, 2018 · 0 comments

Comments

@inkeliz
Copy link

inkeliz commented Apr 30, 2018

In this page the LibSodium describe the safest way to create a nonce in AES-GCM, ChaCha20Poly1305, ChaCha20Poly1305-IEFT and XChaCha20Poly1305.

Based on this information all methods are safe using "Counter, permutation". The XChaCha20Poly1305 is the only one that can be random, due to the size of the nonce.

However, in the 08-advanced.md all methods uses the random_bytes and no more information are given. The documentation already says about the nonce-size, but maybe the reader has no clue about the generation of the nonce. Considering that all examples uses the random nonce, it can make even harder to for the reader figure that out.

I think is better to include some information about the nonce in this page, maybe change the example too.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

1 participant