X-Git-Url: https://git.distorted.org.uk/u/mdw/catacomb/blobdiff_plain/6f313264de6d6f898478db9251700a5b38bf998d..02dfbd5b7af7816959dbd39c1fe628451204e35f:/catcrypt.1 diff --git a/catcrypt.1 b/catcrypt.1 index d4ef3e1..61da7f9 100644 --- a/catcrypt.1 +++ b/catcrypt.1 @@ -184,6 +184,16 @@ Use the algorithm of the .BR key (1)) command to generate the key. +.TP +.B symm +This is a simple symmetric encapsulation scheme. It works by hashing a +binary key with a randomly-generated salt. Use the +.B binary +algorithm of the +.B key add +command (see +.BR key (1)) +to generate the key. .PP As well as the KEM itself, a number of supporting algorithms are used. These are taken from appropriately named attributes on the key or, @@ -335,6 +345,21 @@ algorithm of the command (see .BR key (1)) to generate the key. +.TP +.B mac +This uses a symmetric message-authentication algorithm rather than a +digital signature. The precise message-authentication scheme used is +determined by the +.B mac +attribute on the key, which defaults to +.IB hash -hmac +if unspecified. Use the +.B binary +algorithm of the +.B key add +command (see +.BR key (1)) +to generate the key. .PP As well as the signature algorithm itself, a hash function is used. This is taken from the