X-Git-Url: https://git.distorted.org.uk/u/mdw/catacomb/blobdiff_plain/f9e5133271af9c7a63be8584e4c2705adb241bc2..298182ad446aaced14dea7ed0e7c968946787288:/catcrypt.1 diff --git a/catcrypt.1 b/catcrypt.1 index d4ef3e1..61da7f9 100644 --- a/catcrypt.1 +++ b/catcrypt.1 @@ -184,6 +184,16 @@ Use the algorithm of the .BR key (1)) command to generate the key. +.TP +.B symm +This is a simple symmetric encapsulation scheme. It works by hashing a +binary key with a randomly-generated salt. Use the +.B binary +algorithm of the +.B key add +command (see +.BR key (1)) +to generate the key. .PP As well as the KEM itself, a number of supporting algorithms are used. These are taken from appropriately named attributes on the key or, @@ -335,6 +345,21 @@ algorithm of the command (see .BR key (1)) to generate the key. +.TP +.B mac +This uses a symmetric message-authentication algorithm rather than a +digital signature. The precise message-authentication scheme used is +determined by the +.B mac +attribute on the key, which defaults to +.IB hash -hmac +if unspecified. Use the +.B binary +algorithm of the +.B key add +command (see +.BR key (1)) +to generate the key. .PP As well as the signature algorithm itself, a hash function is used. This is taken from the