From e4c032b5b2ad202c973d6dcf547d37c3a4c6b827 Mon Sep 17 00:00:00 2001 From: Evan Su <48808396+HACKERALERT@users.noreply.github.com> Date: Sat, 27 Aug 2022 23:39:34 -0400 Subject: [PATCH] Update links --- Internals.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/Internals.md b/Internals.md index 94f829c..f4d2208 100644 --- a/Internals.md +++ b/Internals.md @@ -10,7 +10,7 @@ Picocrypt uses the following cryptographic primitives: - Normal mode: 4 passes, 1 GiB memory, 4 threads - Paranoid mode: 8 passes, 1 GiB memory, 8 threads -All primitives used are from the well-known [golang.org/x/crypto](https://golang.org/x/crypto) module. +All primitives used are from the well-known [golang.org/x/crypto](https://pkg.go.dev/golang.org/x/crypto) module. # Counter Overflow Since XChaCha20 has a max message size of 256 GiB, Picocrypt will use the HKDF-SHA3 mentioned above to generate a new nonce for XChaCha20 and a new IV for Serpent if the total encrypted data is more than 60 GiB. While this threshold can be increased up to 256 GiB, Picocrypt uses 60 GiB to prevent any edge cases with blocks or the counter used by Serpent.