diff --git a/RNS/Packet.py b/RNS/Packet.py index feadb1c..76f5bcc 100755 --- a/RNS/Packet.py +++ b/RNS/Packet.py @@ -43,10 +43,10 @@ class Packet: For ``RNS.Destination.GROUP`` destinations, Reticulum will use the pre-shared key configured for the destination. All packets to group - destinations are encrypted with the same AES-128 key. + destinations are encrypted with the same AES-256 key. For ``RNS.Destination.SINGLE`` destinations, Reticulum will use a newly - derived ephemeral AES-128 key for every packet. + derived ephemeral AES-256 key for every packet. For :ref:`RNS.Link` destinations, Reticulum will use per-link ephemeral keys, and offers **Forward Secrecy**. diff --git a/docs/source/understanding.rst b/docs/source/understanding.rst index bdc4cea..168d4a5 100644 --- a/docs/source/understanding.rst +++ b/docs/source/understanding.rst @@ -453,7 +453,7 @@ For exchanges of small amounts of information, Reticulum offers the *Packet* API public signing key. * | In case the packet is addressed to a *group* destination type, the packet will be encrypted with the - pre-shared AES-128 key associated with the destination. In case the packet is addressed to a *plain* + pre-shared AES-256 key associated with the destination. In case the packet is addressed to a *plain* destination type, the payload data will not be encrypted. Neither of these two destination types can offer forward secrecy. In general, it is recommended to always use the *single* destination type, unless it is strictly necessary to use one of the others. @@ -880,7 +880,7 @@ intentionally compromised or weakened clone. The utilised primitives are: * Ephemeral keys derived from an ECDH key exchange on Curve25519 - * AES-128 or AES-256 in CBC mode with PKCS7 padding + * AES-256 in CBC mode with PKCS7 padding * HMAC using SHA256 for message authentication @@ -892,7 +892,7 @@ intentionally compromised or weakened clone. The utilised primitives are: * SHA-512 -In the default installation configuration, the ``X25519``, ``Ed25519``, ``AES-128-CBC`` and ``AES-256-CBC`` +In the default installation configuration, the ``X25519``, ``Ed25519`` and ``AES-256-CBC`` primitives are provided by `OpenSSL `_ (via the `PyCA/cryptography `_ package). The hashing functions ``SHA-256`` and ``SHA-512`` are provided by the standard Python `hashlib `_. The ``HKDF``, ``HMAC``, diff --git a/docs/source/whatis.rst b/docs/source/whatis.rst index 01cbb1b..5297d68 100644 --- a/docs/source/whatis.rst +++ b/docs/source/whatis.rst @@ -68,7 +68,7 @@ What does Reticulum Offer? * Ephemeral per-packet and link keys and derived from an ECDH key exchange on Curve25519 - * AES-128 or AES-256 in CBC mode with PKCS7 padding + * AES-256 in CBC mode with PKCS7 padding * HMAC using SHA256 for authentication