From f16fc463d3272261548ca3d3cb31cf1eef54c399 Mon Sep 17 00:00:00 2001 From: Paul Miller Date: Thu, 29 Jun 2023 00:43:28 +0000 Subject: [PATCH] Description update --- README.md | 6 +++--- package.json | 5 ++++- 2 files changed, 7 insertions(+), 4 deletions(-) diff --git a/README.md b/README.md index 5879e7a..28fe762 100644 --- a/README.md +++ b/README.md @@ -1,13 +1,13 @@ # noble-ciphers -Auditable & minimal JS implementation of AES SIV, Salsa20 and ChaCha20. +Auditable & minimal JS implementation of Salsa20, ChaCha, Poly1305 & AES-SIV - 🔒 Auditable - ðŸ”ŧ Tree-shaking-friendly: use only what's necessary, other code won't be included - 🏎 [Ultra-fast](#speed), hand-optimized for caveats of JS engines - 🔍 Unique tests ensure correctness: property-based, cross-library and Wycheproof vectors - 💞 AES: GCM (Galois Counter Mode), SIV (Nonce Misuse-Resistant encryption) -- 💃 Salsa20, ChaCha20, XSalsa20, XChaCha20, Poly1305, ChaCha8, ChaCha12 +- 💃 Salsa20, ChaCha, XSalsa20, XChaCha, Poly1305, ChaCha8, ChaCha12 - ✍ïļ FF1 format-preserving encryption - 🧂 Compatible with NaCl / libsodium secretbox - ðŸŠķ Just 500 lines / 4KB gzipped for Salsa + ChaCha + Poly build @@ -115,7 +115,7 @@ ChaCha20 and AES-GCM use 96-bit / 12-byte nonces, which implies higher chance of collision. In the example above, `random()` can collide and produce repeating nonce. -To safely use random nonces, utilize XSalsa20 or XChaCha20: +To safely use random nonces, utilize XSalsa20 or XChaCha: they increased nonce length to 192-bit, minimizing a chance of collision. AES-SIV is also fine. In situations where you can't use eXtended-nonce algorithms, key rotation is advised. hkdf would work great for this case. diff --git a/package.json b/package.json index a72518b..9889b87 100644 --- a/package.json +++ b/package.json @@ -1,7 +1,7 @@ { "name": "@noble/ciphers", "version": "0.1.2", - "description": "Auditable & minimal JS implementation of AES SIV, Salsa20 and ChaCha20", + "description": "Auditable & minimal JS implementation of Salsa20, ChaCha, Poly1305 & AES-SIV", "files": [ "esm", "src", @@ -122,6 +122,9 @@ "xsalsa20", "xchacha20", "poly1305", + "xsalsa20poly1305", + "chacha20poly1305", + "xchacha20poly1305", "secretbox", "rijndael" ],