Document that 1.1 uses AES-256 in GCM mode.

This commit is contained in:
Guus Sliepen 2014-01-20 20:21:15 +01:00
parent 1a115d1d1c
commit e187758a7e

4
README
View file

@ -73,8 +73,8 @@ be forwarded by intermediate nodes.
By default, nodes authenticate each other using 2048 bit RSA (or 521 bit By default, nodes authenticate each other using 2048 bit RSA (or 521 bit
ECDSA*) keys. Traffic is encrypted using Blowfish in CBC mode (or AES-256 in ECDSA*) keys. Traffic is encrypted using Blowfish in CBC mode (or AES-256 in
CTR mode*), authenticated using HMAC-SHA1 (or HMAC-SHA-256*), and is protected GCM mode*), authenticated using HMAC-SHA1 (or GCM*), and is protected against
against replay attacks. replay attacks.
*) When using the ExperimentalProtocol option. *) When using the ExperimentalProtocol option.