File tree Expand file tree Collapse file tree 1 file changed +9
-3
lines changed Expand file tree Collapse file tree 1 file changed +9
-3
lines changed Original file line number Diff line number Diff line change @@ -14,9 +14,11 @@ privacy we wanted.
14
14
Background
15
15
------------------------------
16
16
17
- Orwell uses the excellent [ Bouncy Castle] ( http://www.bouncycastle.org/java.html ) library
18
- as a basis for much of the functionality provided, with enhancements made to improve the
19
- security of the block ciphers used.
17
+ Orwell uses [ Stripped Castle] ( https://github.com/gnu-user/strippedcastle ) , which is
18
+ a modified version of the the excellent [ Bouncy Castle] ( http://www.bouncycastle.org/java.html )
19
+ library as a basis for much of the functionality provided. Stripped Castle is the same as
20
+ Bouncy Castle, just with slight enhancements made to support using Bouncy Castle on Android and
21
+ to improve the security of the block ciphers used.
20
22
21
23
22
24
Security
@@ -27,6 +29,10 @@ key exchange protocol uses a unique signing scheme based on the use of *a priori
27
29
information to facilitate signing and verifying the keys, rather than depending on a
28
30
centralized Certificate Authority.
29
31
32
+ After the key exchange a hybrid encryption scheme is used known as Integrated Encryption
33
+ Scheme ([ IES] ( http://en.wikipedia.org/wiki/Integrated_Encryption_Scheme ) ) to facilitate
34
+ sending and receiving encrypted messages by using the Elliptic Curves and * a priori*
35
+ information in order to derive the symmetric keys that are used.
30
36
31
37
32
38
Copyright (Really Copyleft)
You can’t perform that action at this time.
0 commit comments