Skip to content

Commit

Permalink
fix(docs): links to ANSSI documents
Browse files Browse the repository at this point in the history
  • Loading branch information
JulioLoayzaM committed Sep 23, 2024
1 parent 75089f3 commit 1d9b0a7
Show file tree
Hide file tree
Showing 8 changed files with 9 additions and 10 deletions.
2 changes: 1 addition & 1 deletion docs/source/method/AES.md
Original file line number Diff line number Diff line change
Expand Up @@ -146,7 +146,7 @@ authenticity of the message.

## ANSSI rules and recommendations

> Source: [ANSSI - Guide des mécanismes cryptographiques](https://www.ssi.gouv.fr/uploads/2021/03/anssi-guide-mecanismes_crypto-2.04.pdf)
> Source: [Guide des mécanismes cryptographiques](https://cyber.gouv.fr/sites/default/files/2021/03/anssi-guide-mecanismes_crypto-2.04.pdf)
### Symmetric keys

Expand Down
2 changes: 1 addition & 1 deletion docs/source/method/ChaCha20.md
Original file line number Diff line number Diff line change
Expand Up @@ -67,7 +67,7 @@ block counter is at 1.

## ANSSI rules and recommendations

> Reference: [ANSSI - Guide des mécanismes cryptographiques](https://www.ssi.gouv.fr/uploads/2021/03/anssi-guide-mecanismes_crypto-2.04.pdf)
> Source: [Guide des mécanismes cryptographiques](https://cyber.gouv.fr/sites/default/files/2021/03/anssi-guide-mecanismes_crypto-2.04.pdf)
### Symmetric keys

Expand Down
2 changes: 1 addition & 1 deletion docs/source/method/ECDH.md
Original file line number Diff line number Diff line change
Expand Up @@ -56,7 +56,7 @@ introducing the cofactor $h$ to the mix in the steps 5 and 6:

## ANSSI rules and recommendations

> Source: [Guide des méchanismes cryptographiques](https://www.ssi.gouv.fr/uploads/2021/03/anssi-guide-mecanismes_crypto-2.04.pdf)
> Source: [Guide des mécanismes cryptographiques](https://cyber.gouv.fr/sites/default/files/2021/03/anssi-guide-mecanismes_crypto-2.04.pdf)
### Discrete logarithm for elliptic curves defined over $GF(p)$

Expand Down
3 changes: 1 addition & 2 deletions docs/source/method/ECDSA.md
Original file line number Diff line number Diff line change
Expand Up @@ -121,7 +121,7 @@ bit generator shall be used when generating signatures.

## ANSSI rules and recommendations

> Source: [ANSSI - Guide des mécanismes cryptographiques][ANSSI-PG-083]
> Source: [Guide des mécanismes cryptographiques](https://cyber.gouv.fr/sites/default/files/2021/03/anssi-guide-mecanismes_crypto-2.04.pdf)
### Discrete logarithm for elliptic curves defined over GF({math}`p`)

Expand Down Expand Up @@ -229,7 +229,6 @@ system" ([FIPS 186-5][FIPS186]).

<!-- References -->
[ANSSI-PA-079]: https://www.ssi.gouv.fr/uploads/2021/03/anssi-guide-selection_crypto-1.0.pdf
[ANSSI-PG-083]: https://www.ssi.gouv.fr/uploads/2021/03/anssi-guide-mecanismes_crypto-2.04.pdf
[FIPS180]: https://csrc.nist.gov/publications/detail/fips/180/4/final
[FIPS186]: https://csrc.nist.gov/publications/detail/fips/186/5/final
[FIPS202]: https://csrc.nist.gov/publications/detail/fips/202/final
Expand Down
4 changes: 2 additions & 2 deletions docs/source/method/HMAC.md
Original file line number Diff line number Diff line change
Expand Up @@ -70,7 +70,7 @@ constructions based on SHA-1 and SHA-2, such as $H(k || m)$, are vulnerable to.

## ANSSI rules and recommendations

> Source: [ANSSI - Guide des mécanismes cryptographiques](https://www.ssi.gouv.fr/uploads/2021/03/anssi-guide-mecanismes_crypto-2.04.pdf)
> Source: [Guide des mécanismes cryptographiques](https://cyber.gouv.fr/sites/default/files/2021/03/anssi-guide-mecanismes_crypto-2.04.pdf)
:::{admonition} RègleIntegSym
:class: attention
Expand All @@ -91,7 +91,7 @@ constructions based on SHA-1 and SHA-2, such as $H(k || m)$, are vulnerable to.

## ANSSI notes and recommendations

> Source [ANSSI - Guide de sélection d'algorithmes cryptographiques](https://cyber.gouv.fr/sites/default/files/2021/03/anssi-guide-selection_crypto-1.0.pdf).
> Source: [Guide de sélection d'algorithmes cryptographiques](https://cyber.gouv.fr/sites/default/files/2021/03/anssi-guide-selection_crypto-1.0.pdf)
For bandwidth reasons, MACs can be truncated. The size of the output must be
sufficiently large to prevent an adversary from randomly generating a valid MAC.
Expand Down
2 changes: 1 addition & 1 deletion docs/source/method/RSAES.md
Original file line number Diff line number Diff line change
Expand Up @@ -132,7 +132,7 @@ decrypt, whose length is at most $k$. It returns the resulting plaintext.

## ANSSI rules and recommendations

> Source: [ANSSI - Guide des mécanismes cryptographiques](https://www.ssi.gouv.fr/uploads/2021/03/anssi-guide-mecanismes_crypto-2.04.pdf)
> Source: [Guide des mécanismes cryptographiques](https://cyber.gouv.fr/sites/default/files/2021/03/anssi-guide-mecanismes_crypto-2.04.pdf)
### Factorisation

Expand Down
2 changes: 1 addition & 1 deletion docs/source/method/RSASSA.md
Original file line number Diff line number Diff line change
Expand Up @@ -132,7 +132,7 @@ decrypt, whose length is at most $k$. It returns the resulting plaintext.

## ANSSI rules and recommendations

> Source: [ANSSI - Guide des mécanismes cryptographiques](https://www.ssi.gouv.fr/uploads/2021/03/anssi-guide-mecanismes_crypto-2.04.pdf)
> Source: [Guide des mécanismes cryptographiques](https://cyber.gouv.fr/sites/default/files/2021/03/anssi-guide-mecanismes_crypto-2.04.pdf)
### Factorisation

Expand Down
2 changes: 1 addition & 1 deletion docs/source/method/SHA.md
Original file line number Diff line number Diff line change
Expand Up @@ -78,7 +78,7 @@ SHAKE256, Variable {math}`d`, "{math}`\min(d/2, 256)`", "{math}`\ge \min(d/2, 25

## ANSSI rules and recommendations

> Source: [ANSSI - Guide des mécanismes cryptographiques](https://www.ssi.gouv.fr/uploads/2021/03/anssi-guide-mecanismes_crypto-2.04.pdf)
> Source: [Guide des mécanismes cryptographiques](https://cyber.gouv.fr/sites/default/files/2021/03/anssi-guide-mecanismes_crypto-2.04.pdf)
:::{admonition} RegleHash
:class: attention
Expand Down

0 comments on commit 1d9b0a7

Please sign in to comment.