|
1 | | -# rss |
2 | | -Cryptographic library for websites compatible with very old browsers based on gost standards |
| 1 | +# Russian-secured-site |
| 2 | + |
| 3 | +## Introduction |
| 4 | +It is a *javascript* cryptography library offering a symmetric cipher and a hashing algorithm\ |
| 5 | +The encryption algorithm is [**GOST 28147-89**](https://en.wikipedia.org/wiki/GOST_(block_cipher))\ |
| 6 | +The hash algorithm is [**GOST R 34.11-94**](https://en.wikipedia.org/wiki/GOST_(hash_function)) in two variants: *standard* and *crypto*, see details below |
| 7 | + |
| 8 | +## Details |
| 9 | +The cipher (called *magma*) is implemented with updated sbox from **RFC 8891** |
| 10 | + |
| 11 | +The hash function is available in two variants: |
| 12 | + - Standard variant (with sbox from **RFC 4351**), commonly called *GOST* |
| 13 | + - The *CryptoPro* variant is implemented with sbox suggested by [CryptoPro company](https://www.cryptopro.ru) in **RFC 4357**, commonly called *gost-crypto* |
| 14 | + |
| 15 | +## Installation/Usage |
| 16 | +``` html |
| 17 | +<script type='text/javascript' src='gost_hash.js'></script> |
| 18 | +<script type='text/javascript' src='gost.js'></script> |
| 19 | +``` |
| 20 | +Hash and cipher are independent, so you can use only one if needed |
| 21 | + |
| 22 | +## Compatibility |
| 23 | +You can find a lots of richer and better alternative cryptographic libraries for your site\ |
| 24 | +But you won't find a lot of solutions compliant with for **ECMAScript 3**\ |
| 25 | +RSS has been tested with most modern browsers down to **MSIE7**\ |
| 26 | +so you shouldn't have any compatibility issues! |
| 27 | + |
| 28 | +## Security |
| 29 | +Short explanation: you can trust |
| 30 | + |
| 31 | +Long explanation: |
| 32 | + |
| 33 | +Cipher is considered *deeply flawed*, and known attacks are much better than brute-force, **but** still require a lot of resources.\ |
| 34 | +For further details and references see links on [wikipedia page](https://en.wikipedia.org/wiki/GOST_(block_cipher)) in section *Cryptanalysis of GOST* |
| 35 | + |
| 36 | +Hash algorithm is considered broken, but again the efforts required are far from practical.\ |
| 37 | +See details in [this paper](https://doi.org/10.1007%2F978-3-540-85174-5_10) |
0 commit comments