This repository was archived by the owner on Apr 20, 2025. It is now read-only.
File tree Expand file tree Collapse file tree 3 files changed +10
-3
lines changed Expand file tree Collapse file tree 3 files changed +10
-3
lines changed Original file line number Diff line number Diff line change @@ -5,9 +5,10 @@ Compatibility with standards
55.. index :: compatibility
66
77Python-RSA implements encryption and signatures according to PKCS#1
8- version 1.5. This makes it compatible with the OpenSSL RSA module.
8+ version 1.5. Additionally, Python-RSA implements multiprime encryption according to PKCS#1
9+ version 2.1. This makes it largely compatible with the OpenSSL RSA module.
910
10- Keys are stored in PEM or DER format according to PKCS#1 v1.5 . Private
11+ Keys are stored in PEM or DER format according to PKCS#1 v2.1 . Private
1112keys are compatible with OpenSSL. However, OpenSSL uses X.509 for its
1213public keys, which are not supported.
1314
Original file line number Diff line number Diff line change @@ -8,7 +8,8 @@ Welcome to Python-RSA's documentation!
88
99Python-RSA is a pure-Python RSA implementation. It supports
1010encryption and decryption, signing and verifying signatures, and key
11- generation according to PKCS#1 version 1.5.
11+ generation according to PKCS#1 version 1.5. Additionally, Python-RSA
12+ implements multirime encryption according to PKCS#1 version 2.1.
1213
1314If you have the time and skill to improve the implementation, by all
1415means be my guest. The best way is to clone the `Git
Original file line number Diff line number Diff line change @@ -40,6 +40,11 @@ Alternatively you can use :py:meth:`rsa.PrivateKey.load_pkcs1` and
4040 ... keydata = privatefile.read()
4141 >>> privkey = rsa.PrivateKey.load_pkcs1(keydata)
4242
43+ PKCS#1 v2.1 allows you to generate RSA keys with multiple primes:
44+
45+ >>> import rsa
46+ >>> (pubkey, privkey) = rsa.newkeys(512 , nprimes = 3 )
47+
4348
4449Time to generate a key
4550++++++++++++++++++++++
You can’t perform that action at this time.
0 commit comments