From 2665eaa9336540f7f19e05deb7fa4237cbe74f06 Mon Sep 17 00:00:00 2001 From: Douglas Stebila Date: Thu, 29 Oct 2020 19:47:00 -0400 Subject: [PATCH] Documentation updates (#847) [skip ci] --- docs/.Doxyfile | 2 +- docs/algorithms/sig/rainbow.md | 5 +++++ 2 files changed, 6 insertions(+), 1 deletion(-) diff --git a/docs/.Doxyfile b/docs/.Doxyfile index 5303af874..2813e91e2 100644 --- a/docs/.Doxyfile +++ b/docs/.Doxyfile @@ -2034,7 +2034,7 @@ MAN_LINKS = NO # captures the structure of the code including all documentation. # The default value is: NO. -GENERATE_XML = NO +GENERATE_XML = YES # The XML_OUTPUT tag is used to specify where the XML pages will be put. If a # relative path is entered the value of OUTPUT_DIRECTORY will be put in front of diff --git a/docs/algorithms/sig/rainbow.md b/docs/algorithms/sig/rainbow.md index 0af742e28..2e0840eb6 100644 --- a/docs/algorithms/sig/rainbow.md +++ b/docs/algorithms/sig/rainbow.md @@ -29,3 +29,8 @@ Parameter sets | Rainbow-Vc-Classic | EUF-CMA | 5 | 1705536 | 1227104 | 204 | | Rainbow-Vc-Cyclic | EUF-CMA | 5 | 491936 | 1227104 | 204 | | Rainbow-Vc-Cyclic-Compressed | EUF-CMA | 5 | 491936 | 64 | 204 | + +Security considerations +----------------------- + +In October 2020, Beullens announced [improved cryptanalysis of Rainbow](https://eprint.iacr.org/2020/1343.pdf) that somewhat reduces the security of the Round 2 and Round 3 parameters. [As of October 28, 2020](https://groups.google.com/a/list.nist.gov/g/pqc-forum/c/70We3SNi7Ss), the scheme authors have acknowledged the attack and are preparing a response.