Recommend this page to a friend! |
Classes of Scott Arciszewski | Cipher Sweet | docs/examples/04-key-generation.md | Download |
|
DownloadKey GenerationUse Just use
Then save
The sky's the limit, really. Then, either use an existing KeyProvider or define your own, using the KeyProviderInterface. That's all there is to it. Don't do something crazy like try to use a human-memorizable password as
an encryption key without key-stretching (i.e. This library tries to side-step common mistakes, but if you go out of your way to do something insecure, it cannot save you from the consequences of your choices. When in doubt, consult a cryptographer. |