Open Domingo-Gomez-Perez opened 5 months ago
Hi @Domingo-Gomez-Perez , could you specify what you mean by a "file where parameters are generated and some text is encrypted and then decrypted"? Do you mean a binary/executable? Additionally pSwoosh only generates a shared key that can then be used to encrypt information using a symmetric primitive, thus this last part is not part of the implementation.
Sorry, I should have explained myself better. I wanted to see an small example with code to generate a symmetric key. With parameters I mean how to configurate the system, similar to table 1 in your paper.
I would like to have an small sample file where the parameters are generated and some text is encrypted and then decrypted.