From 0b967c337bb5f8669bad8d2a2db6cf8b27424646 Mon Sep 17 00:00:00 2001 From: Tulir Asokan Date: Thu, 5 Mar 2026 17:35:22 +0200 Subject: [PATCH] Update content/client-server-api/modules/end_to_end_encryption.md Co-authored-by: Denis Kasak --- content/client-server-api/modules/end_to_end_encryption.md | 6 +++--- 1 file changed, 3 insertions(+), 3 deletions(-) diff --git a/content/client-server-api/modules/end_to_end_encryption.md b/content/client-server-api/modules/end_to_end_encryption.md index 40272015..ca51befa 100644 --- a/content/client-server-api/modules/end_to_end_encryption.md +++ b/content/client-server-api/modules/end_to_end_encryption.md @@ -270,9 +270,9 @@ key, and encrypts the file using AES-CTR. The counter is 64 bits long, starting at 0 and prefixed by a random 64-bit Initialization Vector (IV), which together form a 128-bit unique counter block. -Clients MUST generate both the AES key and IV using a secure random -source and MUST NOT use the same key or IV multiple times. The latter -64 bits of the 128-bit counter block MUST start at zero. +Clients MUST generate both the AES key and IV using a cryptographically +secure random source and MUST NOT use the same key or IV multiple +times. The latter 64 bits of the 128-bit counter block MUST start at zero. {{% boxes/warning %}} An IV must never be used multiple times with the same key. This implies