Author: toad
Date: 2006-09-06 13:39:06 +0000 (Wed, 06 Sep 2006)
New Revision: 10408

Modified:
   trunk/freenet/src/freenet/node/FNPPacketMangler.java
Log:
Fix comments

Modified: trunk/freenet/src/freenet/node/FNPPacketMangler.java
===================================================================
--- trunk/freenet/src/freenet/node/FNPPacketMangler.java        2006-09-06 
13:36:39 UTC (rev 10407)
+++ trunk/freenet/src/freenet/node/FNPPacketMangler.java        2006-09-06 
13:39:06 UTC (rev 10408)
@@ -289,18 +289,21 @@
                /*
                 * Now, to the real meat
                 * 
-                *  1. Alice generates a random number x and computes and sends 
the exponential g^x to Bob.
-                *      2. Bob generates a random number y and computes the 
exponential g^y.    
-                *      3. Bob computes the shared secret key K = (g^x)^y.
-                *      4. Bob concatenates the exponentials (g^y, g^x) (order 
is important),
+                *  1a. Alice generates a random number x and computes and 
sends the exponential g^x to Bob.
+                *  
+                *      2a. Bob generates a random number y and computes the 
exponential g^y.    
+                *      2b. Bob computes the shared secret key K = (g^x)^y.
+                *      2c. Bob concatenates the exponentials (g^y, g^x) (order 
is important),
                 *        signs them using his asymmetric key B, and then 
encrypts them with K.
-                *    He sends the ciphertext along with his own exponential 
g^y to Alice.
-                *  5. Alice computes the shared secret key K = (gy)x.
-                *  6. Alice decrypts and verifies Bob's signature.
-                *  7. Alice concatenates the exponentials (g^x, g^y) (order is 
important),
+                *  2d. He sends the ciphertext along with his own exponential 
g^y to Alice.
+                *  
+                *  3a. Alice computes the shared secret key K = (gy)x.
+                *  3b. Alice decrypts and verifies Bob's signature.
+                *  3c. Alice concatenates the exponentials (g^x, g^y) (order 
is important),
                 *    signs them using her asymmetric key A, and then encrypts 
them with K.
-                *    She sends the ciphertext to Bob.
-                *  8. Bob decrypts and verifies Alice's signature.
+                *  3d. She sends the ciphertext to Bob.
+                *  
+                *  4. Bob decrypts and verifies Alice's signature.
                 * 
                 *      Alice and Bob are now mutually authenticated and have a 
shared secret.
                 *  This secret, K, can then be used to encrypt further 
communication.


Reply via email to