Author: kryptos
Date: 2007-07-20 19:37:46 +0000 (Fri, 20 Jul 2007)
New Revision: 14215

Modified:
   branches/freenet-jfk/devnotes/crypto_Notes.txt
Log:
JFK implementation

Modified: branches/freenet-jfk/devnotes/crypto_Notes.txt
===================================================================
--- branches/freenet-jfk/devnotes/crypto_Notes.txt      2007-07-20 17:53:59 UTC 
(rev 14214)
+++ branches/freenet-jfk/devnotes/crypto_Notes.txt      2007-07-20 19:37:46 UTC 
(rev 14215)
@@ -2,13 +2,13 @@

    Message 1, I->R:  Ni, g^i

-   Message 2, R->I:  Ni, Nr, g^r, GRPINFOr, IDr,
+   Message 2, R->I:  Ni, Nr, g^r, GRPINFOr, 
                      SIG{r}(g^r, GRPINFOr), HMAC{HKr}(Ni, Nr, g^i, g^r)

    Message 3, I->R:  Ni, Nr, g^i, g^r, HMAC{HKr}(Ni, Nr, g^i, g^r),
-                     E{Ke}(IDi, sa, SIG{i}(Ni, Nr, g^i, g^r, IDr, sa))
+                     E{Ke}( sa, SIG{i}(Ni, Nr, g^i, g^r))

-   Message 4, R->I:  E{Ke}(SIG{r}(Ni, Nr, g^i, g^r , IDi, sa, sa'), sa')
+   Message 4, R->I:  E{Ke}(SIG{r}(Ni, Nr, g^i, g^r , IDi, sa))


    HKr: A transient hash key private to the Responder; this is a
@@ -16,8 +16,5 @@
         for every different protocol run), which changes periodically:
         the Responder must pick a new g^r every time HKr changes.

-   Kir: A shared key derived from g^ir, Ni, and Nr, used as part of
-        the application SA 
-
-   Ke: A shared key derived from g^ir, Ni, and Nr, used to protect
-       messages 3 and 4 of the protocol.
+   Ke:  A shared key derived from g^ir, Ni, and Nr, used to protect
+        messages 3 and 4 of the protocol.


Reply via email to