gnunet-svn
[Top][All Lists]
Advanced

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

[taler-anastasis] branch master updated: rework


From: gnunet
Subject: [taler-anastasis] branch master updated: rework
Date: Thu, 11 Jun 2020 12:19:00 +0200

This is an automated email from the git hooks/post-receive script.

ds-meister pushed a commit to branch master
in repository anastasis.

The following commit(s) were added to refs/heads/master by this push:
     new b0e1e53  rework
b0e1e53 is described below

commit b0e1e53efdffa85a0b98a44a1c8ab68660d0a910
Author: Dominik Meister <dominiksamuel.meister@students.bfh.ch>
AuthorDate: Thu Jun 11 12:18:56 2020 +0200

    rework
---
 doc/thesis/client_architecture.tex | 40 ++++++++++++++++++++++++++++++++------
 1 file changed, 34 insertions(+), 6 deletions(-)

diff --git a/doc/thesis/client_architecture.tex 
b/doc/thesis/client_architecture.tex
index 898a870..6bddfbf 100644
--- a/doc/thesis/client_architecture.tex
+++ b/doc/thesis/client_architecture.tex
@@ -36,18 +36,18 @@ struct kdf_id
 \end{lstlisting}
 
 \item
-The private key is used to sign the data and check the signature later. It is 
a 256-bit eddsa private key. It is generated with the kdf\_id as entropy source.
+The account\_private\_key is used to sign the data and check the signature 
later. It is a 256-bit eddsa private key. It is generated with the kdf\_id as 
entropy source.
 \begin{lstlisting}
-struct private_key
+struct account_private_key
 {
   eddsa_private_key;
 }
 \end{lstlisting}
 
 \item
-The public key is used as the user identification on the different providers. 
It is generated from the private\_key.
+The account\_public\_key is used as the user identification on the different 
providers. It is generated from the private\_key.
 \begin{lstlisting}
-struct public_key
+struct account_public_key
 {
   eddsa_public_key;
 }
@@ -62,6 +62,34 @@ struct truth_key
 }
 \end{lstlisting}
 
+\item
+The truth\_seed is a randomly generated nonce with a size of 32 Bytes. It is 
used to derive a truth\_private\_key
+and is stored within an encrypted recovery document.
+\begin{lstlisting}
+struct truth_seed
+{
+  nonce; //256Bit
+}
+\end{lstlisting}
+
+\item
+The truth\_private\_key is used to sign the encrypted key share and the 
encrypted authentication data. It is a 256-bit eddsa private key. It is 
generated with the truth seed as entropy source.
+\begin{lstlisting}
+struct truth_private_key
+{
+   eddsa_private_key;
+}
+\end{lstlisting}
+
+The truth\_public\_key is used as the user identification on the different 
providers in case of uploaded truths. It is generated from the truth private 
key.
+ \begin{lstlisting}
+struct truth_public_key
+{
+  eddsa_public_key;
+}
+\end{lstlisting}
+
+
 \item
 Anastasis needs different symmetric keys to encrypt data for example, the 
recovery document. These symmetric keys are all 256-bit large hashcodes. These 
symmetric keys are generated through the key routine defined in Implementation 
Key usage.
 \begin{lstlisting}
@@ -104,7 +132,7 @@ To use AES-256 GCM an IV must be generated. It is generated 
with an HKDF over a
 \begin{lstlisting}
 struct iv
 {
-  hashcode; //128 bit
+  hashcode; //128-bit
 }
 \end{lstlisting}
 
@@ -113,7 +141,7 @@ The aes\_tag is generated after each encryption, it is 
later used to check the i
 \begin{lstlisting}
 struct aes_tag
 {
-  hashcode; //128 bit
+  hashcode; //128-bit
 }
 \end{lstlisting}
 \end{itemize}

-- 
To stop receiving notification emails like this one, please contact
gnunet@gnunet.org.



reply via email to

[Prev in Thread] Current Thread [Next in Thread]