[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
[taler-anastasis] branch master updated: rework
From: |
gnunet |
Subject: |
[taler-anastasis] branch master updated: rework |
Date: |
Thu, 11 Jun 2020 12:19:00 +0200 |
This is an automated email from the git hooks/post-receive script.
ds-meister pushed a commit to branch master
in repository anastasis.
The following commit(s) were added to refs/heads/master by this push:
new b0e1e53 rework
b0e1e53 is described below
commit b0e1e53efdffa85a0b98a44a1c8ab68660d0a910
Author: Dominik Meister <dominiksamuel.meister@students.bfh.ch>
AuthorDate: Thu Jun 11 12:18:56 2020 +0200
rework
---
doc/thesis/client_architecture.tex | 40 ++++++++++++++++++++++++++++++++------
1 file changed, 34 insertions(+), 6 deletions(-)
diff --git a/doc/thesis/client_architecture.tex
b/doc/thesis/client_architecture.tex
index 898a870..6bddfbf 100644
--- a/doc/thesis/client_architecture.tex
+++ b/doc/thesis/client_architecture.tex
@@ -36,18 +36,18 @@ struct kdf_id
\end{lstlisting}
\item
-The private key is used to sign the data and check the signature later. It is
a 256-bit eddsa private key. It is generated with the kdf\_id as entropy source.
+The account\_private\_key is used to sign the data and check the signature
later. It is a 256-bit eddsa private key. It is generated with the kdf\_id as
entropy source.
\begin{lstlisting}
-struct private_key
+struct account_private_key
{
eddsa_private_key;
}
\end{lstlisting}
\item
-The public key is used as the user identification on the different providers.
It is generated from the private\_key.
+The account\_public\_key is used as the user identification on the different
providers. It is generated from the private\_key.
\begin{lstlisting}
-struct public_key
+struct account_public_key
{
eddsa_public_key;
}
@@ -62,6 +62,34 @@ struct truth_key
}
\end{lstlisting}
+\item
+The truth\_seed is a randomly generated nonce with a size of 32 Bytes. It is
used to derive a truth\_private\_key
+and is stored within an encrypted recovery document.
+\begin{lstlisting}
+struct truth_seed
+{
+ nonce; //256Bit
+}
+\end{lstlisting}
+
+\item
+The truth\_private\_key is used to sign the encrypted key share and the
encrypted authentication data. It is a 256-bit eddsa private key. It is
generated with the truth seed as entropy source.
+\begin{lstlisting}
+struct truth_private_key
+{
+ eddsa_private_key;
+}
+\end{lstlisting}
+
+The truth\_public\_key is used as the user identification on the different
providers in case of uploaded truths. It is generated from the truth private
key.
+ \begin{lstlisting}
+struct truth_public_key
+{
+ eddsa_public_key;
+}
+\end{lstlisting}
+
+
\item
Anastasis needs different symmetric keys to encrypt data for example, the
recovery document. These symmetric keys are all 256-bit large hashcodes. These
symmetric keys are generated through the key routine defined in Implementation
Key usage.
\begin{lstlisting}
@@ -104,7 +132,7 @@ To use AES-256 GCM an IV must be generated. It is generated
with an HKDF over a
\begin{lstlisting}
struct iv
{
- hashcode; //128 bit
+ hashcode; //128-bit
}
\end{lstlisting}
@@ -113,7 +141,7 @@ The aes\_tag is generated after each encryption, it is
later used to check the i
\begin{lstlisting}
struct aes_tag
{
- hashcode; //128 bit
+ hashcode; //128-bit
}
\end{lstlisting}
\end{itemize}
--
To stop receiving notification emails like this one, please contact
gnunet@gnunet.org.
- [taler-anastasis] branch master updated: rework,
gnunet <=