[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
[taler-anastasis] branch master updated: last changes?
From: |
gnunet |
Subject: |
[taler-anastasis] branch master updated: last changes? |
Date: |
Thu, 11 Jun 2020 17:11:34 +0200 |
This is an automated email from the git hooks/post-receive script.
ds-meister pushed a commit to branch master
in repository anastasis.
The following commit(s) were added to refs/heads/master by this push:
new 967517b last changes?
967517b is described below
commit 967517b1bd85c09196e9963a9152a558aa7bd028
Author: Dominik Meister <dominiksamuel.meister@students.bfh.ch>
AuthorDate: Thu Jun 11 17:11:28 2020 +0200
last changes?
---
doc/thesis/client_architecture.tex | 6 +++---
doc/thesis/design.tex | 2 +-
doc/thesis/server_architecture.tex | 2 +-
3 files changed, 5 insertions(+), 5 deletions(-)
diff --git a/doc/thesis/client_architecture.tex
b/doc/thesis/client_architecture.tex
index e112545..fc890e3 100644
--- a/doc/thesis/client_architecture.tex
+++ b/doc/thesis/client_architecture.tex
@@ -36,7 +36,7 @@ struct kdf_id
\end{lstlisting}
\item
-The account\_private\_key is used to sign the data and check the signature
later. It is a 256-bit eddsa private key. It is generated with the kdf\_id as
entropy source.
+The account\_private\_key is used to sign the data and check the signature
later. It is a 256-bit EdDSA private key. It is generated with the kdf\_id as
entropy source.
\begin{lstlisting}
struct account_private_key
{
@@ -73,7 +73,7 @@ struct truth_seed
\end{lstlisting}
\item
-The truth\_private\_key is used to sign the encrypted key share and the
encrypted authentication data. It is a 256-bit eddsa private key. It is
generated with the truth seed as entropy source.
+The truth\_private\_key is used to sign the encrypted key share and the
encrypted authentication data. It is a 256-bit EdDSA private key. It is
generated with the truth seed as entropy source.
\begin{lstlisting}
struct truth_private_key
{
@@ -119,7 +119,7 @@ struct key_share
\end{lstlisting}
\item
-Before every encryption a random 256-bit large nonce is generated. This gives
the encrpytion algorithm a random factor.
+Before every encryption a random 256-bit large nonce is generated. This gives
the encryption algorithm a random factor.
\begin{lstlisting}
struct nonce
{
diff --git a/doc/thesis/design.tex b/doc/thesis/design.tex
index 553d96f..cbab0a4 100644
--- a/doc/thesis/design.tex
+++ b/doc/thesis/design.tex
@@ -209,7 +209,7 @@ this document we will simply refer to this information as
the
{\em user attributes}.
For each Anastasis provider, a {\em kdf id} key is derived from the
-user’s attributes and a provider salt using Aargon2~\cite{BDK2016}, a
+user’s attributes and a provider salt using Argon2~\cite{BDK2016}, a
computationally expensive cryptographic hash function. Using an
expensive hash algorithm is assumed to make it harder for a weak
adversary to determine user attributes by brute force guessing. The
diff --git a/doc/thesis/server_architecture.tex
b/doc/thesis/server_architecture.tex
index 582ce9a..264f488 100644
--- a/doc/thesis/server_architecture.tex
+++ b/doc/thesis/server_architecture.tex
@@ -94,7 +94,7 @@ result in accidental information leakage about the user from
the image
before encrypting and uploading it to the Anastasis provider.
For recovery, the user must first send a request to server that they
-wants to authorize recovery (GET /truth/\$TRUTH\_PUB). The Anastassis
+wants to authorize recovery (GET /truth/\$TRUTH\_PUB). The Anastasis
provider will then decrypt the user's image and send a request with a
\$TOKEN to a video authentication provider that a user wants to
authenticate, and respond to the user with a link to a video
--
To stop receiving notification emails like this one, please contact
gnunet@gnunet.org.
[Prev in Thread] |
Current Thread |
[Next in Thread] |
- [taler-anastasis] branch master updated: last changes?,
gnunet <=