![]() (This is where the handshake differs from Signal, by the simplistic use of XOR instead of a special key derivation function. These three are XORed to derive one symmetric key, which is used to encrypt the message, along with a randomly generated nonce that is prepended to the ciphertext.You derive 3 shared secrets from the 4 keypairs: both ephemeral keys combined, and each party's ephemeral key combined with the other party's long-term key.When you want to send someone a message, you generate an ephemeral keypair for sending, and ask their homeserver for their ephemeral public key.You generate an ephemeral keypair for receiving and publish the public part on your homeserver.There are no human-readable usernames as there are in email your Sufec address is not otherwise stated, all numbers are serialized in big-endian format.Įach Sufec message is encrypted with a key derived from the long-term key pair and an ephemeral key pair from each party (this is based on the Signal handshake and is supposed to have the same properties): A user has a *homeserver* through which they receive messages, and a long-term public/private key pair, whose public part is their ID. Sufec is formally a federated protocol, similar to email. Resilience: it should be difficult for an attacker to prevent communication by attacking or controlling homeservers.Metadata protection: Sufec should minimize the amount of metadata that an attacker can gather by recording network traffic, even if the attacker controls the homeservers.Forgeability: if an attacker compromises message plaintext, they shouldn't be able to prove anything about it to a third party, not even that a message was sent. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |