commit 6d00adb924931e17ce5d61dd60b62dfbefacaf29
parent 2ce257e467c2cd9f3eeae77291eeb0240f0f252d
Author: Martin Schanzenbach <schanzen@gnunet.org>
Date: Wed, 10 Jul 2024 15:36:14 +0200
minor
Diffstat:
1 file changed, 4 insertions(+), 4 deletions(-)
diff --git a/draft-gnunet-communicators.xml b/draft-gnunet-communicators.xml
@@ -220,9 +220,9 @@
</t>
</section>
<section anchor="primitives" numbered="true" toc="default">
- <name>General purpose primitives</name>
+ <name>Cryptographic primitives</name>
<section anchor="KeyGen" numbered="true" toc="default">
- <name>Key Generation</name>
+ <name>Key generation</name>
<t> TODO FIXME define "standard" KeyGens</t>
<t>
The general idea when generating an Elligator key pair is is to create both a random high-order curve point and a low-order curve point.
@@ -279,7 +279,7 @@ Dec(REPR):
</section>
<section anchor="key_derivation" numbered="true" toc="default">
- <name>Key Derivation</name>
+ <name>Key derivation</name>
<t>
We use a hash-based key derivation function (HKDF) as defined in
<xref target="RFC5869" />, using SHA-256 <xref target="RFC6234"/> for the extraction
@@ -295,7 +295,7 @@ KDF(A,Z):
]]></artwork>
</section>
<section anchor="elligator_kem" numbered="true" toc="default">
- <name>Key Encapsulation</name>
+ <name>Key encapsulation</name>
<t>
GNUnet utilizes Elligator for the encoding and decoding of the ephemeral public keys
described in Section 5 of <xref target="BHKL13"/>.