diff options
author | Christian Grothoff <christian@grothoff.org> | 2023-06-30 19:08:16 +0200 |
---|---|---|
committer | Christian Grothoff <christian@grothoff.org> | 2023-06-30 19:08:16 +0200 |
commit | d383d75b115e71bb1172cace4571266eca02f9cb (patch) | |
tree | 212f4ec751e020bbf9338221d58d059dcb10c9e4 | |
parent | 20e7b0e60aaa699adc9e954066226aa6147faa7d (diff) | |
download | lsd0001-d383d75b115e71bb1172cace4571266eca02f9cb.tar.gz lsd0001-d383d75b115e71bb1172cace4571266eca02f9cb.zip |
use 'plaintext' instead of 'message' for consistency in the text
-rw-r--r-- | draft-schanzen-gns.xml | 18 |
1 files changed, 9 insertions, 9 deletions
diff --git a/draft-schanzen-gns.xml b/draft-schanzen-gns.xml index fbf778c..bfad4fe 100644 --- a/draft-schanzen-gns.xml +++ b/draft-schanzen-gns.xml | |||
@@ -529,19 +529,19 @@ example.000G006K2TJNMD9VTCYRX7BRVV3HAEPS15E6NHDXKPJA1KAJJEG9AFF884 | |||
529 | blinding zk with different values for the label must result | 529 | blinding zk with different values for the label must result |
530 | in different, unlinkable zk' values. | 530 | in different, unlinkable zk' values. |
531 | </dd> | 531 | </dd> |
532 | <dt>S-Encrypt(zk,label,expiration,message) -> ciphertext</dt> | 532 | <dt>S-Encrypt(zk,label,expiration,plaintext) -> ciphertext</dt> |
533 | <dd> | 533 | <dd> |
534 | is a symmetric encryption function which encrypts the record | 534 | is a symmetric encryption function which encrypts the plaintext |
535 | data based on key material derived from the zone key, | 535 | to derive ciphertext based on key material derived from the zone key zk, |
536 | a label, and an expiration timestamp. | 536 | a label and an expiration timestamp. |
537 | In order to leverage performance-enhancing caching features of certain | 537 | In order to leverage performance-enhancing caching features of certain |
538 | underlying storages, in particular DHTs, a deterministic encryption | 538 | underlying storages, in particular DHTs, a deterministic encryption |
539 | scheme is recommended. | 539 | scheme is recommended. |
540 | </dd> | 540 | </dd> |
541 | <dt>S-Decrypt(zk,label,expiration,ciphertext) -> message</dt> | 541 | <dt>S-Decrypt(zk,label,expiration,ciphertext) -> plaintext</dt> |
542 | <dd> | 542 | <dd> |
543 | is a symmetric decryption function which decrypts the encrypted record | 543 | is a symmetric decryption function which decrypts the ciphertext |
544 | data based on key material derived from the zone key, | 544 | into plaintext based on key material derived from the zone key, |
545 | a label, and an expiration timestamp. | 545 | a label, and an expiration timestamp. |
546 | </dd> | 546 | </dd> |
547 | <dt>Sign(d,message) -> signature</dt> | 547 | <dt>Sign(d,message) -> signature</dt> |
@@ -1436,13 +1436,13 @@ VerifyDerived(zk,label,message,signature): | |||
1436 | (XSalsa20-Poly1305): | 1436 | (XSalsa20-Poly1305): |
1437 | </t> | 1437 | </t> |
1438 | <artwork name="" type="" align="left" alt=""><![CDATA[ | 1438 | <artwork name="" type="" align="left" alt=""><![CDATA[ |
1439 | S-Encrypt(zk,label,expiration,message): | 1439 | S-Encrypt(zk,label,expiration,plaintext): |
1440 | PRK_k := HKDF-Extract ("gns-xsalsa-ctx-key", zk) | 1440 | PRK_k := HKDF-Extract ("gns-xsalsa-ctx-key", zk) |
1441 | PRK_n := HKDF-Extract ("gns-xsalsa-ctx-iv", zk) | 1441 | PRK_n := HKDF-Extract ("gns-xsalsa-ctx-iv", zk) |
1442 | K := HKDF-Expand (PRK_k, label, 256 / 8) | 1442 | K := HKDF-Expand (PRK_k, label, 256 / 8) |
1443 | NONCE := HKDF-Expand (PRK_n, label, 128 / 8) | 1443 | NONCE := HKDF-Expand (PRK_n, label, 128 / 8) |
1444 | IV := NONCE || expiration | 1444 | IV := NONCE || expiration |
1445 | return XSalsa20-Poly1305(K, IV, message) | 1445 | return XSalsa20-Poly1305(K, IV, plaintext) |
1446 | 1446 | ||
1447 | S-Decrypt(zk,label,expiration,ciphertext): | 1447 | S-Decrypt(zk,label,expiration,ciphertext): |
1448 | PRK_k := HKDF-Extract ("gns-xsalsa-ctx-key", zk) | 1448 | PRK_k := HKDF-Extract ("gns-xsalsa-ctx-key", zk) |