Services/KeyExchange: Difference between revisions

Jump to navigation Jump to search
Line 38: Line 38:


<ul>
<ul>
   <li>Mobile and Desktop complete the two roundtrips of JPAKE messages to agree upon a strong secret, the K number.</li>
   <li>Mobile and Desktop complete the two roundtrips of JPAKE messages to agree upon a strong secret K</li>
   <li>A 256 bit key is derived from K using HMAC-SHA256 with a fixed 256bit HMAC key.
   <li>A 256 bit key is derived from K using HMAC-SHA256.</li>
   <li>The encryption and hmac keys are derived from that 256 bit key using HMAC-SHA256.</li>
   <li>The encryption and hmac keys are derived from that 256 bit key using HMAC-SHA256.</li>
   <li>In third round trip:
   <li>In third round trip:
canmove, Confirmed users
725

edits

Navigation menu