canmove, Confirmed users
725
edits
Line 38: | Line 38: | ||
<ul> | <ul> | ||
<li>Mobile and Desktop complete the two roundtrips of JPAKE messages to agree upon a strong secret | <li>Mobile and Desktop complete the two roundtrips of JPAKE messages to agree upon a strong secret K</li> | ||
<li>A 256 bit key is derived from K using HMAC-SHA256 | <li>A 256 bit key is derived from K using HMAC-SHA256.</li> | ||
<li>The encryption and hmac keys are derived from that 256 bit key using HMAC-SHA256.</li> | <li>The encryption and hmac keys are derived from that 256 bit key using HMAC-SHA256.</li> | ||
<li>In third round trip: | <li>In third round trip: |