Confirmed users
971
edits
Tarek.ziade (talk | contribs) |
|||
Line 40: | Line 40: | ||
<li>Mobile and Desktop complete the two roundtrips of JPAKE messages to agree upon a secret key.</li> | <li>Mobile and Desktop complete the two roundtrips of JPAKE messages to agree upon a secret key.</li> | ||
<li>The secret key is the sha256 hash of the K number, as returned by python-jpake.</li> | <li>The secret key is the sha256 hash of the K number, as returned by python-jpake.</li> | ||
<li>In third round trip, Mobile hashes the key using SHA256d (=hash twice with SHA256) and uploads it. Desktop verifies it against its key and uploads the encrypted credentials in turn, adding a SHA256-HMAC hash of the | <li>In third round trip, Mobile hashes the key using SHA256d (=hash twice with SHA256) and uploads it. Desktop verifies it against its key and uploads the encrypted credentials in turn, adding a SHA256-HMAC hash of the ciphertext. Mobile verifies whether Desktop had the right key by checking the ciphertext against the SHA256-HMAC hash.</li> | ||
</ul> | </ul> | ||