Changes

Jump to: navigation, search

Identity/AttachedServices/KeyServerProtocol

47 bytes added, 04:41, 3 July 2013
m
SRP Client Calculation
Once the client knows srpSalt, it computes the same "x" integer as it did in the middle of the srpVerifier calculation. It also converts srpB into an integer named "B". Then it creates a random "a" integer, uses it to compute the string "srpA", then combines srpA with the server's srpB to compute the "u" integer. It then combines the static "k", the password-derived "x", the combined "u", and the server's "B", together with some magic math, to derive the "S" integer. If everything went well, the client will compute the same "S" value as the server did. If not (the password was wrong, or the client is talking to a fake server that doesn't really know srpVerifier), then the two "S" values will not match.
('''Again, it is critical that the client keep its "a" integer a and "x" integers secret, both during and after the protocol run.''')
* a (hex integer, normally random but pre-calculated for this example):
Confirm
471
edits

Navigation menu