Services/KeyExchange: Difference between revisions

Jump to navigation Jump to search
Line 81: Line 81:
The encryption key T(1) and the HMAC key T(2) will be derived from J-PAKE's strong secret K as follows:
The encryption key T(1) and the HMAC key T(2) will be derived from J-PAKE's strong secret K as follows:


  key_string = HMAC-SHA256(K, "Sync-AES_256_CBC-HMAC256")
  extraction_key = {0x83, 0x5b, 0x86, 0x9f, 0x96, 0xfa, 0x3b, 0x50, 0xe6, 0xb5, 0x62, 0xc, 0x41, 0xca, 0xb1, 0x3a, 0x47, 0x7c, 0x76, 0x60, 0x36, 0x95, 0xaa, 0xda, 0xde, 0xc4, 0x57, 0x9, 0xc2, 0x6b, 0x9, 0x38}
  key_string = HMAC-SHA256(K, extraction_key)
 
  T(1) = HMAC-SHA256(key_string, "" + "Sync-AES_256_CBC-HMAC256" + 0x01)
  T(1) = HMAC-SHA256(key_string, "" + "Sync-AES_256_CBC-HMAC256" + 0x01)
  T(2) = HMAC-SHA256(key_string, T(1) + Sync-AES_256_CBC-HMAC256" + 0x02)
  T(2) = HMAC-SHA256(key_string, T(1) + Sync-AES_256_CBC-HMAC256" + 0x02)
canmove, Confirmed users
725

edits

Navigation menu