You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: rfcs/models/security/confidentiality-design-choices.md
+10-6Lines changed: 10 additions & 6 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -60,7 +60,7 @@ M' = Decrypt(C)
60
60
```
61
61
DIM computes:
62
62
```
63
-
Verify(Sigma, P)
63
+
Verify(Sigma, P) == TRUE
64
64
(C', H) = Parse(P)
65
65
Verify: H == SHA256Hash(M')
66
66
```
@@ -82,7 +82,7 @@ C' = Decrypt(C)
82
82
```
83
83
DIM computes:
84
84
```
85
-
Verify(Sigma, C)
85
+
Verify(Sigma, C) == TRUE
86
86
M' || S' = Parse(C')
87
87
Verify: S' == Sign(SHA256Hash(M'))
88
88
```
@@ -114,7 +114,7 @@ M' = Decrypt(C1')
114
114
```
115
115
DIM computes:
116
116
```
117
-
Verify(Sigma, P)
117
+
Verify(Sigma, P) == TRUE
118
118
Verify: H1 == SHA256Hash(C2')
119
119
Verify: H' == SHA256Hash(M')
120
120
```
@@ -142,7 +142,7 @@ M1 = Decrypt(C)
142
142
```
143
143
DIM computes:
144
144
```
145
-
Verify(Sigma, P)
145
+
Verify(Sigma, P) == TRUE
146
146
M' || r' = Parse(M1)
147
147
Verify: H == SHA256Hash(M' || r')
148
148
```
@@ -168,9 +168,13 @@ M1 = Decrypt(C)
168
168
```
169
169
DIM computes:
170
170
```
171
-
Verify(Sigma, P)
171
+
Verify(Sigma, P) == TRUE
172
172
C' || H = Parse(P)
173
173
M2 || r' = Parse(M1)
174
174
Verify: H == HMAC(r', M2)
175
175
```
176
-
_Comments_: The hashing is secure (HMAC provides assured randomness, or entropy) and the protocol requires no peer modification or custom signing logic.
176
+
_Comments_: The hashing is secure (HMAC provides assured randomness, or entropy) and the protocol requires no peer modification or custom signing logic. Using HMAC enables provable security [1] of the [authenticity property](./confidentiality.md#security-concerns-and-threat-model) we strive for in our system.
177
+
178
+
179
+
## References
180
+
1. New Proofs for NMAC and HMAC: Security without Collision-Resistance, Mihir Bellare, Crypto 2006 eprint: https://eprint.iacr.org/2006/043.pdf.
0 commit comments