gnunet-svn
[Top][All Lists]
Advanced

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

[taler-anastasis] branch master updated: last changes?


From: gnunet
Subject: [taler-anastasis] branch master updated: last changes?
Date: Thu, 11 Jun 2020 17:11:34 +0200

This is an automated email from the git hooks/post-receive script.

ds-meister pushed a commit to branch master
in repository anastasis.

The following commit(s) were added to refs/heads/master by this push:
     new 967517b  last changes?
967517b is described below

commit 967517b1bd85c09196e9963a9152a558aa7bd028
Author: Dominik Meister <dominiksamuel.meister@students.bfh.ch>
AuthorDate: Thu Jun 11 17:11:28 2020 +0200

    last changes?
---
 doc/thesis/client_architecture.tex | 6 +++---
 doc/thesis/design.tex              | 2 +-
 doc/thesis/server_architecture.tex | 2 +-
 3 files changed, 5 insertions(+), 5 deletions(-)

diff --git a/doc/thesis/client_architecture.tex 
b/doc/thesis/client_architecture.tex
index e112545..fc890e3 100644
--- a/doc/thesis/client_architecture.tex
+++ b/doc/thesis/client_architecture.tex
@@ -36,7 +36,7 @@ struct kdf_id
 \end{lstlisting}
 
 \item
-The account\_private\_key is used to sign the data and check the signature 
later. It is a 256-bit eddsa private key. It is generated with the kdf\_id as 
entropy source.
+The account\_private\_key is used to sign the data and check the signature 
later. It is a 256-bit EdDSA private key. It is generated with the kdf\_id as 
entropy source.
 \begin{lstlisting}
 struct account_private_key
 {
@@ -73,7 +73,7 @@ struct truth_seed
 \end{lstlisting}
 
 \item
-The truth\_private\_key is used to sign the encrypted key share and the 
encrypted authentication data. It is a 256-bit eddsa private key. It is 
generated with the truth seed as entropy source.
+The truth\_private\_key is used to sign the encrypted key share and the 
encrypted authentication data. It is a 256-bit EdDSA private key. It is 
generated with the truth seed as entropy source.
 \begin{lstlisting}
 struct truth_private_key
 {
@@ -119,7 +119,7 @@ struct key_share
 \end{lstlisting}
 
 \item
-Before every encryption a random 256-bit large nonce is generated. This gives 
the encrpytion algorithm a random factor.
+Before every encryption a random 256-bit large nonce is generated. This gives 
the encryption algorithm a random factor.
 \begin{lstlisting}
 struct nonce
 {
diff --git a/doc/thesis/design.tex b/doc/thesis/design.tex
index 553d96f..cbab0a4 100644
--- a/doc/thesis/design.tex
+++ b/doc/thesis/design.tex
@@ -209,7 +209,7 @@ this document we will simply refer to this information as 
the
 {\em user attributes}.
 
 For each Anastasis provider, a {\em kdf id} key is derived from the
-user’s attributes and a provider salt using Aargon2~\cite{BDK2016}, a
+user’s attributes and a provider salt using Argon2~\cite{BDK2016}, a
 computationally expensive cryptographic hash function. Using an
 expensive hash algorithm is assumed to make it harder for a weak
 adversary to determine user attributes by brute force guessing.  The
diff --git a/doc/thesis/server_architecture.tex 
b/doc/thesis/server_architecture.tex
index 582ce9a..264f488 100644
--- a/doc/thesis/server_architecture.tex
+++ b/doc/thesis/server_architecture.tex
@@ -94,7 +94,7 @@ result in accidental information leakage about the user from 
the image
 before encrypting and uploading it to the Anastasis provider.
 
 For recovery, the user must first send a request to server that they
-wants to authorize recovery (GET /truth/\$TRUTH\_PUB).  The Anastassis
+wants to authorize recovery (GET /truth/\$TRUTH\_PUB).  The Anastasis
 provider will then decrypt the user's image and send a request with a
 \$TOKEN to a video authentication provider that a user wants to
 authenticate, and respond to the user with a link to a video

-- 
To stop receiving notification emails like this one, please contact
gnunet@gnunet.org.



reply via email to

[Prev in Thread] Current Thread [Next in Thread]