From 088570b04d57ff2b511e31865001eec7889851eb Mon Sep 17 00:00:00 2001 From: Michael Williams Date: Tue, 28 Nov 2023 01:45:41 +1300 Subject: [PATCH] how many ways to edit the same thing --- README.md | 3 ++- SPEC.md | 3 ++- 2 files changed, 4 insertions(+), 2 deletions(-) diff --git a/README.md b/README.md index d69ef74..0d894f0 100644 --- a/README.md +++ b/README.md @@ -12,7 +12,8 @@ A protocol for a secure message stream, after you've done a secure key exchange. - The channel must be reliable and ordered: i.e. TCP. - Each channel key must be an ephemeral key for a single channel and discarded when the channel ends. - - To get an ephemeral key for a session, do a secure key exchange, such as [Noise](https://noiseprotocol.org/noise.html) or [Secret Handshake](https://dominictarr.github.io/secret-handshake-paper/shs.pdf) first. + - To get a channel key, do a secure key exchange first: e.g. [Noise](https://noiseprotocol.org/noise.html) or [Secret Handshake](https://dominictarr.github.io/secret-handshake-paper/shs.pdf). +- Each channel has one sender (encrypter) and one receiver (decrypter). - For a duplex (bi-directional) connection between peers, create two secret channels (with two separate keys), one in each direction. - A (key, nonce) pair must NEVER be re-used. diff --git a/SPEC.md b/SPEC.md index 8a5cdf7..01a3876 100644 --- a/SPEC.md +++ b/SPEC.md @@ -6,7 +6,8 @@ Streaming authenticated encryption using [ChaCha20-Poly1305](https://en.wikipedi - The channel must be reliable and ordered: i.e. TCP. - Each channel key must be an ephemeral key for a single channel and discarded when the channel ends. - - To get an ephemeral key for a session, do a secure key exchange, such as [Noise](https://noiseprotocol.org/noise.html) or [Secret Handshake](https://dominictarr.github.io/secret-handshake-paper/shs.pdf) first. + - To get a channel key, do a secure key exchange first: e.g. [Noise](https://noiseprotocol.org/noise.html) or [Secret Handshake](https://dominictarr.github.io/secret-handshake-paper/shs.pdf). +- Each channel has one sender (encrypter) and one receiver (decrypter). - For a duplex (bi-directional) connection between peers, create two secret channels (with two separate keys), one in each direction. - A (key, nonce) pair must NEVER be re-used.