-
Wistauder, Martin authoredWistauder, Martin authored
protocol.md 1.03 KiB
The Authentication and Message Exchange Protocol
[A]lice wants to communicate with [B]ob privately.
Protocol Steps
- Authenticate to the server and establish communication.
- A tells the server to open a communication. 2. A sends an id_code to the server. 3. If someone answered with the same id_code, A gets a comm_id from the server.
- B tells the server to answer A's communication request. 2. B sends A's id_code to the server. 3. The server checks if it matches and returns a comm_id to B.
- Generate and exchange an ephemeral key.
- A and B generate RSA public-private key pairs.
- A and B exchange public keys.
- A and B encrypt their chosen secret value and send them to each other.
- A and B decrypt the received secret values and add them to their secret value.
- The result is the ephemeral key.
- Instantiate symmetric encryption using the ephemeral key.
- AES, CTR-mode
- Authenticate each other directly.
- (?) Check communication transcript (avoid malicious server).