- 3.10.1.2 CTR Mode .................................. 24
- 3.10.1.3 Randomized CBC Mode ....................... 26
- 3.10.2 Public Key Algorithms .............................. 26
- 3.10.2.1 Multi-Precision Integers .................. 27
- 3.10.3 Hash Functions ..................................... 27
- 3.10.4 MAC Algorithms ..................................... 27
- 3.10.5 Compression Algorithms ............................. 28
- 3.11 SILC Public Key .......................................... 28
- 3.12 SILC Version Detection ................................... 31
- 3.13 UTF-8 Strings in SILC .................................... 31
- 3.13.1 UTF-8 Identifier Strings ........................... 32
- 3.14 Backup Routers ........................................... 33
- 3.14.1 Switching to Backup Router ......................... 35
- 3.14.2 Resuming Primary Router ............................ 36
-4 SILC Procedures ............................................... 38
- 4.1 Creating Client Connection ................................ 38
- 4.2 Creating Server Connection ................................ 40
- 4.2.1 Announcing Clients, Channels and Servers ............ 40
- 4.3 Joining to a Channel ...................................... 42
- 4.4 Channel Key Generation .................................... 43
- 4.5 Private Message Sending and Reception ..................... 44
- 4.6 Private Message Key Generation ............................ 44
- 4.7 Channel Message Sending and Reception ..................... 45
- 4.8 Session Key Regeneration .................................. 46
- 4.9 Command Sending and Reception ............................. 46
- 4.10 Closing Connection ....................................... 47
- 4.11 Detaching and Resuming a Session ......................... 48
- 4.12 UDP/IP Connections ...................................... XXX
-5 Security Considerations ....................................... 49
-6 References .................................................... 50
-7 Author's Address .............................................. 52
-Appendix A ...................................................... 52
-Appendix B ...................................................... 54
-Appendix C ...................................................... XXX
-Appendix D ...................................................... XXX
-Full Copyright Statement ........................................ XXX
+ 3.10.1.2 CTR Mode .................................. 25
+ 3.10.1.3 Randomized CBC Mode ....................... 27
+ 3.10.2 Public Key Algorithms .............................. 27
+ 3.10.2.1 Multi-Precision Integers .................. 28
+ 3.10.3 Hash Functions ..................................... 28
+ 3.10.4 MAC Algorithms ..................................... 28
+ 3.10.5 Compression Algorithms ............................. 29
+ 3.11 SILC Public Key .......................................... 29
+ 3.12 SILC Version Detection ................................... 32
+ 3.13 UTF-8 Strings in SILC .................................... 33
+ 3.13.1 UTF-8 Identifier Strings ........................... 33
+ 3.14 Backup Routers ........................................... 34
+ 3.14.1 Switching to Backup Router ......................... 36
+ 3.14.2 Resuming Primary Router ............................ 37
+4 SILC Procedures ............................................... 39
+ 4.1 Creating Client Connection ................................ 39
+ 4.2 Creating Server Connection ................................ 41
+ 4.2.1 Announcing Clients, Channels and Servers ............ 42
+ 4.3 Joining to a Channel ...................................... 43
+ 4.4 Channel Key Generation .................................... 44
+ 4.5 Private Message Sending and Reception ..................... 45
+ 4.6 Private Message Key Generation ............................ 46
+ 4.7 Channel Message Sending and Reception ..................... 47
+ 4.8 Session Key Regeneration .................................. 47
+ 4.9 Command Sending and Reception ............................. 48
+ 4.10 Closing Connection ....................................... 49
+ 4.11 Detaching and Resuming a Session ......................... 49
+ 4.12 UDP/IP Connections ...................................... 51
+5 Security Considerations ....................................... 52
+6 References .................................................... 53
+7 Author's Address .............................................. 55
+Appendix A ...................................................... 55
+Appendix B ...................................................... 56
+Appendix C ...................................................... 57
+Appendix D ...................................................... 57
+Full Copyright Statement ........................................ 58