X-Git-Url: http://git.silcnet.org/gitweb/?a=blobdiff_plain;f=doc%2Fdraft-riikonen-silc-ke-auth-06.nroff;h=624fa81ec8ac96a7839d1db5ad2bf2f42d6000a1;hb=c4443647395fea28b999d0c3e85d01a065fa74d4;hp=2cce6a0f5bc6a0ae962053a94efd0e7979df9bbb;hpb=311b158b8460ce3f80e597026bf3bcf872486837;p=crypto.git diff --git a/doc/draft-riikonen-silc-ke-auth-06.nroff b/doc/draft-riikonen-silc-ke-auth-06.nroff index 2cce6a0f..624fa81e 100644 --- a/doc/draft-riikonen-silc-ke-auth-06.nroff +++ b/doc/draft-riikonen-silc-ke-auth-06.nroff @@ -536,16 +536,16 @@ Setup: p is a large and public safe prime. This is one of the If the Mutual Authentication flag is set then initiator MUST also produce signature data SIGN_i which the responder will verify. The initiator MUST compute a hash value - HASH_i = hash(Key Exchange Start Payload | public key - (or certificate) | e). It then signs the HASH_i value with - its private key resulting a signature SIGN_i. + HASH_i = hash(Initiator's Key Exchange Start Payload | + public key (or certificate) | e). It then signs the HASH_i + value with its private key resulting a signature SIGN_i. 2. Responder generates a random number y, where 1 < y < q, and computes f = g ^ y mod p. It then computes the shared secret KEY = e ^ y mod p, and, a hash value - HASH = hash(Key Exchange Start Payload data | public - key (or certificate) | Initiator's public key (or - certificate) | e | f | KEY). It then signs + HASH = hash(Initiator's Key Exchange Start Payload | + public key (or certificate) | Initiator's public key + (or certificate) | e | f | KEY). It then signs the HASH value with its private key resulting a signature SIGN.