You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
`OTP_PADDING_LENGTH` is `2 bytes`, which can hold up to `65535 bytes` of `padding`.
334
334
If `message` length is greater than `OTP_PADDING_LIMIT`, the message is not padded.
335
335
336
-
Unlike in `5. Perfect Forward Secrecy`, our `hash_chain` here provides both replay protection *and* tampering protection
336
+
Unlike in `5. Perfect Forward Secrecy`, our `hash_chain` here provides both replay protection *and* tampering protection. The reason we don't utilize the `per-contact` keys for signing the message, is to provide plausible deniability.
337
337
338
+
Messages could been forged by `Bob`.
338
339
340
+
### 6.3. OTP Pad Generation
341
+
If in `6.2. Message Prepartions`, `Alice` did not have enough pads, she would need to generate and sends pads to `Bob`.
342
+
343
+
`Alice` uses `Bob` ephemeral `Kyber1024` public-key to generate `OTP_PAD_SIZE bytes` of `shared secrets`. `OTP_PAD_SIZE` is default to `11264 bytes` (around 11 Kilobytes)
344
+
345
+
Those `shared secrets` are now `Alice`'s OTP pads.
346
+
347
+
The ciphertext result of `Kyber1024` is signed using `per-contact` keys and is sent to `Bob`:
0 commit comments