[prev in list] [next in list] [prev in thread] [next in thread] 

List:       moderncrypto-noise
Subject:    [noise] Hybrid Forward Secrecy, version 1draft-2
From:       rhys.weatherley () gmail ! com (Rhys Weatherley)
Date:       2016-09-28 1:15:48
Message-ID: CADmumMqoiEd1dCr3OgQPs_vdTC=oaVCMx8vac6089_OSu+g+Kw () mail ! gmail ! com
[Download RAW message or body]

On Tue, Sep 27, 2016 at 7:09 PM, Rhys Weatherley <rhys.weatherley at gmail.com>
wrote:

> I've been working on the implementation for Noise-C (not pushed yet due to
> a bug in my test vector generator).
>

The bug has been fixed.  I have pushed my first-pass Noise-C implementation
of Hybrid Forward Secrecy.  Test vectors can be found here:

https://raw.githubusercontent.com/rweather/noise-c/master/tests/vector/noise-c-hybrid.txt

The vectors check 25519+448 and 25519+NewHope with all ??hfs patterns and
XXfallback+hfs.

As expected, the only hfs scenarios that don't work the same as basic Noise
are fallbacks involving PSK's.  The encrypted "f" token in the abbreviated
handshake makes fallback impossible in that case.

Cheers,

Rhys.
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://moderncrypto.org/mail-archive/noise/attachments/20160928/bf02af3a/attachment.html>

[prev in list] [next in list] [prev in thread] [next in thread] 

Configure | About | News | Add a list | Sponsored by KoreLogic