[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]

[minion-cvs] Apply patch from jean-rene



Update of /home/minion/cvsroot/doc/spec
In directory moria.mit.edu:/tmp/cvs-serv15197

Modified Files:
	E2E-spec.txt 
Log Message:
Apply patch from jean-rene

Index: E2E-spec.txt
===================================================================
RCS file: /home/minion/cvsroot/doc/spec/E2E-spec.txt,v
retrieving revision 1.18
retrieving revision 1.19
diff -u -d -r1.18 -r1.19
--- E2E-spec.txt	17 Dec 2003 00:44:07 -0000	1.18
+++ E2E-spec.txt	6 Aug 2004 19:35:07 -0000	1.19
@@ -215,8 +215,7 @@
        ARGUMENTS
            M: the message to send
            PS: payload sized (fixed)
-           EXF: expansion factor (fixed: everyone must use the same EXF,
-                                 see below.)
+           EXF: expansion factor 
 
        Let M_SIZE = CEIL(LEN(M) / PS)
 
@@ -242,6 +241,8 @@
   [If we find an unpatented O(N) algorithm, we use it instead of this
    junk. -NM]
 
+  Everyone must use the same EXF. The value of EXF is 4/3. 
+
 2.1.3. Building blocks: whitening
 
    While some fragments of a message are stored, but before the entire
@@ -383,7 +384,7 @@
 2.2.2. Generating plaintext forward messages
 
    To send a plaintext forward message M, we first let PAYLOADS =
-   PACKETIZE(M, 28KB).  For every PAYLOAD_i, we set TAG_i = to a
+   PACKETIZE_MESSAGE(M, 0).  For every PAYLOAD_i, we set TAG_i = to a
    randomly chosen 159-bit integer.
 
    We then transmit each payload with its corresponding tag.
@@ -415,7 +416,7 @@
 
    We specify a solution to 2 here.  When generating plaintext forward
    fragmented messages, the message generator uses a routing type of
-   "FRAGMENT" (0x0103), an empty routing into, and prepends the
+   "FRAGMENT" (0x0103), an empty routing info, and prepends the
    following fields to the message body before compressing and
    fragmenting it:
 
@@ -433,7 +434,7 @@
 
    To send an encrypted forward message M to a user with an RSA public
    key PK with length PKLEN (in octets), we set PAYLOADS =
-   PACKETIZE(M, 28KB-PK_OVERHEAD_LEN+TAG_LEN-SPRP_KEY_LEN).  (We lose 42
+   PACKETIZE_MESSAGE(M, PK_OVERHEAD_LEN-TAG_LEN+SPRP_KEY_LEN).  (We lose 42
    octets to OAEP padding and 20 to encode the session key, but gain
    20 by spilling the encrypted data into the decoding tag.)
 
@@ -454,7 +455,7 @@
 2.2.4.   Generating reply messages
 
    To send a reply message M to an anonymous recipient, we set
-   PAYLOADS = PACKETIZE(M, 28KB).   We send each PAYLOAD_i with a
+   PAYLOADS = PACKETIZE(M, 0).   We send each PAYLOAD_i with a
    separate SURB_i -- we must have enough to use a different SURB for
    each message.  We do not need to include TAG (decoding handle)
    fields: they are a part of the SURB.