[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]

[minion-cvs] Clarify the meaning of "random" in nym-spec.txt.



Update of /home/minion/cvsroot/doc/spec
In directory moria.mit.edu:/tmp/cvs-serv24329

Modified Files:
	nym-spec.txt 
Log Message:
Clarify the meaning of "random" in nym-spec.txt.

Index: nym-spec.txt
===================================================================
RCS file: /home/minion/cvsroot/doc/spec/nym-spec.txt,v
retrieving revision 1.10
retrieving revision 1.11
diff -u -d -r1.10 -r1.11
--- nym-spec.txt	11 Apr 2005 16:24:55 -0000	1.10
+++ nym-spec.txt	4 May 2005 10:49:46 -0000	1.11
@@ -380,9 +380,9 @@
          XXXX]
 
       2. The nymserver then forms a synopsis of the email; generates a
-         random 20-octet message ID for the email; encrypts the email
-         for receipt by the nymholder, and decrements the email's size
-         from the user's available quota.
+         cryptographically random 20-octet message ID for the email;
+         encrypts the email for receipt by the nymholder, and
+         decrements the email's size from the user's available quota.
 
 2.3. Relaying emails to the user
 
@@ -506,10 +506,10 @@
    To encrypt an octet sequence, the nymserver first compresses the
    octet sequence (as described in E2E-spec.txt).  Next, the nymserver
    pads the octet sequence to the nearest multiple of 128 octets in
-   length.  The nymserver then generates a random 160-bit key;
-   LIONESS-encrypts the padded compressed data with the key; and
-   prepends to the encrypted data the RSA-encrypted key.  We use the
-   same trick as minion-spec.txt to minimize wasted space.
+   length.  The nymserver then generates a cryptographically random
+   160-bit key; LIONESS-encrypts the padded compressed data with the
+   key; and prepends to the encrypted data the RSA-encrypted key.  We
+   use the same trick as minion-spec.txt to minimize wasted space.
 
    PROCEDURE: Encrypt an octet sequence to a nymholder.
    INPUTS:
@@ -547,7 +547,7 @@
    by prepending to each one the following 22 octet header, and then
    concatenating the synopses.
 
-        ID     [20 octets]   (A randomly generated message ID.)
+        ID     [20 octets]   (A cryptographically random message ID.)
         LEN    [2 octets]    (Length of the synopsis, in octets.)
 
    (Note that the nymserver must associate with each encrypted set of
@@ -578,11 +578,11 @@
             CS    Command data size (3 octets)
             CD    Command data      (variable length; CS octets)
 
-   The 'Signature' field is equal to the RSA-OAEP signature of a
-   SHA-1 hash of the remainder of the message.  The NL field is equal
-   to the length of NYM.  The NYM field is equal to the Nym to which
-   these commands apply.  The SEQNO field holds a random value used
-   by the nymserver later to acknowledge this message.
+   The 'Signature' field is equal to the RSA-OAEP signature of a SHA-1
+   hash of the remainder of the message.  The NL field is equal to the
+   length of NYM.  The NYM field is equal to the Nym to which these
+   commands apply.  The SEQNO field holds a cryptographically random
+   value used by the nymserver later to acknowledge this message.
 
    The value of each 'CS' field must be the big-endian representation
    of the size of the immediately following CD field.
@@ -756,8 +756,8 @@
             CD    Command data      (variable length; CS octets)
 
    The NYM field is equal to the Nym to which these commands apply.
-   The NONCE field holds a random value used by the nymserver later to
-   acknowledge this message.
+   The NONCE field holds a cryptographically random value used by the
+   nymserver later to acknowledge this message.
 
    The value of each 'CS' field must be the big-endian representation
    of the size of the immediately following CD field.