[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]
Re: [tor-dev] [proposal] Post-Quantum Secure Hybrid Handshake Based on NewHope
Typos:
> used as input to the SHAKE-256 extendable output function (XOF), as
decribed
deScribed
> In the case for relays possessing Ed25519 identity keys (c.f. Tor proposal
> ...
> descriptor (c.f. Tor proposal #264) advertises support for the "Relay"
> ...
> (c.f. Tor proposal #249).
> ...
> We introduce a new sub-protocol number, "Relay=3", (c.f. Tor proposal #264
confer, cf., it's a single flying word
> public keys already being in included within the "ntor-onion-key" entry.
s/in included/included/
> poly_getnoise() first generates 4096 Bytes of uniformly random data.
This can
s/Bytes/bytes/
> mode). The output of the PRG is considered an array of 2048 16-bit
integers
> ...
> Note further that the output of this function is secret; the PRG (and the
PRnG was used previously
> pseudocode description of a very naive inplace transformation of an input
> ...
> [0]; a pseudocode description of a very naive inplace transformation of an
s/inplace/in-place/g
_______________________________________________
tor-dev mailing list
tor-dev@xxxxxxxxxxxxxxxxxxxx
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-dev