[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]

Re: [tor-dev] [proposal] Post-Quantum Secure Hybrid Handshake Based on NewHope



Typos:

>  used as input to the SHAKE-256 extendable output function (XOF), as
decribed

deScribed

>  In the case for relays possessing Ed25519 identity keys (c.f. Tor proposal
>  ...
>  descriptor (c.f. Tor proposal #264) advertises support for the "Relay"
>  ...
>  (c.f. Tor proposal #249).
>  ...
>  We introduce a new sub-protocol number, "Relay=3", (c.f. Tor proposal #264

confer, cf., it's a single flying word

>  public keys already being in included within the "ntor-onion-key" entry.

s/in included/included/

>  poly_getnoise() first generates 4096 Bytes of uniformly random data.
This can

s/Bytes/bytes/

>  mode). The output of the PRG is considered an array of 2048 16-bit
integers
>  ...
>  Note further that the output of this function is secret; the PRG (and the

PRnG was used previously

>  pseudocode description of a very naive inplace transformation of an input
>  ...
>  [0]; a pseudocode description of a very naive inplace transformation of an

s/inplace/in-place/g


_______________________________________________
tor-dev mailing list
tor-dev@xxxxxxxxxxxxxxxxxxxx
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-dev