You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardexpand all lines: 04-Protocol-Security.md
+5-5
Original file line number
Diff line number
Diff line change
@@ -35,7 +35,7 @@ These primitives are chosen so that Noise Encryption layer for Stratum V2 can be
35
35
36
36
#### 4.3.1.1 EC point encoding remarks
37
37
Secp256k1 curve points, which includes Public Keys and ECDH results, are points with of X- and Y-coordinate, 32-bytes each. There are several possibilities how to serialize them:
38
-
1. 64-byte full X- and Y-coordinate serialization for public keys (and ECDH results) and 96 Bytes for signatures.
38
+
1. 64-byte full X- and Y-coordinate serialization for public keys (and ECDH results) and 96 bytes for signatures.
39
39
2. 33-byte X-coordinate with 1 parity bit serialization for public keys and similarly 65-byte for signatures.
40
40
3. 32-byte X-coordinate only with implicit Y-coordinate for public keys and 64-byte for signatures.
5. decrypts next 48 bytes with `DecryptAndHash()` and stores the results as `rs.public_key` which is **server's static public key** (note that 32 bytes is the public key and 16 bytes is MAC)
258
258
6. calls `MixKey(ECDH(e, rs)`
259
-
7. decrypts next 90 Bytes with `DecryptAndHash()` and deserialize plaintext into `SIGNATURE_NOISE_MESSAGE` (74 Bytes data + 16 Bytes MAC)
259
+
7. decrypts next 90 bytes with `DecryptAndHash()` and deserialize plaintext into `SIGNATURE_NOISE_MESSAGE` (74 bytes data + 16 bytes MAC)
260
260
9. return pair of CipherState objects, the first for encrypting transport messages from initiator to responder, and the second for messages in the other direction:
261
261
1. sets `temp_k1, temp_k2 = HKDF(ck, zerolen, 2)`
262
262
2. creates two new CipherState objects `c1` and `c2`
0 commit comments