From a62405190e559792330b381f2cfc01869ff5ccea Mon Sep 17 00:00:00 2001 From: Karolin Varner Date: Mon, 27 Feb 2023 21:37:56 +0100 Subject: [PATCH] chore: Consistently use the term `Key Encapsulation Mechanism` --- papers/whitepaper.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/papers/whitepaper.md b/papers/whitepaper.md index 9e7baaa..87b8d7f 100644 --- a/papers/whitepaper.md +++ b/papers/whitepaper.md @@ -33,7 +33,7 @@ abstract: | Rosenpass inherits most security properties from Post-Quantum WireGuard (PQWG). The security properties mentioned here are covered by the symbolic analysis in the Rosenpass repository. ## Secrecy -Three key encapsulations using the keypairs `sski`/`spki`, `sskr`/`spkr`, and `eski`/`epki` provide secrecy (see Section \ref{variables} for an introduction of the variables). Their respective ciphertexts are called `scti`, `sctr`, and `ectr` and the resulting keys are called `spti`, `sptr`, `epti`. A single secure encapsulation is sufficient to provide secrecy. We use two different KEMs (Key Encapsulation Methods; see section \ref{skem}): Kyber and Classic McEliece. +Three key encapsulations using the keypairs `sski`/`spki`, `sskr`/`spkr`, and `eski`/`epki` provide secrecy (see Section \ref{variables} for an introduction of the variables). Their respective ciphertexts are called `scti`, `sctr`, and `ectr` and the resulting keys are called `spti`, `sptr`, `epti`. A single secure encapsulation is sufficient to provide secrecy. We use two different KEMs (Key Encapsulation Mechanisms; see section \ref{skem}): Kyber and Classic McEliece. ## Authenticity