From ec2c30f85c323812007c27688ba8dcfe85c8536a Mon Sep 17 00:00:00 2001 From: Karolin Varner Date: Tue, 3 Oct 2023 17:56:01 +0200 Subject: [PATCH] feat(whitepaper): Typo ct1 -> sctr in IHR5 --- papers/whitepaper.md | 1 + 1 file changed, 1 insertion(+) diff --git a/papers/whitepaper.md b/papers/whitepaper.md index 28e3377..4e2a6f3 100644 --- a/papers/whitepaper.md +++ b/papers/whitepaper.md @@ -507,6 +507,7 @@ During the implementation of go-rosenpass, Steffen Vogel found a number of probl - Explicitly erase `eski` (forward secrecy). This is a minor security fix: Before this change the specification left erasing the secret key to the implementation. The reference implementation did erase `eski` but only after receiving the responder confirmation package (EmptyData at the time) instructing the initiator to stop retransmission of the InitConf package. With this change, `eski` is erased before transmission of the InitConf package. - Add detailed information about when in the handshake process security properties are achieved. - Extra section with a list of timers used. +- Fix a typo where the old `ct1` name was used for `sctr` (the static responder KEM ciphertext) ## Protocol version 1 -- 2023-03-04