diff options
author | 2016-01-27 20:45:08 -0800 | |
---|---|---|
committer | 2016-01-27 20:45:08 -0800 | |
commit | 8ae721d239120acd0455a1fe58b6bebb545d7ba8 (patch) | |
tree | e2f05449a4fbd5612b0f8ba3a0656f9438f9360d | |
parent | Add identity hiding section. (diff) | |
download | noise-8ae721d239120acd0455a1fe58b6bebb545d7ba8.tar.xz noise-8ae721d239120acd0455a1fe58b6bebb545d7ba8.zip |
More edits to ID hiding
-rw-r--r-- | noise.md | 3 |
1 files changed, 2 insertions, 1 deletions
@@ -876,7 +876,8 @@ received. The following table lists the identity hiding properties for all the named patterns in Sections 7.2 and 7.3. Each pattern is assigned properties describing the confidentiality supplied to the initiator's static public key, -and to the responder's static public key. +and to the responder's static public key, assuming that ephemeral private keys +are secure. (Of course, the identities of Noise participants might be exposed through other means, included payload fields, traffic analysis, or metadata such as IP addresses. This section only characterizes identity leakage through static public keys in handshakes.) |