From a79432ac99e0ccda46720047166ef2500cabc8a6 Mon Sep 17 00:00:00 2001 From: Matt David Date: Thu, 28 Apr 2016 16:39:16 -0700 Subject: - Spacing - Recommit mistakently deleted encrypted invoicerequest flow diagram --- bip-0075.mediawiki | 2 ++ bip-0075/mobile-sf-encrypted-ir-without-payment.png | Bin 0 -> 99162 bytes 2 files changed, 2 insertions(+) create mode 100755 bip-0075/mobile-sf-encrypted-ir-without-payment.png diff --git a/bip-0075.mediawiki b/bip-0075.mediawiki index 27dbc44..b5110e0 100644 --- a/bip-0075.mediawiki +++ b/bip-0075.mediawiki @@ -306,9 +306,11 @@ For the following we assume the Sender already knows the Receiver's public key, ===ECDH Point Generation and AES-256 (GCM Mode) Setup=== '''NOTE''': AES-256-GCM is used because it provides authenticated encryption facilities, thus negating the need for a separate message hash for authentication. * Generate the '''secret point''' using [https://en.wikipedia.org/wiki/Elliptic_curve_Diffie–Hellman ECDH] using the local entity's private key and the remote entity's public key as inputs. + * Initialize [http://csrc.nist.gov/publications/nistpubs/800-90A/SP800-90A.pdf HMAC_DRBG] ** Use '''SHA256(secret point's X value)''' for Entropy ** Use the given message's '''nonce''' field for Nonce + * Initialize AES-256 in GCM Mode ** Use HMAC_DRBG.GENERATE(32) as the Encryption Key (256 bits) ** Use HMAC_DRBG.GENERATE(12) as the Initialization Vector (IV) (96 bits) diff --git a/bip-0075/mobile-sf-encrypted-ir-without-payment.png b/bip-0075/mobile-sf-encrypted-ir-without-payment.png new file mode 100755 index 0000000..fb0b5d1 Binary files /dev/null and b/bip-0075/mobile-sf-encrypted-ir-without-payment.png differ -- cgit v1.2.3