This commit is contained in:
zzz
2011-10-11 18:16:36 +00:00
parent 5352a36608
commit 5da0e8e1b9
2 changed files with 7 additions and 3 deletions

View File

@@ -13,7 +13,7 @@ To request an addition to this page, please send to press ~~~at~~~ i2p2.de.
<li><a href="http://www.businessweek.com/magazine/content/03_37/b3849089_mz063.htm">2003 Business Week article referencing invisiblenet</a>
</li><li>
<a href="http://www.netzwelt.de/news/75371-i2p-das-anonyme-netz-im.html">Netzwelt.de article about being anonymous in the Internet</a><
<a href="http://www.netzwelt.de/news/75371-i2p-das-anonyme-netz-im.html">Netzwelt.de article about being anonymous in the Internet</a>
(German)
November 2007.

View File

@@ -31,11 +31,14 @@ key. The specific construct of the MAC is the first 16 bytes from:</p>
<pre>
HMAC-MD5(payload || IV || (payloadLength ^ protocolVersion), macKey)
</pre>
where '||' means append. The macKey is either the introduction key or the
where '||' means append.
The payload is the message starting with the flag byte.
The macKey is either the introduction key or the
session key, as specified for each message below.
<p>The payload itself is AES256/CBC encrypted with the IV and the
<p>The payload itself (that is, the message starting with the flag byte)
is AES256/CBC encrypted with the IV and the
sessionKey, with replay prevention addressed within its body,
explained below. The payloadLength in the MAC is a 2 byte unsigned
integer.</p>
@@ -59,6 +62,7 @@ the following bitfields:</p>
</pre>
<pre>
Header: 37+ bytes
Encryption starts with the flag byte.
+----+----+----+----+----+----+----+----+
| MAC |
+ +