-
Notifications
You must be signed in to change notification settings - Fork 0
/
Copy pathTCSC2_1.txt
71 lines (36 loc) · 1.33 KB
/
TCSC2_1.txt
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
1
Initiator
Initiator generates a 32 byte random value, constructs and sends PBKDFParamRequest
Responder receives PBKDFParamRequest
2
Responder
Responder generates a 32 byte random value, constructs crypto parameter set, and sends PBKDFParamResponse
Initiator receives PBKDFParamResponse
3.a
Initiator
Initiator chooses a session identifier
Session identifier uses the session key key type (refer to spec 4.3.3.7) Session identifier does not overlap with any existing PASE or CASE key identifier in use at the initiator
3.b
Initiator
Initiator constructs and sends PAKE_1
Responder receives PAKE_1
4.a
Responder
Responder chooses a session identifier
Session identifier uses the session key key type (refer to spec 4.3.3.7) Session identifier does not overlap with any existing PASE or CASE key identifier in use at the initiator
4.b
Responder
Responder constructs and sends PAKE_2
Initiator receives PAKE_2
5.a
Initiator
Initiator validates PAKE_2
Verification succeeds. If If verification fails, the initiator responds with a PAKE_Error with error code InvalidKeyConfirmation
5.b
Initiator
Initiator constructs and sends PAKE_3
Responder receives PAKE_3
6
Responder
Responder validates PAKE_3
Verification succeeds. If If verification fails, the responder responds with a PAKE_Error with error code InvalidKeyConfirmation