I'm sorry, but I don't understand this proposal.  I'm losing you when
you say E(R) without specifying the key that you are using.

On 28 March 2017 at 10:21, Scott Fluhrer (sfluhrer) <sfluh...@cisco.com> wrote:
> Here’s how it would work:
>
>
>
> -          The server has a long term secret key K, which it never gives out
>
> -          When the server wants to give a token to a client, it picks a
> random value R, and securely gives the client the values R and E_K(R)
>
> -          When the client wants to use the token, it picks a value i, and
> computes the key Hash( R || i).  It uses that key to protect the message,
> and also sends the server the values E(R) and i
>
> -          The server decrypts the value E(R) to recover R, it computes
> Hash( R || i) to recover the message key, and then decrypts the message
>
>
>
> That way, the server doesn’t have to send the client N different tokens…
>
>
> _______________________________________________
> TLS mailing list
> TLS@ietf.org
> https://www.ietf.org/mailman/listinfo/tls
>

_______________________________________________
TLS mailing list
TLS@ietf.org
https://www.ietf.org/mailman/listinfo/tls

Reply via email to