Update to technical flow for TLS with AES

This commit is contained in:
Samuel Hawksby-Robinson 2021-10-20 23:43:39 +01:00
parent fc1bcf8f31
commit 2acc3f01b5
No known key found for this signature in database
GPG Key ID: AD6D836B165CCDA7
1 changed files with 10 additions and 2 deletions

View File

@ -63,7 +63,7 @@ AES Key, UUID and Serialised Elliptic Curve Public Key
- Devices negotiate who produces the QR code:
- If one of the devices is a desktop device the desktop device will produce the QR code
- If both of the devices are desktop devices a code is generated to share between devices.
- More work needs to be done on this.
- **TODO** More work needs to be done on this.
- If both of the devices are mobile devices the Sender will generate the QR code
- QR device shows QR code containing (see [QR Codes document](./QRCODES.md)):
- a 256-bit AES key
@ -75,9 +75,17 @@ AES Key, UUID and Serialised Elliptic Curve Public Key
- Device UUID matches the exchanged Device UUID from the Receiver
- The EC public key matches the key the Sender signed the x509 certificate with
- The AES key is 256-bit
- TODO Receiver
- If the reading device is a Receiver, the Receiver checks that the:
- Device UUID matches the exchanged Device UUID from the Sender
- The EC public key matches the key the Sender signed the x509 certificate with
- The AES key is 256-bit
- If any of the checks fail, return error and terminate the connection
- The reading device signals, if required, to initiate transfer.
- Receiver adds supplied x509 cert to list of root certs
- Sender encrypts private key payload with secret AES key
- Sender begins data transfer to Receiver
- Receiver decrypts private key payload with secret AES key
- Receiver validates decrypted payload with checksum
- Receiver confirms to User that transfer is complete
## SRP over TCP