mirror of https://github.com/vacp2p/rfc-index.git
Create README.md
This commit is contained in:
parent
4362a7b221
commit
93c389620d
|
@ -0,0 +1,64 @@
|
|||
---
|
||||
slug: 7
|
||||
title: 7/WAKU-DATA
|
||||
name: Waku Envelope data field
|
||||
status: stable
|
||||
editor: Oskar Thorén <oskarth@titanproxy.com>
|
||||
contributors:
|
||||
- Dean Eigenmann <dean@status.im>
|
||||
- Kim De Mey <kimdemey@status.im>
|
||||
---
|
||||
|
||||
This specification describes the encryption, decryption and signing of the content in the [data field used in Waku](/spec/6/#abnf-specification).
|
||||
|
||||
## Specification
|
||||
|
||||
The `data` field is used within the `waku envelope`, the field MUST contain the encrypted payload of the envelope.
|
||||
|
||||
The fields that are concatenated and encrypted as part of the `data` field are:
|
||||
- flags
|
||||
- auxiliary field
|
||||
- payload
|
||||
- padding
|
||||
- signature
|
||||
|
||||
In case of symmetric encryption, a `salt` (a.k.a. AES Nonce, 12 bytes) field MUST be appended.
|
||||
|
||||
### ABNF
|
||||
|
||||
Using [Augmented Backus-Naur form (ABNF)](https://tools.ietf.org/html/rfc5234) we have the following format:
|
||||
|
||||
```abnf
|
||||
; 1 byte; first two bits contain the size of auxiliary field,
|
||||
; third bit indicates whether the signature is present.
|
||||
flags = 1OCTET
|
||||
|
||||
; contains the size of payload.
|
||||
auxiliary-field = 4*OCTET
|
||||
|
||||
; byte array of arbitrary size (may be zero)
|
||||
payload = *OCTET
|
||||
|
||||
; byte array of arbitrary size (may be zero).
|
||||
padding = *OCTET
|
||||
|
||||
; 65 bytes, if present.
|
||||
signature = 65OCTET
|
||||
|
||||
; 2 bytes, if present (in case of symmetric encryption).
|
||||
salt = 2OCTET
|
||||
|
||||
data = flags auxiliary-field payload padding [signature] [salt]
|
||||
```
|
||||
|
||||
### Signature
|
||||
|
||||
Those unable to decrypt the envelope data are also unable to access the signature. The signature, if provided, is the ECDSA signature of the Keccak-256 hash of the unencrypted data using the secret key of the originator identity. The signature is serialized as the concatenation of the `R`, `S` and `V` parameters of the SECP-256k1 ECDSA signature, in that order. `R` and `S` MUST be big-endian encoded, fixed-width 256-bit unsigned. `V` MUST be an 8-bit big-endian encoded, non-normalized and should be either 27 or 28.
|
||||
|
||||
### Padding
|
||||
|
||||
The padding field is used to align data size, since data size alone might reveal important metainformation. Padding can be arbitrary size. However, it is recommended that the size of Data Field (excluding the Salt) before encryption (i.e. plain text) SHOULD be factor of 256 bytes.
|
||||
|
||||
## Copyright
|
||||
|
||||
Copyright and related rights waived via [CC0](https://creativecommons.org/publicdomain/zero/1.0/).
|
Loading…
Reference in New Issue