-
-
Notifications
You must be signed in to change notification settings - Fork 22
Description
https://github.com/SmithSamuelM/Papers/blob/master/whitepapers/kram.md?plain=1
line 19:
Change
Whereas with KERI rotation is happens automatically with a rotation event that is verified with the pre-rotated keys.
to
Whereas with KERI rotation happens automatically with a rotation event that is verified with the pre-rotated keys.
line 20:
Change
using FIDO2/WebAuthn to authentical replay requests would be going backwards.
to
using FIDO2/WebAuthn to authenticate replay requests would be going backwards.
line 26:
Change
A digital signature made with an assymmetric key pair(s) on a request provides non-repudiable authentication of the requester as the controller of that key pair(s).
to
A digital signature made with an asymmetric key pair(s) on a request provides non-repudiable authentication of the requestor as the controller of that key pair(s).
line 36:
Change
The datetime stamp should have fine enough resolution that the monotonicity constraint doesn not limit the rate of requests nor cause it to run past the end of the timeliness window.
to
The datetime stamp should have fine enough resolution that the monotonicity constraint does not limit the rate of requests nor cause it to run past the end of the timeliness window.
line 40:
Change
But even then its still best practice to have a timeout on the authentication because an attacker that intercepts the traffic can still replay the challenge response unless the requestee enforces one and only one reply per request.
to
But even then it's still best practice to have a timeout on the authentication because an attacker that intercepts the traffic can still replay the challenge response unless the requestee enforces one and only one reply per request.
line 44:
Change
The attacker can forward the reply to the requestor to hide the facy that it has intercepted the response and reply as a MITM.
to
The attacker can forward the reply to the requestor to hide the fact that it has intercepted the response and reply as a MITM.
line 126:
Change
But today where we assume a KERI context, we can already assume CSPRNGs, assymetric digital signatures tied to keystate of AIDs, cryptographic strength hashes, salty nonces, robust ubiquitous access to network time servers and a requirement to work over asynchronous public networks.
to
But today where we assume a KERI context, we can already assume CSPRNGs, asymetric digital signatures tied to keystate of AIDs, cryptographic strength hashes, salty nonces, robust ubiquitous access to network time servers and a requirement to work over asynchronous public networks.