Skip to content

Commit

Permalink
Script updating gh-pages from 70d4fc1. [ci skip]
Browse files Browse the repository at this point in the history
  • Loading branch information
ID Bot committed Apr 4, 2024
1 parent b3e1521 commit 380a55d
Show file tree
Hide file tree
Showing 2 changed files with 13 additions and 13 deletions.
10 changes: 5 additions & 5 deletions draft-ietf-sframe-enc.html
Original file line number Diff line number Diff line change
Expand Up @@ -1368,7 +1368,7 @@ <h2 id="name-introduction">
<ol start="1" type="1" class="normal type-1" id="section-1-3">
<li id="section-1-3.1">
<p id="section-1-3.1.1">Hop-by-hop (HBH) encryption of media, metadata, and feedback messages
between the the endpoints and SFU<a href="#section-1-3.1.1" class="pilcrow"></a></p>
between the endpoints and SFU<a href="#section-1-3.1.1" class="pilcrow"></a></p>
</li>
<li id="section-1-3.2">
<p id="section-1-3.2.1">End-to-end (E2E) encryption (E2EE) of media between the endpoints<a href="#section-1-3.2.1" class="pilcrow"></a></p>
Expand Down Expand Up @@ -2128,7 +2128,7 @@ <h4 id="name-decryption">
<p id="section-4.4.4-1">Before decrypting, a receiver needs to assemble a full SFrame ciphertext. When
an SFrame ciphertext may be fragmented into multiple parts for transport (e.g.,
a whole encrypted frame sent in multiple SRTP packets), the receiving client
collects all the fragments of the ciphertext, using an appropriate sequencing
collects all the fragments of the ciphertext, using appropriate sequencing
and start/end markers in the transport. Once all of the required fragments are
available, the client reassembles them into the SFrame ciphertext, then passes
the ciphertext to SFrame for decryption.<a href="#section-4.4.4-1" class="pilcrow"></a></p>
Expand Down Expand Up @@ -2323,7 +2323,7 @@ <h3 id="name-cipher-suites">
created in <a href="#sframe-cipher-suites" class="auto internal xref">Section 8.1</a>.<a href="#section-4.5-5" class="pilcrow"></a></p>
<p id="section-4.5-6">In the suite names, the length of the authentication tag is indicated by
the last value: "_128" indicates a hundred-twenty-eight-bit tag, "_80" indicates
a eighty-bit tag, "_64" indicates a sixty-four-bit tag and "_32" indicates a
an eighty-bit tag, "_64" indicates a sixty-four-bit tag and "_32" indicates a
thirty-two-bit tag.<a href="#section-4.5-6" class="pilcrow"></a></p>
<p id="section-4.5-7">In a session that uses multiple media streams, different cipher suites might be
configured for different media streams. For example, in order to conserve
Expand Down Expand Up @@ -2427,7 +2427,7 @@ <h3 id="name-sender-keys">
<p id="section-5.1-2">In this scheme, it is assumed that receivers have a signal outside of SFrame for
which client has sent a given frame (e.g., an RTP SSRC). SFrame KID
values are then used to distinguish between versions of the sender's <code>base_key</code>.<a href="#section-5.1-2" class="pilcrow"></a></p>
<p id="section-5.1-3">Key IDs in this scheme have two parts, a "key generation" and a "ratchet step".
<p id="section-5.1-3">Key IDs in this scheme have two parts: a "key generation" and a "ratchet step".
Both are unsigned integers that begin at zero. The key generation increments
each time the sender distributes a new key to receivers. The "ratchet step" is
incremented each time the sender ratchets their key forward for forward secrecy:<a href="#section-5.1-3" class="pilcrow"></a></p>
Expand Down Expand Up @@ -2497,7 +2497,7 @@ <h3 id="name-sender-keys">
key may be updated by sending a new <code>base_key</code> (updating the key generation) or
by hashing the current <code>base_key</code> (updating the ratchet step). Ratcheting the
key forward is useful when adding new receivers to an SFrame-based interaction,
since it assures that the new receivers can't decrypt any media encrypted before
since it ensures that the new receivers can't decrypt any media encrypted before
they were added. If a sender wishes to assure the opposite property when
removing a receiver (i.e., ensuring that the receiver can't decrypt media after
they are removed), then the sender will need to distribute a new sender key.<a href="#section-5.1-10" class="pilcrow"></a></p>
Expand Down
16 changes: 8 additions & 8 deletions draft-ietf-sframe-enc.txt
Original file line number Diff line number Diff line change
Expand Up @@ -151,7 +151,7 @@ Table of Contents
As such, two layers of encryption and authentication are required:

1. Hop-by-hop (HBH) encryption of media, metadata, and feedback
messages between the the endpoints and SFU
messages between the endpoints and SFU

2. End-to-end (E2E) encryption (E2EE) of media between the endpoints

Expand Down Expand Up @@ -594,10 +594,10 @@ Alice | (per-frame) (per-packet) | | |
ciphertext. When an SFrame ciphertext may be fragmented into
multiple parts for transport (e.g., a whole encrypted frame sent in
multiple SRTP packets), the receiving client collects all the
fragments of the ciphertext, using an appropriate sequencing and
start/end markers in the transport. Once all of the required
fragments are available, the client reassembles them into the SFrame
ciphertext, then passes the ciphertext to SFrame for decryption.
fragments of the ciphertext, using appropriate sequencing and start/
end markers in the transport. Once all of the required fragments are
available, the client reassembles them into the SFrame ciphertext,
then passes the ciphertext to SFrame for decryption.

The KID field in the SFrame header is used to find the right key and
salt for the encrypted frame, and the CTR field is used to construct
Expand Down Expand Up @@ -698,7 +698,7 @@ Alice | (per-frame) (per-packet) | | |

In the suite names, the length of the authentication tag is indicated
by the last value: "_128" indicates a hundred-twenty-eight-bit tag,
"_80" indicates a eighty-bit tag, "_64" indicates a sixty-four-bit
"_80" indicates an eighty-bit tag, "_64" indicates a sixty-four-bit
tag and "_32" indicates a thirty-two-bit tag.

In a session that uses multiple media streams, different cipher
Expand Down Expand Up @@ -792,7 +792,7 @@ Alice | (per-frame) (per-packet) | | |
SFrame KID values are then used to distinguish between versions of
the sender's base_key.

Key IDs in this scheme have two parts, a "key generation" and a
Key IDs in this scheme have two parts: a "key generation" and a
"ratchet step". Both are unsigned integers that begin at zero. The
key generation increments each time the sender distributes a new key
to receivers. The "ratchet step" is incremented each time the sender
Expand Down Expand Up @@ -838,7 +838,7 @@ Alice | (per-frame) (per-packet) | | |
A sender key may be updated by sending a new base_key (updating the
key generation) or by hashing the current base_key (updating the
ratchet step). Ratcheting the key forward is useful when adding new
receivers to an SFrame-based interaction, since it assures that the
receivers to an SFrame-based interaction, since it ensures that the
new receivers can't decrypt any media encrypted before they were
added. If a sender wishes to assure the opposite property when
removing a receiver (i.e., ensuring that the receiver can't decrypt
Expand Down

0 comments on commit 380a55d

Please sign in to comment.