|
Components | Description |
|
Method | One of the four types of authentication methods agreed by the initiator and the responder. |
Corr | One of the four types of correlation mechanisms provided by the transport path. |
SUITES_I, SUITS_R | List of cipher suites (in order of preference) supported by the initiator and the responder, respectively. |
x, y | The ECDH ephemeral private keys of the initiator and the responder, respectively. |
GX, GY | The ECDH ephemeral public keys of the initiator and the responder, respectively. |
p | A prime number that states the size of the finite field. |
a, b | The coefficients of the elliptic curve equation. |
G | The generator (base point) of the subgroup. |
h, n | The cofactor and order of the subgroup, respectively. |
CI, CR | Connection identifiers for the initiator and responder, respectively, that are used to facilitate the retrieval of the protocol state. |
AD | Application data (also known as external authorization data). |
CREDI, CREDR | The credentials containing the public authentication keys of the initiator and the responder, respectively. |
ID_CREDI, ID_CREDR | The identifiers for the credentials CREDI and CREDR, respectively. |
TH | Transcript hashes used for key derivation and additional authenticated data. |
K | Session key. |
PRK | Pseudorandom key. |
PSK | Preshared key. |
AEAD (K; ) | Authenticated Encryption with Associated Data using a key K. |
Sig (I; . ), Sig(R; . ) | Digital signatures made with the private authentication key of the initiator and the responder, respectively. |
|