Convert also drawio based SVGs to plain SVGs and use unified path

Load all plain SVGs from a unified path.

Signed-off-by: David Runge <dave@sleepmap.de>
This commit is contained in:
David Runge 2023-12-11 16:48:26 +01:00
parent 4b0bc1c007
commit 707ac2f78e
No known key found for this signature in database
GPG key ID: 90D4B9641E092971
11 changed files with 36 additions and 36 deletions

View file

@ -47,7 +47,7 @@ Here, the result of the S2K function is a symmetric key, which is either used to
The "direct method" where the result of the S2K function is directly used as session key is only applicable if only one SKESK packet is present.
```
```{figure} drawio/SKESKv4-decryption.svg
```{figure} plain_svg/SKESKv4-decryption.svg
:name: fig-skeskv4-decryption
:alt: Diagram depicting how the S2K function is used to derive key symmetric key from the user-provided passphrase. This key is then either used directly as session key, or used to decrypt the encrypted session key.
@ -79,7 +79,7 @@ The *AEAD Auth Tag* of the SKESK packet is used as authentication tag.
The result is the *session key*.
```{figure} drawio/SKESKv6-decryption.svg
```{figure} plain_svg/SKESKv6-decryption.svg
:name: fig-skeskv6-decryption
:alt: Diagram depicting the complicated process of deriving the session key from a SKESK version 6 packet.
@ -103,7 +103,7 @@ To detect, which symmetric cipher is used to decrypt the SEIPDv1 packet later on
[^x25519-spec]: [Algorithm-Specific Fields for X25519 encryption](https://www.ietf.org/archive/id/draft-ietf-openpgp-crypto-refresh-12.html#name-algorithm-specific-fields-for-)
[^x448-spec]: [Algorithm-Specific Fields for X448 encryption](https://www.ietf.org/archive/id/draft-ietf-openpgp-crypto-refresh-12.html#name-algorithm-specific-fields-for-x)
```{figure} drawio/PKESKv3-decryption.svg
```{figure} plain_svg/PKESKv3-decryption.svg
:name: fig-decryption-pkesk3
:alt: Depicts, how the secret-key component of the users encryption subkey is directly used to decrypt the encrypted session key.
@ -114,7 +114,7 @@ Decrypting the session key from a version 3 PKESK packet.
The decryption of version 6 PKESK packets works quite similarly to version 3.
```{figure} drawio/PKESKv6-decryption.svg
```{figure} plain_svg/PKESKv6-decryption.svg
:name: fig-decryption-pkesk6
:alt: Depicts, how the secret-key component of the users encryption subkey is directly used to decrypt the encrypted session key.
@ -144,7 +144,7 @@ Once the cipher is initialized, the whole encrypted data from the SEIPD packet i
Describe the MDC which is used for modification detection.
```
```{figure} drawio/SEIPDv1-decryption.svg
```{figure} plain_svg/SEIPDv1-decryption.svg
:name: fig-decryption-seipd1
:alt: Depicts how the session key is used directly to decrypt the contents of the SEIPD packet.
@ -162,7 +162,7 @@ Once the session key was obtained from a PKESK or SKESK, it is used to derive a
The result is split into the message key and first half of the IV.
```{figure} drawio/SEIPDv2-decryption-mk-derivation.svg
```{figure} plain_svg/SEIPDv2-decryption-mk-derivation.svg
:name: fig-decryption-seipd2-mk-derivation
:alt: Depicts how the session key is fed into a salted HKDF to derive both the message key and the first half of an IV.
@ -176,7 +176,7 @@ All decrypted plaintext blocks are appended to form the result of the decryption
After all blocks have been processed, in a final AEAD step, the total number of plaintext octets gets appended to the *additional data* and the final AEAD auth tag from the SEIPD packet is processed.
```{figure} drawio/SEIPDv2-decryption-chunks.svg
```{figure} plain_svg/SEIPDv2-decryption-chunks.svg
:name: fig-decryption-seipd2-chunks
:alt: Depicts, how the message key and index-postfixed IV are used to decrypt each individual chunk of plaintext.