mirror of
https://codeberg.org/openpgp/notes.git
synced 2025-09-11 04:09:41 +02:00
Convert also drawio based SVGs to plain SVGs and use unified path
Load all plain SVGs from a unified path. Signed-off-by: David Runge <dave@sleepmap.de>
This commit is contained in:
parent
4b0bc1c007
commit
707ac2f78e
11 changed files with 36 additions and 36 deletions
|
@ -47,7 +47,7 @@ Here, the result of the S2K function is a symmetric key, which is either used to
|
|||
The "direct method" where the result of the S2K function is directly used as session key is only applicable if only one SKESK packet is present.
|
||||
```
|
||||
|
||||
```{figure} drawio/SKESKv4-decryption.svg
|
||||
```{figure} plain_svg/SKESKv4-decryption.svg
|
||||
:name: fig-skeskv4-decryption
|
||||
:alt: Diagram depicting how the S2K function is used to derive key symmetric key from the user-provided passphrase. This key is then either used directly as session key, or used to decrypt the encrypted session key.
|
||||
|
||||
|
@ -79,7 +79,7 @@ The *AEAD Auth Tag* of the SKESK packet is used as authentication tag.
|
|||
|
||||
The result is the *session key*.
|
||||
|
||||
```{figure} drawio/SKESKv6-decryption.svg
|
||||
```{figure} plain_svg/SKESKv6-decryption.svg
|
||||
:name: fig-skeskv6-decryption
|
||||
:alt: Diagram depicting the complicated process of deriving the session key from a SKESK version 6 packet.
|
||||
|
||||
|
@ -103,7 +103,7 @@ To detect, which symmetric cipher is used to decrypt the SEIPDv1 packet later on
|
|||
[^x25519-spec]: [Algorithm-Specific Fields for X25519 encryption](https://www.ietf.org/archive/id/draft-ietf-openpgp-crypto-refresh-12.html#name-algorithm-specific-fields-for-)
|
||||
[^x448-spec]: [Algorithm-Specific Fields for X448 encryption](https://www.ietf.org/archive/id/draft-ietf-openpgp-crypto-refresh-12.html#name-algorithm-specific-fields-for-x)
|
||||
|
||||
```{figure} drawio/PKESKv3-decryption.svg
|
||||
```{figure} plain_svg/PKESKv3-decryption.svg
|
||||
:name: fig-decryption-pkesk3
|
||||
:alt: Depicts, how the secret-key component of the users encryption subkey is directly used to decrypt the encrypted session key.
|
||||
|
||||
|
@ -114,7 +114,7 @@ Decrypting the session key from a version 3 PKESK packet.
|
|||
|
||||
The decryption of version 6 PKESK packets works quite similarly to version 3.
|
||||
|
||||
```{figure} drawio/PKESKv6-decryption.svg
|
||||
```{figure} plain_svg/PKESKv6-decryption.svg
|
||||
:name: fig-decryption-pkesk6
|
||||
:alt: Depicts, how the secret-key component of the users encryption subkey is directly used to decrypt the encrypted session key.
|
||||
|
||||
|
@ -144,7 +144,7 @@ Once the cipher is initialized, the whole encrypted data from the SEIPD packet i
|
|||
Describe the MDC which is used for modification detection.
|
||||
```
|
||||
|
||||
```{figure} drawio/SEIPDv1-decryption.svg
|
||||
```{figure} plain_svg/SEIPDv1-decryption.svg
|
||||
:name: fig-decryption-seipd1
|
||||
:alt: Depicts how the session key is used directly to decrypt the contents of the SEIPD packet.
|
||||
|
||||
|
@ -162,7 +162,7 @@ Once the session key was obtained from a PKESK or SKESK, it is used to derive a
|
|||
|
||||
The result is split into the message key and first half of the IV.
|
||||
|
||||
```{figure} drawio/SEIPDv2-decryption-mk-derivation.svg
|
||||
```{figure} plain_svg/SEIPDv2-decryption-mk-derivation.svg
|
||||
:name: fig-decryption-seipd2-mk-derivation
|
||||
:alt: Depicts how the session key is fed into a salted HKDF to derive both the message key and the first half of an IV.
|
||||
|
||||
|
@ -176,7 +176,7 @@ All decrypted plaintext blocks are appended to form the result of the decryption
|
|||
|
||||
After all blocks have been processed, in a final AEAD step, the total number of plaintext octets gets appended to the *additional data* and the final AEAD auth tag from the SEIPD packet is processed.
|
||||
|
||||
```{figure} drawio/SEIPDv2-decryption-chunks.svg
|
||||
```{figure} plain_svg/SEIPDv2-decryption-chunks.svg
|
||||
:name: fig-decryption-seipd2-chunks
|
||||
:alt: Depicts, how the message key and index-postfixed IV are used to decrypt each individual chunk of plaintext.
|
||||
|
||||
|
|
Loading…
Add table
Add a link
Reference in a new issue