Author: Rusty Russell 2016-06-28 02:31:34
Published on: 2016-06-28T02:31:34+00:00
The context discusses the introduction of SHA512 for encryption key generation using HMAC_SHA512 hash. The left 32 bytes and right 32 bytes of the hash are used to generate K_1 and K_2, respectively. However, the writer questions the necessity of SHA512 in this process and proposes an alternative method of using HMAC_SHA256 hash to generate the header and body encryption keys separately. The proposed method would use ecdh_secret and cipher-type as the key and message parameters for the HMAC_SHA256 function.
Updated on: 2023-06-11T18:53:59.946083+00:00