From 0c32bbcb680d5cde2e52398692a2e676f0f7388c Mon Sep 17 00:00:00 2001 From: Mark Qvist Date: Wed, 9 Dec 2020 22:23:54 +0100 Subject: [PATCH] Updated readme --- README.html | 2 +- README.md | 2 +- 2 files changed, 2 insertions(+), 2 deletions(-) diff --git a/README.html b/README.html index 2f83335..2b5ff21 100644 --- a/README.html +++ b/README.html @@ -824,7 +824,7 @@ pre {

If a message is delivered to the Reticulum GROUP destination type, the message will be transported using AES-128 encryption.

  • -

    If a message is delivered over a Reticulum link (which is the default method), the message will be encrypted with ephemeral ECDH on the SECP256R1 curve. This mode offers Perfect Forward Secrecy.

    +

    If a message is delivered over a Reticulum link (which is the default method), the message will be encrypted with ephemeral keys derived with ECDH on the SECP256R1 curve. This mode offers Perfect Forward Secrecy.

  • diff --git a/README.md b/README.md index b90ae1a..8194833 100644 --- a/README.md +++ b/README.md @@ -80,7 +80,7 @@ LXMF uses encryption provided by [Reticulum](https://github.com/markqvist/reticu - If a message is delivered to the Reticulum GROUP destination type, the message will be transported using _AES-128_ encryption. -- If a message is delivered over a Reticulum link (which is the default method), the message will be encrypted with _ephemeral ECDH_ on the _SECP256R1_ curve. This mode offers Perfect Forward Secrecy. +- If a message is delivered over a Reticulum link (which is the default method), the message will be encrypted with _ephemeral_ keys derived with _ECDH_ on the _SECP256R1_ curve. This mode offers Perfect Forward Secrecy. ## Wire Format & Overhead