OmniMix • Tutorial • Nyms • Passphrase Creation For Reply Blocks PreviousTopNext

As shown earlier, at each remailer your reply passes on its way home, the net data of the message have to be encrypted with a symmetric passphrase the holder of the account has to keep a record of. So with a 4 hop chain plus the nym server itself plus a passphrase for the subject encryption at the exit remailer 6 random numbers are at work. And if you use 3 chains for reliability reasons, the number increases to 16 (not 18, as the esub mantra along with the subject itself is the same for all chains). So it was necessary to find a way to shield the user from that complexity without giving up any security.

Pseudo-random-sequence generators (PRNGs) allow the creation of an unlimited amount of random numbers, which, originating from a specific seed value, always apear in a definite series, which is why they're called 'pseudo' (OmniMix uses a PRNG based on AES CTR mode with 128 bit key and 128 bit IV range originally written by Wolfgang Ehrhardt according to http://csrc.nist.gov/publications/nistpubs/800-38a/sp800-38a.pdf). Now you only have to create and store one single 'seed' value for an entire chain. OmniMix assigns a unique 'slot number' to every reply chain of a nym account, which even after the deletion of the chain never is reused. In order to produce individual series of passphrases for every reply chain, the seed is XORed by the according slot number, so that one seed value is sufficient to do the job for all reply block chains of a single nym account.

PreviousTopNext