[Annotation] To avoid this situation, the sender of a message MUST generate a fresh random four-byte "reuse guard" value and XOR it with the first four bytes of the nonce from the key schedule before using the nonce for encryption.
duesee opened this issue · comments
To avoid this situation, the sender of a message MUST generate a
fresh random four-byte "reuse guard" value and XOR it with the first
four bytes of the nonce from the key schedule before using the nonce
for encryption.
Annotation
{
"@context": "http://www.w3.org/ns/anno.jsonld",
"type": "Annotation",
"body": [],
"target": {
"selector": [
{
"type": "TextQuoteSelector",
"exact": "To avoid this situation, the sender of a message MUST generate a\n fresh random four-byte \"reuse guard\" value and XOR it with the first\n four bytes of the nonce from the key schedule before using the nonce\n for encryption."
},
{
"type": "TextPositionSelector",
"start": 92836,
"end": 93063
}
]
},
"id": "#12f90ea8-02fd-43d9-8f66-5ce3aa33e656",
"meta": null
}