X-Git-Url: http://www.average.org/gitweb/?p=pam_pcsc_cr.git;a=blobdiff_plain;f=README.md;fp=README.md;h=23aa837107ab31f62a3b3a89fe9f56457417455c;hp=e1527259c42ea40c5399f46e6f1b2269e3a4b38b;hb=194a1c30bd4a0668debc82f40eefa49adfc11a8e;hpb=51bfcb574de61609f5575446455f3f48f7a61b3c diff --git a/README.md b/README.md index e152725..23aa837 100644 --- a/README.md +++ b/README.md @@ -73,6 +73,9 @@ period. The downside is that if the token is used against multiple hosts, and one of them leaks the secret to an adversary, all hosts are compromised. This is not the case with the first approach. +The particular data structure is outlined in the picture: +![](auth-data-structure.svg) + ## Module Operation Authentication file, containing nonce, encrypted shared secret,