From 8d6a79cac58d376842fdd7345f3ac167edcb7312 Mon Sep 17 00:00:00 2001
From: zzz <zzz@mail.i2p>
Date: Tue, 28 Apr 2020 20:52:12 +0000
Subject: [PATCH] minor updates

---
 i2p2www/pages/site/docs/how/elgamal-aes.html         | 12 ++++++++++--
 .../spec/proposals/144-ecies-x25519-aead-ratchet.rst |  9 ++++++---
 2 files changed, 16 insertions(+), 5 deletions(-)

diff --git a/i2p2www/pages/site/docs/how/elgamal-aes.html b/i2p2www/pages/site/docs/how/elgamal-aes.html
index 70ae9b724..dd17122c2 100644
--- a/i2p2www/pages/site/docs/how/elgamal-aes.html
+++ b/i2p2www/pages/site/docs/how/elgamal-aes.html
@@ -1,7 +1,7 @@
 {% extends "global/layout.html" %}
 {% block title %}{% trans %}ElGamal/AES + SessionTag Encryption{% endtrans %}{% endblock %}
-{% block lastupdated %}{% trans %}January 2016{% endtrans %}{% endblock %}
-{% block accuratefor %}0.9.24{% endblock %}
+{% block lastupdated %}April 2020{% endblock %}
+{% block accuratefor %}0.9.46{% endblock %}
 {% block content %}
 <h2>{% trans %}Overview{% endtrans %}</h2>
 <p>{% trans -%}
@@ -342,6 +342,14 @@ See the <a href="{{ i2cpspec }}#msg_SendMessageExpires">I2CP Send Message Expire
 
 
 <h2 id="future">{% trans %}Future Work{% endtrans %}</h2>
+
+<p><b>Note:</b>
+ElGamal/AES+SessionTags is being replaced with ECIES-X25519-AEAD-Ratchet (Proposal 144).
+The issues and ideas referenced below have been incorporated
+into the design of the new protocol.
+The following items will not be addressed in ElGamal/AES+SessionTags.
+</p>
+
 <p>{% trans -%}
 There are many possible areas to tune the Session Key Manager's algorithms;
 some may interact with the streaming library behavior, or have significant
diff --git a/i2p2www/spec/proposals/144-ecies-x25519-aead-ratchet.rst b/i2p2www/spec/proposals/144-ecies-x25519-aead-ratchet.rst
index bb1952825..9e89cf4cf 100644
--- a/i2p2www/spec/proposals/144-ecies-x25519-aead-ratchet.rst
+++ b/i2p2www/spec/proposals/144-ecies-x25519-aead-ratchet.rst
@@ -5,7 +5,7 @@ ECIES-X25519-AEAD-Ratchet
     :author: zzz, chisana, orignal
     :created: 2018-11-22
     :thread: http://zzz.i2p/topics/2639
-    :lastupdated: 2020-04-27
+    :lastupdated: 2020-04-28
     :status: Open
     :target: 0.9.46
     :implementedin: 0.9.46
@@ -3512,11 +3512,14 @@ Storage
 The sender generates tags and keys on the fly, so there is no storage.
 This cuts overall storage requirements in half compared to ElGamal/AES.
 ECIES tags are 8 bytes instead of 32 for ElGamal/AES.
-This cuts overall storage requiremens by another factor of 4.
+This cuts overall storage requirements by another factor of 4.
 Per-tag session keys are not stored at the receiver except for "gaps",
 which are minimal for reasonable loss rates.
 
-Therefore, the total space savings vs. ElGamal/AES is a factor of 8, or 87%.
+The 33% reduction in tag expiration time creates another 33% savings,
+assuming short session times.
+
+Therefore, the total space savings vs. ElGamal/AES is a factor of 10.7, or 92%.
 
 
 
-- 
GitLab