POST request to /register endpoint
Lets a [User
] (=student) to authenticate themselves to the system
This request
can be rejected if the payload is malformed (=not authenticated properly) or if
the [AuthRequest.user_id
] of the request
is not in the list of users that can hold a Gradecoin account
Authentication Process
-
Gradecoin's Public Key (
gradecoin_public_key
) is listed on moodle. -
Gradecoin's Private Key (
gradecoin_private_key
) is loaded here -
Student picks a short temporary key (
k_temp
) -
Creates a JSON object (
auth_plaintext
) with theirmetu_id
andpublic key
in base64 (PEM) format (S_PK
): { student_id: "e12345", passwd: "15 char secret" public_key: "---BEGIN PUBLIC KEY..." } -
Encrypts the serialized string of
auth_plaintext
with 128 bit block AES in CBC mode with Pkcs7 padding using the temporary key (k_temp
), the result isauth_ciphertext
TODO should this be base64'd? -
The temporary key student has picked
k_temp
is encrypted using RSA with OAEP padding scheme using sha256 withgradecoin_public_key
(TODO base64? same as above), giving uskey_ciphertext
-
The payload JSON object (
auth_request
) can be JSON serialized now: { c: "auth_ciphertext" key: "key_ciphertext" }
Gradecoin Side
- Upon receiving, we first RSA decrypt with OAEP padding scheme using SHA256 with
gradecoin_private_key
as the key and auth_request.keykey
as the ciphertext, receivingtemp_key
(this is the temporary key chosen by stu - With
temp_key
, we can AES 128 Cbc Pkcs7 decrypt theauth_request.c
, giving us auth_plaintext - The
auth_plaintext
String can be deserialized to [AuthRequest
] - We then verify the payload and calculate the User fingerprint
- Finally, create the new [
User
] object, insert to users HashMap<fingerprint, User>