RFC-0152/EmojiId
Emoji Id specification
Maintainer(s):Cayle Sharrock
Licence
Copyright 2022. The Tari Development Community
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the following conditions are met:
- Redistributions of this document must retain the above copyright notice, this list of conditions and the following disclaimer.
- Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following disclaimer in the documentation and/or other materials provided with the distribution.
- Neither the name of the copyright holder nor the names of its contributors may be used to endorse or promote products derived from this software without specific prior written permission.
THIS DOCUMENT IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS IS", AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT HOLDER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
Language
The keywords "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT", "SHOULD", "SHOULD NOT", "RECOMMENDED", "NOT RECOMMENDED", "MAY" and "OPTIONAL" in this document are to be interpreted as described in BCP 14 (covering RFC2119 and RFC8174) when, and only when, they appear in all capitals, as shown here.
Disclaimer
This document and its content are intended for information purposes only and may be subject to change or update without notice.
This document may include preliminary concepts that may or may not be in the process of being developed by the Tari community. The release of this document is intended solely for review and discussion by the community regarding the technological merits of the potential system outlined herein.
Goals
This document describes the specification for Emoji Ids. Emoji Ids are encoded node ids used for humans to verify peer node addresses easily and for machines to verify that the address is being used in the correct context.
Related Requests for Comment
None
Description
Tari Communication Nodes are identified on the network via their Node ID; which in turn are derived from the node's public key. Both the node id and public key are simple large integer numbers.
The most common practice for human beings to copy large numbers in cryptocurrency software is scanning a QR code or copying and pasting a value from one application to another. These numbers are typically encoded using hexadecimal or Base58 encoding. The user will then typically scan (parts) of the string by eye to ensure that the value was transferred correctly.
For Tari, we propose encoding values, the node ID in particular and masking the network identifier, for Tari, using emojis. The advantages of this approach are:
- Emoji are more easily identifiable; and, if selected carefully, less prone to identification errors (e.g., mistaking an O for a 0).
- The alphabet can be considerably larger than hexadecimal (16) or Base58 (58), resulting in shorter character sequences in the encoding.
- Should be be able to detect if the address used belongs to the correct network.
The specification
Emoji map
An emoji alphabet of 256 characters is selected. Each emoji is assigned a unique index from 0 to 255 inclusive. The list of selected emojis is:
๐ | ๐ | ๐ | ๐ | ๐ | ๐ | ๐ | ๐ | ๐ | ๐ | ๐ | ๐ฐ | ๐ด | ๐ต | ๐ท | ๐ธ |
๐น | ๐ป | ๐ฝ | ๐ | ๐ | ๐ | ๐ | ๐ | ๐ | ๐ | ๐ | ๐ | ๐ | ๐ | ๐ | ๐ |
๐ | ๐ | ๐ | ๐ | ๐ | ๐ | ๐ | ๐ | ๐ | ๐ | ๐ | ๐ฃ | ๐ฆ | ๐ฉ | ๐ช | ๐ซ |
๐ฌ | ๐ญ | ๐ฏ | ๐ฐ | ๐ณ | ๐ด | ๐ต | ๐ถ | ๐ท | ๐ธ | ๐น | ๐บ | ๐ผ | ๐ | ๐ | ๐ |
๐ | ๐ | ๐ | ๐ | ๐ | ๐ | ๐ | ๐ก | ๐ข | ๐ฃ | ๐ค | ๐ฅ | ๐ง | ๐จ | ๐ฉ | ๐ช |
๐ฌ | ๐ญ | ๐ฎ | ๐ฐ | ๐ฑ | ๐ฒ | ๐ณ | ๐ต | ๐ท | ๐ธ | ๐น | ๐บ | ๐ป | ๐ผ | ๐ฝ | ๐พ |
๐ฟ | ๐ | ๐ | ๐ | ๐ | ๐ | ๐ | ๐ฅ | ๐ฆ | ๐ญ | ๐ฐ | ๐ | ๐ | ๐ | ๐ | ๐ |
๐ | ๐ | ๐ | ๐ | ๐ | ๐ | ๐ | ๐ | ๐ | ๐ | ๐ | ๐ | ๐ | ๐ข | ๐ฃ | ๐จ |
๐ฉ | ๐ช | ๐ฌ | ๐ญ | ๐ฎ | ๐ฏ | ๐ฐ | ๐ฒ | ๐ณ | ๐ด | ๐ต | ๐ถ | ๐ท | ๐ธ | ๐บ | ๐ป |
๐ผ | ๐ฝ | ๐พ | ๐ | ๐ | ๐ | ๐ | ๐ | ๐ | ๐ | ๐ | ๐ | ๐ | ๐ | ๐ | ๐ |
๐ | ๐ | ๐ | ๐ก | ๐ข | ๐ฃ | ๐น | ๐ป | ๐ฝ | ๐พ | ๐ฟ | ๐ | ๐ | ๐ | ๐ | ๐ |
๐ | ๐ | ๐ | ๐ | ๐ | ๐ | ๐ | ๐ | ๐ก | ๐ฃ | ๐ค | ๐ฆ | ๐จ | ๐ฉ | ๐ญ | ๐ฏ |
๐ฐ | ๐ณ | ๐ธ | ๐บ | ๐ป | ๐ผ | ๐ | ๐ | ๐ | ๐ | ๐ | ๐ | ๐ก | ๐ฃ | ๐ฑ | ๐ท |
๐ | ๐ | ๐ | ๐ | ๐ | ๐ฅ | ๐ฆ | ๐ง | ๐จ | ๐ฉ | ๐ช | ๐ซ | ๐ฌ | ๐ญ | ๐ฎ | ๐ฑ |
๐ฝ | ๐ | ๐ | ๐ | ๐ | ๐ | ๐ | ๐ฑ | ๐ท | ๐น | ๐ป | ๐ฟ | ๐ | ๐ | ๐ | ๐ |
๐ | ๐ | ๐ | ๐ | ๐ | ๐ | ๐ข | ๐ฆ | ๐ง | ๐จ | ๐ช | ๐ซ | ๐ฒ | ๐ฝ | ๐ฟ | ๐ |
The emoji have been selected such that:
- Similar-looking emoji are excluded from the map. For example, neither ๐ or ๐ should be included. Similarly, the Irish and Cรดte d'Ivoire flags look very similar, and both should be excluded.
- Modified emoji (skin tones, gender modifiers) are excluded. Only the "base" emoji are considered.
The selection of an alphabet with 256 symbols means there is a direct mapping between bytes and emoji.
Encoding
The emoji ID is calculated from a node public key B
(serialized as 32 bytes) and a network identifier N
(serialized as 8 bits) as follows:
- Use the DammSum algorithm with
k = 8
andm = 32
to compute an 8-bit checksumC
usingB
as input. - Compute the masked checksum
C' = C XOR N
. - Encode
B
into an emoji string using the emoji map. - Encode
C'
into an emoji character using the emoji map. - Concatenate
B
andC'
as the emoji ID.
The result is 33 emoji characters.
Decoding
The node public key is obtained from an emoji ID and a network identifier N
(serialized to 8 bits) as follows:
- Assert that the emoji ID contains exactly 33 valid emoji characters from the emoji alphabet. If not, return an error.
- Decode the emoji ID as an emoji string by mapping each emoji character to a byte value using the emoji map, producing
33 bytes. Let
B
be the first 32 bytes andC'
be the last byte. - Compute the unmasked checksum
C = C' XOR N
. - Use the DammSum validation algorithm on
B
to assert thatC
is the correct checksum. If not, return an error. - Attempt to deserialize
B
as a public key. If this fails, return an error. If it succeeds, return the public key.
Checksum effectiveness
It is important to note that masking the checksum reduces its effectiveness.
Namely, if an emoji ID is presented with a different network identifier, and if there is a transmission error, it is possible for the result to decode in a seemingly valid way with a valid checksum after unmasking.
If both conditions occur randomly, the likelihood of this occurring is n / 256
for n
possible network identifiers.
Since emoji ID will typically be copied digitally and therefore not particularly subject to transmission errors, so it seems unlikely for these conditions to coincide in practice.
Change Log
Date | Change | Author |
---|---|---|
2022-11-10 | Initial stable | SWvHeerden |
2022-11-11 | Algorithm improvements | AaronFeickert |