Alice and Bob use the Signal protocol to derive a key chain, sequentially using keys to encrypt/decrypt messages, and delete each key after use.

Alice Bob

k1 k1

k2 k2

k3 k3

k4 k4

k5 k5

k6 k6

k7 k7

k8 k8

k9 k9

k10 k10

k11 k11

……. …… nostr:note1afkmm89qpje2dzyrfclq80np7enas2l3s2g4pl5suezstfxt9thqwcg3wc

Reply to this note

Please Login to reply.

Discussion

No replies yet.