You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Sita calculates shared key_S based on Rama's SessionInit, Rama does the same. Rama calculates shared key_R based on Sita's session init message, Sita does the same. Sita uses shared key_S and Rama shared key_R for encyrpting messages from there on. The derived key for each "init/ack" interaction is used to encrypt traffic going to the initiator of the interaction. So the side which sent "init" is using it to decrypt incoming data, and the side which sent "ack" to encrypt outgoing data.
Alice creates an ephemeral ECDH key pair and sends Bob SessionInit with the public key
Bob receives SessionInit, creates an ephemeral ECDH key pair and sends back to Alice SessionAck with the public key. Meanwhile he calculates the derived shared key which will be used to encrypt all future outgoing messages to Alice
Alice received SessionAck and calculates the derived shared key which will be used to decrypt all future incoming messages from Bob.
Steps 2-4 are repeated starting with Bob instead of Alice
Details: https://github.com/bitcoin/bips/blob/master/bip-0151.mediawiki
The text was updated successfully, but these errors were encountered: