Oddbean new post about | logout
 Alice and Bob use the Signal protocol to derive a key chain, sequentially using keys to encrypt/decrypt messages, and delete each key after use.

Alice        Bob

k1             k1
k2            k2
k3            k3
k4            k4
k5            k5
k6            k6
k7            k7
k8            k8
k9            k9
k10          k10
k11           k11
…….         …… nostr:note1afkmm89qpje2dzyrfclq80np7enas2l3s2g4pl5suezstfxt9thqwcg3wc