> Slik employs authenticated symmetric encryption. We use AES block cipher in Galois
Counter Mode (GCM) with 256-bit key for all of our encryption operations
That plus the high level overview of the algorithms seems fair enough for a whitepaper
Although I don't get what additional security is gained from using an additional symmetric sharing key in protocol two. Isn't the key gonna be encrypted anyways with the temporary public key from Bob? Also which protocol is used for the asymmetric encryption?
That plus the high level overview of the algorithms seems fair enough for a whitepaper
Although I don't get what additional security is gained from using an additional symmetric sharing key in protocol two. Isn't the key gonna be encrypted anyways with the temporary public key from Bob? Also which protocol is used for the asymmetric encryption?