On startup, each Cloak wallet generates a [NID_secp256k1] keypair (Cloaking Encryption Key / CEK) to enable them to derive ad-hoc secrets using ECDH with their private key and the recipient's public key. This communication forms the basis on all node-to-node communications relating to Enigma. This ECDH based encrypted communication is also utilized for onion-routed data, which is handled by CloakShield.
CloakShield utilizes end-to-end encryption and delivers secure communication, allowing nodes to circumvent traffic analysis.
CloakShield utilizes end-to-end encryption and delivers secure communication, allowing nodes to circumvent traffic analysis.
Latest revision as of 09:59, 26 October 2018
On startup, each Cloak wallet generates a [NID_secp256k1] keypair (Cloaking Encryption Key / CEK) to enable them to derive ad-hoc secrets using ECDH with their private key and the recipient's public key. This communication forms the basis on all node-to-node communications relating to Enigma. This ECDH based encrypted communication is also utilized for onion-routed data, which is handled by CloakShield.
CloakShield utilizes end-to-end encryption and delivers secure communication, allowing nodes to circumvent traffic analysis.