Difference between revisions of "Translations:Cloakshield/15/en"

From CloakCoin Wiki
Jump to: navigation, search
(Importing a new version from external source)
 
(Importing a new version from external source)
 
Line 1: Line 1:
 +
On startup, each Cloak wallet generates a [NID_secp256k1] keypair (Cloaking Encryption Key / CEK) to enable them to derive ad-hoc secrets using ECDH with their private key and the recipient's public key. This communication forms the basis on all node-to-node communications relating to Enigma. This ECDH based encrypted communication is also utilized for onion-routed data, which is handled by CloakShield.
 
CloakShield utilizes end-to-end encryption and delivers secure communication, allowing nodes to circumvent traffic analysis.
 
CloakShield utilizes end-to-end encryption and delivers secure communication, allowing nodes to circumvent traffic analysis.

Latest revision as of 09:59, 26 October 2018

Message definition (Cloakshield)
On startup, each Cloak wallet generates a [NID_secp256k1] keypair (Cloaking Encryption Key / CEK) to enable them to derive ad-hoc secrets using ECDH with their private key and the recipient's public key. This communication forms the basis on all node-to-node communications relating to Enigma. This ECDH based encrypted communication is also utilized for onion-routed data, which is handled by CloakShield. 
CloakShield utilizes end-to-end encryption and delivers secure communication, allowing nodes to circumvent traffic analysis.
TranslationOn startup, each Cloak wallet generates a [NID_secp256k1] keypair (Cloaking Encryption Key / CEK) to enable them to derive ad-hoc secrets using ECDH with their private key and the recipient's public key. This communication forms the basis on all node-to-node communications relating to Enigma. This ECDH based encrypted communication is also utilized for onion-routed data, which is handled by CloakShield. 
CloakShield utilizes end-to-end encryption and delivers secure communication, allowing nodes to circumvent traffic analysis.

On startup, each Cloak wallet generates a [NID_secp256k1] keypair (Cloaking Encryption Key / CEK) to enable them to derive ad-hoc secrets using ECDH with their private key and the recipient's public key. This communication forms the basis on all node-to-node communications relating to Enigma. This ECDH based encrypted communication is also utilized for onion-routed data, which is handled by CloakShield. CloakShield utilizes end-to-end encryption and delivers secure communication, allowing nodes to circumvent traffic analysis.