Encrypted Messaging Demo
End-to-end encryption with AES-GCM, X25519, Ed25519, and HKDF.
1. Initial Setup
2. Alice generates secrets
3. Alice signs & sends key info
4. Bob verifies & responds
5. Key exchange complete
6. Alice encrypts message secret
7. Alice signs & encrypts message
8. Bob decrypts message
Step 1: Initial Setup
Alice and Bob each have long-term Ed25519 keypairs and know each other's public keys.
A
Alice
Message
Alice's Keys & Operations
Long-term Key: 5ccfb693...305be5f9
B
Bob
Bob's Keys & Operations
Long-term Key: 23899990...651b6d62
Received Message
Decrypted message will appear here
A
AliceB
Bob