If you look at the Registration Phase
section it shows that cryptographicEntry
is basically the following and the flowchart show the steps
{
“iv”: “cjwe7Q/ZSUIzf64MOKvJbA==”,
“dek”: “iULqm0Cv5vj6yxBQQuHkoOPoNVcxXTiLm2vPWpbaA86VW8Q4rTuCyUs9KU+cJdDs”, “salt”: “ksSva39weXQdRMQhHQ17BwCJa0s1yBH”,
“kekIV”: “Oss1I1eOFZuc6mQ33ssWSA==”,
“kekSalt”: “A+KZGwOsSo4ivsw4xDpN0oF75WfBu8JU”
}
In the login phase, you retrieve the user’s password and use that to decrypt the encrypted key from cryptographic entry and store it in hashmap so that the the incoming and outgoing data is encrypted/decrypted.