Rafiullah Hamedy
1 min readApr 2, 2019

--

If you look at the Registration Phase section it shows that cryptographicEntry is basically the following and the flowchart show the steps

{
“iv”: “cjwe7Q/ZSUIzf64MOKvJbA==”,
“dek”: “iULqm0Cv5vj6yxBQQuHkoOPoNVcxXTiLm2vPWpbaA86VW8Q4rTuCyUs9KU+cJdDs”, “salt”: “ksSva39weXQdRMQhHQ17BwCJa0s1yBH”,
“kekIV”: “Oss1I1eOFZuc6mQ33ssWSA==”,
“kekSalt”: “A+KZGwOsSo4ivsw4xDpN0oF75WfBu8JU”
}

In the login phase, you retrieve the user’s password and use that to decrypt the encrypted key from cryptographic entry and store it in hashmap so that the the incoming and outgoing data is encrypted/decrypted.

Sign up to discover human stories that deepen your understanding of the world.

Free

Distraction-free reading. No ads.

Organize your knowledge with lists and highlights.

Tell your story. Find your audience.

Membership

Read member-only stories

Support writers you read most

Earn money for your writing

Listen to audio narrations

Read offline with the Medium app

--

--

Rafiullah Hamedy
Rafiullah Hamedy

Written by Rafiullah Hamedy

Staff software developer • Love to write • Over 250K views • Connect on linkedin.com/in/rhamedy • Medium referral https://medium.com/@rhamedy/membership

No responses yet

Write a response