The Instant Messaging Protocol uses ml-kem-aes for secure communication:Documentation Index
Fetch the complete documentation index at: https://docs.kynesys.xyz/llms.txt
Use this file to discover all available pages before exploring further.
- Key Generation: Each peer generates a public/private key pair
- Public Key Exchange: Peers exchange public keys through the signaling server
- Signatures: peers sign their ml-kem public keys with a ml-dsa signing key from the same unifiedCrypto instance to link their two keys
- Message Encryption: Messages are encrypted using the recipient’s public key through encapsulation of a shared secret
- Message Decryption: Recipients decrypt messages using their private key to decapsulate the shared secret and perform AES decryption