WSL2
•
xterm-256color
•
bash
120 views
The following video demonstrates a fictive data exchange between Alice and Bob. Alice begins by generating a public-private key pair. Bob then uses Alice’s public key to derive a shared secret and a ciphertext, which he sends to Alice. Using her private key, Alice reconstructs the same shared secret. Both parties can now use this shared secret as a symmetric encryption key. In this demonstration, AES-256 is used by Bob to encrypt a message, which Alice successfully decrypts at the end of the video.