Protocol Conclusion
Once the two parties have exchanged session keys and hash values and the hash values have been properly validated, the protocol is complete. The sender and the receiver can now use session key A and session key B respectively to send encrypted messages to each other.- Software for developers
-
Delphi Components
.Net Components
Software for Android Developers - More information resources
-
MegaDetailed.Net
Unix Manual Pages
Delphi Examples