|
|
| Picture 1. Connection initialization, key exchange protocol and verification type selection. |
|
|
| Picture 2. Having already exchanged DH public keys, Alice causes Bob to vocalize its public key MadLib. |
|
|
| Picture 3. Alice vocalizes Bob's public key MadLib on her device. |
|
|
| Picture 4. The devices have agreed on a shared secret. |