I can’t figure out why the static public key of the initiator/recipient cannot be sent as plain text in the Noise KK pattern and what kind of cryptographic vulnerability does it provide? For example, in the pattern Noise XX, the recipient's static public key is sent encrypted, although it can be easily obtained by man-in-the-middle attack, cause in the first step performed DH with only ephemeral keys.
Asked
Active
Viewed 88 times