AES-GCM using

  • 256 bit keys
  • 128 bit tags
  • 96 bit IVs


ECDSA using

  • P-256 keys
  • SHA-256 hashing


Key Wrapping


The protocol uses ECDH key agreement to establish a session key. Once a session key has been established, the client uses this key in an AES-256-GCM cipher to encrypt the payload.