P2P-Architecture


The Secure Network protocol implements the following:

  • Key exchange (ECDH, perfect forward secrecy)
  • Authentication (AEAD, Poly1305)
  • Encryption (AEAD, ChaCha20)
  • Framing (length prefix with parcel header)
  • Chunking (fragment and reassemble)

The P2P layer addresses:

  • RPC
  • Publish-Subscribe messaging pattern.
  • Message multiplexing

Kademlia Distributed Hash Table

  • Peer discovery
  • Routing