Once the two parties have exchanged session keys and hash values and the hash values have been properly validated, the protocol is complete. The sender and the receiver can now use session key A and session key B respectively to send encrypted messages to each other.