Yep The resulting keys are used to reset the sending-/receiving chains. This introduces future secrecy in the protocol.How does this introduce forward secrecy?