End-to-End Encryption Basicsby@parashar
3,127 reads

End-to-End Encryption Basics

tldt arrow
Read on Terminal Reader
Read this story w/o Javascript

Too Long; Didn't Read

Most messaging apps use a technique called End to End Encryption, which doesn’t allow these messaging services or their employees to read your conversations with your contacts. But how does this works, well, that is what we will try to understand here. Key generation happens whenever a new session is setup between Bob and Alice for transfer of messages. These keys will be used in encryption and decryption of data. They also share random nonce with each other, which will be further used in key derivation function.

Companies Mentioned

Mention Thumbnail
Mention Thumbnail

Coin Mentioned

Mention Thumbnail
featured image - End-to-End Encryption Basics
Ankit Parashar HackerNoon profile picture

@parashar

Ankit Parashar

Receive Stories from @parashar

react to story with heart

RELATED STORIES

L O A D I N G
. . . comments & more!