Too Long; Didn't Read
Most messaging apps use a technique called End to End Encryption, which doesn’t allow these messaging services or their employees to read your conversations with your contacts. But how does this works, well, that is what we will try to understand here. Key generation happens whenever a new session is setup between Bob and Alice for transfer of messages. These keys will be used in encryption and decryption of data. They also share random nonce with each other, which will be further used in key derivation function.