paint-brush
End-to-End Encryption Basicsby@parashar
3,132 reads
3,132 reads

End-to-End Encryption Basics

by Ankit Parashar3mMarch 7th, 2020
Read on Terminal Reader
Read this story w/o Javascript
tldt arrow

Too Long; Didn't Read

Most messaging apps use a technique called End to End Encryption, which doesn’t allow these messaging services or their employees to read your conversations with your contacts. But how does this works, well, that is what we will try to understand here. Key generation happens whenever a new session is setup between Bob and Alice for transfer of messages. These keys will be used in encryption and decryption of data. They also share random nonce with each other, which will be further used in key derivation function.

Companies Mentioned

Mention Thumbnail
Mention Thumbnail

Coin Mentioned

Mention Thumbnail
featured image - End-to-End Encryption Basics
Ankit Parashar HackerNoon profile picture
Ankit Parashar

Ankit Parashar

@parashar

L O A D I N G
. . . comments & more!

About Author

Ankit Parashar HackerNoon profile picture
Ankit Parashar@parashar

TOPICS

THIS ARTICLE WAS FEATURED IN...

Permanent on Arweave
Read on Terminal Reader
Read this story in a terminal
 Terminal
Read this story w/o Javascript
Read this story w/o Javascript
 Lite