End-to-End Encryption Basics

Written by parashar | Published 2020/03/07
Tech Story Tags: end-to-end-encryption | encryption | software-engineering | cryptography | password-security | security | privacy | data-privacy

TLDR Most messaging apps use a technique called End to End Encryption, which doesn’t allow these messaging services or their employees to read your conversations with your contacts. But how does this works, well, that is what we will try to understand here. Key generation happens whenever a new session is setup between Bob and Alice for transfer of messages. These keys will be used in encryption and decryption of data. They also share random nonce with each other, which will be further used in key derivation function.via the TL;DR App

no story

Published by HackerNoon on 2020/03/07