filmov
tv
Double ratchet algorithm: The ping-pong game encrypting Signal and WhatsApp
Показать описание
How do text messaging services like Signal and WhatsApp keep your text messages secure? The Double Ratchet algorithm.
Let’s say Alice wants to send Bob an end-to-end encrypted message. She uses a key to lock up the message and Bob uses the same key to unlock the message. But what if they want to send a bunch of messages back and forth? Using the same key the whole time is not very secure. It would be better to have a unique key for each message. The Double Ratchet algorithm cranks out a new key each time you send a message by combining a key derivation function and a Diffie-Hellman calculation.
Resources:
Created by Kelsey Houston-Edwards
Let’s say Alice wants to send Bob an end-to-end encrypted message. She uses a key to lock up the message and Bob uses the same key to unlock the message. But what if they want to send a bunch of messages back and forth? Using the same key the whole time is not very secure. It would be better to have a unique key for each message. The Double Ratchet algorithm cranks out a new key each time you send a message by combining a key derivation function and a Diffie-Hellman calculation.
Resources:
Created by Kelsey Houston-Edwards
Double ratchet algorithm: The ping-pong game encrypting Signal and WhatsApp
Double Ratchet Messaging Encryption - Computerphile
Signal's Double Ratchet Algorithm
Double Ratchet Key Derivation simply explained Signal Messenger vs. Slack/WhatsApp/FacebookMessenger
Understanding Double Ratchet Algorithm || E2EE
[Cryptography Meetup] The double-ratchet algorithm: its security and privacy.
Farcaster: Double Ratchet
The Signal Protocol explained
Signal Ratchet, a cryptographic technique, implemented in Lisp, by Ron Garret (lightning talk)
Messaging layer security: Encrypting a group chat
The Signal Protocol - X3DH explained
Learning with errors: Encrypting with unsolvable equations
Intro to Signal Protocol and Signal Source Code
How Signal Works - Signal CTO Ehren Kret Breaks it Down
Towards Bidirectional Ratcheted Key Exchange
Lattice-based cryptography: The tricky math of dots
On Ends-to-Ends Encryption: Asynchronous Group Messaging with Strong Security Guarantees
Designing an end-to-end encryption protocol using Matrix's Olm/Megolm
How End-to-End Encryption works | The Signal Protocol and Privacy Vs Security
Signal Android: Let's read the code!
designing and implementing the 4th version of the Off-the-Record messaging protocol
Ещё немного о криптосистеме Эль-Гамаля
Post-quantum cryptography: Security after Shor’s algorithm
End To End Encryption - E2EE in detail
Комментарии