End-to-end Message Encryption

preview_player
Показать описание

Build Your Own Redis / DNS / BitTorrent / SQLite - with CodeCrafters.

In this video, I explained the concept of end-to-end encryption using a basic example involving parties A and B exchanging messages securely. By utilizing public key cryptography, messages were encrypted with the recipient's public key and decrypted using their private key, ensuring only the intended recipient could read the message. Additionally, the use of digital signatures helped verify the sender's identity. This simple encryption method showcased the importance of maintaining privacy in communication channels, albeit simplified compared to complex systems like WhatsApp or Signal.

# Recommended videos and playlists

If you liked this video, you will find the following videos and playlists helpful

# Things you will find amusing

# Other socials

I keep writing and sharing my practical experience and learnings every day, so if you resonate then follow along. I keep it no fluff.

Thank you for watching and supporting! it means a ton.

I am on a mission to bring out the best engineering stories from around the world and make you all fall in
love with engineering. If you resonate with this then follow along, I always keep it no-fluff.
Рекомендации по теме
Комментарии
Автор

Thanks, Aprit! Fabulous work. Waiting for part 2

sharadkaushik
Автор

Awesome work, Arpit! It was very concise, clear, to the point. ✌️Looking forward to more such informative sessions. Thanks.

abhishekpopli
Автор

to make things simple 9:43 SSL is bounded to the transport layer, application sits in the application layer(Layer 7 OSI, Layer 5 TCP/IP)

ryan-boxi
Автор

Arpit, at 7:00 how can B verify the message is sent by A just by decrypting the digital signature part with A's public key. I believe it also needs to compare the decrypted text with the hash of message it has received

ajaynegi
Автор

Could you cover the scenarios where the digital certificates stored at A & B end users have to be updated post expiry? How this flow is handled in real world.

ShivaSomapur
Автор

Great video keep up the good work man❤️

vulturebeast
Автор

Thanks for this useful insight!
Any idea of how end-to-end encryption works in case of group messages?

techrhymes
Автор

Messages to/fro Whatsapp server should be sent over TCP Protocol rather than HTTPS as Whatsapp must be using Websockets for faster two way communication with its clients.

AH
Автор

If whats app has all of public keys imagine, When user 1 encrypt with private key and send to user 2. User 2 get messge by using public key user 1. This can be done by whats app to. How can prevent deciphering our data by whats app?

maralzavari
Автор

If the private key is not even uploaded to the server and it's in our local mobile/browser database then how whats app decrypt the message when we install it on any other device?

SuperHuman-sr
Автор

but, what about that if i delete my app? all keys will be gone- what's the solution for that?

dev
Автор

Arpit, just wanted to know if end-to-end really works, then how come people's chat got revealed? I mean we all have seen this in India many times.

B-Billy
Автор

how do 'A' knows B's public key, What if someone pretends B and the message will be sent to Someone

dheerajkumark