So, I’m interested how the implementation of “Perfect Forward Secrecy” in Signal looks like, like does every messages has a different encryption key? or does it change over time like #whatsapp does? I tried to find any official documention of this, sadly did not find anything.
Thats why I’m asking, does anyone of you know smth about this and maybe can provide a link to a official source?
#signal #signalapp #privacy #encryption @signalapp @SignalUpdateInfo @privacy
https://en.wikipedia.org/wiki/Double_Ratchet_Algorithm
This is the encryption that they developed. Whatsapp and OMEMO (XMPP) use it as well. It has forward secrecy because if an attacker has the key for a message they can’t calculate the key for the key for the next message etc.
@sexy_peach So when I understood it right (just skimmed the text), the encryption keys changes per message?
essentially, yes. There are two levels of encryption keys and they “ratchet” along (change). Only the lower level is used to encrypt the text so it’s much harder to figure out the other one.
@sexy_peach Thank you very much! Just now wondering, handle WA this differently? Since Ig we all know this message which appears when the “keys” ig, changed
I don’t know if I fully understand you here.
To my understanding whatsapp does it like this too. The key changing must be the high level key, since the message means that it’s an unknown key (thus not yet trusted). From new install or new device.
@sexy_peach Okay, got it, ig.
Double Ratchet Messaging Encryption - Computerphile
https://youtu.be/9sO2qdTci-s?si=qPbDZ2-x_VSiEZ-1
Here is an alternative Piped link(s): https://piped.video/9sO2qdTci-s?si=qPbDZ2-x_VSiEZ-1
Piped is a privacy-respecting open-source alternative frontend to YouTube.
I’m open-source, check me out at GitHub.