So, I'm interested how the implementation of "Perfect Forward Secrecy" in Signal looks like, like does every messages has a different encryption key? or does it change over time like [#whatsapp](https - eviltoast

So, I’m interested how the implementation of “Perfect Forward Secrecy” in Signal looks like, like does every messages has a different encryption key? or does it change over time like #whatsapp does? I tried to find any official documention of this, sadly did not find anything.

Thats why I’m asking, does anyone of you know smth about this and maybe can provide a link to a official source?

#signal #signalapp #privacy #encryption @signalapp @SignalUpdateInfo @privacy

  • sexy_peach@feddit.de
    link
    fedilink
    English
    arrow-up
    5
    ·
    1 year ago

    essentially, yes. There are two levels of encryption keys and they “ratchet” along (change). Only the lower level is used to encrypt the text so it’s much harder to figure out the other one.

    • Voxel@infosec.exchangeOP
      link
      fedilink
      arrow-up
      2
      arrow-down
      1
      ·
      1 year ago

      @sexy_peach Thank you very much! Just now wondering, handle WA this differently? Since Ig we all know this message which appears when the “keys” ig, changed

      • sexy_peach@feddit.de
        link
        fedilink
        English
        arrow-up
        2
        ·
        edit-2
        1 year ago

        Since Ig we all know this message which appears when the “keys” ig, changed

        I don’t know if I fully understand you here.

        To my understanding whatsapp does it like this too. The key changing must be the high level key, since the message means that it’s an unknown key (thus not yet trusted). From new install or new device.