Open main menu
Home
Random
Recent changes
Special pages
Community portal
Preferences
About Wikipedia
Disclaimers
Incubator escapee wiki
Search
User menu
Talk
Dark mode
Contributions
Create account
Log in
Editing
End-to-end encryption
(section)
Warning:
You are not logged in. Your IP address will be publicly visible if you make any edits. If you
log in
or
create an account
, your edits will be attributed to your username, along with other benefits.
Anti-spam check. Do
not
fill this in!
== Etymology == The term "end-to-end encryption" originally only meant that the communication is never decrypted during its transport from the sender to the receiver.<ref name="Baran-E2EE">{{cite book|last=Baran|first=Paul|title=On Distributed Communications|chapter=IX. Security, Secrecy, and Tamper-Free Considerations. III. Some Fundamentals of Cryptography|url=https://www.rand.org/pubs/research_memoranda/RM3765/RM3765.chapter3.html|date=1964|publisher=RAND corporation|access-date=2020-04-07|archive-date=2020-04-07|archive-url=https://web.archive.org/web/20200407143949/https://www.rand.org/pubs/research_memoranda/RM3765/RM3765.chapter3.html|url-status=dead}}</ref> For example, around 2003, E2EE has been proposed as an additional layer of encryption for [[GSM]]<ref name="GSM-E2EE">{{cite conference|last1=Moldal|first1=L.|last2=Jorgensen|first2=T.|title=IEE Seminar Secure GSM and Beyond: End to End Security for Mobile Communications |chapter=End to end encryption in GSM, DECT and satellite networks using NSK200|publisher=IET|chapter-url=https://ieeexplore.ieee.org/document/1292124|date=11 February 2003|volume=2003 |page=5 |doi=10.1049/ic:20030013}}</ref> or [[Terrestrial Trunked Radio|TETRA]],<ref name="TETRA-E2EE">{{cite conference|last=Murgatroyd|first=Brian|title=IEE Seminar Secure GSM and Beyond: End to End Security for Mobile Communications |chapter=End to end encryption in public safety TETRA networks|publisher=IET|chapter-url=https://ieeexplore.ieee.org/document/1292126|date=11 February 2003|volume=2003 |page=7 |doi=10.1049/ic:20030015}}</ref> in addition to the existing radio encryption protecting the communication between the mobile device and the network infrastructure. This has been standardized by SFPG for TETRA.<ref name="SFPG-E2EE">{{cite web|title=New chair for the SFPG|url=https://tcca.info/new-chair-for-the-sfpg/|date=2007}}</ref> Note that in TETRA E2EE, the keys are generated by a Key Management Centre (KMC) or a Key Management Facility (KMF), not by the communicating users.<ref>{{cite thesis|type=Master's Thesis|last=Morquecho Martinez|first=Raul Alejandro|title=Delivery of encryption keys in TETRA networks|date=31 March 2016|publisher=Aalto University|url=https://aaltodoc.aalto.fi/bitstream/handle/123456789/20880/master_Morquecho_Martinez_Raul_2016.pdf}}</ref> Later, around 2014, the meaning of "end-to-end encryption" started to evolve when WhatsApp encrypted a portion of its network,<ref>{{Cite magazine|title=Forget Apple vs. the FBI: WhatsApp Just Switched on Encryption for a Billion People|language=en-us|magazine=Wired|url=https://www.wired.com/2016/04/forget-apple-vs-fbi-whatsapp-just-switched-encryption-billion-people/|access-date=2021-03-02|issn=1059-1028}}</ref> requiring that not only the communication stays encrypted during transport,<ref>{{Cite journal|last=Mtega|first=Wulystan Pius|date=Jan 2021|title=Using WhatsApp Messenger for improving learners' engagement in teaching and learning: a case of undergraduate students at the Sokoine University of Agriculture, Tanzania|url=https://www.proquest.com/docview/2492709488|journal=Library Philosophy and Practice|pages=1β18|id={{ProQuest|2492709488}}|via=ProQuest}}</ref> {{citation needed span|date=June 2020|but also that the provider of the communication service is not able to decrypt the communications either by having access to the private key, or by having the capability to undetectably inject an adversarial public key as part of a [[man-in-the-middle attack]].}} This new meaning is now the widely accepted one.<ref>{{Cite journal|last=Lewis, James A., Denise E. Zheng, and William A. Carter.|title=The effect of encryption on lawful access to communications and data|journal=Rowman & Littlefield}}</ref>
Edit summary
(Briefly describe your changes)
By publishing changes, you agree to the
Terms of Use
, and you irrevocably agree to release your contribution under the
CC BY-SA 4.0 License
and the
GFDL
. You agree that a hyperlink or URL is sufficient attribution under the Creative Commons license.
Cancel
Editing help
(opens in new window)