Computing desk | ||
---|---|---|
< November 6 | << Oct | November | Dec >> | November 8 > |
Welcome to the Wikipedia Computing Reference Desk Archives |
---|
The page you are currently viewing is a transcluded archive page. While you can leave answers for any questions shown below, please ask new questions on one of the current reference desk pages. |
I recently took a course in cyber security where I learnt about public key cryptosystems. Does Whatsapp use these for end to end encryption? If yes then which algorithm? RSA? What is my private key and public key? And more importantly, As I don't know my private key, which means whatsapp server generated it and gave it to me, which means they also have it! So why to say it end to end encrypted, if they have the key? -- Parnaval ( talk) 06:51, 7 November 2021 (UTC)
Computing desk | ||
---|---|---|
< November 6 | << Oct | November | Dec >> | November 8 > |
Welcome to the Wikipedia Computing Reference Desk Archives |
---|
The page you are currently viewing is a transcluded archive page. While you can leave answers for any questions shown below, please ask new questions on one of the current reference desk pages. |
I recently took a course in cyber security where I learnt about public key cryptosystems. Does Whatsapp use these for end to end encryption? If yes then which algorithm? RSA? What is my private key and public key? And more importantly, As I don't know my private key, which means whatsapp server generated it and gave it to me, which means they also have it! So why to say it end to end encrypted, if they have the key? -- Parnaval ( talk) 06:51, 7 November 2021 (UTC)