This was originally written for the Network Security subject at Griffith University in April 2017. You can download it as a PDF here.
Abstract- Some Protocols can provide a large amount of overhead in comparison to others. This report explains how the simple Pretty Good Privacy protocol works as well as the sophisticated Signal protocol in the context of end-to-end encrypted instant messaging applications. This detailed analysis will develop insights into the mechanics of each protocol, identifying potential overheads and additional security services provided by each protocol.
Encrypted messaging applications are becoming more and more common as Internet users focus…
iOS Software Engineer 👨🏽💻🚀