Image for post
Image for post

This was originally written for the Network Security subject at Griffith University in April 2017. You can download it as a PDF here.

Abstract- Some Protocols can provide a large amount of overhead in comparison to others. This report explains how the simple Pretty Good Privacy protocol works as well as the sophisticated Signal protocol in the context of end-to-end encrypted instant messaging applications. This detailed analysis will develop insights into the mechanics of each protocol, identifying potential overheads and additional security services provided by each protocol.

I. Introduction

Encrypted messaging applications are becoming more and more common as Internet users focus on their privacy. These applications focus more on usage by personal users than that of an enterprise or government setting. Various security services are provided depending on the protocol implemented that users find favourable to prevent exposing their personal information on the Internet. …


Nate Sanchez-Goodwin

iOS Software Engineer πŸ‘¨πŸ½β€πŸ’»πŸš€

Get the Medium app