Wednesday 23 May 2018

An Overview about End-to-End Encryption


In todays fast growing world, security of his/her datat is the first priority of every user. So today we are going to give a brief introduction on End-to-End Encryption. End-to-End Encryption is a way of encrypting and decrypting data using the concept of cryptography.      So as the name says End-to-End Encryption refers to encrypting and decrypting of data on both the ends.Suppose a data is going to travel on the internet from a mobile phone, so first it will gen:erate two key , first is Pubic key and second is Private key.    The private key always remains in the phone, but the public key remains at the server.When a data is requested from the server the public key gets activated for that particular mobile phone from which it is generated. The Public key encrypts the data that come from the server in that way that only private key of that particular phone can only decrypts it.
Getting little bit confused ...!!
Lets take an example to clarify...
Suppose there is a messaging app in your mobile phones that uses End-to-End Encryption for protecting your privacy. Now while opening the acoount or Signing Up that app generated two key, first Public Key that will move to the server of that messaging app and the second key that  will remain in that mobile phone only.        So now when someone sends you a message that message will get encrypted by the Public key in that way that only Private key of that account can decrypt it. Now the encrypted file that contains the message is sent through the server to the mobile phone where the private key is already remaining there for decrypting it. So thats it for my self...

So thats it. Hope you guys like it. If yes then please .. comment down below and do not forgot to like follow and share our social media platforms. 

Facebook Page:- https://www.facebook.com/theprogrammer.harshit/ 

0 comments:

Post a Comment