You are viewing a preview of...

A New Method for End-to-End Encryption

A technique to ensure that only senders and recipients read messages by forcing attackers to leave evidence of any such activity.

Background

With current end-to-end encryption, if an attacker compromises a recipient’s device, they can then put themselves in a position to intercept, read and alter all future communications without sender or recipient ever knowing. Effective end-to-end encryption services have already been developed, but by definition they rely on a device itself remaining secure; once a device has been compromised there’s little that the user can do.

Technology Overview

Researchers at the University of Birmingham, in collaboration with the University of Luxembourg and University of Oxford, have developed a technique that ensures that only sender and recipient can read a message. The new protocol forces attackers to leave evidence of any such activity and alerts users to take action.

The solution,

Log in or create a free account to continue reading