Overview of the Signal Protocol

❖ Abstract

This study was made for an assignment of the class ”Elliptic-Curve Cryptography” of my master’s.
For the assignment, the Signal Protocol (as described in [1], [2], [3], [4]), had to be studied, analyzed and presented in a more explanatory and student-friendly way.

❖ Files Included

❖ Keywords

Elliptic curve Cryptography, Edwards Curves, Montgomery Curves, Curve25519, Curve448, EdDSA, ECDH, XEdDSA, X3DH protocol, Double Ratchet, Signal Protocol