Overview of the Signal Protocol
❖ Abstract
This study was made for an assignment of the class ”Elliptic-Curve Cryptography” of my master’s.
For the assignment, the Signal Protocol (as described in [1], [2], [3], [4]), had to be studied, analyzed and presented in a more explanatory and student-friendly way.
❖ Files Included
- PDF (english)
- Presentation (english)
❖ Keywords
Elliptic curve Cryptography, Edwards Curves, Montgomery Curves, Curve25519, Curve448, EdDSA, ECDH, XEdDSA, X3DH protocol, Double Ratchet, Signal Protocol