
WhatsApp Key Transparency with Jasleen Malvai and Kevin Lewi
Security Cryptography Whatever
00:00
The Polynomial Cryptography
Thomas: I have like some simple questions about what the actual cryptography looks like. My first one being, are there any polynomials involved in this? No, they're, they're not serious. That's a, so it's actually funny because we're like, um, maybe in the future, they could be. So that would be an issue to our kind of story. At the moment, this, this implementation is just the parameters we use are hash functions. And we also use VRS, uh, which stands for verifiable random functions.
Transcript
Play full episode