Security Cryptography Whatever cover image

WhatsApp Key Transparency with Jasleen Malvai and Kevin Lewi

Security Cryptography Whatever

00:00

The Polynomial Cryptography

Thomas: I have like some simple questions about what the actual cryptography looks like. My first one being, are there any polynomials involved in this? No, they're, they're not serious. That's a, so it's actually funny because we're like, um, maybe in the future, they could be. So that would be an issue to our kind of story. At the moment, this, this implementation is just the parameters we use are hash functions. And we also use VRS, uh, which stands for verifiable random functions.

Transcript
Play full episode

The AI-powered Podcast Player

Save insights by tapping your headphones, chat with episodes, discover the best highlights - and more!
App store bannerPlay store banner
Get the app