Security Cryptography Whatever cover image

WhatsApp Key Transparency with Jasleen Malvai and Kevin Lewi

Security Cryptography Whatever

00:00

The Polynomial Cryptography

Thomas: I have like some simple questions about what the actual cryptography looks like. My first one being, are there any polynomials involved in this? No, they're, they're not serious. That's a, so it's actually funny because we're like, um, maybe in the future, they could be. So that would be an issue to our kind of story. At the moment, this, this implementation is just the parameters we use are hash functions. And we also use VRS, uh, which stands for verifiable random functions.

Transcript
Play full episode

Remember Everything You Learn from Podcasts

Save insights instantly, chat with episodes, and build lasting knowledge - all powered by AI.
App store bannerPlay store banner
Get the app