To access this content fill in:

End-to-end encryption

“Trust your application, not the network”

End-to-end encryption (E2EE) is the most secure way to communicate privately and securely online. By encrypting information at the sender and decrypting at the receiver point, end-to-end encryption prevents anyone in the middle from reading that information.

E2EE VS NETWORK SECURITY

With End-to-End Encryption (E2EE) there is no need for a secure channel. Instead of relying on a communication protocol lower in the stack to handle the encryption, the application that created the message will handle encryption and decryption of its own communication.

The key difference between traditional channel (“session”, “tunnel”) security and payload encryption based object security is that an application does not need to trust a channel and the different relaying nodes between sender and receiver.

Consider the case of an email message.  When it’s carried over an IPSEC or TLS secured connection, the message is protected during transmission.  However, it is unprotected in the receiver’s mailbox, and in intermediate servers, hubs, etc., along the way.

By contrast, with object security, the entire message is encrypted and integrity protected until it is examined and decrypted by the recipient.  It also provides strong authentication of the actual sending device.

DIFFERENT END-TO-END ENCRYPTION MODELS

E2EE comes in different flavors depending on the purpose the model has been developed for.

PGP

Signal

Read more about HYKER vs Signal here

HYKER RIKS

PGPSIGNALHYKER RIKS
End-to-endxxx
Multiple devicesxx
Any Identityx
Perfect Forward Secrecyx
Access Control Delegationx
Dynamic Groupsx

HYKER End-to-End Security provides all necessary functionality, including encryption key distribution, for simplified application development of full asynchronous end-to-end secure applications.