Perfect Forward-Secrecy and Post Compromise-Secrecy

  • Updated

Each message is encrypted with new keys, so a compromised key has minimal impact. Encryption keys rotate regularly during a call and after a person left the conversation. Old keys are deleted as soon as they are no longer used.

Wire’s cryptography is based on an Open Source Proteus implementation of the Axolotl/Double Ratchet protocol. For the encryption of calling media, Wire uses the Advanced Encryption Standard (AES) encryption algorithm.

Learn more about Wire’s crypto protocol

Was this article helpful?

0 out of 0 found this helpful

Have more questions? Submit a request