{"id":1575,"date":"2016-09-10T10:46:33","date_gmt":"2016-09-10T08:46:33","guid":{"rendered":"https:\/\/blog.mi.hdm-stuttgart.de\/?p=1575"},"modified":"2023-08-06T21:53:55","modified_gmt":"2023-08-06T19:53:55","slug":"whatsapp-encrypts","status":"publish","type":"post","link":"https:\/\/blog.mi.hdm-stuttgart.de\/index.php\/2016\/09\/10\/whatsapp-encrypts\/","title":{"rendered":"WhatsApp encrypts !?"},"content":{"rendered":"<p><a href=\"https:\/\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2016\/09\/WSAP_Screenshot.jpg\"><img loading=\"lazy\" decoding=\"async\" data-attachment-id=\"1576\" data-permalink=\"https:\/\/blog.mi.hdm-stuttgart.de\/index.php\/2016\/09\/10\/whatsapp-encrypts\/wsap_screenshot\/\" data-orig-file=\"https:\/\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2016\/09\/WSAP_Screenshot.jpg\" data-orig-size=\"338,600\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"wsap_screenshot\" data-image-description=\"\" data-image-caption=\"\" data-large-file=\"https:\/\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2016\/09\/WSAP_Screenshot.jpg\" class=\"alignleft wp-image-1576 size-medium\" src=\"https:\/\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2016\/09\/WSAP_Screenshot-169x300.jpg\" alt=\"wsap_screenshot\" width=\"169\" height=\"300\" srcset=\"https:\/\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2016\/09\/WSAP_Screenshot-169x300.jpg 169w, https:\/\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2016\/09\/WSAP_Screenshot.jpg 338w\" sizes=\"auto, (max-width: 169px) 100vw, 169px\" \/><\/a><\/p>\n<p>The majority of the 1 billion monthly whatsapp users may be a little confused about the tiny yellow info-box in their familiar chat. End-to-end encryption? Is this one of these silly annoying whatsapp-viruses or maybe something good?<\/p>\n<p>The first big question is \u201cwhy\u201d. Why do we need a (so complicated) whatsapp end-to-end encryption? The most important answer is obvious: cause the sent messages are highly personal and worthy to protect against third-party attackers or facebook\/ whatsapp itself. From facebook\u2019s point of view there are some more reasons like pressure caused by competitors or loss of trust by the users.<\/p>\n<p><!--more--><\/p>\n<p><strong>How does it work? <\/strong><\/p>\n<p>The next question is, how does this end-to-end encryption work and is it really safe? As a foundation for their protocol they use the Signal Messaging protocol by Open Whisper Systems which security experts trust in. Namely Edward Snowden says: <a href=\"https:\/\/whispersystems.org\/\">\u201cUse anything by Open Whisper Systems.\u201d<\/a> &nbsp;With that said we want to take a closer look and check out a short <a href=\"https:\/\/www.whatsapp.com\/security\/\">white paper<\/a> describing their use of the encryption mechanisms. The first statement answers one of our questions: Is whatsapp saving my data in cleartext on the server? They say no. The messages are encrypted so that no third party nor whatsapp itself are able to extract plain text from messages or calls. A picture says more than thousand words, so there is one, trying to grasp the concepts involved in the encryption process.<\/p>\n<p><a href=\"https:\/\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2016\/09\/whatsapp.jpg\"><img loading=\"lazy\" decoding=\"async\" data-attachment-id=\"1578\" data-permalink=\"https:\/\/blog.mi.hdm-stuttgart.de\/index.php\/2016\/09\/10\/whatsapp-encrypts\/whatsapp\/\" data-orig-file=\"https:\/\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2016\/09\/whatsapp.jpg\" data-orig-size=\"2000,1333\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"whatsapp\" data-image-description=\"\" data-image-caption=\"\" data-large-file=\"https:\/\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2016\/09\/whatsapp-1024x682.jpg\" class=\"aligncenter wp-image-1578 size-large\" src=\"https:\/\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2016\/09\/whatsapp-1024x682.jpg\" alt=\"whatsapp\" width=\"656\" height=\"437\" srcset=\"https:\/\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2016\/09\/whatsapp-1024x682.jpg 1024w, https:\/\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2016\/09\/whatsapp-300x200.jpg 300w, https:\/\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2016\/09\/whatsapp-768x512.jpg 768w, https:\/\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2016\/09\/whatsapp.jpg 2000w\" sizes=\"auto, (max-width: 656px) 100vw, 656px\" \/><\/a>To be able to send messages back and forth three steps have to be performed beforehand.<\/p>\n<ol>\n<li>client registration<\/li>\n<li>session initiation<\/li>\n<li>receiving session setup<\/li>\n<\/ol>\n<p>After a long running session is established messages can be exchanged.<\/p>\n<p>The client sends his public keys, which were generated at install time, to the server where they are saved with an user identifier. If User A wants to send a message to User X he requests the public keys from the Server and establishes a long running session by calculating a master secret with Elliptic Curve Diffie Hellman (ECDH). After that a so called root key and chain keys are generated with HKDF to transform the cryptographic weak material in cryptographic strong material. User X receives the public key material and generates a master secret, a root key and chain keys as well. After the session is established for each sent message a message key is generated by using a chain key, which is changed as well for each transmission and generated using the root key.<\/p>\n<p>In the next section we want to look at the security aspects of the end-to-end encryption of whatsapp.<\/p>\n<h2><b>Loopholes and weak spots?<\/b><\/h2>\n<p><a href=\"https:\/\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2016\/09\/Picture_whiteboard.jpg\"><img loading=\"lazy\" decoding=\"async\" data-attachment-id=\"1579\" data-permalink=\"https:\/\/blog.mi.hdm-stuttgart.de\/index.php\/2016\/09\/10\/whatsapp-encrypts\/picture_whiteboard\/\" data-orig-file=\"https:\/\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2016\/09\/Picture_whiteboard.jpg\" data-orig-size=\"291,244\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;jh&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;1473509259&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"picture_whiteboard\" data-image-description=\"\" data-image-caption=\"\" data-large-file=\"https:\/\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2016\/09\/Picture_whiteboard.jpg\" class=\"alignleft size-full wp-image-1579\" src=\"https:\/\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2016\/09\/Picture_whiteboard.jpg\" alt=\"picture_whiteboard\" width=\"291\" height=\"244\"><\/a>Trying to understand the rough concept behind end-to-end encryption and identifying potential security problems it is helpful to sketch out all the components in the system. The best way to do that is a piece of paper or a whiteboard, as you can see on the left.<\/p>\n<p>&nbsp;<\/p>\n<p>The following picture is similar to Fig. 1 and shows the elements of the system. We want to keep the format of asking questions to identify areas important for security.<\/p>\n<p><a href=\"https:\/\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2016\/09\/whatsapp_Security_analysis.jpg\"><img loading=\"lazy\" decoding=\"async\" data-attachment-id=\"1580\" data-permalink=\"https:\/\/blog.mi.hdm-stuttgart.de\/index.php\/2016\/09\/10\/whatsapp-encrypts\/whatsapp_security_analysis\/\" data-orig-file=\"https:\/\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2016\/09\/whatsapp_Security_analysis.jpg\" data-orig-size=\"2000,1333\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"whatsapp_security_analysis\" data-image-description=\"\" data-image-caption=\"\" data-large-file=\"https:\/\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2016\/09\/whatsapp_Security_analysis-1024x682.jpg\" class=\"aligncenter wp-image-1580 size-large\" src=\"https:\/\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2016\/09\/whatsapp_Security_analysis-1024x682.jpg\" alt=\"whatsapp_security_analysis\" width=\"656\" height=\"437\" srcset=\"https:\/\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2016\/09\/whatsapp_Security_analysis-1024x682.jpg 1024w, https:\/\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2016\/09\/whatsapp_Security_analysis-300x200.jpg 300w, https:\/\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2016\/09\/whatsapp_Security_analysis-768x512.jpg 768w, https:\/\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2016\/09\/whatsapp_Security_analysis.jpg 2000w\" sizes=\"auto, (max-width: 656px) 100vw, 656px\" \/><\/a><b>1. Are the keys safe on the servers of whatsapp and what happens if they would be compromised? <\/b><\/p>\n<p>&nbsp;<\/p>\n<p>On the server data is saved encrypted as well, so that from the data itself no clear text information can be extracted. Another way to get hold of information would be the man in the middle attack where somebody would pose as a whatsapp server and record all the information. Still the keys are encrypted because the private keys are not saved on the servers.<\/p>\n<p><b>2. What happens if somebody gets hold of one of the long running session keys?<\/b><\/p>\n<p>&nbsp;<\/p>\n<p>The encryption protocol uses forward secrecy. Forward secrecy uses long-term keys to generate new keys for every new session. If the communication is recorded and the long-term keys compromised it is not possible to extract the used session keys. Therefore a encrypted communication cannot be encrypted even if the long-term keys are in the possession of an attacker.<\/p>\n<p><b>3. Is it possible to extract plain text out of a message somebody stole?<\/b><\/p>\n<p>The same principle is applied to messages. For every message a new message key is generated from a chain key with a hash algorithm. Meaning the message key cannot be derived after transmission and receiving. With every round trip a new chain key is generated from a root key using Diffie-Hellman procedure. So there are two security mechanisms to secure messages. In the whitepaper they are called an immediate \u201chash ratchet\u201d and a round trip \u201cDH ratchet\u201d.<\/p>\n<p>After looking at these three questions we want to see where the weak spot is right now. The security of the server and the transport of messages are ensured by the encryption protocol. A <a href=\"http:\/\/www.heise.de\/security\/artikel\/Test-Hinter-den-Kulissen-der-WhatsApp-Verschluesselung-3165567.html\">practical examination<\/a> done by heise security has shown, that the encryption works as it should. After looking at the server and the communication we take a look at the sender and recipient, the user, and realize that there is the weak spot right now. The private keys are generated at install time on the user\u2019s phone. In case somebody is able to extract the keys he can pose as the user and send messages back and forth. If the phone is physically stolen and not secured the messages and all the information is fully accessible.<\/p>\n<h2>Questions<\/h2>\n<p>Now, that we got a small overview over the end-to-end encryption used by whatsapp we sum up our questions we had and add some more questions which remain open because they would go beyond the scope of a short blog post.<\/p>\n<ul>\n<li>Does WhatsApp save the data on the server encrypted as well?<\/li>\n<li>Is the encryption working as described in the white paper by whatsapp ?<\/li>\n<li>How are the initial key pairs generated on the user\u2019s phone?<\/li>\n<li>Is the cryptographic quality of the keys sufficient?<\/li>\n<li>How is the app itself secured on the phone?<\/li>\n<li>Are old messages encrypted as well?<\/li>\n<\/ul>\n<p>Still there are questions remaining open, which address the topic in a broader manner. For communication still some data is needed to ensure correct delivery. Out of metadata a lot of personal information can be extracted. So the next question is:<\/p>\n<ul>\n<li>Is it possible to hide private contact information (metadata)?<\/li>\n<\/ul>\n<p>Another question regarding the security awareness of the user opens the space for discussion.<\/p>\n<ul>\n<li>Who is responsible for the data, the user or whatsapp?<\/li>\n<li>What are the main reasons for using a messenger, security, functionality or who else does it use?<\/li>\n<\/ul>\n<h2>Conclusion<\/h2>\n<p>After conducting a small security analysis it is fair to say that whatsapp\u2019s encryption satisfies current security standards. Nevertheless, as a user you should always be aware that metadata is still a great source to extract personal user information. As a user you should know that it is unclear what the service provider is actually doing in the background with your data. Using the service requires trust to the service provider. &nbsp;Another point is the shift of security risks to the devices of the users. Oftentimes users lack security awareness and do not guard their phones or computers sufficiently.<\/p>\n<p><em>Blogpost by Martin Kopp and Jonas H\u00e4fele<\/em><\/p>\n<p>&nbsp;<\/p>\n<p>References:<\/p>\n<p><a href=\"https:\/\/www.whatsapp.com\/security\/\">https:\/\/www.whatsapp.com\/security\/<\/a><\/p>\n<p><a href=\"https:\/\/blog.whatsapp.com\/10000618\/end-to-end-encryption\">https:\/\/blog.whatsapp.com\/10000618\/end-to-end-encryption<\/a>?<\/p>\n<p><a href=\"http:\/\/www.computerworld.ch\/typo3temp\/pics\/7d5758ae0c.jpg\">http:\/\/www.computerworld.ch\/typo3temp\/pics\/7d5758ae0c.jpg<\/a><\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>The majority of the 1 billion monthly whatsapp users may be a little confused about the tiny yellow info-box in their familiar chat. End-to-end encryption? Is this one of these silly annoying whatsapp-viruses or maybe something good?<br \/>\nThe first big question is \u201cwhy\u201d. Why do we need a (so complicated) whatsapp end-to-end encryption? The most important answer is obvious: cause the sent messages are highly personal and worthy to protect against third-party attackers or facebook\/ whatsapp itself. From facebook\u2019s point of view there are some more reasons like pressure caused by competitors or loss of trust by the users.<\/p>\n","protected":false},"author":30,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[26,651],"tags":[],"ppma_author":[705],"class_list":["post-1575","post","type-post","status-publish","format-standard","hentry","category-secure-systems","category-system-designs"],"aioseo_notices":[],"jetpack_featured_media_url":"","jetpack-related-posts":[{"id":20964,"url":"https:\/\/blog.mi.hdm-stuttgart.de\/index.php\/2021\/09\/15\/enterprise-social-audio-research-implementation-and-opportunities\/","url_meta":{"origin":1575,"position":0},"title":"Enterprise Social Audio &#8211; Research, Implementation and Opportunities","author":"Mario Koch","date":"15. September 2021","format":false,"excerpt":"Enterprise Socia Audio - does it work, what are non-negotiables, what are the challenges? Research and implementation in close collaboration with clients.","rel":"","context":"In &quot;Allgemein&quot;","block_context":{"text":"Allgemein","link":"https:\/\/blog.mi.hdm-stuttgart.de\/index.php\/category\/allgemein\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2021\/09\/jason-rosewell-ASKeuOZqhYU-unsplash-1-edited-scaled.jpg?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2021\/09\/jason-rosewell-ASKeuOZqhYU-unsplash-1-edited-scaled.jpg?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2021\/09\/jason-rosewell-ASKeuOZqhYU-unsplash-1-edited-scaled.jpg?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2021\/09\/jason-rosewell-ASKeuOZqhYU-unsplash-1-edited-scaled.jpg?resize=700%2C400&ssl=1 2x, https:\/\/i0.wp.com\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2021\/09\/jason-rosewell-ASKeuOZqhYU-unsplash-1-edited-scaled.jpg?resize=1050%2C600&ssl=1 3x, https:\/\/i0.wp.com\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2021\/09\/jason-rosewell-ASKeuOZqhYU-unsplash-1-edited-scaled.jpg?resize=1400%2C800&ssl=1 4x"},"classes":[]},{"id":21821,"url":"https:\/\/blog.mi.hdm-stuttgart.de\/index.php\/2021\/10\/07\/security-requirement-category-data-at-rest\/","url_meta":{"origin":1575,"position":1},"title":"Security Requirement Category: Data at Rest","author":"Philip Betzler","date":"7. October 2021","format":false,"excerpt":"By Alexander Allerdings, Niklas Werth and Philip Betzler. Security Requirements are requirements that have to be met in a Software Development process to make the software secure. To avoid time and resource costly delays they should be considered from the beginning. In this blog entry we take a closer look\u2026","rel":"","context":"In &quot;Secure Systems&quot;","block_context":{"text":"Secure Systems","link":"https:\/\/blog.mi.hdm-stuttgart.de\/index.php\/category\/system-designs\/secure-systems\/"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":3981,"url":"https:\/\/blog.mi.hdm-stuttgart.de\/index.php\/2018\/08\/16\/usability-and-security\/","url_meta":{"origin":1575,"position":2},"title":"Usability and Security","author":"Christof Kost","date":"16. August 2018","format":false,"excerpt":"Usability and Security - Is a tradeoff necessary? Usability is one of the main reasons for a successful software with user interaction. But often it is worsened by high security standards. Furthermore many use cases need authentication, authorisation and system access where high damage is risked when security possibilities get\u2026","rel":"","context":"In &quot;Allgemein&quot;","block_context":{"text":"Allgemein","link":"https:\/\/blog.mi.hdm-stuttgart.de\/index.php\/category\/allgemein\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2018\/08\/2018-08-16-12_12_42-NotificerffeationsForm.png?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2018\/08\/2018-08-16-12_12_42-NotificerffeationsForm.png?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2018\/08\/2018-08-16-12_12_42-NotificerffeationsForm.png?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2018\/08\/2018-08-16-12_12_42-NotificerffeationsForm.png?resize=700%2C400&ssl=1 2x, https:\/\/i0.wp.com\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2018\/08\/2018-08-16-12_12_42-NotificerffeationsForm.png?resize=1050%2C600&ssl=1 3x, https:\/\/i0.wp.com\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2018\/08\/2018-08-16-12_12_42-NotificerffeationsForm.png?resize=1400%2C800&ssl=1 4x"},"classes":[]},{"id":3811,"url":"https:\/\/blog.mi.hdm-stuttgart.de\/index.php\/2018\/08\/02\/quantum-and-post-quantum-cryptography\/","url_meta":{"origin":1575,"position":3},"title":"Quantum and Post-Quantum Cryptography","author":"Oliver Hummel","date":"2. August 2018","format":false,"excerpt":"In a world where political activists and dissidents get persecuted by authoritarian governments, strong cryptography is more necessary than ever. But the general public benefits from it as well. Identity theft, banking fraud and cyber bullying can happen to anybody. The most effective protection is to not make sensitive material\u2026","rel":"","context":"In &quot;Secure Systems&quot;","block_context":{"text":"Secure Systems","link":"https:\/\/blog.mi.hdm-stuttgart.de\/index.php\/category\/system-designs\/secure-systems\/"},"img":{"alt_text":"BB84 Protocol key generation","src":"https:\/\/i0.wp.com\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2018\/08\/quantum_crypto_fig2_bb84_keygen.png?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2018\/08\/quantum_crypto_fig2_bb84_keygen.png?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2018\/08\/quantum_crypto_fig2_bb84_keygen.png?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2018\/08\/quantum_crypto_fig2_bb84_keygen.png?resize=700%2C400&ssl=1 2x, https:\/\/i0.wp.com\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2018\/08\/quantum_crypto_fig2_bb84_keygen.png?resize=1050%2C600&ssl=1 3x, https:\/\/i0.wp.com\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2018\/08\/quantum_crypto_fig2_bb84_keygen.png?resize=1400%2C800&ssl=1 4x"},"classes":[]},{"id":3217,"url":"https:\/\/blog.mi.hdm-stuttgart.de\/index.php\/2017\/09\/14\/embedded-security-using-an-esp32\/","url_meta":{"origin":1575,"position":4},"title":"Embedded Security using an ESP32","author":"benjaminmorgner","date":"14. September 2017","format":false,"excerpt":"Ever wondered why your brand-new Philips Hue suddenly starts blinking SOS? Or why there is an ominous Broadcast on your Samsung TV while watching your daily Desperate Housewives? And didn't you wear an Apple Watch a few minutes ago, and why did you buy 2 TVs in that time? Security\u2026","rel":"","context":"In &quot;Secure Systems&quot;","block_context":{"text":"Secure Systems","link":"https:\/\/blog.mi.hdm-stuttgart.de\/index.php\/category\/system-designs\/secure-systems\/"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":26307,"url":"https:\/\/blog.mi.hdm-stuttgart.de\/index.php\/2024\/07\/26\/importance-and-impact-of-quantum-safe-encryption-for-enterprises\/","url_meta":{"origin":1575,"position":5},"title":"Importance and Impact of Quantum Safe Encryption for Enterprises","author":"Aleksandra Gidionova","date":"26. July 2024","format":false,"excerpt":"More than forty years ago Richard Feynman\u2019s paper \u201cSimulating Physics with Computers\u201d was published\u00a0[1], laying the foundational vision for what we now recognize as quantum computing. Since then, quantum computing has become a fascinating and fast-expanding\u00a0field at the forefront of technological innovation. With the potential to revolutionize computing power and\u2026","rel":"","context":"In &quot;Allgemein&quot;","block_context":{"text":"Allgemein","link":"https:\/\/blog.mi.hdm-stuttgart.de\/index.php\/category\/allgemein\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2024\/07\/problem.jpg?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2024\/07\/problem.jpg?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2024\/07\/problem.jpg?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2024\/07\/problem.jpg?resize=700%2C400&ssl=1 2x"},"classes":[]}],"jetpack_sharing_enabled":true,"authors":[{"term_id":705,"user_id":30,"is_guest":0,"slug":"jh176","display_name":"jh176","avatar_url":"https:\/\/secure.gravatar.com\/avatar\/9813472ac2ba523c61c9f6b2baf97a5e992656349cb091241ba5e389f56daf00?s=96&d=mm&r=g","0":null,"1":"","2":"","3":"","4":"","5":"","6":"","7":"","8":""}],"_links":{"self":[{"href":"https:\/\/blog.mi.hdm-stuttgart.de\/index.php\/wp-json\/wp\/v2\/posts\/1575","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/blog.mi.hdm-stuttgart.de\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blog.mi.hdm-stuttgart.de\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blog.mi.hdm-stuttgart.de\/index.php\/wp-json\/wp\/v2\/users\/30"}],"replies":[{"embeddable":true,"href":"https:\/\/blog.mi.hdm-stuttgart.de\/index.php\/wp-json\/wp\/v2\/comments?post=1575"}],"version-history":[{"count":6,"href":"https:\/\/blog.mi.hdm-stuttgart.de\/index.php\/wp-json\/wp\/v2\/posts\/1575\/revisions"}],"predecessor-version":[{"id":24704,"href":"https:\/\/blog.mi.hdm-stuttgart.de\/index.php\/wp-json\/wp\/v2\/posts\/1575\/revisions\/24704"}],"wp:attachment":[{"href":"https:\/\/blog.mi.hdm-stuttgart.de\/index.php\/wp-json\/wp\/v2\/media?parent=1575"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blog.mi.hdm-stuttgart.de\/index.php\/wp-json\/wp\/v2\/categories?post=1575"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blog.mi.hdm-stuttgart.de\/index.php\/wp-json\/wp\/v2\/tags?post=1575"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/blog.mi.hdm-stuttgart.de\/index.php\/wp-json\/wp\/v2\/ppma_author?post=1575"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}