FAQ
How does enigma keep complete anonymity between users?
Enigma uses many methods to ensure user anonymity. The main points of emphasis being:
- No network data is saved on the server. This means that if a third party happens to gain control or access to the server, they cannot read any previous or current traffic.
- All conversations are double encrypted. Enigma utilizes a public private key encryption method to encrypt sensitive data. This is all wrapped in a second layer of AES encryption.
- The Key System.
What is AES encryption?
AES (acronym of Advanced Encryption Standard) is a symmetric encryption algorithm.
The algorithm was developed by two Belgian cryptographer Joan Daemen and Vincent Rijmen.
AES was designed to be efficient in both hardware and software, and supports a block length of 128 bits and key lengths of 128, 192, and 256 bits.
The algorithm was developed by two Belgian cryptographer Joan Daemen and Vincent Rijmen.
AES was designed to be efficient in both hardware and software, and supports a block length of 128 bits and key lengths of 128, 192, and 256 bits.
What is public-private key encryption?
A cryptographic system that uses two keys -- a public key known to everyone and a private or secret key known only to the recipient of the message. When John wants to send a secure message to Jane, he uses Jane's public key to encrypt the message. Jane then uses her private key to decrypt it. An important element to the public key system is that the public and private keys are related in such a way that only the public key can be used to encrypt messages and only the corresponding private key can be used to decrypt them. Moreover, it is virtually impossible to deduce the private key if you know the public key
What is a key system?
A Key system is a system that works much like the phone number system. Each Enigma user is given a randomly generated key after their account creation. This key becomes their phone number per say. A user may only contact you if he or she has your key. The importance of this system is that users don't need to know your name or account, just your key. To ensure anonymity, users are given the ability to change their key as many times as they would like.
how can i contribute to the development of enigma?
If you would like to contribute to the development of Enigma in anyway please contact the Lead Developer. You can Find all contact info under the Development Team tab.