How Messaging Layer Security Works (sort of*) image/svg+xml How Messaging Layer Security Works (sort of*) Hubert Chathi
1
  1. Title
  2. Warning
  3. Why MLS
  4. Trees
  5. Trees (cont'd)
  6. fine print
  7. Tree nodes contain
  8. Alice creates a group
  9. Alice invites bob and Carol - full
  10. Alice invites Bob and Carol
  11. Cryptographic Ratchet
  12. Alice sends to Bob
  13. Bob decrypts the tree
  14. Alice sends to Carol
  15. Alice invites bob and Carol - full
  16. Alice sends a message
  17. Alice "removes" Bob
  18. Carol invites Dan, Erin, and Frank
  19. Carol invites Dan, Erin, and Frank
  20. Carol sends to the group
  21. Alice decrypts
  22. Alice decrypts
  23. Carol sends to Dan
  24. Dan derives K3''
  25. Carol sends to Erin
  26. Carol sends to Frank
  27. Carol sends to Frank
  28. Dan updates the group secret
  29. Alice can decrypt K4
  30. Carol and Erin can decrypt K4'
  31. Frank can decrypt K4''
  32. Dan updates group secret - full
  33. Overview