"Double ratchet" redirects here. For the hand tool, see Wrench.
In cryptography, the Double Ratchet Algorithm (previously referred to as the Axolotl Ratchet[1][2]) is a key management algorithm that was developed by Trevor Perrin and Moxie Marlinspike in 2013. It can be used as part of a cryptographic protocol to provide end-to-end encryption for instant messaging. After an initial key exchange it manages the ongoing renewal and maintenance of short-lived session keys. It combines a cryptographic so-called "ratchet" based on the Diffie–Hellman key exchange (DH) and a ratchet based on a key derivation function (KDF), such as a hash function, and is therefore called a double ratchet.
The algorithm provides forward secrecy for messages, and implicit renegotiation of forward keys; properties for which the protocol is named.[3]
^Perrin, Trevor (30 March 2016). "Compare Revisions". GitHub. Retrieved 9 April 2016.
^Marlinspike, Moxie (30 March 2016). "Signal on the outside, Signal on the inside". Open Whisper Systems. Retrieved 31 March 2016.
^Cohn-Gordon, K.; Cremers, C.; Garratt, L. (2016). "On Post-compromise Security". 2016 IEEE 29th Computer Security Foundations Symposium (CSF). pp. 164–178. doi:10.1109/CSF.2016.19. ISBN 978-1-5090-2607-4. S2CID 5703986.
and 21 Related for: Double Ratchet Algorithm information
In cryptography, the DoubleRatchetAlgorithm (previously referred to as the Axolotl Ratchet) is a key management algorithm that was developed by Trevor...
cliquet option Double RatchetAlgorithm, an algorithm for managing cryptographic keys Ratchet (slang), a derogatory term Ratchet Gearloose, a Disney character...
Skype for its Private Conversations. The protocol combines the DoubleRatchetAlgorithm, prekeys, and a triple Elliptic-curve Diffie–Hellman (3-DH) handshake...
developed by Andreas Straub. According to Straub, OMEMO uses the DoubleRatchetAlgorithm "to provide multi-end to multi-end encryption, allowing messages...
having completed an independent security audit. Cryptocat uses a DoubleRatchetAlgorithm in order to obtain forward and future secrecy across messages,...
approximately 15% for the initial handshake. The Signal Protocol uses the DoubleRatchetAlgorithm to provide forward secrecy. On the other hand, among popular protocols...
"more than a billion people worldwide". The protocol combines the DoubleRatchetAlgorithm, prekeys, and a 3-DH handshake. It uses Curve25519, AES-256, and...
can be used to provide end-to-end encryption. It combines the DoubleRatchetalgorithm, prekeys, and a 3-DH handshake. Signal Messenger maintains several...
Silent Circle transitioned to using a protocol that uses the DoubleRatchetAlgorithm instead of SCIMP. "Silent Circle's SCIMP page". Archived from the...
design also included a feature known as double-stepping. This occurred when each pawl aligned with both the ratchet of its rotor and the rotating notched...
weights have been lost, but the diver is still at the bottom and has a ratchet reel with sufficient line. In this case the reel line is tied off to a...
1000+ ft (300 m). Reels for distance lines may have a locking mechanism, ratchet or adjustable drag to control deployment of the line and a winding handle...
"Secret Chat" is limited to the paid subscription tier of MeWe, and uses doubleratchet encryption to ensure that chats are private and not visible even to...
net were reduced drastically: between 2001 and 2005 as defense outlays ratcheted up, child allowances were cut by 45%, unemployment compensation by 47%...
Simmel, Friedrich C.; Dietz, Hendrik (2022-07-20). "A DNA origami rotary ratchet motor". Nature. 607: 492–498. doi:10.1038/s41586-022-04910-y. Julin, Sofia;...
Outlined in 1965 by Gordon Moore, co-founder of Intel Corporation. Muller's ratchet where mutations in a species will tend to accumulate. Muphry's law: "If...
net were reduced drastically: between 2001 and 2005 as defense outlays ratcheted up, child allowances were cut by 45%, unemployment compensation by 47%...
John M.; Keeling, Patrick J.; et al. (2011). "How a neutral evolutionary ratchet can build cellular complexity". IUBMB Life. 63 (7): 528–537. doi:10.1002/iub...