End-to-end encryption or E2EE is the type of encryption where a message is encrypted at the sender's end and decrypted on the receiver's end. The message remains encrypted at all points during the transit, so even if someone intercepts it during transmission, they can't read its contents.
The term end-to-end refers to this same fact. The encryption and decryption of the messages happen only at the endpoints, the sender, and the receiver end. The message is not encrypted or decrypted at any point in transit. Even the server relaying and storing your message cannot decipher and read your messages.
E2EE uses asymmetric public key encryption, where both parties have two keys. Here, the term “key” refers to the mathematical algorithm used to decrypt or encrypt a message. One of the keys is the public key that anyone can access, while the other is the private key that is not shared with anyone else. The public key is used to encode a message, and this encoded message can only be decoded using its corresponding private key. Simply put it’s a double-lock system.
When somebody sends you an encrypted message, their app uses your public key to encrypt the message. The encrypted message is sent over the internet. However, the public key can't be used to translate the message into its original form. To do that, you need your private key. This is possible because the public key and private key are linked in a way that is nearly impossible to figure out when looking at the public key alone.
Besides securing your messages, and ensuring privacy, E2EE also helps those working remotely to access company tools and data securely.
However, E2EE isn’t a perfect security solution. If an app’s communication is fully encrypted, that can prevent the app from offering additional features like contextual services based on the content of the message, or the ability to automatically generate calendar invites, message history, and other additional features.
Moreover, while E2EE does help protect the content and data of your messages, it doesn’t encrypt the metadata. Thus, even if the content is encrypted, it’s still possible to determine who you sent messages to, and when. Law enforcement agencies in the US and European countries have also argued that E2EE prevents text messaging applications such as Telegram, WhatsApp, Apple's iMessage, Jabber and Signal, or even Facebook Messager, to monitor illegal activities on these platforms.
You’ve reached your limit of {{free_limit}} free articles this month.
Subscribe now for unlimited access.
Already subscribed? Log in
Subscribe to read the full story →
Smart Quarterly
₹900
3 Months
₹300/Month
Smart Essential
₹2,700
1 Year
₹225/Month
Super Saver
₹3,900
2 Years
₹162/Month
Renews automatically, cancel anytime
Here’s what’s included in our digital subscription plans
Exclusive premium stories online
Over 30 premium stories daily, handpicked by our editors


Complimentary Access to The New York Times
News, Games, Cooking, Audio, Wirecutter & The Athletic
Business Standard Epaper
Digital replica of our daily newspaper — with options to read, save, and share


Curated Newsletters
Insights on markets, finance, politics, tech, and more delivered to your inbox
Market Analysis & Investment Insights
In-depth market analysis & insights with access to The Smart Investor


Archives
Repository of articles and publications dating back to 1997
Ad-free Reading
Uninterrupted reading experience with no advertisements


Seamless Access Across All Devices
Access Business Standard across devices — mobile, tablet, or PC, via web or app
)