Skip to content

Preamble

The protocols presented in this part are those used by the SDK (possibly integrated in the desktop application).

WARNING

Some protocols are specific to the desktop application, and cannot be used in the SDK.

Some key notions are useful to go further in the documentation. They are summarized here and some informative documentation links are provided.

For normative documentation, see the Référentiel Général de Sécurité of the ANSSI and its annexes B1 and B2.

Asymmetric cryptography

This is a cryptographic method that allows anyone to protect a message that can only be read by the intended recipient. The protection is carried out using the public key of the recipient of a message. The message can then be decrypted by the recipient using his private key.

For more information, see the dedicated Wikipedia page.

Symmetric cryptography

Symmetric cryptography is a cryptographic method that allows to protect a message with a shared secret called symmetric key. Indeed, unlike asymmetric encryption, in symmetric encryption, the same secret is used to encrypt and decrypt the message at the same time.

For more information, see the dedicated Wikipedia page.