eSeGeCe
software
Starting with eSeGeCe All-Access 2026.2.0, the TsgcWSPClient_E2EE protocol extends end-to-end encryption beyond direct peer-to-peer chat and adds first-class support for encrypted group traffic. The important part is that the server still behaves as a relay and coordinator only: payloads stay encrypted from sender to recipients and plaintext never crosses the server boundary.
What is included in 2026.2.0
The cryptographic model is aligned with the E2EE protocol documentation and is designed to keep the cost of group broadcast low without losing confidentiality or integrity guarantees.
1) Pairwise trust and key agreement
Each client owns its identity keys and performs ECDH-based key agreement for pairwise secure channels. Private keys are never moved to the server. HKDF-SHA-256 is used to derive working keys, and payload encryption uses AEAD (AES-256-GCM)).
2) Sender-key state per group
For each group, each sender maintains a sender-key state (chain key + message counter). For every outbound group message, the chain advances and derives a one-time message key. The message key encrypts the content, including authentication tag generation.
3) Initial sender-key distribution
When a user joins a group, the sender key state is distributed to current authorized members over already established pairwise E2EE sessions. Once all recipients have sender-key material, regular group messages follow the fast path (single encryption operation per outgoing payload).
4) Membership updates and key rotation
When users join or leave, sender-key rotation is mandatory to preserve forward/backward secrecy expectations:
During rotation, clients can briefly accept previous key id values in a transition window and then retire old material.
Configuration points
When you subscribe to the blog, we will send you an e-mail when there are new updates on the site so you wouldn't miss them.