Course Content
UPSC Notes Samples
Full Syllabus Covered | 100% as per Official UPSC Syllabus
0/46
1. Art & Culture Sample
Covered under topic 1. Indian culture will cover the salient aspects of Art Forms, Literature and Architecture from ancient to modern times.
0/67
1. Indian culture will cover the salient aspects of Art Forms, Literature and Architecture from ancient to modern times. (copy)
0/67
2. Modern Indian history from about the middle of the eighteenth century until the present- significant events, personalities, issues. (copy)
0/66
5. History of the world will include events from the 18th century such as Industrial revolution, World wars, Redrawal of national boundaries, Colonization, Decolonization, Political philosophies like Communism, Capitalism, Socialism etc.- their forms and effect on the society.
0/59
7. Role of women and women’s organizations, Population and associated issues, Poverty and developmental issues, Urbanization, their problems and their remedies.
0/41
10.2. Introduction to Maps
0/1
GS2
All topics that need updates are given below.
2. Functions and responsibilities of the Union and the States, issues and challenges pertaining to the federal structure, devolution of powers and finances up to local levels and challenges therein.
All topics that need updates are given below.
0/36
5. Parliament and State Legislatures – structure, functioning, conduct of business, powers & privileges and issues arising out of these.
All topics that need updates are given below.
0/31
6. Structure, organization and functioning of the Executive and the Judiciary; Ministries and Departments of the Government; pressure groups and formal/informal associations and their role in the Polity.
All topics that need updates are given below.
0/47
12. Welfare schemes for Vulnerable Sections of the Population by the Centre and States and the Performance of these schemes; Mechanisms, Laws, Institutions and Bodies constituted for the Protection and Betterment of these Vulnerable Sections.
All topics that need updates are given below.
0/33
GS3
All topics that need updates are given below.
11. Science and Technology- developments and their applications and effects in everyday life.
0/1
GS3: BIODIVERSITY AND ENVIRONMENT
All topics that need updates are given below.
1. Environment
0/151
GS4
All topics that need updates are given below.
GS3: SCIENCE AND TECHNOLOGY
All topics given below
0/1
1. Motion & Measurements
0/46
9. Metals & Non-Metals
0/23
10. Energy
0/49
12. Plant Organisms
0/33
14. Life Processes
0/42
18. Biotechnology
0/88
19. Information Technology
0/59
20. Space Technology
0/64
National & International Current Affairs (CA) 2025
Current affairs of all months are given below
delete UPSC Sample Notes [English]

xxv. End-to-End Encryption

Law enforcement organizations insist on encryption techniques that could allow for “lawful access by design”.  But the messaging apps and internet behemoths seem to be making a stronger effort to adopt end-to-end encryption to secure more user data. 

Only the users who are conversing can read messages in an end-to-end encryption (E2EE) system.

In theory, it stops possible listeners from having access to the cryptographic keys required to decrypt the conversation. This includes telecom carriers, Internet service providers, hostile actors, and even communication service providers.

What makes end-to-end encryption unique compared to other encryption systems is that only the endpoints – the sender and the receiver – are capable of decrypting and reading the message.

What is end-to-end encryption?

End-to-end encryption (E2EE) is a secure communication technique that makes it impossible for outsiders to access data while it is transported from one end system or device to another.

  • Only the intended recipient can decrypt the data in an E2EE transaction since it is encrypted on the sending system or device.
  • The communication cannot be read or altered while in transit by an internet service provider (ISP), an application service provider, a hacker, or any other person, group, or service.

Many well-known messaging service providers, such as Facebook, WhatsApp, and Zoom use end-to-end encryption.

The adoption of E2EE has caused controversy for these providers. The technology possibly enables private messaging for those participating and makes it more difficult for service providers to provide useful information from their services to authorities.

How does end-to-end encryption work?

The endpoints hold the cryptographic keys that are used to encrypt and decrypt the messages. In this method, public key encryption is used.

  • A private key and a shared public key are used in public key encryption, also known as asymmetric encryption.
  • When the public key is made available, anyone can use it to encrypt a message and send it to the public key’s owner.
  • Only the associated private key, also known as the decryption key, can be used to decrypt the communication.

Online conversations nearly always include a third party passing messages back and forth between the persons participating in an exchange.

  • This middleman is typically a server owned by an ISP, a telecommunications provider, or several other businesses.
  • The public key infrastructure that E2EE utilizes prevents middlemen from intercepting messages in transit.

Incorporating a public key into a certificate that has been digitally signed by a reputable certificate authority is the best way to ensure a public key is a genuine key generated by the intended receiver (CA).

  • A certificate signed with the CA’s public key can be trusted because it is extensively used and understood, and because of this, its authenticity can be assumed.
  • The CA would probably refuse to certify a certificate that linked a different public key to the same name because the certificate links the recipient’s name and public key.

How is E2EE used?

  • When data security is required, such as in the financial, medical, and communications sectors, end-to-end encryption is used.
  • It is frequently employed to assist businesses in adhering to data privacy and security rules and legislation.
  • To protect sensitive data, such as consumer credit card information, a vendor of electronic point-of-sale (POS) systems might offer E2EE.
  • The Payment Card Industry Data Security Standard (PCI DSS), which prohibits the storage of card numbers, magnetic stripe information, and security codes on client devices, can be complied with by retailers by using E2EE.

E2EE defends against these two dangers

  • Prying eyes: Only the sender and intended recipient know the keys to decrypt the message, so E2EE prevents anybody else from accessing the communication’s contents in transit. The message won’t be readable, even though a server acting as an intermediary server and facilitating its transmission may be able to see it.
  • Tampering: E2EE additionally guards against the alteration of encrypted messages. Any attempts to change a message encrypted in this fashion would be obvious because there is no way to predictably change it.

E2EE does not defend against

Even though the E2EE key exchange is thought to be impenetrable with current processing power and known methods, there have been numerous documented possible vulnerabilities of the encryption technique, including the following three:

  • Metadata: While E2EE protects the information inside a message, it does not conceal information about the message, such as the date and time it was sent or the participants in the exchange. This metadata could give malicious actors with an interest in the encrypted information clues as to where they may be able to intercept the information once it has been unencrypted.
  • Compromised endpoints: If either endpoint has been compromised, an attacker may be able to see a message before it is encrypted or after it is decrypted. Attackers could also retrieve keys from compromised endpoints and execute a man-in-the-middle attack with a stolen public key.
  • Vulnerable intermediaries: Sometimes, providers claim to offer end-to-end encryption when what they offer is closer to encryption in transit. The data may be stored on an intermediary server where it can be accessed.

Advantages of end-to-end encryption

The main advantage of end-to-end encryption is a high level of data privacy due to the following features:

  • Security in transit: End-to-end encryption uses public key cryptography, which stores private keys on endpoint devices. Messages can only be decrypted using these keys, so only people with access to the endpoint devices can read the message.
  • Tamper-proof: With E2EE, the decryption key does not have to be transmitted; the recipient will already have it. If a message encrypted with a public key gets altered or tampered with in transit, the recipient will not be able to decrypt it, so the tampered contents will not be viewable.
  • Compliance: Many industries are bound by regulatory compliance laws that require encryption-level data security. End-to-end encryption can help organizations protect that data by making it unreadable.

Disadvantages of end-to-end encryption

Although E2EE generally does a good job of securing digital communications, it does not guarantee data security.

  • Complexity: Some E2EE implementations allow the encrypted data to be decrypted and re-encrypted at certain points during transmission. This makes it important to clearly define and distinguish the endpoints of the communication circuit.
  • Excessive privacy: Government and law enforcement agencies expressed concern that end-to-end encryption can protect people sharing illicit content because service providers are unable to provide law enforcement with access to the content.
  • Visible metadata: Although messages in transit are encrypted and impossible to read, information about the message — date sent and recipient, for instance — is still visible, which may provide useful information to an interloper.
  • Endpoint security: If endpoints are compromised, encrypted data may be revealed.
  • Not future-proof: Although end-to-end encryption is a strong technology now, there is speculation that eventually quantum computing will render cryptography obsolete.

Encryption in India

  • There is no explicit encryption law in India. However, a number of industry regulations, including those controlling the banking, finance, and telecommunications sectors, include demands for the use of minimal encryption standards to secure transactions.
  • According to the licensing agreement between the ISP and the DoT, users are not permitted to use encryption standards larger than 40 bits utilizing symmetric key algorithms or comparable methods without prior clearance and deposition of decryption keys.

News about end-to-end encryption

  • Apple has announced it will be increasing the number of data points protected by End-to-End Encryption (E2EE) on iCloud from 14 to 23 categories.
  • In 2019, Facebook announced that all three messaging services would begin using E2EE. However, law enforcement and intelligence agencies argue that encryption limits Facebook’s ability to police illegal activity on its platforms. The debate often focuses on how E2EE can make it more difficult to identify and disrupt child abuse on private messaging platforms.