Applied Cryptographer / Protocol Designer

Trevor Perrin

"The man who taught a billion conversations to keep a secret"

He named his breakthrough algorithm after a salamander that can regrow its own heart. That detail tells you everything. Trevor Perrin doesn't just build cryptographic protocols - he designs them to survive the worst-case scenario and keep going.

Signal Protocol Noise Framework Levchin Prize 2017 UC Berkeley
Trevor Perrin
github.com/trevp
1B+ Conversations Protected
4+ Major Protocols
2017 Levchin Prize
PD Noise: Public Domain

The Quiet Architect of Private Conversation

Most people who changed the internet did it loudly. Trevor Perrin did it in a spec document with a salamander joke buried in the footnotes. The Double Ratchet Algorithm - the cryptographic engine inside Signal, WhatsApp, and a dozen other secure messaging apps - was originally called the Axolotl Ratchet. Named for a Mexican amphibian that can regenerate not just limbs but heart tissue and parts of its brain. The algorithm heals itself forward the same way. Compromise a key today and tomorrow's messages are still private.

That's not metaphor. That's forward secrecy working the way it's supposed to. And that's the lens through which Perrin builds things: elegant, rigorous, designed to survive contact with reality.

Build something robust enough that even its failure modes are graceful.

- The design philosophy behind the Double Ratchet

Perrin spent years at Cryptography Research - the firm Paul Kocher built after breaking smartcard security with timing attacks in 1996 - before linking up with Moxie Marlinspike at Open Whisper Systems. When they sat down to design the protocol that would become Signal, they weren't trying to build something popular. They were trying to build something correct.

The timing turned out to be everything. 2013. The Snowden documents had just hit. The world discovered that "secure" and "private" were not the same thing. Perrin and Marlinspike had already written the math.

Three Protocols. One Billion Users.

Most cryptographers produce papers. Perrin produces infrastructure. The protocols he has designed or co-designed now run inside the apps that billions of people trust with their most sensitive conversations.

🔒
2013-2014

Signal Protocol

Co-created with Moxie Marlinspike. Uses Triple Diffie-Hellman and the Double Ratchet to provide end-to-end encryption with forward secrecy and break-in recovery.

Signal WhatsApp FB Messenger Google Allo
🔄
2013

Double Ratchet

Originally the "Axolotl Ratchet" - combines a Diffie-Hellman ratchet with a KDF ratchet to manage session keys with continuous forward secrecy and self-healing recovery.

Signal Protocol Matrix Wire
🔓
2015-2016

Noise Protocol

A public domain framework for building secure 2-party protocols. Defines handshake patterns based on Diffie-Hellman. Released without any license restrictions.

WireGuard WhatsApp Lightning Slack
// Noise Protocol Deployment Reach
WireGuard VPN
Linux kernel
WhatsApp
2B+ users
Lightning Network
Bitcoin L2
Slack
300M users

The axolotl (Ambystoma mexicanum) is the only vertebrate that retains juvenile features into adulthood - it never fully metamorphoses. It can regenerate limbs, lungs, heart tissue, and portions of its brain. Perrin named his algorithm after it because after a key compromise, the protocol doesn't just recover - it continues as if nothing happened, with new keys derived forward. The name was changed to "Double Ratchet" in 2016. But the biology stuck in cryptographers' minds.

The Protocol That Changed Everything

Before Signal Protocol existed, secure messaging meant OTR - Off-the-Record Messaging. OTR was good. It gave you forward secrecy for a session. But it assumed continuous connection and required both parties online simultaneously. Smartphones had already killed that assumption.

Perrin and Marlinspike had to solve asynchronous delivery while preserving all the security properties that made OTR worth using. The result was TextSecure v2, introduced in February 2014. It used Triple Diffie-Hellman for the initial key agreement - combining identity keys, signed prekeys, and ephemeral one-time keys into a handshake elegant enough that academic cryptographers spent years writing papers proving why it works.

WhatsApp adopted it in 2016, encrypting end-to-end for 1 billion users overnight. That was the largest single cryptographic deployment in history at the time. Perrin's name appeared in the acknowledgments. The quiet ones usually are in acknowledgments.

// Signal Protocol Key Components
🔑
X3DH
Extended Triple Diffie-Hellman handshake
🔄
Double Ratchet
Session key renewal algorithm
🔒
Sealed Sender
Sender anonymity layer
🛠
PreKeys
Asynchronous key delivery

Build Your Own Secure Channel

After Signal Protocol, Perrin stepped back and asked a bigger question. Everyone building secure communications was reinventing the same wheel. TLS was too complex and carried 30 years of backward compatibility baggage. What if there was a framework - not a protocol, but a language for building protocols - that let you specify exactly the handshake you needed?

That's the Noise Protocol Framework. Released in 2015, refined through 2016. Public domain. No license. No restrictions. A set of handshake patterns that compose like building blocks, each with formally provable security properties.

Jason Donenfeld, building WireGuard, chose Noise_IKpsk2 as the foundation for what became the most praised VPN protocol in a decade - eventually merged into the Linux kernel. Lightning Network, the Bitcoin payment layer, uses Noise to authenticate node connections. Slack uses it for client transport. The public domain release was deliberate: maximum adoption, zero friction.

The goal of Noise is to make it easy to build protocols that have simple, understandable security properties.

- Trevor Perrin, noiseprotocol.org
Levchin Prize for Real World Cryptography
// 2017 - Jointly with Moxie Marlinspike
Awarded at Real World Cryptography 2017 "for the development and wide deployment of the Signal protocol." The Levchin Prize - named after PayPal co-founder Max Levchin - recognizes cryptographic work that has had actual impact on the real world. At the time of the award, the protocol was protecting conversations for over a billion people.

The citation understated it. By 2017, the Signal Protocol had become the de facto standard for secure messaging - not because regulators mandated it, not because it was easy to adopt, but because it was simply the best option and the authors had made it open enough that anyone could use it. That's a different kind of prize.

Before Signal, There Was the Specification

Perrin graduated from UC Berkeley and arrived at Cryptography Research - Paul Kocher's firm in San Francisco - at a time when applied cryptography was beginning to diverge sharply from academic cryptography. The field had great theory. It had terrible implementation. Kocher's group was obsessed with the gap between the two.

In 2007, Perrin co-authored RFC 5054: the Secure Remote Password (SRP) protocol for TLS Authentication. Not glamorous work. Exactly the kind of cryptographic plumbing that the internet runs on invisibly. That same year, he presented on public key distribution through "cryptoIDs" at NSPW 2003 - work that anticipated identity-binding problems that still haven't been fully solved.

The TACK TLS extension, which Perrin designed, proposed a form of key continuity for TLS certificates - a way for servers to build up trust over time rather than relying entirely on certificate authorities. It was ahead of its time. Certificate Transparency, which Google later deployed widely, addressed some of the same problems through different means.

On Stage

2014

End-to-End Secure Messages

CloudFlare Meetup - Early public presentation of TextSecure protocol

Watch on YouTube
2015

TextSecure Protocol: Present and Future

NorthSec 2015 - Deep dive into the protocol design and future directions

Watch on YouTube
2016

The Noise Protocol Framework

Stanford EE380 Seminar - Academic presentation of Noise framework design

View Slides
2017

Message Encryption

Real World Crypto 2017 - Protocol survey and Signal Protocol deep dive

Watch on YouTube
2017

The Noise Protocol Framework

34C3 (Chaos Communication Congress) - Comprehensive Noise framework talk

Watch on CCC
2018

The Noise Protocol Framework

Real World Crypto 2018 - Noise deployment experiences and updates

Watch on YouTube

The Quantum Problem

The encryption that Perrin helped build is very good. Good enough that the primary way adversaries bypass it is to store encrypted traffic and wait for a quantum computer powerful enough to break the key exchange. "Harvest now, decrypt later." The threat isn't today. But the decisions you make today about what you encrypt and how determine whether 2030's quantum computers find anything useful in your archived traffic.

This is where Perrin is now: independent consultant, working on quantum readiness and cryptographic inventory. Helping organizations understand what they actually have deployed, where the exposure is, and what needs to be upgraded before the window closes. The Signal team added post-quantum cryptography to the Signal Protocol in 2023 using the PQXDH specification - Perrin's foundational work made that upgrade tractable.

The pattern is consistent. He builds things that can be upgraded. The axolotl can regenerate. The ratchet keeps turning.

Five Things

The axolotl that inspired the algorithm's name can regenerate heart tissue and portions of its brain - not just limbs. The protocol's "healing" metaphor is more accurate than most cryptographers realize.

The Noise Protocol Framework was deliberately released into the public domain - no license, no attribution required. The goal was zero friction to adoption. WireGuard, now in the Linux kernel, is the result.

His Twitter handle is @trevp__ - two trailing underscores, programmer-style. He has under 2,000 followers. His code has run on over 2 billion devices.

RFC 5054, which Perrin co-authored in 2007, defined Secure Remote Password (SRP) for TLS. The same year the iPhone launched - both changed how people communicate privately, in different ways.

The 2020 Signal Private Group System paper Perrin co-authored solved the hard problem of group messaging: how do you prove you're in a group without revealing who else is in it?

He requested removal of the NSA from IETF Crypto Review - a stance that generated significant Hacker News discussion and reflects his consistent position on cryptographic standards integrity.

Links