Incidental Incremental In-Band Fingerprint Verification: a Novel Authentication Ceremony for End-to-End Encrypted Messaging

被引:0
|
作者
Malkin, Nathan [1 ]
机构
[1] Univ Maryland, College Pk, MD 20742 USA
基金
美国国家科学基金会;
关键词
ATTACKS;
D O I
10.1145/3584318.3584326
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
End-to-end encryption in popular messaging applications relies on centralized key servers. To keep these honest, users are supposed to meet in person and compare "fingerprints" of their public keys. Very few people do this, despite attempts to make this process more usable, making trust in the systems tenuous. To encourage broader adoption of verification behaviors, this paper proposes a new type of authentication ceremony, incidental incremental in-band fingerprint verification (I3FV), in which users periodically share with their friends photos or videos of themselves responding to simple visual or behavioral prompts ("challenges"). This strategy allows verification to be performed incidentally to normal user activities, incrementally over time, and in-band within the messaging application. By replacing a dedicated security task with a fun, already-widespread activity, I3FV has the potential to vastly increase the number of people verifying keys and therefore strengthen trust in encrypted messaging.
引用
收藏
页码:104 / 116
页数:13
相关论文
共 17 条
  • [1] Traceback for End-to-End Encrypted Messaging
    Tyagi, Nirvan
    Miers, Ian
    Ristenpart, Thomas
    PROCEEDINGS OF THE 2019 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (CCS'19), 2019, : 413 - 430
  • [2] End-to-End Encrypted Messaging Protocols: An Overview
    Ermoshina, Ksenia
    Musiani, Francesca
    Halpin, Harry
    INTERNET SCIENCE, (INSCI 2016), 2016, 9934 : 244 - 254
  • [3] On the Pitfalls of End-to-End Encrypted Communications: A Study of Remote Key-Fingerprint Verification
    Shirvanian, Maliheh
    Saxena, Nitesh
    George, Jesvin James
    33RD ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE (ACSAC 2017), 2017, : 499 - 511
  • [4] SEEMless: Secure End-to-End Encrypted Messaging with less Trust
    Chase, Melissa
    Deshpande, Apoorvaa
    Ghosh, Esha
    Malvai, Harjasleen
    PROCEEDINGS OF THE 2019 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (CCS'19), 2019, : 1639 - 1656
  • [5] One Time Chat - A Toy End-to-End Encrypted Web Messaging Service
    Kaczynski, Kamil
    Glet, Michal
    APPLIED CRYPTOGRAPHY AND NETWORK SECURITY WORKSHOPS, PT II, ACNS 2024-AIBLOCK 2024, AIHWS 2024, AIOTS 2024, SCI 2024, AAC 2024, SIMLA 2024, LLE 2024, AND CIMSS 2024, 2024, 14587 : 183 - 187
  • [6] SoK: An Analysis of End-to-End Encryption and Authentication Ceremonies in Secure Messaging Systems
    Alatawi, Mashari
    Saxena, Nitesh
    PROCEEDINGS OF THE 16TH ACM CONFERENCE ON SECURITY AND PRIVACY IN WIRELESS AND MOBILE NETWORKS, WISEC 2023, 2023, : 187 - 201
  • [7] "Standardising by running code": the Signal protocol and de facto standardisation in end-to-end encrypted messaging
    Ermoshina, Ksenia
    Musiani, Francesca
    INTERNET HISTORIES, 2019, 3 (3-4): : 343 - 363
  • [8] A Novel End-To-End Approach For Offline Signature Verification System
    Thakare, Bhushan S.
    Deshmukh, Hemant R.
    2018 3RD INTERNATIONAL CONFERENCE FOR CONVERGENCE IN TECHNOLOGY (I2CT), 2018,
  • [9] Deep learning based end-to-end visible light communication with an in-band channel modeling strategy
    Li, Zhongya
    Shi, Jianyang
    Zhao, Yiheng
    Li, Guoqiang
    Chen, Jiang
    Zhang, Junwen
    Chi, Nan
    OPTICS EXPRESS, 2022, 30 (16) : 28905 - 28921
  • [10] Formal verification of the PQXDH Post-Quantum key agreement protocol for end-to-end secure messaging
    Bhargavan, Karthikeyan
    Jacomme, Charlie
    Kiefer, Franziskus
    Schmidt, Rolfe
    PROCEEDINGS OF THE 33RD USENIX SECURITY SYMPOSIUM, SECURITY 2024, 2024, : 469 - 486