SoK: An Analysis of End-to-End Encryption and Authentication Ceremonies in Secure Messaging Systems

被引:5
|
作者
Alatawi, Mashari [1 ]
Saxena, Nitesh [1 ]
机构
[1] Texas A&M Univ, College Stn, TX 77843 USA
关键词
E2EE apps; authentication ceremony; MitM attacks;
D O I
10.1145/3558482.3581773
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Instant-messaging (IM) and voice over IP (VoIP) applications like WhatsApp, Zoom, and Skype have made people extremely reliant on online communications for their audio, video, and text conversations. Since more people are using these platforms to talk to each other and share sensitive information, many ongoing concerns have been raised about how the government and law enforcement monitor these platforms. Due to these concerns, the need for a method to secure confidential messages and electronic conversations has grown. This solution could be achieved by implementing an end-toend encryption (E2EE) system without relying on any first or third parties, such as an online service or a centralized infrastructure like a public key infrastructure (PKI), which may be attacked, malicious, or coerced by law enforcement and government surveillance programs. In this systematization of knowledge paper, we first introduce the most popular E2EE apps, including their underlying E2EE messaging protocols. Then, based on the existing research literature, we investigate and systematize their E2EE features, including their underlying authentication ceremonies. Even though many research studies have examined some messaging services, we analyze and evaluate a broader set of the most popular E2EE apps and their underlying authentication ceremonies. Based on our evaluation, we have determined that all current E2EE apps, particularly when operating in opportunistic E2EE mode, are incapable of repelling active man-in-the-middle (MitM) attacks. In addition, we find that none of the current E2EE apps provide better and more usable authentication ceremonies, resulting in insecure E2EE communications against active MitM attacks. The conclusions of this systematization paper could influence future research in the field, including any improvements to the implementation of E2EE systems and authentication ceremonies that provide powerful protections against eavesdropping and MitM attacks.
引用
收藏
页码:187 / 201
页数:15
相关论文
共 50 条
  • [1] Universally Composable End-to-End Secure Messaging
    Canetti, Ran
    Jain, Palak
    Swanberg, Marika
    Varia, Mayank
    ADVANCES IN CRYPTOLOGY - CRYPTO 2022, PT II, 2022, 13508 : 3 - 33
  • [2] Secure End-To-End Authentication for Mobile Banking
    Singh, Basudeo
    Jasmine, K. S.
    SOFTWARE ENGINEERING IN INTELLIGENT SYSTEMS (CSOC2015), VOL 3, 2015, 349 : 223 - 232
  • [3] Secure Messaging Authentication Ceremonies Are Broken
    Herzberg, Amir
    Leibowitz, Hemi
    Seamons, Kent
    Vaziripour, Elham
    Wu, Justin
    Zappala, Daniel
    IEEE SECURITY & PRIVACY, 2021, 19 (02) : 29 - 37
  • [4] An Encryption Protocol for End-to-end Secure Transmission of SMS
    Thomas, Minta
    Panchami, V
    2015 INTERNATIONAL CONFERENCED ON CIRCUITS, POWER AND COMPUTING TECHNOLOGIES (ICCPCT-2015), 2015,
  • [5] End-to-End Secure Messaging with Traceability Only for Illegal Content
    Bartusek, James
    Garg, Sanjam
    Jain, Abhishek
    Policharla, Guru-Vamsi
    ADVANCES IN CRYPTOLOGY - EUROCRYPT 2023, PT V, 2023, 14008 : 35 - 66
  • [6] SEEMless: Secure End-to-End Encrypted Messaging with less Trust
    Chase, Melissa
    Deshpande, Apoorvaa
    Ghosh, Esha
    Malvai, Harjasleen
    PROCEEDINGS OF THE 2019 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (CCS'19), 2019, : 1639 - 1656
  • [7] Blockchain-enabled End-to-End Encryption for Instant Messaging Applications
    Singh, Raman
    Chauhan, Ark Nandan Singh
    Tewari, Hitesh
    2022 IEEE 23RD INTERNATIONAL SYMPOSIUM ON A WORLD OF WIRELESS, MOBILE AND MULTIMEDIA NETWORKS (WOWMOM 2022), 2022, : 501 - 506
  • [8] Integrating end-to-end encryption and authentication technology into broadband networks
    Pierson, LG
    INTEGRATION ISSUES IN LARGE COMMERCIAL MEDIA DELIVERY SYSTEMS, 1996, 2615 : 260 - 269
  • [9] Authentication for the Web of Things: Secure End-to-End Authentication Between CoAP and HTTP
    Buschsieweke, Marian
    Guenes, Mesut
    2017 IEEE 28TH ANNUAL INTERNATIONAL SYMPOSIUM ON PERSONAL, INDOOR, AND MOBILE RADIO COMMUNICATIONS (PIMRC), 2017,
  • [10] Quantum-resistant End-to-End Secure Messaging and Email Communication
    Doeberl, Christoph
    Eibner, Wolfgang
    Gaertner, Simon
    Kos, Manuela
    Kutschera, Florian
    Ramacher, Sebastian
    18TH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY & SECURITY, ARES 2023, 2023,