SoK: An Analysis of End-to-End Encryption and Authentication Ceremonies in Secure Messaging Systems

被引:5
|
作者
Alatawi, Mashari [1 ]
Saxena, Nitesh [1 ]
机构
[1] Texas A&M Univ, College Stn, TX 77843 USA
关键词
E2EE apps; authentication ceremony; MitM attacks;
D O I
10.1145/3558482.3581773
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Instant-messaging (IM) and voice over IP (VoIP) applications like WhatsApp, Zoom, and Skype have made people extremely reliant on online communications for their audio, video, and text conversations. Since more people are using these platforms to talk to each other and share sensitive information, many ongoing concerns have been raised about how the government and law enforcement monitor these platforms. Due to these concerns, the need for a method to secure confidential messages and electronic conversations has grown. This solution could be achieved by implementing an end-toend encryption (E2EE) system without relying on any first or third parties, such as an online service or a centralized infrastructure like a public key infrastructure (PKI), which may be attacked, malicious, or coerced by law enforcement and government surveillance programs. In this systematization of knowledge paper, we first introduce the most popular E2EE apps, including their underlying E2EE messaging protocols. Then, based on the existing research literature, we investigate and systematize their E2EE features, including their underlying authentication ceremonies. Even though many research studies have examined some messaging services, we analyze and evaluate a broader set of the most popular E2EE apps and their underlying authentication ceremonies. Based on our evaluation, we have determined that all current E2EE apps, particularly when operating in opportunistic E2EE mode, are incapable of repelling active man-in-the-middle (MitM) attacks. In addition, we find that none of the current E2EE apps provide better and more usable authentication ceremonies, resulting in insecure E2EE communications against active MitM attacks. The conclusions of this systematization paper could influence future research in the field, including any improvements to the implementation of E2EE systems and authentication ceremonies that provide powerful protections against eavesdropping and MitM attacks.
引用
收藏
页码:187 / 201
页数:15
相关论文
共 50 条
  • [31] Anonymous Traceback for End-to-End Encryption
    Kenney, Erin
    Tang, Qiang
    Wu, Chase
    COMPUTER SECURITY - ESORICS 2022, PT II, 2022, 13555 : 42 - 62
  • [32] SECURE COMMUNICATION IN INTERNET ENVIRONMENTS - A HIERARCHICAL KEY MANAGEMENT SCHEME FOR END-TO-END ENCRYPTION
    LU, WP
    SUNDARESHAN, MK
    IEEE TRANSACTIONS ON COMMUNICATIONS, 1989, 37 (10) : 1014 - 1023
  • [33] Security Analysis and Countermeasures of an End-to-End Encryption Scheme of LINE
    Isobe, Takanori
    Minematsu, Kazuhiko
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2020, E103A (01) : 313 - 324
  • [34] A provably secure and practical end-to-end authentication scheme for tactile Industrial Internet of Things
    Guo, Yimin
    Guo, Yajun
    Xiong, Ping
    Yang, Fan
    Zhang, Chengde
    PERVASIVE AND MOBILE COMPUTING, 2024, 98
  • [35] End-to-end authentication based secure communication in vehicular ad hoc networks (VANET)
    Kumar, Ankit
    Sharma, Neeraj
    Kumar, Abhishek
    JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY, 2022, 25 (01): : 219 - 229
  • [36] DCGAN-based symmetric encryption end-to-end communication systems
    An, Yongli
    Wang, Mengtao
    Chen, Lei
    Ji, Zhanlin
    AEU-INTERNATIONAL JOURNAL OF ELECTRONICS AND COMMUNICATIONS, 2022, 154
  • [37] Design of Cryptographic model for End-to-End Encryption in FPGA based systems
    Chatterjee, Runa
    Chakraborty, Rajdeep
    Mandal, J. K.
    PROCEEDINGS OF THE 2019 3RD INTERNATIONAL CONFERENCE ON COMPUTING METHODOLOGIES AND COMMUNICATION (ICCMC 2019), 2019, : 459 - 465
  • [38] Efficient end-to-end authentication protocol for wearable health monitoring systems
    Jiang, Qi
    Ma, Jianfeng
    Yang, Chao
    Ma, Xindi
    Shen, Jian
    Chaudhry, Shehzad Ashraf
    COMPUTERS & ELECTRICAL ENGINEERING, 2017, 63 : 182 - 195
  • [39] An End-to-End Authentication Scheme for Healthcare IoT Systems Using WMSN
    Nashwan, Shadi
    CMC-COMPUTERS MATERIALS & CONTINUA, 2021, 68 (01): : 607 - 642
  • [40] Secure Provisioning for Achieving End-to-End Secure Communications
    Sousa, Patricia R.
    Resende, Joao S.
    Martins, Rolando
    Antunes, Luis
    AD-HOC, MOBILE, AND WIRELESS NETWORKS (ADHOC-NOW 2019), 2019, 11803 : 498 - 507