SoK: An Analysis of End-to-End Encryption and Authentication Ceremonies in Secure Messaging Systems

被引:5
|
作者
Alatawi, Mashari [1 ]
Saxena, Nitesh [1 ]
机构
[1] Texas A&M Univ, College Stn, TX 77843 USA
关键词
E2EE apps; authentication ceremony; MitM attacks;
D O I
10.1145/3558482.3581773
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Instant-messaging (IM) and voice over IP (VoIP) applications like WhatsApp, Zoom, and Skype have made people extremely reliant on online communications for their audio, video, and text conversations. Since more people are using these platforms to talk to each other and share sensitive information, many ongoing concerns have been raised about how the government and law enforcement monitor these platforms. Due to these concerns, the need for a method to secure confidential messages and electronic conversations has grown. This solution could be achieved by implementing an end-toend encryption (E2EE) system without relying on any first or third parties, such as an online service or a centralized infrastructure like a public key infrastructure (PKI), which may be attacked, malicious, or coerced by law enforcement and government surveillance programs. In this systematization of knowledge paper, we first introduce the most popular E2EE apps, including their underlying E2EE messaging protocols. Then, based on the existing research literature, we investigate and systematize their E2EE features, including their underlying authentication ceremonies. Even though many research studies have examined some messaging services, we analyze and evaluate a broader set of the most popular E2EE apps and their underlying authentication ceremonies. Based on our evaluation, we have determined that all current E2EE apps, particularly when operating in opportunistic E2EE mode, are incapable of repelling active man-in-the-middle (MitM) attacks. In addition, we find that none of the current E2EE apps provide better and more usable authentication ceremonies, resulting in insecure E2EE communications against active MitM attacks. The conclusions of this systematization paper could influence future research in the field, including any improvements to the implementation of E2EE systems and authentication ceremonies that provide powerful protections against eavesdropping and MitM attacks.
引用
收藏
页码:187 / 201
页数:15
相关论文
共 50 条
  • [41] End-to-end Secure Insurance Telematics
    Salant, Eliot
    Gershinsky, Gidon
    SYSTOR '19: PROCEEDINGS OF THE 12TH ACM INTERNATIONAL SYSTEMS AND STORAGE CONFERENCE, 2019, : 182 - 182
  • [42] A secure end-to-end IoT solution
    Mathur, Avijit
    Newe, Thomas
    Elgenaidi, Walid
    Rao, Muzaffar
    Dooly, Gerard
    Toal, Daniel
    SENSORS AND ACTUATORS A-PHYSICAL, 2017, 263 : 291 - 299
  • [43] Incidental Incremental In-Band Fingerprint Verification: a Novel Authentication Ceremony for End-to-End Encrypted Messaging
    Malkin, Nathan
    NEW SECURITY PARADIGMS WORKSHOP, NSPW 2022, 2023, : 104 - 116
  • [44] End-To-End Encryption Enabled Lightweight Mutual Authentication Scheme for Resource Constrained IoT Network
    Ullah, Shafi
    Nasir, Haidawati Muhammad
    Kadir, Kushsairy
    Khan, Akbar
    Memon, Ahsanullah
    Azhar, Shanila
    Khan, Ilyas
    Ashraf, Muhammad
    CMC-COMPUTERS MATERIALS & CONTINUA, 2025, 82 (02): : 3223 - 3249
  • [45] End-to-end Encryption based Biometric SaaS Using Raspberry Pi as a Remote Authentication Node
    Shah, Dhvani K.
    Bharadi, Vinayak A.
    Kaul, V. J.
    Amrutia, Sameer
    1ST INTERNATIONAL CONFERENCE ON COMPUTING COMMUNICATION CONTROL AND AUTOMATION ICCUBEA 2015, 2015, : 52 - 59
  • [46] A framework for secure end-to-end delivery of messages in publish/subscribe systems
    Pallickara, Shrideep
    Pierce, Marlon
    Gadgil, Harshawardhan
    Fox, Geoffrey
    Yan, Yan
    Huang, Yi
    2006 7TH IEEE/ACM INTERNATIONAL CONFERENCE ON GRID COMPUTING, 2006, : 215 - +
  • [47] A Modular End-to-End Framework for Secure Firmware Updates on Embedded Systems
    Falas, Solon
    Konstantinou, Charalambos
    Michael, Maria K.
    ACM JOURNAL ON EMERGING TECHNOLOGIES IN COMPUTING SYSTEMS, 2022, 18 (01)
  • [48] Formal verification of the PQXDH Post-Quantum key agreement protocol for end-to-end secure messaging
    Bhargavan, Karthikeyan
    Jacomme, Charlie
    Kiefer, Franziskus
    Schmidt, Rolfe
    PROCEEDINGS OF THE 33RD USENIX SECURITY SYMPOSIUM, SECURITY 2024, 2024, : 469 - 486
  • [49] RAVEN: Robust Anonymous Vehicular End-to-End Encryption and Efficient Mutual Authentication for Post-Quantum Intelligent Transportation Systems
    Khalid, Haqi
    Hashim, Shaiful Jahari
    Hashim, Fazirulhisyam
    Al-Jawher, Waleed Ameen Mahmoud
    Chaudhary, Muhammad Akmal
    Altarturi, Hamza H. M.
    IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS, 2024, 25 (11) : 17574 - 17586
  • [50] Subverting Telegram's End-to-End Encryption
    Cogliati, Benoit
    Ethan, Jordan
    Jha, Ashwin
    IACR TRANSACTIONS ON SYMMETRIC CRYPTOLOGY, 2023, 2023 (01) : 5 - 40