A Formal Security Analysis of the Signal Messaging Protocol

被引:101
|
作者
Cohn-Gordon, Katriel [1 ]
Cremers, Cas [1 ]
Dowling, Benjamin [2 ]
Garratt, Luke [1 ]
Stebila, Douglas [3 ]
机构
[1] Univ Oxford, Oxford, England
[2] Royal Holloway Univ London, London, England
[3] McMaster Univ, Hamilton, ON, Canada
基金
加拿大自然科学与工程研究理事会; 澳大利亚研究理事会;
关键词
D O I
10.1109/EuroSP.2017.27
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Signal is a new security protocol and accompanying app that provides end-to-end encryption for instant messaging. The core protocol has recently been adopted by WhatsApp, Facebook Messenger, and Google Allo among many others; the first two of these have at least 1 billion active users. Signal includes several uncommon security properties (such as "future secrecy" or "post-compromise security"), enabled by a novel technique called ratcheting in which session keys are updated with every message sent. Despite its importance and novelty, there has been little to no academic analysis of the Signal protocol. We conduct the first security analysis of Signal's Key Agreement and Double Ratchet as a multi-stage key exchange protocol. We extract from the implementation a formal description of the abstract protocol, and define a security model which can capture the "ratcheting" key update structure. We then prove the security of Signal's core in our model, demonstrating several standard security properties. We have found no major flaws in the design, and hope that our presentation and results can serve as a starting point for other analyses of this widely adopted protocol.
引用
收藏
页码:451 / 466
页数:16
相关论文
共 50 条
  • [1] A Formal Security Analysis of the Signal Messaging Protocol
    Cohn-Gordon, Katriel
    Cremers, Cas
    Dowling, Benjamin
    Garratt, Luke
    Stebila, Douglas
    [J]. JOURNAL OF CRYPTOLOGY, 2020, 33 (04) : 1914 - 1983
  • [2] A Formal Security Analysis of the Signal Messaging Protocol
    Katriel Cohn-Gordon
    Cas Cremers
    Benjamin Dowling
    Luke Garratt
    Douglas Stebila
    [J]. Journal of Cryptology, 2020, 33 : 1914 - 1983
  • [3] Formal Security Analysis of the MaCAN Protocol
    Bruni, Alessandro
    Sojka, Michal
    Nielson, Flemming
    Nielson, Hanne Riis
    [J]. INTEGRATED FORMAL METHODS, IFM 2014, 2014, 8739 : 241 - 255
  • [4] Formal modeling and security analysis method of security protocol based on CPN
    Gong, Xiang
    Feng, Tao
    Du, Jinze
    [J]. Tongxin Xuebao/Journal on Communications, 2021, 42 (09): : 240 - 253
  • [5] Formal Analysis of the Security Protocol with Timestamp Using SPIN
    Xiao, Meihua
    Song, Weiwei
    Yang, Ke
    OuYang, Ri
    Zhao, Hanyu
    [J]. COMPUTATIONAL INTELLIGENCE AND NEUROSCIENCE, 2022, 2022
  • [6] Protocol engineering applied to formal analysis of security systems
    Lopez, J
    Ortega, JJ
    Troya, JM
    [J]. INFRASTRUCTURE SECURITY, PROCEEDINGS, 2002, 2437 : 246 - 259
  • [7] An Improved Security Protocol Formal Analysis with BAN Logic
    Li Tingyuan
    Liu Xiaodong
    Qin Zhiguang
    Zhang Xuanfang
    [J]. ECBI: 2009 INTERNATIONAL CONFERENCE ON ELECTRONIC COMMERCE AND BUSINESS INTELLIGENCE, PROCEEDINGS, 2009, : 102 - +
  • [8] Formal Analysis of the Signal Protocol using the Scyther Tool
    Almuzaini, Nawal Zaied
    Ahmad, Iftikhar
    [J]. 2019 2ND INTERNATIONAL CONFERENCE ON COMPUTER APPLICATIONS & INFORMATION SECURITY (ICCAIS), 2019,
  • [9] Formal modelling and security analysis of bitcoin's payment protocol
    Modesti, Paolo
    Shahandashti, Siamak F.
    McCorry, Patrick
    Hao, Feng
    [J]. COMPUTERS & SECURITY, 2021, 107
  • [10] Formal Theory for Security Protocol Analysis of Distributed Denial of Service
    Jiang, Rui
    Bhargava, Bharat
    [J]. INTERNATIONAL JOURNAL OF NEXT-GENERATION COMPUTING, 2014, 5 (03): : 233 - 248