A Formal Security Analysis of the Signal Messaging Protocol

被引:101
|
作者
Cohn-Gordon, Katriel [1 ]
Cremers, Cas [1 ]
Dowling, Benjamin [2 ]
Garratt, Luke [1 ]
Stebila, Douglas [3 ]
机构
[1] Univ Oxford, Oxford, England
[2] Royal Holloway Univ London, London, England
[3] McMaster Univ, Hamilton, ON, Canada
基金
加拿大自然科学与工程研究理事会; 澳大利亚研究理事会;
关键词
D O I
10.1109/EuroSP.2017.27
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Signal is a new security protocol and accompanying app that provides end-to-end encryption for instant messaging. The core protocol has recently been adopted by WhatsApp, Facebook Messenger, and Google Allo among many others; the first two of these have at least 1 billion active users. Signal includes several uncommon security properties (such as "future secrecy" or "post-compromise security"), enabled by a novel technique called ratcheting in which session keys are updated with every message sent. Despite its importance and novelty, there has been little to no academic analysis of the Signal protocol. We conduct the first security analysis of Signal's Key Agreement and Double Ratchet as a multi-stage key exchange protocol. We extract from the implementation a formal description of the abstract protocol, and define a security model which can capture the "ratcheting" key update structure. We then prove the security of Signal's core in our model, demonstrating several standard security properties. We have found no major flaws in the design, and hope that our presentation and results can serve as a starting point for other analyses of this widely adopted protocol.
引用
收藏
页码:451 / 466
页数:16
相关论文
共 50 条
  • [31] Formal security analysis of Ariadne secure routing protocol using model checking
    Onem, E.
    Gurdag, A. Burak
    Caglayan, M. Ufuk
    [J]. INTERNATIONAL JOURNAL OF AD HOC AND UBIQUITOUS COMPUTING, 2012, 9 (01) : 12 - 24
  • [32] Formal Security Analysis of Authentication in SNMPv3 Protocol by An Automated Tool
    Asadi, Sepideh
    Shahhoseini, Hadi Shahriar
    [J]. 2012 SIXTH INTERNATIONAL SYMPOSIUM ON TELECOMMUNICATIONS (IST), 2012, : 1060 - 1064
  • [33] An analysis of the Manufacturing Messaging Specification protocol
    Sorensen, Jan Tore
    Jaatun, Martin Gilje
    [J]. UBIQUITOUS INTELLIGENCE AND COMPUTING, PROCEEDINGS, 2008, 5061 : 602 - +
  • [34] APSec1.0: Innovative Security Protocol Design with Formal Security Analysis for the Artificial Pancreas System
    Kim, Jiyoon
    Oh, Jongmin
    Son, Daehyeon
    Kwon, Hoseok
    Astillo, Philip Virgil
    You, Ilsun
    [J]. SENSORS, 2023, 23 (12)
  • [35] Formal analysis of a security protocol for e-passports based on rewrite theory specifications
    Mandadi, Manjukeshwar Reddy
    Mandadi, Varuneshwar Reddy
    Ogata, Kazuhiro
    [J]. JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2018, 42 : 71 - 86
  • [36] On Modeling Protocol-Based Clustering Tag in RFID Systems with Formal Security Analysis
    Bruce, Ndibanje
    Kim, HyunHo
    Kang, Young Jin
    Lee, Young Sil
    Lee, Hoon Jae
    [J]. 2015 IEEE 29TH INTERNATIONAL CONFERENCE ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS (IEEE AINA 2015), 2015, : 498 - 505
  • [37] Formal modeling and analysis of security schemes of RPL protocol using colored Petri nets
    Ahmad, Farooq
    Chaudhry, Muhammad Tayyab
    Jamal, Muhammad Hasan
    Sohail, Muhammad Amar
    Gavilanes, Daniel
    Masias Vergara, Manuel
    Ashraf, Imran
    [J]. PLOS ONE, 2023, 18 (08):
  • [38] Integration and formal security analysis of a quantum key distribution scheme within CHAP protocol
    Ghilen, Aymen
    Azizi, Mostafa
    Bouallegue, Ridha
    [J]. 2015 IEEE/ACS 12TH INTERNATIONAL CONFERENCE OF COMPUTER SYSTEMS AND APPLICATIONS (AICCSA), 2015,
  • [39] Formal security analysis of LoRaWAN
    Eldefrawy, Mohamed
    Butun, Ismail
    Pereira, Nuno
    Gidlund, Mikael
    [J]. COMPUTER NETWORKS, 2019, 148 : 328 - 339
  • [40] The Security Analysis of Popular Instant Messaging Applications
    Zhang, Lijun
    Ji, Qingbing
    Yu, Fei
    [J]. 2017 INTERNATIONAL CONFERENCE ON COMPUTER SYSTEMS, ELECTRONICS AND CONTROL (ICCSEC), 2017, : 1324 - 1328