"Standardising by running code": the Signal protocol and de facto standardisation in end-to-end encrypted messaging

被引:5
|
作者
Ermoshina, Ksenia [1 ]
Musiani, Francesca [1 ]
机构
[1] CNRS, Ctr Internet & Soc, 59-61 Rue Pouchet, F-75849 Paris 17, France
来源
INTERNET HISTORIES | 2019年 / 3卷 / 3-4期
基金
欧盟地平线“2020”;
关键词
Encryption; secure messaging; standards; standardisation; Signal; protocols; GOVERNANCE;
D O I
10.1080/24701475.2019.1654697
中图分类号
G2 [信息与知识传播];
学科分类号
05 ; 0503 ;
摘要
After Edward Snowden's revelations, encryption of online communications at a large scale and in a usable manner has become a matter of public concern. The most advanced and popular among recently-developed encryption protocols is currently the Signal protocol. While the Signal protocol is widely adopted and considered as an improvement over previous ones, it remains officially unstandardised, even though there is an informal draft elaborated towards that goal. The analysis of how this protocol was introduced and swiftly adopted by various applications, and of subsequent transformations of the encrypted messaging ecosystem, sheds light on how a particular period in the history of secure messaging has been marked by a "de facto standardisation." What can we learn about existing modes of governance of encryption and the histories of traditional standardisation bodies, when analysing the approach of "standardisation by running code" adopted by Signal? And finally, how does the Signal protocol challenge a "linear," evolution-based vision of messaging history? Drawing from a three-year qualitative investigation of end-to-end encrypted messaging, from a perspective informed by science and technology studies (STS), we seek to unveil the ensemble of processes that make the Signal protocol a quasi-standard.
引用
收藏
页码:343 / 363
页数:21
相关论文
共 9 条
  • [1] Traceback for End-to-End Encrypted Messaging
    Tyagi, Nirvan
    Miers, Ian
    Ristenpart, Thomas
    PROCEEDINGS OF THE 2019 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (CCS'19), 2019, : 413 - 430
  • [2] End-to-End Encrypted Messaging Protocols: An Overview
    Ermoshina, Ksenia
    Musiani, Francesca
    Halpin, Harry
    INTERNET SCIENCE, (INSCI 2016), 2016, 9934 : 244 - 254
  • [3] SEEMless: Secure End-to-End Encrypted Messaging with less Trust
    Chase, Melissa
    Deshpande, Apoorvaa
    Ghosh, Esha
    Malvai, Harjasleen
    PROCEEDINGS OF THE 2019 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (CCS'19), 2019, : 1639 - 1656
  • [4] One Time Chat - A Toy End-to-End Encrypted Web Messaging Service
    Kaczynski, Kamil
    Glet, Michal
    APPLIED CRYPTOGRAPHY AND NETWORK SECURITY WORKSHOPS, PT II, ACNS 2024-AIBLOCK 2024, AIHWS 2024, AIOTS 2024, SCI 2024, AAC 2024, SIMLA 2024, LLE 2024, AND CIMSS 2024, 2024, 14587 : 183 - 187
  • [5] Security Analysis of the WhatsApp End-to-End Encrypted Backup Protocol
    Davies, Gareth T.
    Faller, Sebastian
    Gellert, Kai
    Handirk, Tobias
    Hesse, Julia
    Horvath, Mate
    Jager, Tibor
    ADVANCES IN CRYPTOLOGY - CRYPTO 2023, PT IV, 2023, 14084 : 330 - 361
  • [6] Incidental Incremental In-Band Fingerprint Verification: a Novel Authentication Ceremony for End-to-End Encrypted Messaging
    Malkin, Nathan
    NEW SECURITY PARADIGMS WORKSHOP, NSPW 2022, 2023, : 104 - 116
  • [7] Formal verification of the PQXDH Post-Quantum key agreement protocol for end-to-end secure messaging
    Bhargavan, Karthikeyan
    Jacomme, Charlie
    Kiefer, Franziskus
    Schmidt, Rolfe
    PROCEEDINGS OF THE 33RD USENIX SECURITY SYMPOSIUM, SECURITY 2024, 2024, : 469 - 486
  • [8] A Formal Security Analysis of the p ≡ p Authentication Protocol for Decentralized Key Distribution and End-to-End Encrypted Email
    Sandoval, Itzel Vazquez
    Lenzini, Gabriele
    EMERGING TECHNOLOGIES FOR AUTHORIZATION AND AUTHENTICATION, ETAA 2019, 2020, 11967 : 171 - 187
  • [9] End-to-end service level negotiation protocol for self-management networksProtocole de négociation du niveau de service de bout en bout dans le carde d’une gestion autonome des réseaux
    Nader Mbarek
    Francine Krief
    Annales Des Télécommunications, 2007, 62 (9-10): : 1079 - 1098