메뉴 건너뛰기




Volumn , Issue , 2017, Pages 451-466

A Formal Security Analysis of the Signal Messaging Protocol

Author keywords

authenticated key exchange; future secrecy; messaging; multi stage key exchange; post compromise security; provable security; Signal

Indexed keywords

CRYPTOGRAPHY; SECURITY SYSTEMS; SIGNALING;

EID: 85026636223     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/EuroSP.2017.27     Document Type: Conference Paper
Times cited : (155)

References (50)
  • 1
    • 84924705705 scopus 로고    scopus 로고
    • Tightly-secure authenticated key exchange
    • LNCS. Springer, Heidelberg, Mar
    • Christoph Bader, Dennis Hofheinz, Tibor Jager, Eike Kiltz, and Yong Li. "Tightly-Secure Authenticated Key Exchange". In: TCC 2015, Part I. Vol. 9014. LNCS. Springer, Heidelberg, Mar. 2015, pp. 629-658.
    • (2015) TCC 2015, Part I , vol.9014 , pp. 629-658
    • Bader, C.1    Hofheinz, D.2    Jager, T.3    Kiltz, E.4    Li, Y.5
  • 2
    • 85026648229 scopus 로고    scopus 로고
    • (visited on 01/2017)
    • Chris Ballinger. ChatSecure. URL: https://chatsecure.org/ blog/chatsecure-v4-released/ (visited on 01/2017).
    • ChatSecure
    • Ballinger, C.1
  • 4
    • 35248891000 scopus 로고    scopus 로고
    • Forward-security in private-key cryptography
    • LNCS. Springer, Heidelberg, Apr
    • Mihir Bellare and Bennet S. Yee. "Forward-Security in Private-Key Cryptography". In: CT-RSA 2003. Vol. 2612. LNCS. Springer, Heidelberg, Apr. 2003, pp. 1-18.
    • (2003) CT-RSA 2003 , vol.2612 , pp. 1-18
    • Bellare, M.1    Yee, B.S.2
  • 5
    • 80053515348 scopus 로고    scopus 로고
    • High-speed high-security signatures
    • LNCS. Springer, Heidelberg, Sept
    • Daniel J. Bernstein, Niels Duif, Tanja Lange, Peter Schwabe, and Bo-Yin Yang. "High-Speed High-Security Signatures". In: CHES 2011. Vol. 6917. LNCS. Springer, Heidelberg, Sept. 2011, pp. 124-142.
    • (2011) CHES 2011 , vol.6917 , pp. 124-142
    • Bernstein, D.J.1    Duif, N.2    Lange, T.3    Schwabe, P.4    Yang, B.5
  • 7
    • 85026651702 scopus 로고    scopus 로고
    • Mar. 2, (visited on 07/2016)
    • David Bogado and Danny O'Brien. Punished for a Paradox. Mar. 2, 2016. URL: https://www.eff.org/deeplinks/2016/03/ punished-for-paradox-brazils-facebook (visited on 07/2016).
    • (2016) Punished for a Paradox
    • Bogado, D.1    O'Brien, D.2
  • 8
    • 20444490057 scopus 로고    scopus 로고
    • Off-therecord Communication, or, Why Not to Use PGP
    • Washington DC, USA: ACM
    • Nikita Borisov, Ian Goldberg, and Eric Brewer. "Off-therecord Communication, or, Why Not to Use PGP". In: WPES. Washington DC, USA: ACM, 2004, pp. 77-84.
    • (2004) WPES , pp. 77-84
    • Borisov, N.1    Goldberg, I.2    Brewer, E.3
  • 9
    • 35248897599 scopus 로고    scopus 로고
    • A forward-secure public-key encryption scheme
    • LNCS. Springer, Heidelberg, May
    • Ran Canetti, Shai Halevi, and Jonathan Katz. "A Forward-Secure Public-Key Encryption Scheme". In: EUROCRYPT 2003. Vol. 2656. LNCS. Springer, Heidelberg, May 2003, pp. 255-271.
    • (2003) EUROCRYPT 2003 , vol.2656 , pp. 255-271
    • Canetti, R.1    Halevi, S.2    Katz, J.3
  • 12
    • 33847081093 scopus 로고    scopus 로고
    • (visited on 07/2016)
    • Conversations. URL: https://conversations.im/ (visited on 07/2016).
    • Conversations
  • 14
    • 84987660705 scopus 로고    scopus 로고
    • Automated analysis and verification of tls 1.3: 0-rtt, resumption and delayed authentication
    • IEEE Computer Society Press, May
    • Cas Cremers, Marko Horvat, Sam Scott, and Thyla van der Merwe. "Automated Analysis and Verification of TLS 1.3: 0-RTT, Resumption and Delayed Authentication". In: 2016 IEEE Symposium on Security and Privacy. IEEE Computer Society Press, May 2016.
    • (2016) 2016 IEEE Symposium on Security and Privacy
    • Cremers, C.1    Horvat, M.2    Scott, S.3    Van Der Merwe, T.4
  • 15
    • 84857775893 scopus 로고    scopus 로고
    • On the joint security of encryption and signature in EMV
    • LNCS. Springer, Heidelberg, Feb
    • Jean Paul Degabriele, Anja Lehmann, Kenneth G. Paterson, Nigel P. Smart, and Mario Strefler. "On the Joint Security of Encryption and Signature in EMV". In: CT-RSA 2012. Vol. 7178. LNCS. Springer, Heidelberg, Feb. 2012, pp. 116-135.
    • (2012) CT-RSA 2012 , vol.7178 , pp. 116-135
    • Paul Degabriele, J.1    Lehmann, A.2    Paterson, K.G.3    Smart, N.P.4    Strefler, M.5
  • 16
    • 34547254779 scopus 로고    scopus 로고
    • Deniable authentication and key exchange
    • ACM Press, Oct
    • Mario Di Raimondo, Rosario Gennaro, and Hugo Krawczyk. "Deniable authentication and key exchange". In: ACM CCS 06. ACM Press, Oct. 2006, pp. 400-409.
    • (2006) ACM CCS 06 , pp. 400-409
    • Di Raimondo, M.1    Gennaro, R.2    Krawczyk, H.3
  • 17
    • 33749021102 scopus 로고    scopus 로고
    • Secure off-the-record messaging
    • Alexandria, VA, USA: ACM
    • Mario Di Raimondo, Rosario Gennaro, and Hugo Krawczyk. "Secure Off-the-record Messaging". In: WPES. Alexandria, VA, USA: ACM, 2005, pp. 81-89.
    • (2005) WPES , pp. 81-89
    • Di Raimondo, M.1    Gennaro, R.2    Krawczyk, H.3
  • 18
    • 84954140761 scopus 로고    scopus 로고
    • A cryptographic analysis of the TLS 1.3 handshake protocol candidates
    • ACM Press, Oct
    • Benjamin Dowling, Marc Fischlin, Felix Günther, and Douglas Stebila. "A Cryptographic Analysis of the TLS 1.3 Handshake Protocol Candidates". In: ACM CCS 15. ACM Press, Oct. 2015, pp. 1197-1210.
    • (2015) ACM CCS 15 , pp. 1197-1210
    • Dowling, B.1    Fischlin, M.2    Günther, F.3    Stebila, D.4
  • 19
    • 85024497839 scopus 로고    scopus 로고
    • Electronic Frontier Foundation
    • Electronic Frontier Foundation. Secure Messaging Scorecard. 2016. URL: https://www.eff.org/node/82654.
    • (2016) Secure Messaging Scorecard
  • 20
    • 85026656402 scopus 로고    scopus 로고
    • Tech. rep. (visited on 07/2016)
    • Facebook. Messenger Secret Conversations. Tech. rep. 2016. URL: https://fbnewsroomus.files.wordpress.com/2016/07/ secret-conversations-whitepaper-1.pdf (visited on 07/2016).
    • (2016) Messenger Secret Conversations
  • 21
    • 85026673215 scopus 로고    scopus 로고
    • Cryptology ePrint Archive, Report 2014/904 (Version from April 5, 2016)
    • Tilman Frosch, Christian Mainka, Christoph Bader, Florian Bergsma, Joerg Schwenk, and Thorsten Holz. How Secure is TextSecure? Cryptology ePrint Archive, Report 2014/904. http://eprint.iacr.org/2014/904 (Version from April 5, 2016). 2014.
    • (2014) How Secure Is TextSecure
    • Frosch, T.1    Mainka, C.2    Bader, C.3    Bergsma, F.4    Schwenk, J.5    Holz, T.6
  • 23
    • 85024500905 scopus 로고    scopus 로고
    • Dancing on the Lip of the Volcano: Chosen Ciphertext Attacks on Apple iMessage
    • Christina Garman, Matthew Green, Gabriel Kaptchuk, Ian Miers, and Michael Rushanan. "Dancing on the Lip of the Volcano: Chosen Ciphertext Attacks on Apple iMessage". In: Usenix Security 2016. 2016.
    • (2016) Usenix Security 2016
    • Garman, C.1    Green, M.2    Kaptchuk, G.3    Miers, I.4    Rushanan, M.5
  • 24
    • 84945182231 scopus 로고    scopus 로고
    • Forward secure asynchronous messaging from puncturable encryption
    • IEEE Computer Society Press, May
    • Matthew D. Green and Ian Miers. "Forward Secure Asynchronous Messaging from Puncturable Encryption". In: 2015 IEEE Symposium on Security and Privacy. IEEE Computer Society Press, May 2015, pp. 305-320.
    • (2015) 2015 IEEE Symposium on Security and Privacy , pp. 305-320
    • Green, M.D.1    Miers, I.2
  • 25
    • 84865461888 scopus 로고    scopus 로고
    • On the security of TLS-DHE in the standard model
    • LNCS. Springer, Heidelberg, Aug
    • Tibor Jager, Florian Kohlar, Sven Schäge, and Jörg Schwenk. "On the Security of TLS-DHE in the Standard Model". In: CRYPTO 2012. Vol. 7417. LNCS. Springer, Heidelberg, Aug. 2012, pp. 273-293.
    • (2012) CRYPTO 2012 , vol.7417 , pp. 273-293
    • Jager, T.1    Kohlar, F.2    Schäge, S.3    Schwenk, J.4
  • 26
    • 84954113686 scopus 로고    scopus 로고
    • On the security of TLS 1.3 and QUIC against weaknesses in PKCS#1 v1.5 encryption
    • ACM Press, Oct
    • Tibor Jager, Jörg Schwenk, and Juraj Somorovsky. "On the Security of TLS 1.3 and QUIC Against Weaknesses in PKCS#1 v1.5 Encryption". In: ACM CCS 15. ACM Press, Oct. 2015, pp. 1185-1196.
    • (2015) ACM CCS 15 , pp. 1185-1196
    • Jager, T.1    Schwenk, J.2    Somorovsky, J.3
  • 27
    • 84889036706 scopus 로고    scopus 로고
    • (visited on 07/2016)
    • Nadim Kobeissi. Cryptocat. URL: https://crypto.cat/security. html (visited on 07/2016).
    • Cryptocat
    • Kobeissi, N.1
  • 28
    • 85024477053 scopus 로고    scopus 로고
    • Automated Verification for Secure Messaging Protocols and their Implementations: A Symbolic and Computational Approach
    • IEEE Computer Society Press, Apr
    • Nadim Kobeissi, Karthikeyan Bhargavan, and Bruno Blanchet. "Automated Verification for Secure Messaging Protocols and their Implementations: A Symbolic and Computational Approach". In: 2nd IEEE European Symposium on Security and Privacy. IEEE Computer Society Press, Apr. 2017.
    • (2017) 2nd IEEE European Symposium on Security and Privacy
    • Kobeissi, N.1    Bhargavan, K.2    Blanchet, B.3
  • 29
    • 84951872326 scopus 로고    scopus 로고
    • De-)constructing TLS 1.3
    • LNCS. Springer, Heidelberg, Dec
    • Markulf Kohlweiss, Ueli Maurer, Cristina Onete, Björn Tackmann, and Daniele Venturi. "(De-)Constructing TLS 1.3". In: INDOCRYPT 2015. Vol. 9462. LNCS. Springer, Heidelberg, Dec. 2015, pp. 85-102.
    • (2015) INDOCRYPT 2015 , vol.9462 , pp. 85-102
    • Kohlweiss, M.1    Maurer, U.2    Onete, C.3    Tackmann, B.4    Venturi, D.5
  • 30
    • 77957013995 scopus 로고    scopus 로고
    • Cryptographic extraction and key derivation: The HKDF scheme
    • LNCS. Springer, Heidelberg, Aug
    • Hugo Krawczyk. "Cryptographic Extraction and Key Derivation: The HKDF Scheme". In: CRYPTO 2010. Vol. 6223. LNCS. Springer, Heidelberg, Aug. 2010, pp. 631-648.
    • (2010) CRYPTO 2010 , vol.6223 , pp. 631-648
    • Krawczyk, H.1
  • 31
    • 33745179557 scopus 로고    scopus 로고
    • Hmqv: A high-performance secure diffie-hellman protocol
    • LNCS. Springer, Heidelberg, Aug
    • Hugo Krawczyk. "HMQV: A High-Performance Secure Diffie-Hellman Protocol". In: CRYPTO 2005. Vol. 3621. LNCS. Springer, Heidelberg, Aug. 2005, pp. 546-566.
    • (2005) CRYPTO 2005 , vol.3621 , pp. 546-566
    • Krawczyk, H.1
  • 32
    • 33646756559 scopus 로고    scopus 로고
    • Modular security proofs for key agreement protocols
    • LNCS. Springer, Heidelberg, Dec
    • Caroline Kudla and Kenneth G. Paterson. "Modular Security Proofs for Key Agreement Protocols". In: ASIACRYPT 2005. Vol. 3788. LNCS. Springer, Heidelberg, Dec. 2005, pp. 549-565.
    • (2005) ASIACRYPT 2005 , vol.3788 , pp. 549-565
    • Kudla, C.1    Paterson, K.G.2
  • 33
    • 38149012093 scopus 로고    scopus 로고
    • Stronger security of authenticated key exchange
    • LNCS. Springer, Heidelberg, Nov
    • Brian A. LaMacchia, Kristin Lauter, and Anton Mityagin. "Stronger Security of Authenticated Key Exchange". In: ProvSec 2007. Vol. 4784. LNCS. Springer, Heidelberg, Nov. 2007, pp. 1-16.
    • (2007) ProvSec 2007 , vol.4784 , pp. 1-16
    • LaMacchia, B.A.1    Lauter, K.2    Mityagin, A.3
  • 34
    • 84985922270 scopus 로고    scopus 로고
    • (visited on 06/22/2015)
    • Adam Langley. Pond. 2014. URL: https://pond.imperialviolet. org/ (visited on 06/22/2015).
    • (2014) Pond
    • Langley, A.1
  • 35
    • 84987602328 scopus 로고    scopus 로고
    • Multiple handshakes security of TLS 1.3 candidates
    • IEEE Computer Society Press, May
    • Xinyu Li, Jing Xu, Zhenfeng Zhang, Dengguo Feng, and Honggang Hu. "Multiple Handshakes Security of TLS 1.3 Candidates". In: 2016 IEEE Symposium on Security and Privacy. IEEE Computer Society Press, May 2016.
    • (2016) 2016 IEEE Symposium on Security and Privacy
    • Li, X.1    Xu, J.2    Zhang, Z.3    Feng, D.4    Hu, H.5
  • 39
    • 84857829372 scopus 로고    scopus 로고
    • On reusing ephemeral keys in diffie-hellman key agreement protocols
    • Jan
    • Alfred Menezes and Berkant Ustaoglu. "On Reusing Ephemeral Keys in Diffie-Hellman Key Agreement Protocols". In: Int. J. Appl. Cryptol. 2.2 (Jan. 2010), pp. 154-158.
    • (2010) Int. J. Appl. Cryptol , vol.2 , Issue.2 , pp. 154-158
    • Menezes, A.1    Ustaoglu, B.2
  • 40
    • 84904134785 scopus 로고    scopus 로고
    • Tech. rep. Archived from the original. Dec. 5, (visited on 07/2016)
    • Vinnie Moscaritolo, Gary Belvin, and Phil Zimmermann. Silent Circle Instant Messaging Protocol Specification. Tech. rep. Archived from the original. Dec. 5, 2012. URL: https: //web.archive.org/web/20150402122917/https://silentcircle. com/ sites / default / themes / silentcircle / assets / downloads / SCIMP-paper.pdf (visited on 07/2016).
    • (2012) Silent Circle Instant Messaging Protocol Specification
    • Moscaritolo, V.1    Belvin, G.2    Zimmermann, P.3
  • 41
    • 82955177026 scopus 로고    scopus 로고
    • On the joint security of encryption and signature, revisited
    • LNCS. Springer, Heidelberg, Dec
    • Kenneth G. Paterson, Jacob C. N. Schuldt, Martijn Stam, and Susan Thomson. "On the Joint Security of Encryption and Signature, Revisited". In: ASIACRYPT 2011. Vol. 7073. LNCS. Springer, Heidelberg, Dec. 2011, pp. 161-178.
    • (2011) ASIACRYPT 2011 , vol.7073 , pp. 161-178
    • Paterson, K.G.1    Schuldt, J.C.N.2    Stam, M.3    Thomson, S.4
  • 42
    • 85026638946 scopus 로고    scopus 로고
    • GitHub wiki (visited on 07/22/2016)
    • Trevor Perrin. Double Ratchet Algorithm. GitHub wiki. 2016. URL: https://github.com/trevp/double-ratchet/wiki (visited on 07/22/2016).
    • (2016) Double Ratchet Algorithm
    • Perrin, T.1
  • 43
    • 85026640949 scopus 로고    scopus 로고
    • Specification. Oct. (visited on 07/2016)
    • Trevor Perrin. The XEdDSA and VXEdDSA Signature Schemes. Specification. Oct. 2016. URL: https: / / whispersystems. org / docs / specifications / xeddsa/ (visited on 07/2016).
    • (2016) The XEdDSA and VXEdDSA Signature Schemes
    • Perrin, T.1
  • 44
    • 85026638946 scopus 로고    scopus 로고
    • Specification. Nov. (visited on 01/2017)
    • Trevor Perrin and Moxie Marlinspike. The Double Ratchet Algorithm. Specification. Nov. 2016. URL: https: / / whispersystems. org / docs / specifications / doubleratchet/ (visited on 01/2017).
    • (2016) The Double Ratchet Algorithm
    • Perrin, T.1    Marlinspike, M.2
  • 45
    • 85026679673 scopus 로고    scopus 로고
    • Specification. Nov. (visited on 01/2017)
    • Trevor Perrin and Moxie Marlinspike. The X3DH Key Agreement Protocol. Specification. Nov. 2016. URL: https: //whispersystems.org/docs/specifications/x3dh/ (visited on 01/2017).
    • (2016) The X3DH Key Agreement Protocol
    • Perrin, T.1    Marlinspike, M.2
  • 47
    • 85026633035 scopus 로고    scopus 로고
    • Oct. 25, (visited on 07/2016)
    • Andreas Straub. OMEMO Encryption. Oct. 25, 2015. URL: https://conversations.im/xeps/multi-end.html (visited on 07/2016).
    • (2015) OMEMO Encryption
    • Straub, A.1
  • 49
    • 84954146338 scopus 로고    scopus 로고
    • Deniable key exchanges for secure messaging
    • ACM Press, Oct
    • Nik Unger and Ian Goldberg. "Deniable Key Exchanges for Secure Messaging". In: ACM CCS 15. ACM Press, Oct. 2015, pp. 1211-1223.
    • (2015) ACM CCS 15 , pp. 1211-1223
    • Unger, N.1    Goldberg, I.2
  • 50
    • 84979293776 scopus 로고    scopus 로고
    • Tech. rep. (visited on 07/2016)
    • WhatsApp. WhatsApp Encryption Overview. Tech. rep. 2016. URL: https: / /www. Whatsapp. com / security / WhatsApp-Security-Whitepaper.pdf (visited on 07/2016).
    • (2016) WhatsApp Encryption Overview


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.