Skip to main content

2018 | OriginalPaper | Buchkapitel

Breaking Message Integrity of an End-to-End Encryption Scheme of LINE

verfasst von : Takanori Isobe, Kazuhiko Minematsu

Erschienen in: Computer Security

Verlag: Springer International Publishing

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

In this paper, we analyze the security of an end-to-end encryption scheme (E2EE) of LINE, a.k.a Letter Sealing. LINE is one of the most widely-deployed instant messaging applications, especially in East Asia. By a close inspection of their protocols, we give several attacks against the message integrity of Letter Sealing. Specifically, we propose forgery and impersonation attacks on the one-to-one message encryption and the group message encryption. All of our attacks are feasible with the help of an end-to-end adversary, who has access to the inside of the LINE server (e.g. service provider LINE themselves). We stress that the main purpose of E2EE is to provide a protection against the end-to-end adversary. In addition, we found some attacks that even do not need the help of E2E adversary, which shows a critical security flaw of the protocol. Our results reveal that the E2EE scheme of LINE do not sufficiently guarantee the integrity of messages compared to the state-of-the-art E2EE schemes such as Signal, which is used by WhatApp and Facebook Messenger.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat FIPS PUB 197: Advanced Encryption Standard (AES). U.S. Department of Commerce/National Institute of Standards and Technology (2001) FIPS PUB 197: Advanced Encryption Standard (AES). U.S. Department of Commerce/National Institute of Standards and Technology (2001)
2.
Zurück zum Zitat NIST SP 800–38A: Recommendation for Block Cipher Modes of Operation. U.S. Department of Commerce/National Institute of Standards and Technology (2001) NIST SP 800–38A: Recommendation for Block Cipher Modes of Operation. U.S. Department of Commerce/National Institute of Standards and Technology (2001)
3.
Zurück zum Zitat NIST SP 800–38C: Recommendation for Block Cipher Modes of Operation: the CCM Mode for Authentication and Confidentiality. U.S. Department of Commerce/National Institute of Standards and Technology (2007) NIST SP 800–38C: Recommendation for Block Cipher Modes of Operation: the CCM Mode for Authentication and Confidentiality. U.S. Department of Commerce/National Institute of Standards and Technology (2007)
4.
Zurück zum Zitat NIST SP 800–38D: Recommendation for Block Cipher Modes of Operation: Galois/Counter Mode (GCM) and GMAC. U.S. Department of Commerce/National Institute of Standards and Technology (2007) NIST SP 800–38D: Recommendation for Block Cipher Modes of Operation: Galois/Counter Mode (GCM) and GMAC. U.S. Department of Commerce/National Institute of Standards and Technology (2007)
5.
Zurück zum Zitat FIPS PUB 180–4: Secure Hash Standard. U.S. Department of Commerce/National Institute of Standards and Technology (2015) FIPS PUB 180–4: Secure Hash Standard. U.S. Department of Commerce/National Institute of Standards and Technology (2015)
9.
Zurück zum Zitat Al Fardan, N.J., Paterson, K.G.: Lucky thirteen: breaking the TLS and DTLS record protocols. In: 2013 IEEE Symposium on Security and Privacy, SP 2013, pp. 526–540. IEEE Computer Society (2013) Al Fardan, N.J., Paterson, K.G.: Lucky thirteen: breaking the TLS and DTLS record protocols. In: 2013 IEEE Symposium on Security and Privacy, SP 2013, pp. 526–540. IEEE Computer Society (2013)
10.
Zurück zum Zitat Bellare, M., Namprempre, C.: Authenticated encryption: relations among notions and analysis of the generic composition paradigm. J. Cryptol. 21(4), 469–491 (2008)MathSciNetCrossRef Bellare, M., Namprempre, C.: Authenticated encryption: relations among notions and analysis of the generic composition paradigm. J. Cryptol. 21(4), 469–491 (2008)MathSciNetCrossRef
14.
Zurück zum Zitat Möller, B., Duong, T., Kotowicz, K.: This POODLE Bites: Exploiting The SSL 3.0 Fallback (2016) Möller, B., Duong, T., Kotowicz, K.: This POODLE Bites: Exploiting The SSL 3.0 Fallback (2016)
15.
Zurück zum Zitat Cohn-Gordon, K., Cremers, C., Garratt, L., Millican, J., Milner, K.: On Ends-to-Ends Encryption: Asynchronous Group Messaging with Strong Security Guarantees. Cryptology ePrint Archive, Report 2017/666 (2017). http://eprint.iacr.org/2017/666 Cohn-Gordon, K., Cremers, C., Garratt, L., Millican, J., Milner, K.: On Ends-to-Ends Encryption: Asynchronous Group Messaging with Strong Security Guarantees. Cryptology ePrint Archive, Report 2017/666 (2017). http://​eprint.​iacr.​org/​2017/​666
16.
Zurück zum Zitat Cohn-Gordon, K., Cremers, C.J.F., Dowling, B., Garratt, L., Stebila, D.: A formal security analysis of the signal messaging protocol. In: 2017 IEEE European Symposium on Security and Privacy, EuroS&P 2017, pp. 451–466. IEEE (2017) Cohn-Gordon, K., Cremers, C.J.F., Dowling, B., Garratt, L., Stebila, D.: A formal security analysis of the signal messaging protocol. In: 2017 IEEE European Symposium on Security and Privacy, EuroS&P 2017, pp. 451–466. IEEE (2017)
17.
Zurück zum Zitat Cohn-Gordon, K., Cremers, C.J.F., Garratt, L.: On post-compromise security. In: IEEE 29th Computer Security Foundations Symposium, CSF 2016, pp. 164–178. IEEE Computer Society (2016) Cohn-Gordon, K., Cremers, C.J.F., Garratt, L.: On post-compromise security. In: IEEE 29th Computer Security Foundations Symposium, CSF 2016, pp. 164–178. IEEE Computer Society (2016)
18.
Zurück zum Zitat Curtis, T.: Encryption out of LINE Reverse engineering end-to-end encrypted messaging. Ekoparty 2016 (2016) Curtis, T.: Encryption out of LINE Reverse engineering end-to-end encrypted messaging. Ekoparty 2016 (2016)
19.
Zurück zum Zitat Espinoza, A.M., Tolley, W.J., Crandall, J.R., Crete-Nishihata, M., Hilts, A.: Alice and Bob, who the FOCI are they?: analysis of end-to-end encryption in the LINE messaging application. In: 7th USENIX Workshop on Free and Open Communications on the Internet (FOCI 17). USENIX Association (2017) Espinoza, A.M., Tolley, W.J., Crandall, J.R., Crete-Nishihata, M., Hilts, A.: Alice and Bob, who the FOCI are they?: analysis of end-to-end encryption in the LINE messaging application. In: 7th USENIX Workshop on Free and Open Communications on the Internet (FOCI 17). USENIX Association (2017)
20.
Zurück zum Zitat Garman, C., Green, M., Kaptchuk, G., Miers, I., Rushanan, M.: Dancing on the lip of the volcano: chosen ciphertext attacks on apple imessage. In: 25th USENIX Security Symposium (USENIX Security 16), pp. 655–672. USENIX Association (2016) Garman, C., Green, M., Kaptchuk, G., Miers, I., Rushanan, M.: Dancing on the lip of the volcano: chosen ciphertext attacks on apple imessage. In: 25th USENIX Security Symposium (USENIX Security 16), pp. 655–672. USENIX Association (2016)
23.
Zurück zum Zitat LINE Corporation: LINE Encryption Overview (2016) LINE Corporation: LINE Encryption Overview (2016)
26.
Zurück zum Zitat Rosler, P., Mainka, C., Schwenk, J.: More is less: how group chats weaken the security of instant messengers signal, WhatsApp, and Threema. In: 3rd IEEE European Symposium on Security and Privacy 2018 (2018) Rosler, P., Mainka, C., Schwenk, J.: More is less: how group chats weaken the security of instant messengers signal, WhatsApp, and Threema. In: 3rd IEEE European Symposium on Security and Privacy 2018 (2018)
Metadaten
Titel
Breaking Message Integrity of an End-to-End Encryption Scheme of LINE
verfasst von
Takanori Isobe
Kazuhiko Minematsu
Copyright-Jahr
2018
DOI
https://doi.org/10.1007/978-3-319-98989-1_13

Premium Partner