Skip to main content
Top

2018 | OriginalPaper | Chapter

Breaking Message Integrity of an End-to-End Encryption Scheme of LINE

Authors : Takanori Isobe, Kazuhiko Minematsu

Published in: Computer Security

Publisher: Springer International Publishing

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

In this paper, we analyze the security of an end-to-end encryption scheme (E2EE) of LINE, a.k.a Letter Sealing. LINE is one of the most widely-deployed instant messaging applications, especially in East Asia. By a close inspection of their protocols, we give several attacks against the message integrity of Letter Sealing. Specifically, we propose forgery and impersonation attacks on the one-to-one message encryption and the group message encryption. All of our attacks are feasible with the help of an end-to-end adversary, who has access to the inside of the LINE server (e.g. service provider LINE themselves). We stress that the main purpose of E2EE is to provide a protection against the end-to-end adversary. In addition, we found some attacks that even do not need the help of E2E adversary, which shows a critical security flaw of the protocol. Our results reveal that the E2EE scheme of LINE do not sufficiently guarantee the integrity of messages compared to the state-of-the-art E2EE schemes such as Signal, which is used by WhatApp and Facebook Messenger.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference FIPS PUB 197: Advanced Encryption Standard (AES). U.S. Department of Commerce/National Institute of Standards and Technology (2001) FIPS PUB 197: Advanced Encryption Standard (AES). U.S. Department of Commerce/National Institute of Standards and Technology (2001)
2.
go back to reference NIST SP 800–38A: Recommendation for Block Cipher Modes of Operation. U.S. Department of Commerce/National Institute of Standards and Technology (2001) NIST SP 800–38A: Recommendation for Block Cipher Modes of Operation. U.S. Department of Commerce/National Institute of Standards and Technology (2001)
3.
go back to reference NIST SP 800–38C: Recommendation for Block Cipher Modes of Operation: the CCM Mode for Authentication and Confidentiality. U.S. Department of Commerce/National Institute of Standards and Technology (2007) NIST SP 800–38C: Recommendation for Block Cipher Modes of Operation: the CCM Mode for Authentication and Confidentiality. U.S. Department of Commerce/National Institute of Standards and Technology (2007)
4.
go back to reference NIST SP 800–38D: Recommendation for Block Cipher Modes of Operation: Galois/Counter Mode (GCM) and GMAC. U.S. Department of Commerce/National Institute of Standards and Technology (2007) NIST SP 800–38D: Recommendation for Block Cipher Modes of Operation: Galois/Counter Mode (GCM) and GMAC. U.S. Department of Commerce/National Institute of Standards and Technology (2007)
5.
go back to reference FIPS PUB 180–4: Secure Hash Standard. U.S. Department of Commerce/National Institute of Standards and Technology (2015) FIPS PUB 180–4: Secure Hash Standard. U.S. Department of Commerce/National Institute of Standards and Technology (2015)
9.
go back to reference Al Fardan, N.J., Paterson, K.G.: Lucky thirteen: breaking the TLS and DTLS record protocols. In: 2013 IEEE Symposium on Security and Privacy, SP 2013, pp. 526–540. IEEE Computer Society (2013) Al Fardan, N.J., Paterson, K.G.: Lucky thirteen: breaking the TLS and DTLS record protocols. In: 2013 IEEE Symposium on Security and Privacy, SP 2013, pp. 526–540. IEEE Computer Society (2013)
10.
go back to reference Bellare, M., Namprempre, C.: Authenticated encryption: relations among notions and analysis of the generic composition paradigm. J. Cryptol. 21(4), 469–491 (2008)MathSciNetCrossRef Bellare, M., Namprempre, C.: Authenticated encryption: relations among notions and analysis of the generic composition paradigm. J. Cryptol. 21(4), 469–491 (2008)MathSciNetCrossRef
14.
go back to reference Möller, B., Duong, T., Kotowicz, K.: This POODLE Bites: Exploiting The SSL 3.0 Fallback (2016) Möller, B., Duong, T., Kotowicz, K.: This POODLE Bites: Exploiting The SSL 3.0 Fallback (2016)
15.
go back to reference Cohn-Gordon, K., Cremers, C., Garratt, L., Millican, J., Milner, K.: On Ends-to-Ends Encryption: Asynchronous Group Messaging with Strong Security Guarantees. Cryptology ePrint Archive, Report 2017/666 (2017). http://eprint.iacr.org/2017/666 Cohn-Gordon, K., Cremers, C., Garratt, L., Millican, J., Milner, K.: On Ends-to-Ends Encryption: Asynchronous Group Messaging with Strong Security Guarantees. Cryptology ePrint Archive, Report 2017/666 (2017). http://​eprint.​iacr.​org/​2017/​666
16.
go back to reference Cohn-Gordon, K., Cremers, C.J.F., Dowling, B., Garratt, L., Stebila, D.: A formal security analysis of the signal messaging protocol. In: 2017 IEEE European Symposium on Security and Privacy, EuroS&P 2017, pp. 451–466. IEEE (2017) Cohn-Gordon, K., Cremers, C.J.F., Dowling, B., Garratt, L., Stebila, D.: A formal security analysis of the signal messaging protocol. In: 2017 IEEE European Symposium on Security and Privacy, EuroS&P 2017, pp. 451–466. IEEE (2017)
17.
go back to reference Cohn-Gordon, K., Cremers, C.J.F., Garratt, L.: On post-compromise security. In: IEEE 29th Computer Security Foundations Symposium, CSF 2016, pp. 164–178. IEEE Computer Society (2016) Cohn-Gordon, K., Cremers, C.J.F., Garratt, L.: On post-compromise security. In: IEEE 29th Computer Security Foundations Symposium, CSF 2016, pp. 164–178. IEEE Computer Society (2016)
18.
go back to reference Curtis, T.: Encryption out of LINE Reverse engineering end-to-end encrypted messaging. Ekoparty 2016 (2016) Curtis, T.: Encryption out of LINE Reverse engineering end-to-end encrypted messaging. Ekoparty 2016 (2016)
19.
go back to reference Espinoza, A.M., Tolley, W.J., Crandall, J.R., Crete-Nishihata, M., Hilts, A.: Alice and Bob, who the FOCI are they?: analysis of end-to-end encryption in the LINE messaging application. In: 7th USENIX Workshop on Free and Open Communications on the Internet (FOCI 17). USENIX Association (2017) Espinoza, A.M., Tolley, W.J., Crandall, J.R., Crete-Nishihata, M., Hilts, A.: Alice and Bob, who the FOCI are they?: analysis of end-to-end encryption in the LINE messaging application. In: 7th USENIX Workshop on Free and Open Communications on the Internet (FOCI 17). USENIX Association (2017)
20.
go back to reference Garman, C., Green, M., Kaptchuk, G., Miers, I., Rushanan, M.: Dancing on the lip of the volcano: chosen ciphertext attacks on apple imessage. In: 25th USENIX Security Symposium (USENIX Security 16), pp. 655–672. USENIX Association (2016) Garman, C., Green, M., Kaptchuk, G., Miers, I., Rushanan, M.: Dancing on the lip of the volcano: chosen ciphertext attacks on apple imessage. In: 25th USENIX Security Symposium (USENIX Security 16), pp. 655–672. USENIX Association (2016)
23.
go back to reference LINE Corporation: LINE Encryption Overview (2016) LINE Corporation: LINE Encryption Overview (2016)
26.
go back to reference Rosler, P., Mainka, C., Schwenk, J.: More is less: how group chats weaken the security of instant messengers signal, WhatsApp, and Threema. In: 3rd IEEE European Symposium on Security and Privacy 2018 (2018) Rosler, P., Mainka, C., Schwenk, J.: More is less: how group chats weaken the security of instant messengers signal, WhatsApp, and Threema. In: 3rd IEEE European Symposium on Security and Privacy 2018 (2018)
Metadata
Title
Breaking Message Integrity of an End-to-End Encryption Scheme of LINE
Authors
Takanori Isobe
Kazuhiko Minematsu
Copyright Year
2018
DOI
https://doi.org/10.1007/978-3-319-98989-1_13

Premium Partner