A Formal Security Analysis of the Signal Messaging Protocol

被引:77
作者
Cohn-Gordon, Katriel
Cremers, Cas [1 ]
Dowling, Benjamin [2 ]
Garratt, Luke [3 ]
Stebila, Douglas [4 ]
机构
[1] CISPA Helmholtz Ctr Informat Secur, Saarbrucken, Germany
[2] Swiss Fed Inst Technol, Zurich, Switzerland
[3] Cisco Syst, San Jose, CA USA
[4] Univ Waterloo, Waterloo, ON, Canada
基金
加拿大自然科学与工程研究理事会; 英国工程与自然科学研究理事会; 澳大利亚研究理事会;
关键词
Cryptography - Security systems;
D O I
10.1007/s00145-020-09360-1
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
The Signal protocol is a cryptographic messaging protocol that provides end-to-end encryption for instant messaging in WhatsApp, Wire, and Facebook Messenger among many others, serving well over 1 billion active users. Signal includes several uncommon security properties (such as "future secrecy" or "post-compromise security"), enabled by a technique calledratchetingin which session keys are updated with every message sent. We conduct a formal security analysis of Signal's initial extended triple Diffie-Hellman (X3DH) key agreement and Double Ratchet protocols as a multi-stage authenticated key exchange protocol. We extract from the implementation a formal description of the abstract protocol and define a security model which can capture the "ratcheting" key update structure as a multi-stage model where there can be a "tree" of stages, rather than just a sequence. We then prove the security of Signal's key exchange core in our model, demonstrating several standard security properties. We have found no major flaws in the design and hope that our presentation and results can serve as a foundation for other analyses of this widely adopted protocol.
引用
收藏
页码:1914 / 1983
页数:70
相关论文
共 65 条
[1]  
Alwen J., 2018, IACR CRYPTOLOGY EPRI, V2018, P1037
[2]  
[Anonymous], 2017, The Transport Layer Security (TLS) Protocol Version 1.3
[3]  
Bader C., 2015, 2015374 CRYPT EPRINT
[4]   Tightly-Secure Authenticated Key Exchange [J].
Bader, Christoph ;
Hofheinz, Dennis ;
Jager, Tibor ;
Kiltz, Eike ;
Li, Yong .
THEORY OF CRYPTOGRAPHY (TCC 2015), PT I, 2015, 9014 :629-658
[5]  
Bellare M, 2000, LECT NOTES COMPUT SC, V1807, P139
[6]  
Bellare M, 2004, LECT NOTES COMPUT SC, V3027, P171
[7]  
Bellare M, 2003, LECT NOTES COMPUT SC, V2612, P1
[8]  
Bellare M, 2016, 20161028 CRYPT EPRIN
[9]  
Bellare M., 1993, LNCS, VCRYPTO 93, P232, DOI DOI 10.1007/3-540-48329-2_21
[10]  
Bellare M., 1993, P ACM C COMPUTER COM, P62, DOI 10.1145/168588.168596