论文标题

在安全消息传递中自动检测假键攻击

Automatic Detection of Fake Key Attacks in Secure Messaging

论文作者

Yadav, Tarun Kumar, Gosain, Devashish, Herzberg, Amir, Zappala, Daniel, Seamons, Kent

论文摘要

流行的即时消息应用程序(例如WhatsApp和Signal)为数十亿用户提供了端到端的加密。他们依靠集中式应用程序特定的服务器来分发用户之间的公共密钥和继电器加密消息。因此,它们可以防止被动攻击,但容易受到某些主动攻击的影响。恶意或黑客的服务器可以向用户分发假钥匙,以执行中间人或模仿攻击。虽然典型的安全消息传递应用程序为用户提供了一种手动方法来检测这些攻击,但这使用户负担负担,并且研究表明它在实践中无效。本文介绍了KTACA,这是一种完全自动化的关键验证方法,它忽略了用户,易于部署。我们通过设计两种自动密钥验证的方法来激励KTACA。一种方法使用客户端审核(KTCA),第二种方法使用匿名密钥监视(AKM)。两者都有相对较低的安全性,导致KTACA,它结合了这些方法以提供两全其美的方法。我们提供对每个防御的安全分析,以确定他们可以自动检测到的攻击。我们实施主动攻击以证明它们是可能的,并且还创建了所有防御措施的原型实现,以衡量其性能并确认其可行性。最后,我们讨论了每个防御的优势和劣势,客户和服务提供者的开销以及部署的考虑。

Popular instant messaging applications such as WhatsApp and Signal provide end-to-end encryption for billions of users. They rely on a centralized, application-specific server to distribute public keys and relay encrypted messages between the users. Therefore, they prevent passive attacks but are vulnerable to some active attacks. A malicious or hacked server can distribute fake keys to users to perform man-in-the-middle or impersonation attacks. While typical secure messaging applications provide a manual method for users to detect these attacks, this burdens users, and studies show it is ineffective in practice. This paper presents KTACA, a completely automated approach for key verification that is oblivious to users and easy to deploy. We motivate KTACA by designing two approaches to automatic key verification. One approach uses client auditing (KTCA) and the second uses anonymous key monitoring (AKM). Both have relatively inferior security properties, leading to KTACA, which combines these approaches to provide the best of both worlds. We provide a security analysis of each defense, identifying which attacks they can automatically detect. We implement the active attacks to demonstrate they are possible, and we also create a prototype implementation of all the defenses to measure their performance and confirm their feasibility. Finally, we discuss the strengths and weaknesses of each defense, the overhead on clients and service providers, and deployment considerations.

扫码加入交流群

加入微信交流群

微信交流群二维码

扫码加入学术交流群,获取更多资源