Security Analysis and Countermeasures of an End-to-End Encryption Scheme of LINE

被引:1
|
作者
Isobe, Takanori [1 ]
Minematsu, Kazuhiko [2 ]
机构
[1] Univ Hyogo, Kobe, Hyogo 6500047, Japan
[2] NEC Corp Ltd, Kawasaki, Kanagawa 2118666, Japan
关键词
E2EE; LINE; key exchange; group message; authenticated encryption;
D O I
10.1587/transfun.2019EAP1041
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
In this paper, we analyze the security of an end-to-end encryption scheme (E2EE) of LINE, a.k.a Letter Sealing. LINE is one of the most widely-deployed instant messaging applications, especially in East Asia. By a close inspection of their protocols, we give several attacks against the message integrity of Letter Sealing. Specifically, we propose forgery and impersonation attacks on the one-to-one message encryption and the group message encryption. All of our attacks are feasible with the help of an end-to-end adversary, who has access to the inside of the LINE server (e.g. service provider LINE themselves). We stress that the main purpose of E2EE is to provide a protection against the end-to-end adversary. In addition, we found some attacks that even do not need the help of E2E adversary, which shows a critical security flaw of the protocol. Our results reveal that the E2EE scheme of LINE do not sufficiently guarantee the integrity of messages compared to the state-of-the-art E2EE schemes such as Signal, which is used by WhatApp and Facebook Messenger. We also provide some countermeasures against our attacks. We have shared our findings with LINE corporation in advance. The LINE corporation has confirmed our attacks are valid as long as the E2E adversary is involved, and officially recognizes our results as a vulnerability of encryption break.
引用
收藏
页码:313 / 324
页数:12
相关论文
共 50 条
  • [21] Subverting Telegram's End-to-End Encryption
    Cogliati, Benoit
    Ethan, Jordan
    Jha, Ashwin
    IACR TRANSACTIONS ON SYMMETRIC CRYPTOLOGY, 2023, 2023 (01) : 5 - 40
  • [22] System of end-to-end symmetric database encryption
    Galushka, V. V.
    Aydinyan, A. R.
    Tsvetkova, O. L.
    Fathi, V. A.
    Fathi, D. V.
    INTERNATIONAL CONFERENCE INFORMATION TECHNOLOGIES IN BUSINESS AND INDUSTRY 2018, PTS 1-4, 2018, 1015
  • [23] On Track of Sigfox Confidentiality with End-to-End Encryption
    Fujdiak, Radek
    Blazek, Petr
    Mikhaylov, Konstantin
    Malina, Lukas
    Mlynek, Petr
    Misurec, Jiri
    Blazek, Vojtech
    13TH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY AND SECURITY (ARES 2018), 2019,
  • [24] Mitigation of Attacks on Email End-to-End Encryption
    Schwenk, Joerg
    Brinkmann, Marcus
    Poddebniak, Damian
    Mueller, Jens
    Somorovsky, Juraj
    Schinzel, Sebastian
    CCS '20: PROCEEDINGS OF THE 2020 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2020, : 1647 - 1664
  • [25] SafeSMS - End-to-end encryption for SMS messages
    Hassinen, M
    ConTEL 2005: Proceedings of the 8th International Conference on Telecommunications, Vols 1 and 2, 2005, : 359 - 365
  • [26] End-to-End Encryption for Personal Telehealth Systems
    Oellerer, Gerald
    Mense, Alexander
    PHEALTH 2014, 2014, 200 : 140 - 145
  • [27] Review of End-to-End Encryption for Social Media
    Bhuse, Vijay
    PROCEEDINGS OF THE 18TH INTERNATIONAL CONFERENCE ON CYBER WARFARE AND SECURITY ICCWS, 2023, : 35 - 38
  • [28] Fast Packet Inspection for End-To-End Encryption
    Kim, So-Yeon
    Yun, Sun-Woo
    Lee, Eun-Young
    Bae, So-Hyeon
    Lee, Il-Gu
    ELECTRONICS, 2020, 9 (11) : 1 - 14
  • [29] Performance Analysis of End-to-End Security Schemes in Healthcare IoT
    Moosavi, Sanaz Rahimi
    Nigussie, Ethiopia
    Levorato, Marco
    Virtanen, Seppo
    Isoaho, Jouni
    9TH INTERNATIONAL CONFERENCE ON AMBIENT SYSTEMS, NETWORKS AND TECHNOLOGIES (ANT 2018) / THE 8TH INTERNATIONAL CONFERENCE ON SUSTAINABLE ENERGY INFORMATION TECHNOLOGY (SEIT-2018) / AFFILIATED WORKSHOPS, 2018, 130 : 432 - 439
  • [30] Security Analysis of the WhatsApp End-to-End Encrypted Backup Protocol
    Davies, Gareth T.
    Faller, Sebastian
    Gellert, Kai
    Handirk, Tobias
    Hesse, Julia
    Horvath, Mate
    Jager, Tibor
    ADVANCES IN CRYPTOLOGY - CRYPTO 2023, PT IV, 2023, 14084 : 330 - 361