Security Analysis and Countermeasures of an End-to-End Encryption Scheme of LINE

被引:1
|
作者
Isobe, Takanori [1 ]
Minematsu, Kazuhiko [2 ]
机构
[1] Univ Hyogo, Kobe, Hyogo 6500047, Japan
[2] NEC Corp Ltd, Kawasaki, Kanagawa 2118666, Japan
关键词
E2EE; LINE; key exchange; group message; authenticated encryption;
D O I
10.1587/transfun.2019EAP1041
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
In this paper, we analyze the security of an end-to-end encryption scheme (E2EE) of LINE, a.k.a Letter Sealing. LINE is one of the most widely-deployed instant messaging applications, especially in East Asia. By a close inspection of their protocols, we give several attacks against the message integrity of Letter Sealing. Specifically, we propose forgery and impersonation attacks on the one-to-one message encryption and the group message encryption. All of our attacks are feasible with the help of an end-to-end adversary, who has access to the inside of the LINE server (e.g. service provider LINE themselves). We stress that the main purpose of E2EE is to provide a protection against the end-to-end adversary. In addition, we found some attacks that even do not need the help of E2E adversary, which shows a critical security flaw of the protocol. Our results reveal that the E2EE scheme of LINE do not sufficiently guarantee the integrity of messages compared to the state-of-the-art E2EE schemes such as Signal, which is used by WhatApp and Facebook Messenger. We also provide some countermeasures against our attacks. We have shared our findings with LINE corporation in advance. The LINE corporation has confirmed our attacks are valid as long as the E2E adversary is involved, and officially recognizes our results as a vulnerability of encryption break.
引用
收藏
页码:313 / 324
页数:12
相关论文
共 50 条
  • [31] ANALYSIS OF END-TO-END SOA SECURITY PROTOCOLS WITH MOBILE DEVICES
    Ahmed, Norman
    Gamble, Rose
    Linderman, Mark
    Bhargava, Bharat
    2013 IEEE 14TH INTERNATIONAL CONFERENCE ON MOBILE DATA MANAGEMENT (MDM 2013), VOL 2, 2013, : 166 - 170
  • [32] End-To-End Security for Video Distribution
    Boho, Andras
    Van Wallendael, Glenn
    Dooms, Ann
    De Cock, Jan
    Braeckman, Geert
    Schelkens, Peter
    Preneel, Bart
    Van de Walle, Rik
    IEEE SIGNAL PROCESSING MAGAZINE, 2013, 30 (02) : 97 - 107
  • [33] An end-to-end security solution for SCTP
    Lindskog, Stefan
    Brunstrom, Anna
    ARES 2008: PROCEEDINGS OF THE THIRD INTERNATIONAL CONFERENCE ON AVAILABILITY, SECURITY AND RELIABILITY, 2008, : 526 - +
  • [34] A transparent end-to-end security solution
    Thomas, S
    Misra, D
    Eswari, PRL
    Babu, NSC
    INFORMATION SYSTEMS SECURITY, PROCEEDINGS, 2005, 3803 : 336 - 339
  • [35] Synthesising End-to-End Security Protocols
    Thevathayan, Charles
    Bertok, Peter
    Fernandez, George
    2014 IEEE 13TH INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (TRUSTCOM), 2014, : 440 - 447
  • [36] End-to-End Security for Personal Telehealth
    Koster, Paul
    Asim, Muhammad
    Petkovic, Milan
    USER CENTRED NETWORKED HEALTH CARE, 2011, 169 : 621 - 625
  • [37] End-to-End Security for Enterprise Mashups
    Rosenberg, Florian
    Khalaf, Rania
    Duftler, Matthew
    Curbera, Francisco
    Austel, Paula
    SERVICE-ORIENTED COMPUTING - ICSOC 2009, PROCEEDINGS, 2009, 5900 : 389 - +
  • [38] End-to-end security for GSM users
    Rekha, AB
    Umadevi, B
    Solanke, Y
    Kolli, SR
    2005 IEEE INTERNATIONAL CONFERENCE ON PERSONAL WIRELESS COMMUNICATIONS, 2005, : 434 - 437
  • [39] WAP performance on an end-to-end scheme
    Ladas, C
    Edwards, RM
    Manson, G
    LONDON COMMUNICATIONS SYMPOSIUM 2001, PROCEEDINGS, 2001, : 183 - 186
  • [40] End-To-End Encryption Enabled Lightweight Mutual Authentication Scheme for Resource Constrained IoT Network
    Ullah, Shafi
    Nasir, Haidawati Muhammad
    Kadir, Kushsairy
    Khan, Akbar
    Memon, Ahsanullah
    Azhar, Shanila
    Khan, Ilyas
    Ashraf, Muhammad
    CMC-COMPUTERS MATERIALS & CONTINUA, 2025, 82 (02): : 3223 - 3249