Security Analysis and Countermeasures of an End-to-End Encryption Scheme of LINE

被引:1
|
作者
Isobe, Takanori [1 ]
Minematsu, Kazuhiko [2 ]
机构
[1] Univ Hyogo, Kobe, Hyogo 6500047, Japan
[2] NEC Corp Ltd, Kawasaki, Kanagawa 2118666, Japan
关键词
E2EE; LINE; key exchange; group message; authenticated encryption;
D O I
10.1587/transfun.2019EAP1041
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
In this paper, we analyze the security of an end-to-end encryption scheme (E2EE) of LINE, a.k.a Letter Sealing. LINE is one of the most widely-deployed instant messaging applications, especially in East Asia. By a close inspection of their protocols, we give several attacks against the message integrity of Letter Sealing. Specifically, we propose forgery and impersonation attacks on the one-to-one message encryption and the group message encryption. All of our attacks are feasible with the help of an end-to-end adversary, who has access to the inside of the LINE server (e.g. service provider LINE themselves). We stress that the main purpose of E2EE is to provide a protection against the end-to-end adversary. In addition, we found some attacks that even do not need the help of E2E adversary, which shows a critical security flaw of the protocol. Our results reveal that the E2EE scheme of LINE do not sufficiently guarantee the integrity of messages compared to the state-of-the-art E2EE schemes such as Signal, which is used by WhatApp and Facebook Messenger. We also provide some countermeasures against our attacks. We have shared our findings with LINE corporation in advance. The LINE corporation has confirmed our attacks are valid as long as the E2E adversary is involved, and officially recognizes our results as a vulnerability of encryption break.
引用
收藏
页码:313 / 324
页数:12
相关论文
共 50 条
  • [41] SoK: An Analysis of End-to-End Encryption and Authentication Ceremonies in Secure Messaging Systems
    Alatawi, Mashari
    Saxena, Nitesh
    PROCEEDINGS OF THE 16TH ACM CONFERENCE ON SECURITY AND PRIVACY IN WIRELESS AND MOBILE NETWORKS, WISEC 2023, 2023, : 187 - 201
  • [42] A Unified End-to-End Security Scheme for Machine-Type Communication in LTE Networks
    Lai, Chengzhe
    Li, Hui
    Lu, Rongxing
    Shen, Xuemin
    Cao, Jin
    2013 IEEE/CIC INTERNATIONAL CONFERENCE ON COMMUNICATIONS IN CHINA (ICCC), 2013, : 698 - 703
  • [43] Homomorphic Encryption as End-to-End Solution for Smart Devices
    Shanthala, P. T.
    Annapurna, D.
    Nittala, Sravanthi
    Bhat, Arpitha S.
    Aishwarya
    INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2022, 22 (06): : 57 - 62
  • [44] End-to-end security scheme for Machine Type Communication based on Generic Authentication Architecture
    Wujun Zhang
    Yueyu Zhang
    Jie Chen
    Hui Li
    Yumin Wang
    Cluster Computing, 2013, 16 : 861 - 871
  • [45] P-SIGMA: security aware paging in end-to-end mobility management scheme
    Reaz, Abu
    Roy, Rajesh
    Atiquzzaman, Mohammed
    WIRELESS NETWORKS, 2013, 19 (08) : 2049 - 2065
  • [46] End-to-end security scheme for Machine Type Communication based on Generic Authentication Architecture
    Zhang, Wujun
    Zhang, Yueyu
    Chen, Jie
    Li, Hui
    Wang, Yumin
    CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2013, 16 (04): : 861 - 871
  • [47] P-SIGMA: security aware paging in end-to-end mobility management scheme
    Abu Reaz
    Rajesh Roy
    Mohammed Atiquzzaman
    Wireless Networks, 2013, 19 : 2049 - 2065
  • [48] An Encryption Protocol for End-to-end Secure Transmission of SMS
    Thomas, Minta
    Panchami, V
    2015 INTERNATIONAL CONFERENCED ON CIRCUITS, POWER AND COMPUTING TECHNOLOGIES (ICCPCT-2015), 2015,
  • [49] End-to-End Line Drawing Vectorization
    Liu, Hanyuan
    Li, Chengze
    Liu, Xueting
    Wong, Tien-Tsin
    THIRTY-SIXTH AAAI CONFERENCE ON ARTIFICIAL INTELLIGENCE / THIRTY-FOURTH CONFERENCE ON INNOVATIVE APPLICATIONS OF ARTIFICIAL INTELLIGENCE / THE TWELVETH SYMPOSIUM ON EDUCATIONAL ADVANCES IN ARTIFICIAL INTELLIGENCE, 2022, : 4559 - 4566
  • [50] Scalable and Configurable End-to-End Collection and Analysis of IoT Security Data
    Roukounaki, Aikaterini
    Efremidis, Sofoklis
    Soldatos, John
    Neises, Juergen
    Walloschke, Thomas
    Kefalakis, Nikos
    2019 GLOBAL IOT SUMMIT (GIOTS), 2019,