Paper 2024/1886

Impossibility Results for Post-Compromise Security in Real-World Communication Systems

Cas Cremers, Helmholtz Center for Information Security
Niklas Medinger, Helmholtz Center for Information Security
Aurora Naska, Helmholtz Center for Information Security
Abstract

Modern secure communication systems, such as iMessage, WhatsApp, and Signal include intricate mechanisms that aim to achieve very strong security properties. These mechanisms typically involve continuously merging in new fresh secrets into the keying material, which is used to encrypt messages during communications. In the literature, these mechanisms have been proven to achieve forms of Post Compromise Security (PCS): the ability to provide communication security even if the full state of a party was compromised some time in the past. However, recent work has shown these proofs do not transfer to the end-user level, possibly because of usability concerns. This has raised the question of whether end-users can actually obtain PCS or not, and under which conditions. Here we show and formally prove that communication systems that need to be resilient against certain types of state loss (which can occur in practice) fundamentally cannot achieve full PCS for end-users. Whereas previous work showed that the Signal messenger did not achieve this with its current session-management layer, we isolate the exact conditions that cause this failure, and why this cannot be simply solved in communication systems by implementing a different session-management layer or an entirely different protocol. Moreover, we clarify the trade-off of the maximum number of sessions between two users (40 in Signal) in terms of failure-resilience versus security. Our results have direct consequences for the design of future secure communication systems, and could motivate either the simplification of redundant mechanisms, or the improvement of session-management designs to provide better security trade-offs with respect to state loss/failure tolerance.

Metadata
Available format(s)
PDF
Category
Cryptographic protocols
Publication info
Preprint.
Keywords
Security protocolsSecure messagingPost-Compromise SecurityPCSDouble RatchetResilienceState loss
Contact author(s)
cremers @ cispa de
niklas medinger @ cispa de
aurora naska @ cispa de
History
2024-11-22: approved
2024-11-19: received
See all versions
Short URL
https://ia.cr/2024/1886
License
Creative Commons Attribution-ShareAlike
CC BY-SA

BibTeX

@misc{cryptoeprint:2024/1886,
      author = {Cas Cremers and Niklas Medinger and Aurora Naska},
      title = {Impossibility Results for Post-Compromise Security in Real-World Communication Systems},
      howpublished = {Cryptology {ePrint} Archive, Paper 2024/1886},
      year = {2024},
      url = {https://eprint.iacr.org/2024/1886}
}
Note: In order to protect the privacy of readers, eprint.iacr.org does not use cookies or embedded third party content.