Paper 2024/1886
Impossibility Results for Post-Compromise Security in Real-World Communication Systems
Abstract
Modern secure communication systems, such as iMessage, WhatsApp, and Signal include intricate mechanisms that aim to achieve very strong security properties. These mechanisms typically involve continuously merging in new fresh secrets into the keying material, which is used to encrypt messages during communications. In the literature, these mechanisms have been proven to achieve forms of Post Compromise Security (PCS): the ability to provide communication security even if the full state of a party was compromised some time in the past. However, recent work has shown these proofs do not transfer to the end-user level, possibly because of usability concerns. This has raised the question of whether end-users can actually obtain PCS or not, and under which conditions. Here we show and formally prove that communication systems that need to be resilient against certain types of state loss (which can occur in practice) fundamentally cannot achieve full PCS for end-users. Whereas previous work showed that the Signal messenger did not achieve this with its current session-management layer, we isolate the exact conditions that cause this failure, and why this cannot be simply solved in communication systems by implementing a different session-management layer or an entirely different protocol. Moreover, we clarify the trade-off of the maximum number of sessions between two users (40 in Signal) in terms of failure-resilience versus security. Our results have direct consequences for the design of future secure communication systems, and could motivate either the simplification of redundant mechanisms, or the improvement of session-management designs to provide better security trade-offs with respect to state loss/failure tolerance.
Metadata
- Available format(s)
- Category
- Cryptographic protocols
- Publication info
- Preprint.
- Keywords
- Security protocolsSecure messagingPost-Compromise SecurityPCSDouble RatchetResilienceState loss
- Contact author(s)
-
cremers @ cispa de
niklas medinger @ cispa de
aurora naska @ cispa de - History
- 2024-11-22: approved
- 2024-11-19: received
- See all versions
- Short URL
- https://ia.cr/2024/1886
- License
-
CC BY-SA
BibTeX
@misc{cryptoeprint:2024/1886, author = {Cas Cremers and Niklas Medinger and Aurora Naska}, title = {Impossibility Results for Post-Compromise Security in Real-World Communication Systems}, howpublished = {Cryptology {ePrint} Archive, Paper 2024/1886}, year = {2024}, url = {https://eprint.iacr.org/2024/1886} }