Open access
Datum
2022-05Typ
- Conference Paper
ETH Bibliographie
yes
Altmetrics
Abstract
We study the use of symmetric cryptography in the MTProto 2.0 protocol, Telegram's equivalent of the TLS record protocol. We give positive and negative results. On the one hand, we formally and in detail model a slight variant of Telegram's ``record protocol'' and prove that it achieves security in a suitable bidirectional secure channel model, albeit under unstudied assumptions; this model itself advances the state-of-the-art for secure channels. On the other hand, we first motivate our modelling deviation from MTProto as deployed by giving two attacks -- one of practical, one of theoretical interest -- against MTProto without our modifications. We then also give a third attack exploiting timing side channels, of varying strength, in three official Telegram clients. On its own this attack is thwarted by the secrecy of salt and id fields that are established by Telegram's key exchange protocol. To recover these, we chain the third attack with a fourth one against the implementation of the key exchange protocol on Telegram's servers. In totality, our results provide the first comprehensive study of MTProto's use of symmetric cryptography. Mehr anzeigen
Persistenter Link
https://doi.org/10.3929/ethz-b-000506353Publikationsstatus
publishedExterne Links
Buchtitel
2022 IEEE Symposium on Security and Privacy (SP)Seiten / Artikelnummer
Verlag
IEEEKonferenz
Thema
Applied cryptography; Protocol securityOrganisationseinheit
09653 - Paterson, Kenneth / Paterson, Kenneth
Anmerkungen
Conference lecture held on May 23, 2022ETH Bibliographie
yes
Altmetrics