On the Pitfalls of End-to-End Encrypted Communications: A Study of Remote Key-Fingerprint Verification Maliheh Shirvanian Nitesh Saxena Jesvin James George University of Alabama at Birmingham University of Alabama at Birmingham University of Alabama at Birmingham Birmingham, Alabama Birmingham, Alabama Birmingham, Alabama
[email protected] [email protected] [email protected] ABSTRACT KEYWORDS Many widely used Internet messaging and calling apps, such as end-to-end encryption; fingerprint verification; key exchange vali- WhatsApp, Viber, Telegram, and Signal, have deployed an end-to- dation; mobile app security end encryption functionality. To defeat potential man-in-the-middle attackers against the key exchange protocol, the approach crucially relies upon users to perform a code verification task whereby each 1 INTRODUCTION user must compare the code (a fingerprint of the cryptographic keys) computed by her app with the one computed by the other Many widely deployed Internet-based messaging and calling ap- user’s app and reject the session if the two codes do not match. plications, such as WhatsApp [14], Viber [12], Telegram [10] and In this paper, we study the security and usability of this human- Signal [8], have deployed an end-to-end encryption (E2EE) feature, centered code verification task for a prominent setting where the to hide the communications from the attackers and even from the end users are remotely located, and compare it as a baseline to a service providers. Using this approach, all the communication be- potentially less frequent scenario where the end users are in close tween the end users gets encrypted/authenticated with a key held proximity.