End-to-End Encrypted Messaging Protocols: An Overview Kseniia Ermoshina, Francesca Musiani, Harry Halpin To cite this version: Kseniia Ermoshina, Francesca Musiani, Harry Halpin. End-to-End Encrypted Messaging Protocols: An Overview. Third International Conference, INSCI 2016 - Internet Science, Sep 2016, Florence, Italy. pp.244 - 254, 10.1007/978-3-319-45982-0_22. hal-01426845 HAL Id: hal-01426845 https://hal.inria.fr/hal-01426845 Submitted on 5 Jan 2017 HAL is a multi-disciplinary open access L’archive ouverte pluridisciplinaire HAL, est archive for the deposit and dissemination of sci- destinée au dépôt et à la diffusion de documents entific research documents, whether they are pub- scientifiques de niveau recherche, publiés ou non, lished or not. The documents may come from émanant des établissements d’enseignement et de teaching and research institutions in France or recherche français ou étrangers, des laboratoires abroad, or from public or private research centers. publics ou privés. End-to-end Encrypted Messaging Protocols: An Overview Ksenia Ermoshina1, Francesca Musiani2, and Harry Halpin3 1 i3-CSI, MINES ParisTech, France [email protected] 2 ISCC, CNRS/Paris-Sorbonne/UPMC, France [email protected] 3INRIA, France [email protected] Abstract.This paper aims at giving an overview of the different core proto- cols used for decentralized chat and email-oriented services. This work is part of a survey of 30 projects focused on decentralized and/or end-to-end encrypted internet messaging, currently conducted in the early stages of the H2020 CAPS project NEXTLEAP. Keywords: Decentralization; end-to-end encryption; messaging; protocols; NEXTLEAP Exploratory/Survey Paper 1. Introduction This exploratory paper first gives an overview of the different core protocols subtend- ing the development of end-to-end encrypted internet messaging (chat and email- oriented) services. In its second part, the paper outlines initial findings of a survey of thirty decentralized and/or end-to-end encrypted projects. The paper also presents the methodological opportunities and challenges of studying such systems with social sciences tools. Currently, end-to-end encrypted messaging has risen to prominence, with the adoption of end-to-end encrypted messaging by large proprietary applications such as WhatsApp or Facebook Messenger, and the interest in securing communication priva- cy provoked by the Snowden revelations. In “end-to-end” encrypted messaging, the server that hosts messages for a user or any third-party adversary that intercepts data as the message is en route cannot read the message content due to the use of encryp- tion. The “end” in “end-to-end” encryption refers to the “endpoint,” which in the case of messaging is the client device of the user rather than the server. However, open standards for encrypted e-mail and chat are still not seeing wide- spread use, and a new generation of end-to-end encrypted messaging protocols offer- ing better security properties are rapidly gaining traction, although most are not yet standardized or decentralized. The academic cryptographic community has renewed impetus post-Snowden to rigorously engage with the “secure messaging problem in the untrusted-server model,” a problem that until recently “feels almost intentionally pushed aside” although the problem is perhaps “the most fundamental privacy prob- lem in cryptography: how can parties communicate in such a way that nobody knows who said what” [1]. While the security research community has already began to overview the technical details of these protocols [2], what is missing from the tech- nical work currently in progress is the needs and expectations of users when using encrypted end-to-end messaging applications. An ongoing study on the use of encryption and decentralized communication tools is being conducted via the H2020 CAPS (Collective Awareness Project) project NEXt-generation Techno-social Legal Encryption Access and Privacy (NEXTLEAP).1 NEXTLEAP seeks to address, in an interdisciplinary manner, the recent erosion of public trust in the Internet as a secure means of communication that has been prompted by the Snowden revelations. The core objective of NEXTLEAP is to improve, create, validate, and deploy communication protocols that can serve as pillars for a secure, trust-worthy and privacy-respecting Internet able to ensure citi- zens‟ fundamental rights. For this purpose, NEXTLEAP seeks to develop an interdis- ciplinary internet science of decentralization as the basis on which these protocols can not only be built, but become fully (and meaningfully) embedded in society. In this regard, the social aspect of end-to-end encryption must be included in the overall analysis of trust and decentralization at the heart of Internet Science. The two main kinds of projects that we seek to examine are related to email and chat clients (also called “instant messaging” clients), both of which are considered to be particular cases of messaging. Historically, e-mail is considered asynchronous messaging, where a user does not have to be online to receive the message, while chat is considered asynchronous messaging, where a user has to be online to receive the message. However, in general these distinctions are blurring as any popular chat protocols now support asynchronous messaging. The remainder of this paper presents a genealogy of these fundamental protocols used for email and chat-oriented services, and then moves on to present preliminary findings and open questions. 2. E-mail Protocols Email is based on standardized and open protocols descended insofar as the fun- damental protocols allow interoperability between different email servers, so that a Microsoft server can send email to a Google server. Classically, as revealed by the PRISM program of the NSA, e-mail is sent unencrypted and so the server has full access to the content of e-mail. Thus, there has been a long-standing program to send email “end-to-end” encryption. SMTP (Simple Mail Transfer Protocol) is the protocol originally used for transfer- ring email and as such is one of the oldest standards for asynchronous messaging, first 1 https://nextleap.eu 2 defined in 1982 by the IETF2 and by default not having provision for content confi- dentiality using end-to-end encryption. PGP (Pretty Good Privacy) was created to add end-to-end encryption capabilities to e-mail in 1991 by Phil Zimmerman. In part due to pressure from the U.S. government, and in part due to patent claims by RSA Cor- poration, Phil Zimmerman pushed PGP to become an IETF standard. The OpenPGP set of standards was finally defined in 1997, to allow the open implementation of PGP. OpenPGP is implemented in open-source software such as Thunderbird with the Enigmail plug-in as well as in mobile apps, such as the IPGMail for iOS and the Openkeychain key management system for Android and F-Droid. GPG (GnuGPG) is a free software implementation of the OpenPGP standards developed by Free Soft- ware Foundation in 1999 and compliant with the OpenPGP standard specifications, serving as the free software foundation for most modern PGP-enabled applications. Recently, the IETF has recently opened up the OpenPGP Working Group in order to allow the fundamental algorithms to be upgraded and to use more modern crypto- graphic primitives, such as larger keys. S/MIME3 is another IETF standard addressing the need for encrypting e-mail. In contrast to PGP that is based on a decentralized “Web of Trust” between users who accept and sign each others keys (and so “offloads” the complexity of key manage- ment to the end-user), S/MIME uses a centralized public key infrastructure to manage keys. Thus, while it has been adopted by some large centralized institutions, it has had much less success among the general public and so is not part of the study. The problem with implementations of OpenPGP such as GPG is that they are dif- ficult for most users to understand and use, especially in terms of usage and key man- agement [3]. These problems extend to security: if an adversary compromises a user‟s private key, this allows all encrypted messages to be read. In general, while OpenPGP has had a resurgence of interest since 2013, it has not had as much deployment by ordinary users due to the aforementioned issues around user-friendliness and the fact that OpenPGP expects the users to understand the fundamentals of cryptography, such as public and private keys. 3. Chat Protocols Unlike e-mail that is started as high-latency and asynchronous messaging, chat protocols began as low-latency synchronous messaging, although recently the line has become more blurred as many chat protocols allow asynchronous message delivery. There has long been an intuition that more and more messaging is moving from e- mail to messaging, although it seems that e-mail is still widely used. XMPP (eXtensible Message and Presence Protocol) became an IETF (Internet Engineering Task Force) standard in 2004 for chat, and is probably the most widely used standardized chat protocol. XMPP is a federated standard that “provides a tech- nology for the asynchronous, end-to-end exchange of structured data by means of direct, persistent XML streams among a distributed network of globally addressable, 2https://tools.ietf.org/html/rfc821 3https://tools.ietf.org/html/rfc3851 presence-aware clients and servers.”4 There are many implementations of the XMPP specifications, with the XMPP Foundation giving a list of 70 clients and 25 servers using the XMPP protocol.5 Jabber.org is the original instant messaging service based on XMPP, and it is now one of the biggest nodes on the XMPP network. XMPP traf- fic or content are not encrypted by default, although network-level encryption security using SASL and TLS has been built into the core. In addition, as claimed by the XMPP foundation, a team of developers is working on an upgrade of the standard to support end-to-end encryption.6 The OTR (Off-the-Record) protocol released in 2004 is an extension to XMPP to provide end-to-end encryption.
Details
-
File Typepdf
-
Upload Time-
-
Content LanguagesEnglish
-
Upload UserAnonymous/Not logged-in
-
File Pages12 Page
-
File Size-