• Corpus ID: 26205922

Security analysis of end-to-end encryption in Telegram

@inproceedings{Lee2017SecurityAO,
  title={Security analysis of end-to-end encryption in Telegram},
  author={Jeeun Lee and Rakyong Choi and Sungsook Kim and Kwangjo Kim},
  year={2017}
}
Telegram is known as one of the most popular instant messaging (IM) services for secure communications. It features end-to-end encryption (E2EE) in secret chats based on their customised protocol called MTProto. This brand new protocol is believed as a safe alternative among the public, however, it is in doubt and has not been fully reviewed by cryptanalytic experts. It is theoretically demonstrated in 2015 that MTProto does not meet indistinguishability under chosen ciphertext attack (IND-CCA… 

Figures and Tables from this paper

A survey on the security protocols employed by mobile messaging applications
TLDR
This paper presents the two protocols underlying MTProto and Signal and examines from the point of view of the primitive cryptographic security used and how the authenticated encryption, key derivation and asynchronous messaging are performed.
A Survey Of the Privacy Preferences and Practices of Iranian Users of Telegram
TLDR
It is found that the overwhelming majority of respondents feel it is important that messaging applications protect the privacy of their messages, yet their adoption of the available privacy and security features is mixed, and recommendations for improving the design of Telegram and similar secure messaging applications so that they place a greater priority on protecting privacy are discussed.
Verifpal: Cryptographic Protocol Analysis for the Real World
TLDR
Through Verifpal, it is shown that advanced verification with formalized semantics and sound logic can exist without any expense towards the convenience of real-world practitioners.
ADOPTION OF WHATSAPP AND TELEGRAM IN INDIA
TLDR
This article analyzes the penetration performance of WhatsApp and Telegram in India and the focus is to create technology awareness among the users of these two competitors.
Human Detecting Sensors and End-To-End Security Model for Design and Manufacturing of IoT-Based Disinfectant Sanitizer Tunnel: An Innovation Against Covid-19
TLDR
A strong IoT-based disinfectant tunnel which is used to disinfect external surface of objects, clothes, or even human skin to provide protection against COVID-19 in social or public places such as malls, schools, hospitals, airports, and offices is described.
Regulatory framework creation analysis to reduce security risks the use of social media in companies
TLDR
A regulatory framework can serve as a basis for establishing company internal policies for the use of social media by its employees and will help companies that have the maximum ability in the field of information technology to overcome this challenge.
Analyzing the Influence of Free-Riding Behaviour and Approaches to Overcoming it in Peer-to-peer System
TLDR
This paper offers solutions with the free-riding behavior of users introducing various mechanisms which would force users to actively participate in contribution to the P2P system.
Ethereum Whisper 기반의 안전한 모바일 메신저
현재 많은 사람들이 주로 사용하는 모바일 메신저는 중앙 집중형 서버를 이용하고 있다. 서버를 거쳐서 전송되는 메시지 내용은 서버에 일정 시간 보관된다. 따라서 데이터를 보관한 서버가 해킹될 경우 저장된 데이터에 대한 안전이 보장되지 않는다. 기존의 모바일 메신저에서는 공격자에 의해, 혹은 내부자에 의해서 서버에 저장된 데이터가 유출될 경우 이에 따르는
Post-Quantum Security of IGE Mode Encryption in Telegram

References

SHOWING 1-10 OF 10 REFERENCES
On the CCA (in)Security of MTProto
TLDR
An audit of Telegram's Android source code found that the symmetric encryption scheme used in Telegram is not IND-CCA secure, since it is possible to turn any ciphertext into a different ciphertext that decrypts to the same message.
On Message Integrity in Symmetric Encryption
TLDR
The practical use of the dominance relation and lattice in defning the relative strength of diferent integrity notions is illustrated with common modes of encryption, and simple, non-cryptographic, manipulation detection code functions, such as bitwise exclusive-or and constant functions.
Who can survive in CAESAR competition at round-zero?
TLDR
This paper analyzes Authenticated Encryption modes submitted to NIST and predicts the essential features of the submissions to survive CAESAR competition.
A Formal Security Analysis of the Signal Messaging Protocol
TLDR
This work extracts from the implementation a formal description of the abstract protocol, and defines a security model which can capture the "ratcheting" key update structure, and proves the security of Signal's core in this model, demonstrating several standard security properties.
Does Encryption with Redundancy Provide Authenticity?
TLDR
This work considers various possible notions of privacy for the base encryption scheme, and provides a condition on the redundancy function that is necessary and sufficient to ensure authenticity of the encryption-with-redundancy scheme.
Encode-Then-Encipher Encryption: How to Exploit Nonces or Redundancy in Plaintexts for Efficient Cryptography
We investigate the following approach to symmetric encryption: first encode the message via some keyless transform, and then encipher the encoded message, meaning apply a permutation FK based on a
Authenticated Encryption: Relations among Notions and Analysis of the Generic Composition Paradigm
TLDR
This work considers two possible notions of authenticity for authenticated encryption schemes, namely integrity of plaintexts and integrity of ciphertexts, and relates them to the standard notions of privacy IND-CCA and NM-CPA by presenting implications and separations between all notions considered.
Design and specification of cryptographic capabilities
  • C. Campbell
  • Computer Science, Mathematics
    IEEE Communications Society Magazine
  • 1978
TLDR
Data secrecy, with or without data authentication, is provided by block encryption or data stream encryption techniques, and total systems security may be provided on a linkby-link, node-by-node, or end-to-end basis, depending upon the nature of the application.
Finding Collisions in the Full SHA-1
TLDR
This is the first attack on the full 80-step SHA-1 with complexity less than the 280 theoretical bound, and it is shown that collisions ofSHA-1 can be found with complexityLess than 269 hash operations.
A practical cryptanalysis of the Telegram messaging protocol
  • Master’s thesis, Aarhus University, 2015.
  • 2015