Save 37% off PRO during our Black Friday Sale! »

End-to-end encryption: Behind the scenes

End-to-end encryption: Behind the scenes

Slides of a talk given by Diana Vasile and Martin Kleppmann at Strange Loop, St Louis, 16 September 2016.
http://thestrangeloop.com/2016/end-to-end-encryption-behind-the-scenes.html

Abstract:

There is no cloud — it's just someone else's computer. And you're storing all sorts of sensitive data on it, blindly trusting that this computer will only allow access to authorised users. What if it is compromised?

End-to-end encryption avoids having to trust the servers. Although PGP/GPG encrypted email never went mainstream, secure messaging apps like WhatsApp, Signal and iMessage have shown that it is feasible for millions of people to use end-to-end encryption without being security experts.

But how do these protocols actually work? In this talk, we will dig into the details of secure messaging protocols — to understand the threats against which they defend, and how cryptographic operations are combined to implement those defences in the protocol. If you have ever wondered what "forward secrecy" means, how key exchange works, or how protocols can ensure you're communicating with the right person (not an impostor like a "man in the middle"), this talk will clear things up.

We will also look at taking end-to-end encryption to other areas beyond instant messaging. What would it take to build an end-to-end secure version of Google Docs, for example?

References:

1. David Adrian, Karthikeyan Bhargavan, Zakir Durumeric, et al.: “Imperfect Forward Secrecy: How Diffie-Hellman Fails in Practice,” at 22nd ACM Conference on Computer and Communications Security (CCS), October 2015. https://weakdh.org/imperfect-forward-secrecy-ccs15.pdf

2. Nikita Borisov, Ian Goldberg, and Eric A Brewer: “Off-the-Record Communication, or, Why Not To Use PGP,” at ACM Workshop on Privacy in the Electronic Society (WPES), October 2004. https://otr.cypherpunks.ca/otr-wpes.pdf

3. Tilman Frosch, Christian Mainka, Christoph Bader, et al.: “How Secure is TextSecure?,” at 1st IEEE European Symposium on Security and Privacy (EuroS&P), March 2016. https://eprint.iacr.org/2014/904

4. Christina Garman, Matthew Green, Gabriel Kaptchuk, Ian Miers, and Michael Rushanan: “Dancing on the Lip of the Volcano: Chosen Ciphertext Attacks on Apple iMessage,” at 25th USENIX Security Symposium, August 2016. https://www.usenix.org/conference/usenixsecurity16/technical-sessions/presentation/garman

5. Hugo Krawczyk: “SIGMA: the “SIGn-and-MAc” Approach to Authenticated Diffie-Hellman and its Use in the IKE Protocols,” at 23rd Annual International Cryptology Conference (CRYPTO), August 2003. http://iacr.org/archive/crypto2003/27290399/27290399.pdf

6. Ben Laurie: “Certificate Transparency,” ACM Queue, volume 12, number 8, August 2014. http://queue.acm.org/detail.cfm?id=2668154

7. Moxie Marlinspike: “Advanced cryptographic ratcheting,” 26 November 2013. https://whispersystems.org/blog/advanced-ratcheting/

8. Marcela S Melara, Aaron Blankstein, Joseph Bonneau, Edward W Felten, and Michael J Freedman: “CONIKS: Bringing Key Transparency to End Users,” at 24th USENIX Security Symposium, August 2015. https://www.usenix.org/system/files/conference/usenixsecurity15/sec15-paper-melara.pdf

9. Wade Trappe and Lawrence C Washington: Introduction to Cryptography with Coding Theory, 2nd edition. Pearson, July 2005. ISBN: 978-0131862395

10. Nik Unger, Sergej Dechand, Joseph Bonneau, et al.: “SoK: Secure Messaging,” at 36th IEEE Symposium on Security and Privacy, May 2015. http://cacr.uwaterloo.ca/techreports/2015/cacr2015-02.pdf

11. “iOS Security White Paper,” Apple Inc., May 2016. http://www.apple.com/business/docs/iOS_Security_Guide.pdf

12. “WhatsApp Encryption Overview,” WhatsApp Inc., April 2016. https://www.whatsapp.com/security/WhatsApp-Security-Whitepaper.pdf

0d4ef9af8e4f0cf5c162b48ba24faea6?s=128

Martin Kleppmann

September 16, 2016
Tweet

Transcript

  1. None
  2. None
  3. None
  4. None
  5. None
  6. None
  7. None
  8. None
  9. None
  10. None
  11. None
  12. None
  13. None
  14. None
  15. None
  16. None
  17. None
  18. None
  19. None
  20. None
  21. None
  22. None
  23. None
  24. None
  25. None
  26. None
  27. None
  28. None
  29. None
  30. None
  31. None
  32. None
  33. None
  34. None
  35. None
  36. None
  37. None
  38. None
  39. None
  40. None
  41. None
  42. None
  43. None
  44. None
  45. None
  46. None
  47. None
  48. None
  49. None
  50. None
  51. None
  52. None
  53. None
  54. None
  55. None
  56. None
  57. None
  58. None
  59. None
  60. None
  61. None
  62. None
  63. None
  64. None
  65. None
  66. None
  67. None
  68. None
  69. None
  70. None
  71. None
  72. None
  73. None
  74. None
  75. None
  76. None
  77. None
  78. None
  79. None
  80. None
  81. None
  82. None
  83. None
  84. None
  85. None
  86. None
  87. None
  88. None
  89. None
  90. None
  91. None
  92. None
  93. None
  94. None
  95. References (1) 1.  David Adrian, Karthikeyan Bhargavan, Zakir Durumeric, et

    al.: “Imperfect Forward Secrecy: How Diffie-Hellman Fails in Practice,” at 22nd ACM Conference on Computer and Communications Security (CCS), October 2015. https://weakdh.org/imperfect-forward- secrecy-ccs15.pdf 2.  Nikita Borisov, Ian Goldberg, and Eric A Brewer: “Off-the-Record Communication, or, Why Not To Use PGP,” at ACM Workshop on Privacy in the Electronic Society (WPES), October 2004. https://otr.cypherpunks.ca/otr-wpes.pdf 3.  Tilman Frosch, Christian Mainka, Christoph Bader, et al.: “How Secure is TextSecure?,” at 1st IEEE European Symposium on Security and Privacy (EuroS&P), March 2016. https:// eprint.iacr.org/2014/904 4.  Christina Garman, Matthew Green, Gabriel Kaptchuk, Ian Miers, and Michael Rushanan: “Dancing on the Lip of the Volcano: Chosen Ciphertext Attacks on Apple iMessage,” at 25th USENIX Security Symposium, August 2016. https://www.usenix.org/conference/ usenixsecurity16/technical-sessions/presentation/garman 5.  Hugo Krawczyk: “SIGMA: the “SIGn-and-MAc” Approach to Authenticated Diffie-Hellman and its Use in the IKE Protocols,” at 23rd Annual International Cryptology Conference (CRYPTO), August 2003. http://iacr.org/archive/crypto2003/27290399/27290399.pdf 6.  Ben Laurie: “Certificate Transparency,” ACM Queue, volume 12, number 8, August 2014. http://queue.acm.org/detail.cfm?id=2668154
  96. References (2) 7.  Moxie Marlinspike: “Advanced cryptographic ratcheting,” 26 November

    2013. https:// whispersystems.org/blog/advanced-ratcheting/ 8.  Marcela S Melara, Aaron Blankstein, Joseph Bonneau, Edward W Felten, and Michael J Freedman: “CONIKS: Bringing Key Transparency to End Users,” at 24th USENIX Security Symposium, August 2015. https://www.usenix.org/system/files/conference/usenixsecurity15/ sec15-paper-melara.pdf 9.  Wade Trappe and Lawrence C Washington: Introduction to Cryptography with Coding Theory, 2nd edition. Pearson, July 2005. ISBN: 978-0131862395 10. Nik Unger, Sergej Dechand, Joseph Bonneau, et al.: “SoK: Secure Messaging,” at 36th IEEE Symposium on Security and Privacy, May 2015. http://cacr.uwaterloo.ca/techreports/2015/ cacr2015-02.pdf 11. “iOS Security White Paper,” Apple Inc., May 2016. http://www.apple.com/business/docs/ iOS_Security_Guide.pdf 12. “WhatsApp Encryption Overview,” WhatsApp Inc., April 2016. https://www.whatsapp.com/ security/WhatsApp-Security-Whitepaper.pdf
  97. Book Signing Saturday 12:00 O’Reilly Booth