On the security of AEAD scheme is recommended for use in Signal protocol

Authors

  • Nguyen Tuan Anh
  • Trieu Quang Phong

DOI:

https://doi.org/10.54654/isj.v1i21.1028

Keywords:

AEAD, authenticated encryption, Signal

Tóm tắt

Abstract In this paper, we provide a security assessment for the authenticated encryption mode used in the recommendation of the Signal protocol. Furthermore, we found how tags are computed in Signal’s guidance differs slightly from the cited documentation. Our evaluation suggests how to choose the IV value to reduce the data storage space in the Signal protocol.

Downloads

Download data is not yet available.

References

Alwen, J., S. Coretti, and Y. Dodis. The double ratchet: security notions, proofs, and modularization for the signal protocol. in Annual International Conference on the Theory and Applications of Cryptographic Techniques. 2019. Springer.

Rogaway, P. and T. Shrimpton. A provable-security treatment of the key-wrap problem. in Annual international conference on the theory and applications of cryptographic techniques. 2006. Springer.

Rogaway, P. Authenticated-encryption with associated-data. in Proceedings of the 9th ACM Conference on Computer and Communications Security. 2002.

Rogaway, P., Evaluation of some blockcipher modes of operation. Cryptography Research and Evaluation Committees (CRYPTREC) for the Government of Japan, 2011. 630.

Bellare, M. New proofs for NMAC and HMAC: Security without collision-resistance. in Annual International Cryptology Conference. 2006. Springer.

Wang, X., Y.L. Yin, and H. Yu, Collision search attacks on SHA1. 2005, Feb.

Rijmen, V. and E. Oswald. Update on SHA-1. in Topics in Cryptology–CT-RSA 2005: The Cryptographers’ Track at the RSA Conference 2005, San Francisco, CA, USA, February 14-18, 2005. Proceedings. 2005. Springer.

Manuel, S., Classification and generation of disturbance vectors for collision attacks against SHA-1. Designs, Codes and Cryptography, 2011. 59(1-3): p. 247-263.

Blog, G.S., Announcing the first SHA1 collision. 2017.

Leurent, G. and T. Peyrin. {SHA-1} is a shambles: First {Chosen-Prefix} collision on {SHA-1} and application to the {PGP} web of trust. in 29th USENIX Security Symposium (USENIX Security 20). 2020.

Long, N. V. (2020). Phân tích các thành phần mật mã trong hoán vị Keccak-p. Journal of Science and Technology on Information Security, 8(2), 34-45. https://doi.org/10.54654/isj.v8i2.31

Nguyen, A.T. and C.B. Nguyen, A new proof for the security of the keyed Sponge construction in the ideal compression function model. Journal of Science and Technology on Information security, 2019. 10(2): p. 18-24.

https://github.com/signalapp/libsignal-protocol-c.

Downloads

Abstract views: 151 / PDF downloads: 50

Published

2024-06-28

How to Cite

Anh, N. T., & Phong, T. Q. (2024). On the security of AEAD scheme is recommended for use in Signal protocol. Journal of Science and Technology on Information Security, 1(21), 67-74. https://doi.org/10.54654/isj.v1i21.1028

Issue

Section

Papers