Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Brigham Young University

Authentication

2019

Articles 1 - 1 of 1

Full-Text Articles in Physical Sciences and Mathematics

Automatic Detection And Prevention Of Fake Key Attacks In Signal, Tarun Kumar Yadav Dec 2019

Automatic Detection And Prevention Of Fake Key Attacks In Signal, Tarun Kumar Yadav

Theses and Dissertations

The Signal protocol provides end-to-end encryption for billions of users in popular instant messaging applications like WhatsApp, Facebook Messenger, and Google Allo. The protocol relies on an app-specific central server to distribute public keys and relay encrypted messages between the users. Signal prevents passive attacks. However, it is vulnerable to some active attacks due to its reliance on a trusted key server. A malicious key server can distribute fake keys to users to perform man-in-the-middle or impersonation attacks. Signal applications support an authentication ceremony to detect these active attacks. However, this places an undue burden on the users to manually …