End-to-end encryption
End-to-end encryption (E2EE) is a system of communication where only the communicating users can read the messages. In principle, it prevents potential eavesdroppers – including telecom providers, Internet providers, and even the provider of the communication service – from being able to access the cryptographic keys needed to decrypt the conversation.[1] The systems are designed to defeat any attempts at surveillance and/or tampering because no third parties can decipher the data being communicated or stored. For example, companies that use end-to-end encryption are unable to hand over texts of their customers' messages to the authorities.[2]
Key exchange
In an E2EE system, encryption keys must only be known to the communicating parties. To achieve this goal, E2EE systems can encrypt data using a pre-arranged string of symbols, called a pre-shared secret (PGP), or a one-time secret derived from such a pre-shared secret (DUKPT). They can also negotiate a secret key on the spot using Diffie-Hellman key exchange (OTR).[3]
Modern usage
Examples of end-to-end encryption include PGP, GnuPG, Protonmail, S/MIME, or pEp for email; OTR, iMessage, Signal, Threema, or WhatsApp for instant messaging; ZRTP or FaceTime for telephony; Google Duo or Wire for videotelephony; and TETRA for radio.
As of 2016, typical server-based communications systems do not include end-to-end encryption. These systems can only guarantee the protection of communications between clients and servers, meaning that users have to trust the third-parties who are running the servers with the original texts. End-to-end encryption is regarded as safer because it reduces the number of parties who might be able to interfere or break the encryption.[4] In the case of instant messaging, users may use a third party client (e.g. Pidgin) to implement an end-to-end encryption scheme (e.g. OTR) over an otherwise non-E2EE protocol.[5]
Some non-E2EE systems, for example Lavabit and Hushmail, have described themselves as offering "end-to-end" encryption when they did not.[6] Other systems, such as Telegram and Google Allo, have been criticized for not having the end-to-end encryption that they offer enabled by default.[7][8]
Some backup services such as SpiderOak and Tresorit provide client-side encryption. The encryption they offer is not referred to as end-to-end encryption, because the services are not meant for communication between users.
Challenges
Man-in-the-Middle attacks
End-to-end encryption ensures that data is transferred securely between endpoints. But, rather than try to break the encryption, an eavesdropper may impersonate a message recipient (during key exchange or by substituting his public key for the recipient's), so that messages are encrypted with a key known to the attacker. After decrypting the message, the snoop can then encrypt it with a key that he/she shares with the actual recipient, or his/her public key in case of asymmetric systems, and send the message on again to avoid detection. This is known as a man-in-the-middle attack.[1][9]
Authentication
Most end-to-end encryption protocols include some form of endpoint authentication specifically to prevent MITM attacks. For example, one could rely on certification authorities or a web of trust.[10] An alternative technique is to generate cryptographic hashes (fingerprints) based on the communicating users’ public keys or shared secret keys. The parties compare their fingerprints using an outside (out-of-band) communication channel that guarantees integrity and authenticity of communication (but not necessarily secrecy), before starting their conversation. If the fingerprints match, there is in theory, no man in the middle.[1]
When displayed for human inspection, fingerprints are usually encoded into hexadecimal strings. These strings are then formatted into groups of characters for readability. For example, a 128-bit MD5 fingerprint would be displayed as follows:
43:51:43:a1:b5:fc:8b:b7:0a:3a:a9:b1:0f:66:73:a8
Some protocols display natural language representations of the hexadecimal blocks.[11] As the approach consists of a one-to-one mapping between fingerprint blocks and words, there is no loss in entropy. The protocol may choose to display words in the user's native (system) language.[11] This can, however, make cross-language comparisons prone to errors.[12] In order to improve localization, some protocols have chosen to display fingerprints as base 10 strings instead of hexadecimal or natural language strings.[13][12] Modern messaging applications can also display fingerprints as QR codes that users can scan off each other's devices.[13]
Endpoint security
The end-to-end encryption paradigm does not directly address risks at the communications endpoints themselves. Each users’ computer can still be hacked to steal his or her cryptographic key (to create a MITM attack) or simply read the recipients’ decrypted messages. Even the most perfectly encrypted communication pipe is only as secure as the mailbox on the other end.[1]
Backdoors
Companies may also willingly or unwillingly introduce back doors to their software that help subvert key negotiation or bypass encryption altogether. In 2013, information leaked by Edward Snowden showed that Skype had a back door which allowed Microsoft to hand over their users' messages to the NSA despite the fact that those messages were officially end-to-end encrypted.[14][15]
See also
- Comparison of instant messaging clients#Secure messengers – a table overview of instant messaging clients that offer end-to-end encryption
- Comparison of instant messaging protocols
- Comparison of VoIP software#Secure VoIP software – a table overview of VoIP clients that offer end-to-end encryption
- Client-side encryption – the encryption of data before it is transmitted to a server
- Point to Point Encryption
References
- 1 2 3 4 "Hacker Lexicon: What Is End-to-End Encryption?". WIRED. Retrieved 22 December 2015.
- ↑ McLaughlin, Jenna (21 December 2015). "Democratic Debate Spawns Fantasy Talk on Encryption". The Intercept.
- ↑ Chris Alexander, Ian Avrum Goldberg (February 2007). "Improved User Authentication in Off-The-Record Messaging" (PDF). Proceedings of the 2007 ACM workshop on Privacy in electronic society. New York: Association for Computing Machinery: 41–47. doi:10.1145/1314333.1314340.
- ↑ "End-to-End Encryption". EFF Surveillance Self-Defence Guide. Electronic Frontier Foundation. Retrieved 2 February 2016.
- ↑ "How to: Use OTR for Windows". EEF Surveillance Self-Defence Guide. Electronic Frontier Foundation. Retrieved 2 February 2016.
- ↑ Grauer, Yael. "Mr. Robot Uses ProtonMail, But It Still Isn't Fully Secure". WIRED.
- ↑ "Why Telegram's security flaws may put Iran's journalists at risk". Committee to Protect Journalists. 31 May 2016. Retrieved 23 September 2016.
- ↑ Hackett, Robert (21 May 2016). "Here's Why Privacy Savants Are Blasting Google Allo". Fortune. Time Inc. Retrieved 23 September 2016.
- ↑ Schneier, Bruce; Ferguson, Niels; Kohno, Tadayoshi (2010). Cryptography engineering : design principles and practical applications. Indianapolis, IN: Wiley Pub., inc. p. 183. ISBN 978-0470474242.
- ↑ "What is man-in-the-middle attack (MitM)? - Definition from WhatIs.com". IoT Agenda. Retrieved 7 January 2016.
- 1 2 "pEp White Paper" (PDF). pEp Foundation Council. 18 July 2016. Retrieved 11 October 2016.
- 1 2 Marlinspike, Moxie (5 April 2016). "WhatsApp's Signal Protocol integration is now complete". Open Whisper Systems. Retrieved 11 October 2016.
- 1 2 Budington, Bill (7 April 2016). "WhatsApp Rolls Out End-To-End Encryption to its Over One Billion Users". Deeplinks Blog. Electronic Frontier Foundation. Retrieved 11 October 2016.
- ↑ Goodin, Dan (20 May 2013). "Think your Skype messages get end-to-end encryption? Think again". Ars Technica.
- ↑ Greenwald, Glenn; MacAskill, Ewen; Poitras, Laura; Ackerman, Spencer; Rushe, Dominic (12 July 2013). "Microsoft handed the NSA access to encrypted messages". the Guardian.
Further reading
- Ermoshina, Ksenia; Musiani, Francesca; Halpin, Harry (September 2016). "End-to-End Encrypted Messaging Protocols: An Overview". In Bagnoli, Franco; et al. Internet Science. INSCI 2016. Florence, Italy: Springer. pp. 244–254. doi:10.1007/978-3-319-45982-0_22. ISBN 978-3-319-45982-0.