Verification of LINE Encryption Version 1.0 Using ProVerif

1Citations
Citations of this article
10Readers
Mendeley users who have this article in their library.
Get full text

Abstract

LINE is currently the most popular messaging service in Japan. Communications using LINE are protected by the original encryption scheme, called LINE Encryption, and specifications of the client-to-server transport encryption protocol and the client-to-client message end-to-end encryption protocol are published by the Technical Whitepaper. Though a spoofing attack (i.e., a malicious client makes another client misunderstand the identity of the peer) and a reply attack (i.e., a message in a session is sent again in another session by a man-in-the-middle adversary, and the receiver accepts these messages) to the end-to-end protocol have been shown, no formal security analysis of these protocols is known. In this paper, we show a formal verification result of secrecy of application data and authenticity for protocols of LINE Encryption (Version 1.0) by using the automated security verification tool ProVerif. Especially, since it is claimed that the transport protocol satisfies forward secrecy (i.e., even if the static private key is leaked, security of application data is guaranteed), we verify forward secrecy for client’s data and for server’s data of the transport protocol, and we find an attack to break secrecy of client’s application data. Moreover, we find the spoofing attack and the reply attack, which are reported in previous papers.

Cite

CITATION STYLE

APA

Shi, C., & Yoneyama, K. (2018). Verification of LINE Encryption Version 1.0 Using ProVerif. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 11049 LNCS, pp. 158–173). Springer Verlag. https://doi.org/10.1007/978-3-319-97916-8_11

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free