USENIX Security '16 - Analyzing Chosen Ciphertext Attacks on Apple iMessage
This paper examines vulnerabilities in Apple iMessage through chosen ciphertext attacks, highlighting potential security risks and implications.

USENIX
186 views β’ Dec 3, 2021

About this video
Dancing on the Lip of the Volcano: Chosen Ciphertext Attacks on Apple iMessage
Christina Garman, Matthew Green, Gabriel Kaptchuk, Ian Miers, and Michael Rushanan, Johns Hopkins University
Appleβs iMessage is one of the most widely-deployed end-to-end encrypted messaging protocols. Despite its broad deployment, the encryption protocols used by iMessage have never been subjected to rigorous cryptanalysis. In this paper, we conduct a thorough analysis of iMessage to determine the security of the protocol against a variety of attacks. Our analysis shows that iMessage has significant vulnerabilities that can be exploited by a sophisticated attacker. In particular, we outline a novel chosen ciphertext attack on Huffman compressed data, which allows retrospective decryption of some iMessage payloads in less than 218 queries. The practical implication of these attacks is that any party who gains access to iMessage ciphertexts may potentially decrypt them remotely and after the fact. We additionally describe mitigations that will prevent these attacks on the protocol, without breaking backwards compatibility. Apple has deployed our mitigations in the latest iOS and OS X releases.
View the full USENIX Security '16 program at https://www.usenix.org/conference/usenixsecurity16/technical-sessions
Christina Garman, Matthew Green, Gabriel Kaptchuk, Ian Miers, and Michael Rushanan, Johns Hopkins University
Appleβs iMessage is one of the most widely-deployed end-to-end encrypted messaging protocols. Despite its broad deployment, the encryption protocols used by iMessage have never been subjected to rigorous cryptanalysis. In this paper, we conduct a thorough analysis of iMessage to determine the security of the protocol against a variety of attacks. Our analysis shows that iMessage has significant vulnerabilities that can be exploited by a sophisticated attacker. In particular, we outline a novel chosen ciphertext attack on Huffman compressed data, which allows retrospective decryption of some iMessage payloads in less than 218 queries. The practical implication of these attacks is that any party who gains access to iMessage ciphertexts may potentially decrypt them remotely and after the fact. We additionally describe mitigations that will prevent these attacks on the protocol, without breaking backwards compatibility. Apple has deployed our mitigations in the latest iOS and OS X releases.
View the full USENIX Security '16 program at https://www.usenix.org/conference/usenixsecurity16/technical-sessions
Tags and Topics
Browse our collection to discover more content in these categories.
Video Information
Views
186
Likes
1
Duration
28:41
Published
Dec 3, 2021
Related Trending Topics
LIVE TRENDSRelated trending topics. Click any trend to explore more videos.