USENIX Security '16 - Analyzing Chosen Ciphertext Attacks on Apple iMessage

This paper examines vulnerabilities in Apple iMessage through chosen ciphertext attacks, highlighting potential security risks and implications.

USENIX Security '16 - Analyzing Chosen Ciphertext Attacks on Apple iMessage
USENIX
186 views β€’ Dec 3, 2021
USENIX Security '16 - Analyzing Chosen Ciphertext Attacks on Apple iMessage

About this video

Dancing on the Lip of the Volcano: Chosen Ciphertext Attacks on Apple iMessage

Christina Garman, Matthew Green, Gabriel Kaptchuk, Ian Miers, and Michael Rushanan, Johns Hopkins University

Apple’s iMessage is one of the most widely-deployed end-to-end encrypted messaging protocols. Despite its broad deployment, the encryption protocols used by iMessage have never been subjected to rigorous cryptanalysis. In this paper, we conduct a thorough analysis of iMessage to determine the security of the protocol against a variety of attacks. Our analysis shows that iMessage has significant vulnerabilities that can be exploited by a sophisticated attacker. In particular, we outline a novel chosen ciphertext attack on Huffman compressed data, which allows retrospective decryption of some iMessage payloads in less than 218 queries. The practical implication of these attacks is that any party who gains access to iMessage ciphertexts may potentially decrypt them remotely and after the fact. We additionally describe mitigations that will prevent these attacks on the protocol, without breaking backwards compatibility. Apple has deployed our mitigations in the latest iOS and OS X releases.

View the full USENIX Security '16 program at https://www.usenix.org/conference/usenixsecurity16/technical-sessions

Tags and Topics

Browse our collection to discover more content in these categories.

Video Information

Views

186

Likes

1

Duration

28:41

Published

Dec 3, 2021

Related Trending Topics

LIVE TRENDS

Related trending topics. Click any trend to explore more videos.