1
0

Upload files to 'content/posts/tech'

This commit is contained in:
Olivier 2023-01-09 15:27:50 +01:00
parent e5898f49f1
commit d3c035d6af

View File

@ -0,0 +1,34 @@
---
title: "Threema: analysis of a secure messenger"
date: 2023-01-09T14:41:00+01:00
draft: false
tags: ["encryption","tech","Instant Messenger"]
author: "9x0rg"
hidemeta: false
ShowReadingTime: true
ShowPostNavLinks: true
showtoc: false
cover:
image: "/images/"
alt: "<alt text>"
caption: "<text>"
---
Threema is a Swiss encrypted messaging application which has been widely advertised as a secure alternative to Signal, WhatsApp or Wire. Threema claims It has more than 10 million users and more than 7,000 on-premise customers. Prominent users of Threema include the Swiss Government, the Swiss Army and the current Chancellor of Germany, Olaf Scholz.
A group of academic researchers from the [Applied Cryptography](https://appliedcrypto.ethz.ch/) Group at ETH Zurich (Swiss Federal Institute of Technology) presents [seven attacks against the cryptographic protocols](https://breakingthe3ma.app/) used by Threema in three distinct threat models.
Seems the researchers were quite happy with the outcome as they claim that *all the attacks are accompanied by proof-of-concept implementations that demonstrate their feasibility in practice*.
"Don't roll your own crypto" is already a classic - except for Telegram maybe. This mantra should be extended "don't roll your own cryptographic protocol" they write.
## Key Takeaway
> There are some principles well-known in the research community which have not fully made their way into the community of developers using cryptography.
>
> 1. **Using modern, secure libraries for cryptographic primitives does not, on its own, lead to a secure protocol design**: libraries such as NaCl or libsignal can be misused while building more complex protocols and developers must be wary not to be lulled into a false sense of security. While the mantra "don't roll your own crypto" is now widely known, it should be extended to "don't roll your own cryptographic protocol" (assuming one already exists that meets the developer's requirements). In the case of Threema, the bespoke **C2S protocol could be replaced by TLS**.
>
>
> 2. **Beware of cross-protocol interactions**: even if a protocol on its own is considered secure, there is no a priori guarantee that it will be secure when composed with other protocols. Cross-protocol interactions can undermine the original security guarantees, as we have shown with the vouch box forgery and Kompromat attacks. Such bad interactions can be prevented by **following the key separation principle** which states that a system should use **different keys for different purposes**.
>
> 3. **Proactive, not reactive security**: our inability to find an attack on a protocol does not imply it is secure. New attacks could be found at any moment and known attacks only get stronger over time if left unaddressed. Often, secure systems and protocols follow a design-release-break-patch process (a reactive approach). This is inconvenient for users and often requires the maintenance of backwards compatibility. Developers should instead adopt a proactive approach, where **the system or protocol is formally analyzed during the design stage**.
Report: [Three Lessons from Threema](https://breakingthe3ma.app/) (.pdf) by Prof. Kenneth G. Paterson, Matteo Scarlata, Kien Tuong Truong