David Leon Gil <[email protected]> writes:

> A new paper by Frosch et al. here: http://eprint.iacr.org/2014/904
>

I'm also not extremely concerned about the practical implications of
the attacks on this paper, but I really appreciated the paper because
it presented the TextSecure protocol in a way that can be analyzed and
audited.

I admit that I haven't searched too much but I haven't yet found a
document by the whispersystems team that presents the crypto protocol
in a way that can be analyzed by academics or security people (most
academics will not bother going through developer-facing protocol
documents). This paper has been the most consise description of the
protocol I know about, and if you know a better one please do tell me!

Just by skimming the paper, I learned some stuff about the textsecure
protocol that I didn't know about. For example, I didn't know about
"last resort" prekeys.

And I also didn't know that the TextSecure server encrypts messages
before sending them to the GCM server so that "Google's Cloud
Messaging servers will only be able to see the receipient [sic] but
not the sender of the message".

Furthremore, the security proof in section IV might serve as a good
start for further security proofs for the whole protocol.
_______________________________________________
Messaging mailing list
[email protected]
https://moderncrypto.org/mailman/listinfo/messaging

Reply via email to