Examining Authentication Properties of End-to-End (E2E) Encryption: Secure messaging
applications provide billions of users with E2E encryption to ensure message privacy. A long list
of applications provides this service, including WhatsApp, iMessage, Facebook Messenger, Skype, Signal, etc. The application’s underlying encryption protocols vary, though many use the Signal protocol or some derivation. These protocols offer many security properties, including confidentiality, deniability, forward and future secrecy, etc.
Our recent work demonstrates that Signal (and its derivative) protocols are susceptible to man-in-the-middle (MITM) attacks, and thus we propose automatic techniques to defend against them [8]. Similarly, other security properties offered by Signal also warrant attention. For instance, cryptographic deniability allows the sender of a message to deny they sent it with no cryptographic evidence to refute their claim. However, deniability requires social and legal acceptance to be effective. Senders unaware of whether a system supports deniability will be unable to use it. Moreover, users aware that an app supports deniability may have a false sense of security if they do not understand deniability’s social or legal acceptance. This can lead to a conundrum where Aisha claims that she received a message ‘m’ from Dinesh, but he denies sending the message. In our initial multi-perspective, multi-methods study of user perceptions and expectations of deniability, we highlight such inconsistencies that can lead to different social engineering attacks [29]. I aim to pursue research in usability security, with a special focus on the Indian population, given the vast number of heterogeneous Internet users in terms of language, creed, and culture. For an ordinary user, understanding security properties heavily depends on different social factors.