308 lines
11 KiB
Plaintext
308 lines
11 KiB
Plaintext
\begin{thebibliography}{10}
|
||
|
||
\bibitem{Albrecht_Dowling_Jones}
|
||
Martin~R Albrecht, Benjamin Dowling, and Daniel Jones.
|
||
\newblock Device-oriented group messaging: A formal cryptographic analysis of
|
||
matrix’ core.
|
||
|
||
\bibitem{Albrecht_2025}
|
||
Martin~R Albrecht, Benjamin Dowling, and Daniel Jones.
|
||
\newblock Formal analysis of multi-device group messaging in whatsapp.
|
||
|
||
\bibitem{alwen_doubleratchet}
|
||
Joël Alwen, Sandro Coretti, and Yevgeniy Dodis.
|
||
\newblock {\em The Double Ratchet: Security Notions, Proofs, and Modularization
|
||
for the Signal Protocol}, volume 11476 of {\em Lecture Notes in Computer
|
||
Science}, page 129–158.
|
||
\newblock Springer International Publishing, Cham, 2019.
|
||
|
||
\bibitem{Alwen_Coretti_Jost_Mularczyk_2020}
|
||
Joël Alwen, Sandro Coretti, Daniel Jost, and Marta Mularczyk.
|
||
\newblock {\em Continuous Group Key Agreement with Active Security}, volume
|
||
12551 of {\em Lecture Notes in Computer Science}, page 261–290.
|
||
\newblock Springer International Publishing, Cham, 2020.
|
||
|
||
\bibitem{Balbas_SK}
|
||
David Balbás, Daniel Collins, and Phillip Gajland.
|
||
\newblock {\em WhatsUpp with Sender Keys? Analysis, Improvements and Security
|
||
Proofs}, volume 14442 of {\em Lecture Notes in Computer Science}, page
|
||
307–341.
|
||
\newblock Springer Nature Singapore, Singapore, 2023.
|
||
|
||
\bibitem{SoK_CAC}
|
||
Manuel Barbosa, Gilles Barthe, Karthik Bhargavan, Bruno Blanchet, Cas Cremers,
|
||
Kevin Liao, and Bryan Parno.
|
||
\newblock Sok: Computer-aided cryptography.
|
||
\newblock In {\em 2021 IEEE Symposium on Security and Privacy (SP)}, page
|
||
777–795, May 2021.
|
||
|
||
\bibitem{rfc9420}
|
||
Richard Barnes, Benjamin Beurdouche, Raphael Robert, Jon Millican, Emad Omara,
|
||
and Katriel Cohn-Gordon.
|
||
\newblock {The Messaging Layer Security (MLS) Protocol}.
|
||
\newblock RFC 9420, July 2023.
|
||
|
||
\bibitem{rfc9180}
|
||
Richard Barnes, Karthikeyan Bhargavan, Benjamin Lipp, and Christopher~A. Wood.
|
||
\newblock {Hybrid Public Key Encryption}.
|
||
\newblock RFC 9180, February 2022.
|
||
|
||
\bibitem{Basin_Cremers_Dreier_Sasse_2022}
|
||
David Basin, Cas Cremers, Jannik Dreier, and Ralf Sasse.
|
||
\newblock Tamarin: Verification of large-scale, real-world, cryptographic
|
||
protocols.
|
||
\newblock {\em IEEE Security \& Privacy}, 20(3):24–32, May 2022.
|
||
|
||
\bibitem{bhargavan_dy}
|
||
Karthikeyan Bhargavan, Abhishek Bichhawat, Quoc~Huy Do, Pedram Hosseyni, Ralf
|
||
Küsters, Guido Schmitz, and Tim Würtele.
|
||
\newblock Dy*: A modular symbolic verification framework for executable
|
||
cryptographic protocol code.
|
||
|
||
\bibitem{DY}
|
||
Karthikeyan Bhargavan, Abhishek Bichhawat, Quoc~Huy Do, Pedram Hosseyni, Ralf
|
||
Küsters, Guido Schmitz, and Tim Würtele.
|
||
\newblock Dy*: A modular symbolic verification framework for executable
|
||
cryptographic protocol code.
|
||
|
||
\bibitem{Bhargavan_PQXDH}
|
||
Karthikeyan Bhargavan, Charlie Jacomme, Franziskus Kiefer, and Rolfe Schmidt.
|
||
\newblock Formal verification of the pqxdh post-quantum key agreement protocol
|
||
for end-to-end secure messaging.
|
||
|
||
\bibitem{Blanchet_2012}
|
||
Bruno Blanchet.
|
||
\newblock {\em Security Protocol Verification: Symbolic and Computational
|
||
Models}, volume 7215 of {\em Lecture Notes in Computer Science}, page 3–29.
|
||
\newblock Springer Berlin Heidelberg, Berlin, Heidelberg, 2012.
|
||
|
||
\bibitem{Blanchet_2016}
|
||
Bruno Blanchet.
|
||
\newblock Modeling and verifying security protocols with the applied pi
|
||
calculus and proverif.
|
||
\newblock {\em Foundations and Trends® in Privacy and Security},
|
||
1(1–2):1–135, 2016.
|
||
|
||
\bibitem{Blanchet_Jacomme}
|
||
Bruno Blanchet and Charlie Jacomme.
|
||
\newblock Cryptoverif: a computationally-sound security protocol verifier.
|
||
|
||
\bibitem{ProverifManual}
|
||
Bruno Blanchet, Ben Smyth, Vincent Cheval, and Marc Sylvestre.
|
||
\newblock Proverif 2.05: Automatic cryptographic protocol verifier, user manual
|
||
and tutorial.
|
||
|
||
\bibitem{Celi_Hoyland_Stebila_Wiggers_2022}
|
||
Sofía Celi, Jonathan Hoyland, Douglas Stebila, and Thom Wiggers.
|
||
\newblock {\em A Tale of Two Models: Formal Verification of KEMTLS via
|
||
Tamarin}, volume 13556 of {\em Lecture Notes in Computer Science}, page
|
||
63–83.
|
||
\newblock Springer Nature Switzerland, Cham, 2022.
|
||
|
||
\bibitem{Chase_Perrin_Zaverucha_2020}
|
||
Melissa Chase, Trevor Perrin, and Greg Zaverucha.
|
||
\newblock The signal private group system and anonymous credentials supporting
|
||
efficient verifiable encryption.
|
||
\newblock In {\em Proceedings of the 2020 ACM SIGSAC Conference on Computer and
|
||
Communications Security}, page 1445–1459, Virtual Event USA, October 2020.
|
||
ACM.
|
||
|
||
\bibitem{cremers_signal}
|
||
Katriel Cohn-Gordon, Cas Cremers, Benjamin Dowling, Luke Garratt, and Douglas
|
||
Stebila.
|
||
\newblock A formal security analysis of the signal messaging protocol.
|
||
|
||
\bibitem{Collins_Colombo_Huguenin-Dumittan_2025}
|
||
Daniel Collins, Simone Colombo, and Loïs Huguenin-Dumittan.
|
||
\newblock Real-world deniability in messaging.
|
||
\newblock {\em Proceedings on Privacy Enhancing Technologies},
|
||
2025(1):320–340, January 2025.
|
||
|
||
\bibitem{auth}
|
||
Whitfield Diffie, Paul~C. Van~Oorschot, and Michael~J. Wiener.
|
||
\newblock Authentication and authenticated key exchanges.
|
||
\newblock {\em Designs, Codes and Cryptography}, 2(2):107–125, June 1992.
|
||
|
||
\bibitem{Dingledine_Mathewson_Syverson_2004}
|
||
Roger Dingledine, Nick Mathewson, and Paul Syverson.
|
||
\newblock Tor: The second-generation onion router:.
|
||
\newblock January 2004.
|
||
|
||
\bibitem{Dolev_1983}
|
||
Danny Dolev.
|
||
\newblock On the security of public key protocols.
|
||
\newblock {\em IEEE TRANSACTIONS ON INFORMATION THEORY}, (2), 1983.
|
||
|
||
\bibitem{Donenfeld_2017}
|
||
Jason~A. Donenfeld.
|
||
\newblock Wireguard: Next generation kernel network tunnel.
|
||
\newblock In {\em Proceedings 2017 Network and Distributed System Security
|
||
Symposium}, San Diego, CA, 2017. Internet Society.
|
||
|
||
\bibitem{rfc9369}
|
||
Martin Duke.
|
||
\newblock {QUIC Version 2}.
|
||
\newblock RFC 9369, May 2023.
|
||
|
||
\bibitem{FiedlerPQXDHdeny}
|
||
Rune Fiedler and Christian Janson.
|
||
\newblock A deniability analysis of signal’s initial handshake pqxdh.
|
||
\newblock {\em Proceedings on Privacy Enhancing Technologies},
|
||
2024(4):907–928, October 2024.
|
||
|
||
\bibitem{Gancher_2023}
|
||
Joshua Gancher, Sydney Gibson, Pratap Singh, Samvid Dharanikota, and Bryan
|
||
Parno.
|
||
\newblock Owl: Compositional verification of security protocols via an
|
||
information-flow type system.
|
||
\newblock In {\em 2023 IEEE Symposium on Security and Privacy (SP)}, page
|
||
1130–1147, San Francisco, CA, USA, May 2023. IEEE.
|
||
|
||
\bibitem{pqwg}
|
||
Andreas Hülsing, Kai-Chun Ning, Peter Schwabe, Fiona~Johanna Weber, and
|
||
Philip~R. Zimmermann.
|
||
\newblock Post-quantum wireguard.
|
||
\newblock In {\em 2021 IEEE Symposium on Security and Privacy (SP)}, page
|
||
304–321, San Francisco, CA, USA, May 2021. IEEE.
|
||
|
||
\bibitem{Itkis_Reyzin_2001}
|
||
Gene Itkis and Leonid Reyzin.
|
||
\newblock {\em Forward-Secure Signatures with Optimal Signing and Verifying},
|
||
volume 2139 of {\em Lecture Notes in Computer Science}, page 332–354.
|
||
\newblock Springer Berlin Heidelberg, Berlin, Heidelberg, 2001.
|
||
|
||
\bibitem{Jefferys2020SessionProtocol}
|
||
Kee Jefferys.
|
||
\newblock Session protocol: Technical implementation details.
|
||
\newblock Blog post on getSession.org, December 2020.
|
||
\newblock Accessed: 2025-08-08.
|
||
|
||
\bibitem{Kobeissi_Bhargavan_Blanchet_2017}
|
||
Nadim Kobeissi, Karthikeyan Bhargavan, and Bruno Blanchet.
|
||
\newblock Automated verification for secure messaging protocols and their
|
||
implementations: A symbolic and computational approach.
|
||
\newblock In {\em 2017 IEEE European Symposium on Security and Privacy}, page
|
||
435–450, Paris, April 2017. IEEE.
|
||
|
||
\bibitem{rfc5869}
|
||
Hugo Krawczyk and Pasi Eronen.
|
||
\newblock {HMAC-based Extract-and-Expand Key Derivation Function (HKDF)}.
|
||
\newblock RFC 5869, May 2010.
|
||
|
||
\bibitem{Kret_Schmidt_PQXDH}
|
||
Ehren Kret and Rolfe Schmidt.
|
||
\newblock The pqxdh key agreement protocol.
|
||
\newblock 2024.
|
||
|
||
\bibitem{Lafourcade_Mahmoud_Ruhault_Taleb}
|
||
Pascal Lafourcade, Dhekra Mahmoud, Sylvain Ruhault, and Abdul~Rahman Taleb.
|
||
\newblock A tale of two worlds, a formal story of wireguard hybridization.
|
||
|
||
\bibitem{Moxie_Sesame}
|
||
Moxie Marlinspike and Trevor Perrin.
|
||
\newblock The sesame algorithm: Session management for asynchronous message
|
||
encryption.
|
||
\newblock 2016.
|
||
|
||
\bibitem{Marlinspike_Perrin_X3DH}
|
||
Moxie Marlinspike and Trevor Perrin.
|
||
\newblock The x3dh key agreement protocol.
|
||
\newblock 2016.
|
||
|
||
\bibitem{matrixorg_olm_repo}
|
||
{matrix-org}.
|
||
\newblock Olm.
|
||
\newblock \url{https://gitlab.matrix.org/matrix-org/olm}, April 2019.
|
||
\newblock GitLab repository implementing Olm and Megolm cryptographic ratchets.
|
||
|
||
\bibitem{matrixorg_megolm_doc}
|
||
{matrix-org}.
|
||
\newblock docs/megolm.md.
|
||
\newblock
|
||
\url{https://gitlab.matrix.org/matrix-org/olm/-/blob/master/docs/megolm.md},
|
||
September 2022.
|
||
\newblock Markdown file in \emph{Olm} repository.
|
||
|
||
\bibitem{mcmillion2025keytransparencyarchitecture}
|
||
Brendan McMillion.
|
||
\newblock Key transparency architecture.
|
||
\newblock Internet-Draft, IETF, July 2025.
|
||
\newblock draft-ietf-keytrans-architecture-04, Intended status: Informational.
|
||
|
||
\bibitem{mcMillion2025keytrans}
|
||
Brendan McMillion.
|
||
\newblock {Key Transparency Architecture}.
|
||
\newblock Internet-Draft draft-ietf-keytrans-architecture-04, IETF
|
||
Internet-Draft, July 2025.
|
||
\newblock Intended status: Informational; Expires 8 January 2026.
|
||
|
||
\bibitem{MetaMessengerE2EE2023}
|
||
Jon Millican, Reed Riley, and Meta Platforms.
|
||
\newblock Messenger end-to-end encryption overview.
|
||
\newblock Technical White Paper Version 1M, Meta Platforms (Facebook
|
||
Engineering), December 2023.
|
||
\newblock Published December 6, 2023 — describes core Signal-Protocol-based
|
||
E2EE implementation for Messenger and Instagram Direct.
|
||
|
||
\bibitem{Moxie_DoubleRatchet}
|
||
Trevor Perrin and Moxie Marlinspike.
|
||
\newblock The double ratchet algorithm.
|
||
\newblock 2016.
|
||
|
||
\bibitem{rfc8446}
|
||
Eric Rescorla.
|
||
\newblock {The Transport Layer Security (TLS) Protocol Version 1.3}.
|
||
\newblock RFC 8446, August 2018.
|
||
|
||
\bibitem{Schwabe_Stebila_Wiggers_2020}
|
||
Peter Schwabe, Douglas Stebila, and Thom Wiggers.
|
||
\newblock Post-quantum tls without handshake signatures.
|
||
\newblock In {\em Proceedings of the 2020 ACM SIGSAC Conference on Computer and
|
||
Communications Security}, page 1461–1480, Virtual Event USA, October 2020.
|
||
ACM.
|
||
|
||
\bibitem{SignalSenderKeysRust}
|
||
{Signal Foundation}.
|
||
\newblock sender\_keys.rs — sender keys implementation (rust).
|
||
\newblock
|
||
\url{https://github.com/signalapp/libsignal/blob/main/rust/protocol/src/sender\_keys.rs},
|
||
2025.
|
||
\newblock Reference implementation of the Sender Keys protocol in libsignal’s
|
||
Rust codebase.
|
||
|
||
\bibitem{Unger_Goldberg_2018}
|
||
Nik Unger and Ian Goldberg.
|
||
\newblock Improved strongly deniable authenticated key exchanges for secure
|
||
messaging.
|
||
\newblock {\em Proceedings on Privacy Enhancing Technologies}, 2018(1):21–66,
|
||
January 2018.
|
||
|
||
\bibitem{VatandasDeny}
|
||
Nihal Vatandas, Rosario Gennaro, Bertrand Ithurburn, and Hugo Krawczyk.
|
||
\newblock {\em On the Cryptographic Deniability of the Signal Protocol}, volume
|
||
12147 of {\em Lecture Notes in Computer Science}, page 188–209.
|
||
\newblock Springer International Publishing, Cham, 2020.
|
||
|
||
\bibitem{Wallez_TreeKEM}
|
||
Theophile Wallez, Jonathan Protzenko, and Karthikeyan Bhargavan.
|
||
\newblock Treekem: A modular machine-checked symbolic security analysis of
|
||
group key agreement in messaging layer security.
|
||
|
||
\bibitem{Wallez_TreeSync}
|
||
Théophile Wallez, Benjamin Beurdouche, and Karthikeyan Bhargavan.
|
||
\newblock Treesync: Authenticated group management for messaging layer
|
||
security.
|
||
|
||
\bibitem{WhatsAppSecurity2024}
|
||
WhatsApp.
|
||
\newblock Whatsapp encryption overview: Technical white paper.
|
||
\newblock Technical White Paper Version 8, Meta (WhatsApp), August 2024.
|
||
\newblock Updated August 19, 2024.
|
||
|
||
\bibitem{openvpn}
|
||
James Yonan.
|
||
\newblock {\em OpenVPN: An Open Source VPN}, 2002.
|
||
\newblock Version 2.6.0 and later. Accessed: 2025-08-08.
|
||
|
||
\end{thebibliography}
|