Poster: Handsfree ZRTP - A Novel Key Agreement for RTP, Protected by Voice Commitments

نویسندگان

  • Dominik Schürmann
  • Stephan Sigg
چکیده

Recently, several mobile applications were released that claim to provide secure Voice-over-IP communications. Most of these, e.g., Redphone by Open WhisperSystems or Silent Phone by Silent Circle, are utilizing ZRTP [4] to establish session keys for end-to-end security. ZRTP was designed to achieve key exchange without trusted third parties or certificate infrastructure, while providing a way to protect against Man-in-the-Middle (MitM) attacks. The basic idea is that the caller and callee can verify that no MitM attacker is present by recognizing the voice of the peer, while comparing Short Authentication Strings (SAS). We rethink ZRTP’s concept of voice recognition by utilising audio fingerprinting to replace the manual comparison of SAS. This enables the use of devices without displays and hands-free equipment. It provides end-to-end secure communications in cars, while the driver focuses on the street. We discuss shortcomings of ZRTP, present our novel authentication protocol and discuss results from a case study on utilising audio fingerprints to establish a common secret via a remote connection. With this poster, we aim at gathering feedback and discussing attack scenarios, before implementing a prototype. ZRTP extends Diffie-Hellman (DH) key agreement by protection against MitM. It forces the callee to release a 256 bit hash hB of the DH public part yB in advance of exchanging the public parts yA, yB themselves. Due to this hash commitment, an attacker can only guess once with a chance of 1:65536 by using 16 bit SAS [4]. The actual protection against MitM attacks is done by reading the SAS (generated from a combination of hB , yA, and yB) aloud, while the peer has to compare the heard SAS with a displayed one and simultaneously recognise the voice of the caller. For ease of use and pronunciation SAS are words in modern ZRTP implementations. An analogous verification can protect against sophisticated replay attacks, where an attacker impersonates one peer and calls in its name. In this case, the attacker has to use actual recorded speech to conduct a conversation, which is hard to perform unnoticed. Mutual authentication protects against impersonation as it also forces the attacker to read the SAS (or a part of it) aloud, which is tied to this specific key exchange by hash commitment [2].

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

“Detecting Man in the Middle Attacks on Ephemeral Diffie-Hellman without Relying on a Public Key Infrastructure in Real-Time Communications”

With the recent revelations about pervasive surveillance on the Internet, there is renewed interest in techniques that protect against passive eavesdropping without relying on a Public Key Infrastructure (PKI). An ephemeral Diffie-Hellman (DH) key agreement can provide such protection, but (without authentication) the exchange is vulnerable to a Man in the Middle (MitM) attack. An example of a ...

متن کامل

Wiretapping End-to-End Encrypted VoIP Calls: Real-World Attacks on ZRTP

Voice calls are still one of the most common use cases for smartphones. Often, sensitive personal information but also confidential business information is shared. End-to-end security is required to protect against wiretapping of voice calls. For such real-time communication, the ZRTP key-agreement protocol has been proposed. By verbally comparing a small number of on-screen characters or words...

متن کامل

An Analysis of VoIP Secure Key Exchange Protocols against Man-in-the-Middle Attack

This paper presents a brief survey about the existing key exchange protocols namely MIKEY, ZRTP and SDES. The core features of these protocols and their suitability to SIP-VoIP Networks are analyzed in this paper. The focused research area in VoIP is related to the Security and Quality of service of the Voice data. Among these areas VoIP security and confidentiality of voice data turns to be a ...

متن کامل

The ZRTP Protocol - Security Considerations

ZRTP is draft of key agreement protocol by Phil Zimmermann, which relies on a Di e-Hellman exchange to generate SRTP session parameters, providing con dentiality and protecting against Man-in-the-Middle attacks even without a public key infrastructure or endpoint certi cates. This is an analysis of the protocol performed with AVISPA and ProVerif, which tests security properties of ZRTP; in orde...

متن کامل

Security and Usability Aspects of Man-in-the-Middle Attacks on ZRTP

ZRTP is a protocol designed to set up a shared secret between two communication parties which is subsequently used to secure the media stream (i.e. the audio data) of a VoIP connection. It uses Diffie-Hellman (DH) key exchange to agree upon a session key, which is inherently vulnerable to active Man-in-the-Middle (MitM) attacks. Therefore ZRTP introduces some proven methods to detect such attac...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2013