Chat-App Decryption Key Extraction
نویسنده
چکیده
Recent years have seen a pervasive usage of mobile-based instant messaging apps, which are popularly known as chat apps. On users’ mobile devices, chat logs are usually stored encrypted. This paper is concerned with discovering the decryption key of chat-log database files as they are used by popular chat apps like WhatsApp andWeChat. We propose a systematic and generalized information-flow based approach to recovering the decryption key by taking advantage of both static and dynamic analyses. We show that, despite the employed code obfuscation techniques, we can perform the key discovery process on relevant code portions. Furthermore, to the best of our knowledge, we are the first to detail the employed string de-obfuscation, encrypted database file structure, and decryption-key formulation of the latest WhatsApp with crypt12 database. We also demonstrate how our keyextraction techniques can decrypt encrypted WhatsApp and WeChat database files that originate from a target device. Additionally, we show how we can construct a version of WhatsApp or WeChat that simulates the key generation processes of a remote target device, and recover the keys. Lastly, we analyze why our technique can work on widely-popular chat apps, and mention measures that can be adopted by chat-app developers to better protect the privacy of billions of their users.
منابع مشابه
Attribute-based encryption with encryption and decryption outsourcing
In this paper we propose a new scheme for ciphertext-policy attribute-based encryption that allows outsourcing of computationally expensive encryption and decryption steps. The scheme constitutes an important building block for mobile applications where both the host and users use mobile devices with limited computational power. In the proposed scheme, during encryption the host involves a semi...
متن کاملQTRU: quaternionic version of the NTRU public-key cryptosystems
In this paper we will construct a lattice-based public-key cryptosystem using non-commutative quaternion algebra, and since its lattice does not fully fit within Circular and Convolutional Modular Lattice (CCML), we prove it is arguably more secure than the existing lattice-based cryptosystems such as NTRU. As in NTRU, the proposed public-key cryptosystem relies for its inherent securi...
متن کاملSecure Crypto System for Image Encryption and Data Embedding using Chaos and BB Equation Algorithm
This project proposes method for image encryption and decryption, data embedding and data extraction. The content owner first encrypts image by BB equation and chaos algorithm, then the data is encrypted using data hiding key and embedded into LSB bit of specific pixels. With an encrypted image containing additional data, if a receiver has the data-hiding key, the data can be extracted without ...
متن کاملConstruction of a Hybrid (Hierarchical) Identity-Based Encryption Protocol Secure Against Adaptive Attacks
The current work considers the problem of obtaining a hierarchical identity-based encryption (HIBE) protocol which is secure against adaptive key extraction and decryption queries. Such a protocol is obtained by modifying an earlier protocol by Chatterjee and Sarkar (which, in turn, is based on a protocol due to Waters) which is secure only against adaptive key extraction queries. The setting i...
متن کاملDesign and Evaluation of a Mobile Chat App for the Open Source Behavioral Health Intervention Platform MobileCoach
The open source platform MobileCoach (mobile-coach.eu) has been used for various behavioral health interventions in the public health context. However, so far, MobileCoach is limited to text message-based interactions. That is, participants use error-prone and laborious text-input fields and have to bear the SMS costs. Moreover, MobileCoach does not provide a dedicated chat channel for individu...
متن کامل