{"title":"Proposing a Key Escrow Mechanism for Real-Time access to End-to-End encryption systems in the Interest of Law Enforcement","authors":"Pooja Bharadwaj, Harshita Pal, Bhawna Narwal","doi":"10.1109/IC3I44769.2018.9007301","DOIUrl":null,"url":null,"abstract":"Since end-to-end encryption is now a prevalent in text based communication, it has become necessary to explore its flip side as well. This paper studies and analyses the working and security mechanisms of one such application, WhatsApp messenger. It also discusses the pitfalls of perfect forward secrecy and its consequences for law enforcement, which essentially hold true for any end-to-end encryption system. Lastly, a model is proposed using key escrow that tries to provide selective access to law enforcement under justified conditions. This model can be generalized to extend to other WhatsApp-like applications and implemented or enforced in the form of a guideline or regulation respectively.","PeriodicalId":161694,"journal":{"name":"2018 3rd International Conference on Contemporary Computing and Informatics (IC3I)","volume":"35 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"7","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2018 3rd International Conference on Contemporary Computing and Informatics (IC3I)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/IC3I44769.2018.9007301","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 7
Abstract
Since end-to-end encryption is now a prevalent in text based communication, it has become necessary to explore its flip side as well. This paper studies and analyses the working and security mechanisms of one such application, WhatsApp messenger. It also discusses the pitfalls of perfect forward secrecy and its consequences for law enforcement, which essentially hold true for any end-to-end encryption system. Lastly, a model is proposed using key escrow that tries to provide selective access to law enforcement under justified conditions. This model can be generalized to extend to other WhatsApp-like applications and implemented or enforced in the form of a guideline or regulation respectively.