Cryptography Experts Recommend Apple Replace its iMessage Encryption

IMessage_IconApple has implemented a series of short- and long-term defenses to its iMessage protocol after several issues were discovered by a team of researchers at Johns Hopkins University, according to a report published today (via PatentlyApple).

This attack is different to the one Johns Hopkins researchers discovered in March, which allowed an attacker to decrypt photos and videos sent over iMessage.

The technical paper details how another method known as a "ciphertext attack" allowed them to retrospectively decrypt certain types of payloads and attachments when either the sender or receiver is still online.

The scenario requires that the attacker intercepts messages using stolen TLS certificates or by gaining access to Apple's servers. While the attack takes a high level of technical expertise to be successful, the researchers note that it would be well within the means of state-sponsored actors.

Overall, our determination is that while iMessage’s end-to-end encryption protocol is an improvement over systems that use encryption on network traffic only (e.g., Google Hangouts), messages sent through iMessage may not be secure against sophisticated adversaries.

The team also discovered that Apple doesn't rotate encryption keys at regular intervals, in the way that modern encryption protocols such as OTR and Signal do. This means that the same attack can be used on iMessage historical data, which is often backed up inside iCloud. In theory, law enforcement could issue a court order forcing Apple to provide access to their servers and then use the attack to decrypt the data.

The researchers believe the attack could also be used on other protocols that use the same encryption format, such as Apple's Handoff feature, which transfers data between devices via Bluetooth. OpenPGP encryption (as implemented by GnuPGP) may be vulnerable to similar attacks when used in instant messaging applications, the paper noted.

Apple was notified of the issue as early as November 2015 and patched the iMessage protocol in iOS 9.3 and OS X 10.11.4 as a result. Since that time, the company has been pushing out further mitigations recommended by the researchers through monthly updates to several of its products.

However, the team's long-term recommendation is that Apple should replace the iMessage encryption mechanism with one that eliminates weaknesses in the protocol's core distribution mechanism.

The paper detailing the security issue is called Dancing on the Lip of the Volcano: Chosen Ciphertext Attacks on Apple iMessage, and was published as part of the USENIX Security Symposium, which took place in Austin, Texas. You can read the full paper here.

Popular Stories

iCloud General Feature Redux

iPhone Users Who Pay for iCloud Storage Receive a New Perk

Thursday March 20, 2025 12:01 am PDT by
If you pay for iCloud storage on your iPhone, Apple has a new perk for you, at no additional cost. The new perk is the ability to create invitations in the Apple Invites app for the iPhone, which launched in the App Store last month. In the Apple Invites app, iCloud+ subscribers can create invitations for any occasion, such as birthday parties, graduations, baby showers, and more. Anyone ...
apple wallet drivers license feature iPhone 15 pro teal 1

Apple Says iPhone Driver's Licenses Coming to These 8 U.S. States, But Rollout Remains Slow

Wednesday March 19, 2025 6:55 am PDT by
In select U.S. states, residents can add their driver's license or state ID to the Wallet app on the iPhone and Apple Watch, providing a convenient and contactless way to display proof of identity or age at select airports and businesses, and in select apps. Unfortunately, this feature continues to roll out very slowly. It has been three and a half years since Apple first announced the...
Generic iOS 19 Feature Mock

iOS 19 Coming in June With These New Features

Thursday March 20, 2025 2:04 pm PDT by
While the first iOS 19 beta is still more than two months away, there are already plenty of rumors about the upcoming software update. Below, we recap the key iOS 19 rumors so far. visionOS-Like Design In January, the YouTube channel Front Page Tech revealed a redesigned Camera app that is allegedly planned for iOS 19. According to Front Page Tech host Jon Prosser, the Camera app...
Windows Vista

Apple Might Be Having Its Windows Vista Moment, Says Analyst

Thursday March 20, 2025 6:52 am PDT by
Is Apple experiencing a "Vista-like drift into systemically poor execution?" That was a question posed by well-known technology analyst Benedict Evans, in a recent blog post covering Apple's innovation and execution, or seemingly lack thereof as of late. He is referring to Microsoft's Windows Vista operating system, which was widely criticized when it launched in 2007 due to software bugs,...
iPhone 17 Air Fanned Feature

First iPhone 17 Air Case Has Camera Bar, Camera Control Button Cutouts

Wednesday March 19, 2025 5:29 am PDT by
Serial leaker Sonny Dickson today shared an image of what he claims is a first look at a third-party case for Apple's iPhone 17 Air. "If you didn’t know an Air was coming, you'd swear it was a Google Pixel case," he said. Case manufacturers often obtain design specifications of upcoming iPhone models before their release by collaborating with Apple through official partnerships or...
iPhone 17 Pro Render Front Page Tech

Latest iPhone 17 Pro Dummies Highlight Apple's New Part-Glass Design

Thursday March 20, 2025 5:27 am PDT by
Seasoned leaker Sonny Dickson has shared more dummy models of Apple's upcoming iPhone 17 series, with the latest lot revealing a noticeable shift in Apple's iPhone Pro model design that goes beyond the much-talked-about new rear camera bar. Dickson points out that the iPhone 17 Pro dummy models feature an outlined area on the back, beginning just below the camera module and extending to the...
iphone 16 pro ghost hand

Next Year's iPhone 18 Pro Already Rumored to Have Five New Features

Tuesday March 18, 2025 1:00 pm PDT by
While the iPhone 18 Pro models are still around a year and a half away from launching, there are already some early rumors about the devices. Below, we recap some key iPhone 18 Pro rumors so far. Under-Screen Face ID In April 2023, display industry analyst Ross Young shared a roadmap showing that iPhone 17 Pro models would feature under-display Face ID. In May 2024, however, Young said ...
Generic iOS 19 Feature Mock

iOS 19 and iOS 20 Must Include a Long List of Major Changes, EU Says

Wednesday March 19, 2025 10:26 am PDT by
The European Commission today announced a long list of changes that Apple is legally required to implement in future iOS 19 and iOS 20 updates. The announcement clarifies interoperability requirements that Apple is required to adhere to in the EU, under the Digital Markets Act, which has been fully enforced since March 2024. The changes will further open up the iPhone and its technologies to ...
airpods pro 2 gradient

AirPods Pro 3 Launch Now Just Months Away: Here's What We Know

Tuesday March 18, 2025 9:13 am PDT by
Despite being released over two years ago, Apple's AirPods Pro 2 continue to dominate the wireless earbud market. However, with the AirPods Pro 3 expected to launch in 2025, anyone thinking of buying Apple's premium earbuds may be wondering if the next generation is worth holding out for. Apart from their audio and noise-canceling performance, which are generally regarded as excellent for...

Top Rated Comments

joe-h2o Avatar
112 months ago
John Hopkins is a renowned medical school in Baltimore. What makes them the experts on cryptography?
It's more than just a medical school.

Jesus ****ing christ on a stick we're less than three comments in and 2/3 of them are dismissing this out of hand because it's not a 100% positive Apple story but a constructive criticism of how they can improve weaknesses in their cryptography.
Score: 40 Votes (Like | Disagree)
Telos101 Avatar
112 months ago
John Hopkins is a renowned medical school in Baltimore. What makes them the experts on cryptography?
They have an Information Security Institute. Professor Matthew Green was part of the research team.

Green is part of the group which developed Zerocoin ('https://en.wikipedia.org/wiki/Zerocoin'), an anonymous cryptocurrency ('https://en.wikipedia.org/wiki/Cryptocurrency'). His research team has exposed flaws in more than one third of SSL/TLS ('https://en.wikipedia.org/wiki/Transport_Layer_Security') encrypted web sites as well as vulnerabilities in encryption technologies, including RSA BSAFE ('https://en.wikipedia.org/wiki/RSA_BSAFE'), Exxon/Mobil Speedpass ('https://en.wikipedia.org/wiki/Speedpass'), E-ZPass ('https://en.wikipedia.org/wiki/E-ZPass'), and automotive security systems. In 2015, Green was a member of the research team that identified the Logjam ('https://en.wikipedia.org/wiki/Logjam_(computer_security)') vulnerability in the TLS protocol.

Green is a member of the technical advisory board for the Linux Foundation Core Infrastructure Initiative, formed to address critical Internet security concerns in the wake of the Heartbleed ('https://en.wikipedia.org/wiki/Heartbleed') security bug disclosed in April 2014 in the OpenSSL ('https://en.wikipedia.org/wiki/OpenSSL') cryptography library.

He sits on the technical advisory boards for CipherCloud ('https://en.wikipedia.org/wiki/CipherCloud'), Overnest and Mozilla Cybersecurity Delphi. Green co-founded and serves on the Board for Directors of the Open Crypto Audit Project (OCAP), which undertook a security audit ('https://en.wikipedia.org/wiki/Security_audit') of the TrueCrypt ('https://en.wikipedia.org/wiki/TrueCrypt') software.

https://en.wikipedia.org/wiki/Matthew_D._Green
Score: 35 Votes (Like | Disagree)
voxtro Avatar
112 months ago
John Hopkins is a renowned medical school in Baltimore. What makes them the experts on cryptography?
Comments like these annoy me quite a bit (unless I'm missing some type of sarcasm). As an Apple user and someone with a background in cryptography who has actually read the entire paper, you don't need to have a MIT or Stanford paper to make a cryptanalysis. In cryptography papers are heavily peer reviewed and skepticism is part of the process the whole time. At the end of the day it boils down to mathematics and computer science and these are provable things, so it's not hypothesis. The paper includes examples of how the attacks can be carried out and under specific conditions. It explains the protocols and the exact mechanisms used to extract the payloads in their settings. All the caveats are stated. Also, it does state that Apple implemented a lot of their recommendations in later versions of iOS and OS X/macOS (their paper references iOS 9.3 and OS X 10.11.4 or later)
Score: 31 Votes (Like | Disagree)
joe-h2o Avatar
112 months ago
I think I read this on news.google.com.au.... sounds like a beat up to me. Next....
You have to read more than just the title before you can make an informed comment.
Score: 19 Votes (Like | Disagree)
aplnub Avatar
112 months ago
I think I read this on news.google.com.au.... sounds like a beat up to me. Next....
Doesn't sound like a beat up to me. Sounds like good advice and it seems Apple has been favorable at receiving advice in the past. Hopefully, they address the concerns for all our sakes.
Score: 13 Votes (Like | Disagree)
aplnub Avatar
112 months ago
John Hopkins is a renowned medical school in Baltimore. What makes them the experts on cryptography?
A school cannot be great at more than one field?
Score: 11 Votes (Like | Disagree)