![]() As one example, we present a cross-protocol attack which breaks authentication in Threema and which exploits the lack of proper key separation between different sub-protocols. We present seven different attacks against the protocol in three different threat models. ![]() ![]() We provide an extensive cryptographic analysis of Threema, a Swiss-based encrypted messaging application with more than 10 million users and 7000 corporate customers. A group of Swiss researchers have published an impressive security analysis of Threema. ![]()
0 Comments
Leave a Reply. |