WhatsApp Users ‘Should Not Trust Broken Encryption’

WhatsApp encryption does not work in a secure way and users should consider all their previous communications compromised, a European researcher has claimed.

One problem uncovered by Thijs Alkemade, a computer science student at Utrecht University, was that the massively popular communications app was using the same RC4 encryption key in both directions.

Because of the way RC4 works, this would allow an attacker to look at how the XOR operation used by the standard is working in both ways, in order to reveal bits of the plain text.

WhatsApp encryption flaws

In encryption, XOR works by applying a string of bytes to the binary digits that need to be protected. Where two bits are the same a 0 is produced; where one is different to the other, a positive 1 is produced. The resulting string is thus encoded. Applying the XOR to that resulting string then decodes it.

In the case of WhatsApp, an attacker could get hold of two messages using the same RC4 key and figure out how the encryption is working to crack it, according to the researcher.

“As WhatsApp uses the same key for the incoming and the outgoing RC4 stream, we know that ciphertext byte i on the incoming stream XORed with ciphertext byte i on the outgoing stream will be equal to XORing plaintext byte i on the incoming stream with plaintext byte i of the outgoing stream. By XORing this with either of the plaintext bytes, we can uncover the other byte,” Alkemade said.

He found further problems in the authentication of WhatsApp messages, surrounding the use of MACs.

“A MAC by itself is not enough to detect all forms of tampering: an attacker could drop specific messages, swap them or even transmit them back to the sender,” Alkemade added

“TLS counters this by including a sequence number in the plaintext of every message and by using a different key for the HMAC for messages from the server to the client and for messages from the client to the server. WhatsApp does not use such a sequence counter and it reuses the key used for RC4 for the HMAC.”

Whilst he was unsure whether that could be exploited, Alkemade claimed anyone who can intercept WhatsApp messages could decrypt them “given enough effort”.

WhatsApp had not responded to a request for comment.

This isn’t the first time users have poked holes in WhatsApp security. Security researcher Troy Hunt uncovered some SSL encryption weaknesses in the payment processing of the application, which could have exposed users’ details.

“Anyone using WhatsApp for sensitive communications probably needs their head examined. It’s hardly had a spotless record when it comes to security,” security expert Graham Cluley told TechWeekEurope.

Earlier this week, WhatsApp had its homepage defaced by pro-Palestinian attackers.

Are you a pedant on privacy? Try our quiz!

Thomas Brewster

Tom Brewster is TechWeek Europe's Security Correspondent. He has also been named BT Information Security Journalist of the Year in 2012 and 2013.

Recent Posts

Amazon Mulls $15 Billion Warehouse Expansion Plan – Report

Expansion among chaos. Amazon considering warehouse expansion in US, and already cancelled some Chinese orders

14 hours ago

Musk’s DOGE Uses AI To Detect Anti-Trump Sentiment In Federal Workers

Loose lips sink...your job. Federal communications reportedly being spied upon by Musk's DOGE, using AI…

15 hours ago

Microsoft Overtakes Apple As Most Valuable Public Company

Apple's share price plummets over 23 percent in recent days, promoting Microsoft as world's most…

17 hours ago

Bitcoin Falls Further, As Trump’s Tariffs Roil Markets

Global markets continue to plummet, as Trump tariffs go into force - including a 104…

19 hours ago

Ofcom Launches First ‘Online Safety Act’ Investigation

British regulator Ofcom announces first investigation under new digital safety laws, into an online suicide…

21 hours ago