Skip to main content

Conference Paper

PDF

Authloop: Practical end-to-end cryptographic authentication for telephony over voice channels

Bradley Reaves, Logan Blue, and Patrick Traynor

Proceedings of the USENIX Security Symposium, 2016

A TLS-inspired authentication protocol sent over the voice audio channel verifies caller identity without network changes or a data connection.

Abstract

asserting an identity (e.g., a bank, law enforcement, etc.), taking advantage of a lack of reliable cues and mechanisms to dispute such claims. Addressing these problems will require the application of lessons from a related space. The Web experienced very similar problems in the 1990s, and developed and deployed the Transport Layer Security (TLS) protocol suite and necessary support infrastructure to assist with the integration of more verifiable identity in communications. While by no means perfect and still an area of active research, this infrastructure helps to make a huge range of attacks substantially more difficult. Unfortunately, the lack of similarly strong mechanisms in telephony means that not even trained security experts can currently reason about the identity of other callers. In this paper, we address this problem with AuthLoop.1 AuthLoop provides a strong cryptographic authentication protocol inspired by TLS 1.2. However, unlike other related solutions that assume Internet access (e.g., Silent Circle, RedPhone, etc [24, 73, 25, 5, 3, 6, 1, 74, 7]), accessibility to a secondary and concurrent data channel is not a guarantee in many locations (e.g., high density cities, rural areas) nor for all devices, mandating that a solution to this problem be network agnostic. Accordingly, AuthLoop is designed for and transmitted over the only channel certain to be available to all phone systems — audio. The advantage to this approach is that it requires no changes to any network core, which would likely see limited adoption at best. Through the use of AuthLoop, users can quickly and strongly identify callers who may fraudulently be claiming to be organizations including their financial institutions and their government [28]. We make the following contributions:

Citation (IEEE)

B. Reaves, L. Blue, and P. Traynor, “Authloop: Practical end-to-end cryptographic authentication for telephony over voice channels,” in Proceedings of the USENIX Security Symposium, 2016.

BibTeX
@inproceedings{blt16,
  author = {{Bradley Reaves} and {Logan Blue} and {Patrick Traynor}},
  booktitle = {Proceedings of the {USENIX} Security Symposium},
  date = {2016-08},
  title = {{Authloop}: {Practical} end-to-end cryptographic authentication for telephony over voice channels},
}