[Resource Topic] 2023/485: Practically-exploitable Cryptographic Vulnerabilities in Matrix

Welcome to the resource topic for 2023/485

Title:
Practically-exploitable Cryptographic Vulnerabilities in Matrix

Authors: Martin R. Albrecht, Sofía Celi, Benjamin Dowling, Daniel Jones

Abstract:

We report several practically-exploitable cryptographic vulnerabilities in the Matrix standard for federated real-time communication and its flagship client and prototype implementation, Element. These, together, invalidate the confidentiality and authentication guarantees claimed by Matrix against a malicious server. This is despite Matrix’ cryptographic routines being constructed from well-known and -studied cryptographic building blocks. The vulnerabilities we exploit differ in their nature (insecure by design, protocol confusion, lack of domain separation, implementation bugs) and are distributed broadly across the different subprotocols and libraries that make up the cryptographic core of Matrix and Element. Together, these vulnerabilities highlight the need for a systematic and formal analysis of the cryptography in the Matrix standard.

ePrint: https://eprint.iacr.org/2023/485

See all topics related to this paper.

Feel free to post resources that are related to this paper below.

Example resources include: implementations, explanation materials, talks, slides, links to previous discussions on other websites.

For more information, see the rules for Resource Topics .