JOURNAL ARTICLE

Subverting Telegram's End-to-End Encryption

Abstract

Telegram is a popular secure messaging service with third biggest user base as of 2021. In this paper, we analyze the security of Telegram’s end-to-end encryption (E2EE) protocol in presence of mass-surveillance. Specifically, we show that Telegram’s E2EE protocol is susceptible to fairly efficient algorithm substitution attacks. While official Telegram clients should be protected against this type of attack due their open-source nature and reproducible builds, this could potentially lead to a very efficient state sponsored surveillance of private communications over Telegram, either on individuals through a targeted attack or massively through some compromised third-party clients. We provide an efficient algorithm substitution attack against MTProto2.0 --- the underlying authenticated encryption scheme --- that recovers significant amount of encryption key material with a very high probability with few queries and fairly low latency. This could potentially lead to a very efficient state sponsored surveillance of private communications over Telegram, either through a targeted attack or a compromised third-party app. Our attack exploits MTProto2.0's degree of freedom in choosing the random padding length and padding value. Accordingly, we strongly recommend that Telegram should revise MTProto2.0's padding methodology. In particular, we show that a minor change in the padding description of MTProto2.0 makes it subversion-resistant in most of the practical scenarios. As a side-effect, we generalize the underlying mode of operation in MTProto2.0, as MTProto-G, and show that this generalization is a multi-user secure deterministic authenticated encryption scheme.

Keywords:
Padding Encryption Protocol (science) Authenticated encryption Timing attack Exploit Generalization Probabilistic encryption 56-bit encryption

Metrics

0
Cited By
0.00
FWCI (Field Weighted Citation Impact)
0
Refs
0.40
Citation Normalized Percentile
Is in top 1%
Is in top 10%

Topics

Cryptography and Data Security
Physical Sciences →  Computer Science →  Artificial Intelligence
Advanced Authentication Protocols Security
Physical Sciences →  Computer Science →  Computer Networks and Communications
Cryptographic Implementations and Security
Physical Sciences →  Computer Science →  Artificial Intelligence

Related Documents

JOURNAL ARTICLE

Subverting Telegram's End-to-End Encryption

Cogliati, Benoît-MichelEthan, JordanJha, Ashwin

Journal:   CISPA Helmholtz Center Year: 2023
JOURNAL ARTICLE

Subverting Telegram’s End-to-End Encryption

Benoît CogliatiJordan EthanAshwin Jha

Journal:   IACR Transactions on Symmetric Cryptology Year: 2023 Pages: 5-40
JOURNAL ARTICLE

End-to-End Encryption

Benjamin Aleshire

Journal:   Pleiades Year: 2024 Vol: 44 (1)Pages: 285-285
JOURNAL ARTICLE

End-to-end encryption

Elizaveta Sergeevna Mazunina

Journal:   Academic community of students Year: 2016 Pages: 48-50
BOOK-CHAPTER

end-to-end encryption

Martin H. Weik

Year: 2000 Pages: 522-522
© 2026 ScienceGate Book Chapters — All rights reserved.