International Association for Cryptologic Research

International Association
for Cryptologic Research

CryptoDB

Analysis of the Telegram Key Exchange

Authors:
Martin R. Albrecht , King's College London
Lenka Mareková , ETH Zurich
Kenneth G. Paterson , ETH Zurich
Eyal Ronen , Tel-Aviv University
Igors Stepanovs , Amazon
Download:
Search ePrint
Search Google
Conference: EUROCRYPT 2025
Abstract: We describe, formally model, and prove the security of Telegram's key exchange protocols for client-server communications. To achieve this, we develop a suitable multi-stage key exchange security model along with pseudocode descriptions of the Telegram protocols that are based on analysis of Telegram's specifications and client source code. We carefully document how our descriptions differ from reality and justify our modelling choices. Our security proofs reduce the security of the protocols to that of their cryptographic building blocks, but the subsequent analysis of those building blocks requires the introduction of a number of novel security assumptions, reflecting many design decisions made by Telegram that are suboptimal from the perspective of formal analysis. Along the way, we provide a proof of IND-CCA security for the variant of RSA-OEAP+ used in Telegram and identify a hypothetical attack exploiting current Telegram server behaviour (which is not captured in our protocol descriptions). Finally, we reflect on the broader lessons about protocol design that can be taken from our work.
BibTeX
@inproceedings{eurocrypt-2025-35024,
  title={Analysis of the Telegram Key Exchange},
  publisher={Springer-Verlag},
  author={Martin R. Albrecht and Lenka Mareková and Kenneth G. Paterson and Eyal Ronen and Igors Stepanovs},
  year=2025
}