Double Ratchet
Double Ratchet
Double Ratchet
Revision 1, 2016-11-20
Contents
1. Introduction 3
2. Overview 3
2.1. KDF chains . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3
2.2. Symmetric-key ratchet . . . . . . . . . . . . . . . . . . . . . . . . 5
2.3. Diffie-Hellman ratchet . . . . . . . . . . . . . . . . . . . . . . . . . 6
2.4. Double Ratchet . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13
2.6. Out-of-order messages . . . . . . . . . . . . . . . . . . . . . . . . . 17
3. Double Ratchet 18
3.1. External functions . . . . . . . . . . . . . . . . . . . . . . . . . . . 18
3.2. State variables . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 19
3.3. Initialization . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 19
3.4. Encrypting messages . . . . . . . . . . . . . . . . . . . . . . . . . 20
3.5. Decrypting messages . . . . . . . . . . . . . . . . . . . . . . . . . 20
5. Implementation considerations 29
5.1. Integration with X3DH . . . . . . . . . . . . . . . . . . . . . . . . 29
5.2. Recommended cryptographic algorithms . . . . . . . . . . . . . . 30
6. Security considerations 31
6.1. Secure deletion . . . . . . . . . . . . . . . . . . . . . . . . . . . . 31
6.2. Recovery from compromise . . . . . . . . . . . . . . . . . . . . . . 31
6.3. Cryptanalysis and ratchet public keys . . . . . . . . . . . . . . . . 31
1
6.4. Deletion of skipped message keys . . . . . . . . . . . . . . . . . . 32
6.5. Deferring new ratchet key generation . . . . . . . . . . . . . . . . 32
6.6. Truncating authentication tags . . . . . . . . . . . . . . . . . . . . 32
6.7. Implementation fingerprinting . . . . . . . . . . . . . . . . . . . . 32
7. IPR 33
8. Acknowledgements 33
9. References 33
2
1. Introduction
The Double Ratchet algorithm is used by two parties to exchange encrypted
messages based on a shared secret key. Typically the parties will use some
key agreement protocol (such as X3DH [1]) to agree on the shared secret key.
Following this, the parties will use the Double Ratchet to send and receive
encrypted messages.
The parties derive new keys for every Double Ratchet message so that earlier keys
cannot be calculated from later ones. The parties also send Diffie-Hellman public
values attached to their messages. The results of Diffie-Hellman calculations
are mixed into the derived keys so that later keys cannot be calculated from
earlier ones. These properties gives some protection to earlier or later encrypted
messages in case of a compromise of a partys keys.
The Double Ratchet and its header encryption variant are presented below, and
their security properties are discussed.
2. Overview
3
KDF key
Key
Input In KDF
Out
Key
Input In KDF
Out
Key
Input In KDF
Out
A KDF chain has the following properties (using terminology adapted from [4]):
Resilience: The output keys appear random to an adversary without
knowledge of the KDF keys. This is true even if the adversary can control
the KDF inputs.
Forward security: Output keys from the past appear random to an
adversary who learns the KDF key at some point in time.
Break-in recovery: Future output keys appear random to an adversary
who learns the KDF key at some point in time, provided that future inputs
have added sufficient entropy.
In a Double Ratchet session between Alice and Bob each party stores a KDF
key for three chains: a root chain, a sending chain, and a receiving chain
(Alices sending chain matches Bobs receiving chain, and vice versa).
As Alice and Bob exchange messages they also exchange new Diffie-Hellman
4
public keys, and the Diffie-Hellman output secrets become the inputs to the
root chain. The output keys from the root chain become new KDF keys for the
sending and receiving chains. This is called the Diffie-Hellman ratchet.
The sending and receiving chains advance as each message is sent and received.
Their output keys are used to encrypt and decrypt messages. This is called the
symmetric-key ratchet
The next sections explain the symmetric-key and Diffie-Hellman ratchets in more
detail, then show how they are combined into the Double Ratchet.
Every message sent or received is encrypted with a unique message key. The
message keys are output keys from the sending and receiving KDF chains. The
KDF keys for these chains will be called chain keys.
The KDF inputs for the sending and receiving chains are constant, so these
chains dont provide break-in recovery. The sending and receiving chains just
ensure that each message is encrypted with a unique key that can be deleted
after encryption or decryption. Calculating the next chain key and message key
from a given chain key is a single ratchet step in the symmetric-key ratchet.
The below diagram shows two steps:
Chain key
Key
Constant In KDF
Out
Key
Constant In KDF
Out
5
Because message keys arent used to derive any other keys, message keys may
be stored without affecting the security of other message keys. This is useful for
handling lost or out-of-order messages (see Section 2.6).
If an attacker steals one partys sending and receiving chain keys, the attacker can
compute all future message keys and decrypt all future messages. To prevent this,
the Double Ratchet combines the symmetric-key ratchet with a DH ratchet
which updates chain keys based on Diffie-Hellman outputs.
To implement the DH ratchet, each party generates a DH key pair (a Diffie-
Hellman public key and private key) which becomes their current ratchet key
pair. Every message from either party begins with a header which contains the
senders current ratchet public key. When a new ratchet public key is received
from the remote party, a DH ratchet step is performed which replaces the
local partys current ratchet key pair with a new key pair.
This results in a ping-pong behavior as the parties take turns replacing
ratchet key pairs. An eavesdropper who briefly compromises one of the parties
might learn the value of a current ratchet private key, but that private key
will eventually be replaced with an uncompromised one. At that point, the
Diffie-Hellman calculation between ratchet key pairs will define a DH output
unknown to the attacker.
The following diagrams show how the DH ratchet derives a shared sequence of
DH outputs.
Alice is initialized with Bobs ratchet public key. Alices ratchet public key isnt
yet known to Bob. As part of initialization Alice performs a DH calculation
between her ratchet private key and Bobs ratchet public key:
Alice Bob
DH DH output
6
Alices initial messages advertise her ratchet public key. Once Bob receives one
of these messages, Bob performs a DH ratchet step: He calculates the DH output
between Alices ratchet public key and his ratchet private key, which equals
Alices initial DH output. Bob then replaces his ratchet key pair and calculates
a new DH output:
Alice Bob
DH DH output = DH output DH
DH output DH
7
Messages sent by Bob advertise his new public key. Eventually, Alice will receive
one of Bobs messages and perform a DH ratchet step, replacing her ratchet key
pair and deriving two DH outputs, one that matches Bobs latest and a new one:
Alice Bob
DH DH output = DH output DH
DH DH output = DH output DH
DH DH output
8
Messages sent by Alice advertise her new public key. Eventually, Bob will receive
one of these messages and perform a second DH ratchet step, and so on:
Alice Bob
DH DH output = DH output DH
DH DH output = DH output DH
DH DH output = DH output DH
DH output DH
9
The DH outputs generated during each DH ratchet step are used to derive new
sending and receiving chain keys. The below diagram revisits Bobs first ratchet
step. Bob uses his first DH output to derive a receiving chain that matches
Alices sending chain. Bob uses the second DH output to derive a new sending
chain:
Alice Bob
Sending chain DH
10
As the parties take turns performing DH ratchet steps, they take turns introducing
new sending chains:
Alice Bob
DH Sending chain
11
However, the above picture is a simplification. Instead of taking the chain
keys directly from DH outputs, the DH outputs are used as KDF inputs to a
root chain, and the KDF outputs from the root chain are used as sending and
receiving chain keys. Using a KDF chain here improves resilience and break-in
recovery.
So a full DH ratchet step consists of updating the root KDF chain twice, and
using the KDF output keys as new receiving and sending chain keys:
Root key
Key
DH In KDF
Out
Key
DH In KDF
Out
Root key
12
2.4. Double Ratchet
RK CK
When Alice sends her first message A1, she applies a symmetric-key ratchet step
to her sending chain key, resulting in a new message key (message keys will be
labelled with the message they encrypt or decrypt). The new chain key is stored,
but the message key and old chain key can be deleted:
RK CK
Symmetric-key
ratchet
CK A1
13
If Alice next receives a response B1 from Bob, it will contain a new ratchet
public key (Bobs public keys are labelled with the message when they were first
received). Alice applies a DH ratchet step to derive new receiving and sending
chain keys. Then she applies a symmetric-key ratchet step to the receiving chain
to get the message key for the received message:
RK
RK CK
CK A1
B1
RK CK CK
14
Suppose Alice next sends a message A2, receives a message B2 with Bobs old
ratchet public key, then sends messages A3 and A4. Alices sending chain will
ratchet three steps, and her receiving chain will ratchet once:
RK
RK CK
CK A1
B1
RK CK CK
CK A2 CK B1
3 steps
CK A3 CK B2
1 step
CK A4
15
Suppose Alice then receives messages B3 and B4 with Bobs next ratchet key,
then sends a message A5. Alices final state will be as follows:
RK
RK CK
CK A1
B1
RK CK CK
CK A2 CK B1
CK A3 CK B2
CK A4
Before B3
B3
RK CK CK
CK A5 CK B3
CK B4
16
2.6. Out-of-order messages
RK CK CK
CK A2 CK B1
CK A3 CK B2
Before B4 CK A4
RK CK CK
CK B3
CK B4
17
3. Double Ratchet
To instantiate the Double Ratchet requires defining the following functions. For
recommendations, see Section 5.2.
GENERATE_DH(): Returns a new Diffie-Hellman key pair.
DH(dh_pair, dh_pub): Returns the output from the Diffie-Hellman
calculation between the private key from the DH key pair dh_pair and
the DH public key dh_pub. If the DH function rejects invalid public keys,
then this function may raise an exception which terminates processing.
KDF_RK(rk, dh_out): Returns a pair (32-byte root key, 32-byte chain
key) as the output of applying a KDF keyed by a 32-byte root key rk to a
Diffie-Hellman output dh_out.
KDF_CK(ck): Returns a pair (32-byte chain key, 32-byte message key)
as the output of applying a KDF keyed by a 32-byte chain key ck to some
constant.
ENCRYPT(mk, plaintext, associated_data): Returns an AEAD
encryption of plaintext with message key mk [5]. The associated_data is
authenticated but is not included in the ciphertext. Because each message
key is only used once, the AEAD nonce may handled in several ways: fixed
to a constant; derived from mk alongside an independent AEAD encryption
key; derived as an additional output from KDF_CK(); or chosen randomly
and transmitted.
DECRYPT(mk, ciphertext, associated_data): Returns the AEAD
decryption of ciphertext with message key mk. If authentication fails, an
exception will be raised that terminates processing.
HEADER(dh_pair, pn, n): Creates a new message header containing
the DH ratchet public key from the key pair in dh_pair, the previous chain
length pn, and the message number n. The returned header object contains
ratchet public key dh and integers pn and n.
CONCAT(ad, header): Encodes a message header into a parseable byte
sequence, prepends the ad byte sequence, and returns the result. If ad is
not guaranteed to be a parseable byte sequence, a length value should be
prepended to the output to ensure that the output is parseable as a unique
pair (ad, header).
A MAX_SKIP constant also needs to be defined. This specifies the maximum
number of message keys that can be skipped in a single chain. It should be set
high enough to tolerate routine lost or delayed messages, but low enough that a
malicious sender cant trigger excessive recipient computation.
18
3.2. State variables
3.3. Initialization
Prior to initialization both parties must use some key agreement protocol to
agree on a 32-byte shared secret key SK and Bobs ratchet public key. These
values will be used to populate Alices sending chain key and Bobs root key.
Bobs chain keys and Alices receiving chain key will be left empty, since they
are populated by each partys first DH ratchet step.
(This assumes Alice begins sending messages first, and Bob doesnt send messages
until he has received one of Alices messages. To allow Bob to send messages
immediately after initialization Bobs sending chain key and Alices receiving
chain key could be initialized to a shared secret. For the sake of simplicity we
wont consider this further.)
Once Alice and Bob have agreed on SK and Bobs ratchet public key, Alice calls
RatchetInitAlice() and Bob calls RatchetInitBob():
def RatchetInitAlice(state, SK, bob_dh_public_key):
state.DHs = GENERATE_DH()
state.DHr = bob_dh_public_key
state.RK, state.CKs = KDF_RK(SK, DH(state.DHs, state.DHr))
state.CKr = None
state.Ns = 0
state.Nr = 0
state.PN = 0
state.MKSKIPPED = {}
19
def RatchetInitBob(state, SK, bob_dh_key_pair):
state.DHs = bob_dh_key_pair
state.DHr = None
state.RK = SK
state.CKs = None
state.CKr = None
state.Ns = 0
state.Nr = 0
state.PN = 0
state.MKSKIPPED = {}
20
def RatchetDecrypt(state, header, ciphertext, AD):
plaintext = TrySkippedMessageKeys(state, header, ciphertext, AD)
if plaintext != None:
return plaintext
if header.dh != state.DHr:
SkipMessageKeys(state, header.pn)
DHRatchet(state, header)
SkipMessageKeys(state, header.n)
state.CKr, mk = KDF_CK(state.CKr)
state.Nr += 1
return DECRYPT(mk, ciphertext, CONCAT(AD, header))
21
4. Double Ratchet with header encryption
4.1. Overview
This section describes the header encryption variant of the Double Ratchet.
Message headers contain ratchet public keys and (PN, N ) values. In some cases
it may be desirable to encrypt the headers so that an eavesdropper cant tell
which messages belong to which sessions, or the ordering of messages within a
session.
With header encryption each party stores a symmetric header key and next
header key for both the sending and receiving directions. The sending header
key is used for encrypting headers for the current sending chain.
When a recipient receives a message she must first associate the message with
its relevant Double Ratchet session (assuming she has different sessions with
different parties). How this is done is outside of the scope of this document,
although the Pond protocol offers some ideas [6].
After associating the message with a session, the recipient attempts to decrypt
the header with that sessions receiving header key, next header key, and any
header keys corresponding to skipped messages. Successful decryption with the
next header key indicates the recipient must perform a DH ratchet step. During
a DH ratchet step the next header keys replace the current header keys, and
new next header keys are taken as additional output from the root KDF.
In the below diagram Alice has been initialized with Bobs ratchet public key
and shared secrets for the initial root key, the sending header key (HK ), and the
receiving next header key (NHK ). As part of initialization Alice generates her
ratchet key pair and updates the root chain to derive a new root key, sending
chain key, and sending next header key (NHK ):
RK CK NHK HK NHK
22
When Alice sends her first message A1, she encrypts its header with the sending
header key she was initialized with:
RK
RK CK NHK HK NHK
CK A1
If Alice next receives a response B1 from Bob, its header will be encrypted with
the receiving next header key that she was initialized with. Alice applies a DH
ratchet step which shifts the next header keys into the current header keys, and
generates new next header keys:
RK
RK CK NHK HK NHK
CK A1
B1
RK CK NHK HK CK NHK HK
CK B1
23
Alice next sends a message A2, then receives a message B2 using the current
receiving header key and containing the same ratchet public key she received in
message B1. Alice then sends messages A3 and A4. The current header keys
are used for all sent and received messages:
RK
RK CK NHK HK NHK
CK A1
B1
RK CK NHK HK CK NHK HK
CK A2 CK B1
CK A3 CK B2
CK A4
24
Alice then receives message B3 containing Bobs next ratchet key and with its
header encrypted by the next receiving header key. Successful header decryption
with the next header key will trigger a DH ratchet step. Alice then receives B4
with the same ratchet key and header key, then sends a message A5. Alices
final state will be as follows:
RK
RK CK NHK HK NHK
CK A1
B1
RK CK NHK HK CK NHK HK
CK A2 CK B1
CK A3 CK B2
CK A4
Before B3
B3
RK CK NHK HK CK NHK HK
CK A5 CK B3
CK B4
25
4.2. External functions
4.4. Initialization
Some additional shared secrets must be used to initialize the header keys:
Alices sending header key and Bobs next receiving header key must be
set to the same value, so that Alices first message triggers a DH ratchet
step for Bob.
Alices next receiving header key and Bobs next sending header key must
be set to the same value, so that after Bobs first DH ratchet step, Bobs
next message triggers a DH ratchet step for Alice.
Once Alice and Bob have agreed on SK, Bobs ratchet public key, and these
additional values, Alice calls RatchetInitAliceHE() and Bob calls RatchetInit-
BobHE():
26
def RatchetInitAliceHE(state, SK, bob_dh_public_key, shared_hka, shared_nhkb):
state.DHRs = GENERATE_DH()
state.DHRr = bob_dh_public_key
state.RK, state.CKs, state.NHKs = KDF_RK_HE(SK, DH(state.DHRs, state.DHRr))
state.CKr = None
state.Ns = 0
state.Nr = 0
state.PN = 0
state.MKSKIPPED = {}
state.HKs = shared_hka
state.HKr = None
state.NHKr = shared_nhkb
27
4.6. Decrypting messages
28
def DHRatchetHE(state, header):
state.PN = state.Ns
state.Ns = 0
state.Nr = 0
state.HKs = state.NHKs
state.HKr = state.NHKr
state.DHRr = header.dh
state.RK, state.CKr, state.NHKr = KDF_RK_HE(state.RK, DH(state.DHRs, state.DHRr))
state.DHRs = GENERATE_DH()
state.RK, state.CKs, state.NHKs = KDF_RK_HE(state.RK, DH(state.DHRs, state.DHRr))
5. Implementation considerations
The Double Ratchet algorithm can be used in combination with the X3DH key
agreement protocol [1]. The Double Ratchet plays the role of a post-X3DH
protocol which takes the session key SK negotiated by X3DH and uses it as the
Double Ratchets initial root key.
The following outputs from X3DH are used by the Double Ratchet:
The SK output from X3DH becomes the SK input to Double Ratchet
initialization (see Section 3.3).
The AD output from X3DH becomes the AD input to Double Ratchet
encryption and decryption (see Section 3.4 and Section 3.5).
Bobs signed prekey from X3DH (SPKB ) becomes Bobs initial ratchet
public key (and corresponding key pair) for Double Ratchet initialization.
Any Double Ratchet message encrypted using Alices initial sending chain can
serve as an initial ciphertext for X3DH. To deal with the possibility of lost or
out-of-order messages, a recommended pattern is for Alice to repeatedly send
the same X3DH initial message prepended to all of her Double Ratchet messages
until she receives Bobs first Double Ratchet response message.
29
5.2. Recommended cryptographic algorithms
30
6. Security considerations
Because all DH ratchet computations are mixed into the root key, an attacker
who can decrypt a session with passive cryptanalysis might lose this ability if
she fails to observe some ratchet public key.
This is not a reliable countermeasure against cryptanalysis, of course. If weak-
nesses are discovered in any of the cryptographic algorithms a session relies upon,
the session should be discarded and replaced with a new session using strong
cryptography.
31
6.4. Deletion of skipped message keys
During each DH ratchet step a new ratchet key pair and sending chain are
generated. As the sending chain is not needed right away, these steps could be
deferred until the party is about to send a new message. This would slightly
increase security by shortening the lifetime of ratchet keys, at the cost of some
complexity.
If this protocol is used in settings with anonymous parties, care should be taken
that implementations behave identically in all cases.
In an anonymous context, implementations are advised to follow the algorithms
from Sections 3 and 4 precisely. Such implementations are also advised to use
identical limits for the number of skipped message keys stored, and identical
32
deletion policies for skipped message keys. Deletion policies should be based on
deterministic events (e.g. messages received), rather than time.
7. IPR
This document is hereby placed in the public domain.
8. Acknowledgements
This algorithm was designed by Trevor Perrin and Moxie Marlinspike.
The concept of a Diffie-Hellman ratchet was taken from the OTR protocol by
Nikita Borisov, Ian Goldberg, and Eric Brewer [12].
Symmetric-key ratcheting is an old idea [13], [14]. Its been used in recent
protocols like SCIMP and MinimaLT [15][17].
The term ratchet for forward-secure key updating was introduced by Adam
Langley in Pond [18].
Thanks to Michael Rogers and Adam Back for mailing list discussions [19].
Thanks to Adam Langley for discussion on improving the receiving algorithm.
The security of this protocol and similar protocols has been analyzed by Katriel
Cohn-Gordon, Cas Cremers, Benjamin Dowling, Luke Garratt, and Douglas
Stebila [20], [21].
Thanks to Tom Ritter, Joseph Bonneau, Ximin Luo, Yan Zhu, Samuel Neves,
Raphael Arias, and David J. Wu for editorial feedback.
9. References
[1] T. Perrin and M. Marlinspike, The X3DH Key Agreement Protocol, 2016.
https://whispersystems.org/docs/specifications/x3dh/
[2] H. Krawczyk, M. Bellare, and R. Canetti, HMAC: Keyed-Hashing for Message
Authentication. Internet Engineering Task Force; RFC 2104 (Informational);
IETF, Feb-1997. http://www.ietf.org/rfc/rfc2104.txt
[3] H. Krawczyk and P. Eronen, HMAC-based Extract-and-Expand Key Deriva-
tion Function (HKDF). Internet Engineering Task Force; RFC 5869 (Informa-
tional); IETF, May-2010. http://www.ietf.org/rfc/rfc5869.txt
[4] B. Barak and S. Halevi, A model and architecture for pseudo-random
generation with applications to /dev/random. Cryptology ePrint Archive,
33
Report 2005/029, 2005. http://eprint.iacr.org/2005/029
[5] P. Rogaway, Authenticated-encryption with Associated-data, in Proceedings
of the 9th ACM Conference on Computer and Communications Security, 2002.
http://web.cs.ucdavis.edu/~rogaway/papers/ad.pdf
[6] A. Langley, Pond, 2012. https://github.com/agl/pond
[7] A. Langley, M. Hamburg, and S. Turner, Elliptic Curves for Security.
Internet Engineering Task Force; RFC 7748 (Informational); IETF, Jan-2016.
http://www.ietf.org/rfc/rfc7748.txt
[8] NIST, FIPS 180-4. Secure Hash Standard (SHS), National Institute
of Standards & Technology, Gaithersburg, MD, United States, 2012. http:
//csrc.nist.gov/publications/fips/fips180-4/fips-180-4.pdf
[9] P. Rogaway and T. Shrimpton, A Provable-security Treatment of the Key-
wrap Problem, in Proceedings of the 24th Annual International Conference
on The Theory and Applications of Cryptographic Techniques, 2006. http:
//web.cs.ucdavis.edu/~rogaway/papers/keywrap.html
[10] NIST, FIPS 197. Advanced Encryption Standard, National Institute
of Standards & Technology, Gaithersburg, MD, United States, 2001. http:
//csrc.nist.gov/publications/fips/fips197/fips-197.pdf
[11] B. Kaliski, PKCS #7: Cryptographic Message Syntax Version 1.5. Internet
Engineering Task Force; RFC 2315 (Informational); IETF, Mar-1998. http:
//www.ietf.org/rfc/rfc2315.txt
[12] N. Borisov, I. Goldberg, and E. Brewer, Off-the-record Communication, or,
Why Not to Use PGP, in Proceedings of the 2004 acm workshop on privacy in
the electronic society, 2004. http://doi.acm.org/10.1145/1029179.1029200
[13] M. Abdalla and M. Bellare, Increasing the Lifetime of a Key: A Comparative
Analysis of the Security of Re-keying Techniques, in Advances in Cryptology -
ASIACRYPT 2000, 6th International Conference on the Theory and Application
of Cryptology and Information Security, 2000. https://cseweb.ucsd.edu/~mihir/
papers/rekey.html
[14] B. Olson, Key Coercion after encrypted message transmission. sci.crypt,
1994. https://groups.google.com/d/topic/sci.crypt/3MJzGwiTZ10/discussion
[15] Wikipedia, Silent Circle Instant Messaging Protocol Wikipedia, The
Free Encyclopedia. 2016. https://en.wikipedia.org/w/index.php?title=Silent_
Circle_Instant_Messaging_Protocol
[16] G. Belvin, A Secure Text Messaging Protocol. Cryptology ePrint Archive,
Report 2014/036, 2014. http://eprint.iacr.org/2014/036
[17] W. M. Petullo, X. Zhang, J. A. Solworth, D. J. Bernstein, and T. Lange,
MinimaLT: Minimal-latency Networking Through Better Security, in Proceed-
34
ings of the 2013 ACM SIGSAC Conference on Computer & Communications
Security, 2013. http://doi.acm.org/10.1145/2508859.2516737
[18] A. Langley, Pond/README.md, 2012. https://github.com/agl/pond/
commit/7bb06244b9aa121d367a6d556867992d1481f0c8
[19] M. Rogers and A. Back, Asynchronous forward secrecy encryption. Cryp-
tography mailing list, 2013. http://lists.randombit.net/pipermail/cryptography/
2013-September/005327.html
[20] K. Cohn-Gordon, C. Cremers, B. Dowling, L. Garratt, and D. Stebila, A
Formal Security Analysis of the Signal Messaging Protocol. Cryptology ePrint
Archive, Report 2016/1013, 2016. http://eprint.iacr.org/2016/1013
[21] K. Cohn-Gordon, C. Cremers, and L. Garratt, On Post-Compromise
Security. Cryptology ePrint Archive, Report 2016/221, 2016. http://eprint.iacr.
org/2016/221
35