A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2013; you can also visit <a rel="external noopener" href="http://www.dmi.unict.it/diraimondo/web/wp-content/uploads/papers/otr.pdf">the original URL</a>. The file type is <code>application/pdf</code>.
<i title="ACM Press">
<a target="_blank" rel="noopener" href="https://fatcat.wiki/container/gstzkitjpfagfei6fz6yhj4apu" style="color: black;">Proceedings of the 2005 ACM workshop on Privacy in the electronic society - WPES '05</a>
At the 2004 Workshop on Privacy in the Electronic Society (WPES), Borisov, Goldberg and Brewer, presented "Off the Record Messaging" (OTR), a protocol designed to add endto-end security and privacy to Instant Messaging protocols. An open-source implementation of OTR is available and has achieved considerable success. In this paper we present a security analysis of OTR showing that, while the overall concept of the system is valid and attractive, the protocol suffers from security shortcomings<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1145/1102199.1102216">doi:10.1145/1102199.1102216</a> <a target="_blank" rel="external noopener" href="https://dblp.org/rec/conf/wpes/RaimondoGK05.html">dblp:conf/wpes/RaimondoGK05</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/jfr2gvrt35crzd67strre3t4jm">fatcat:jfr2gvrt35crzd67strre3t4jm</a> </span>
more »... e to the use of an insecure key-exchange protocol and other problematic design choices. On the basis of these findings, we propose alternative designs and improvements that strengthen the security of the system and provide the originally intended features of the protocol, including deniability, in a sound and well-defined sense. of information, including very sensitive data. As a consequence, the need to secure the email infrastructure has received plenty of attention, and solutions such as PGP [4, 27] and s/MIME  are widely available. Such solutions are designed to provide with the three pillars of secure communications, namely: Confidentiality: the content of communications should remain secret: an unauthorized person should not be able to learn any private information. Authentication: the recipient of information should have certainty about the sender of the information; no other person (or entity) should be able to impersonate the legitimate sender.
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20131005002607/http://www.dmi.unict.it/diraimondo/web/wp-content/uploads/papers/otr.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/f2/24/f2240d036da8e72caa8bcf09f45c7c8661120bca.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1145/1102199.1102216"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> acm.org </button> </a>