How secure is BBM? Not very.

by Volker Weber

Time for a bit of b/s detection around BBM. First, the party line.

BBM lets you chat and share with a speed, control and privacy you can’t get on other instant messenger apps.

How is this privacy enabled? There are two layers of encryption:

  1. The smartphone communicates with the BlackBerry infrastructure via TLS.
  2. Messages are scrambled with a Triple DES 168-bit key.

TLS ensures transport security. However, when the message comes out at the server end, it becomes readable. Notice the word scramble instead of encrypt. All BBM messages are scrambled with the same key. Yes, you read this correctly. The same key. As a BES administrator you can create a different key, by which you create an island, where all your users can communicate with each other, but not with anyone else outside your organization*.

This is where BBM Protected comes into play. It offers a third level of encryption:

Messages between BBM Protected users are encrypted using a PGP like model. The sender and recipient have unique public / private encryption and signing keys. These keys are generated on the device, by the FIPS 140-2 certified cryptographic library, and are controlled by the enterprise. BBM and BlackBerry are not involved in brokering the key exchanges so at no time are they stored within the BlackBerry infrastructure. Plus, each message uses a new random symmetric key for message encryption. Even if one message in a conversation were somehow compromised, the remaining messages would remain protected.

Translated into plain engineering terms: BBM Protected uses a public key infrastructure. For each message a new symmetric cipher key is created and encrypted with the public key of the receiver. The message itself is encrypted with the symmetric cipher key. Then both the keys and the cipher text are transmitted over the existing two security layers of the BBM infrastructure. Assuming your BES is secure, this will protect the privacy of your messages.

Why is the symmetric key necessary? Two reasons: first, BBM can send large volumes of data, where the asymmetric encryption is too slow. And second, you can encrypt the message for multiple recipients once and then just encrypt the cipher key for all recipients individually. This will also provide an audit trail, if you encrypt the cipher key for your audit archive.

Management summary: BBM Protected may be secure. BBM probably is not.

ad *) There is a requirement in regulated industries such as finance to provide an audit trail for all communications. Easy for email on your own servers, not so easy for messaging provided by a vendor. Therefore there is an option to provide that audit trail for BBM. The BES administrator can log all BBM messages to log file or send to an email address.

Comments

the link you provided regarding BBM logging is only available on BES 5 (and therefore legacy devices). With BB10 OS the BBM always run in the personal perimeter which means it cannot be audited at the moment. However, this is going to change with BBM Protected which then is able to run in the work perimeter, too.

I never understood how many enterprises are tolerating IM´s without ANY security measurements or even SMS. BBM might not be "secure" but the basic security it delivers out of the box (for about a decade now!) is much better than what is integrated in 95% of the other IM´s. The key that is used to scramble the BBM´s is not public knowledge and even if it would be it´s still provides the TLS-layer from the device to the BlackBerry NOC which makes it unlikely that that someone reads a BBM message just by using any packet capture software in an internet cafe (hello WhatsApp! ;)

Anyway, for secure corporate IM it is recommended to use the Enterprise Messenger through BES5/BES10 which allows to connect to a Sametime or Lync environment, this also integrates Desktop users. In this case the enterprise has control over the encryption keys.
I

Bastian Anthon, 2014-06-13 09:48

Public knowledge or not, the same key for all users is not secure. And messengers with public key encryption are indeed available today, but not widely used.

Volker Weber, 2014-06-13 10:31

Post a comment








Shall I remember this for you?




Use your full name and a working email address. Unless you want your comment to be removed. No kidding.



Recent comments

Volker Weber on Ello at 14:28
Benjamin Rohrschneider on Ello at 14:27
Benjamin Rohrschneider on Ello at 14:25
Volker Weber on Ello at 12:18
Oliver Barner on Ello at 11:29
Volker Weber on Ello at 09:51
Detlev Buschkamp on Waage at 08:40
Sascha Westphal on Ello at 23:53
Armin Grewe on GoPro Accessories at 22:17
Carl tyler on GoPro Accessories at 20:45
Jochen Schug on Ello at 18:50
Jochen Schug on GoPro Accessories at 18:48
rainer kraemer on Ello at 18:36
Susanne Kastner on Ello at 18:01
Martin Pürschel on Ello at 11:20
Ursus Schneider on Ello at 11:20
Martin Pürschel on Ello at 11:17
Volker Weber on Instagram Hyperlapse at 09:32
Alexander Hauser on Instagram Hyperlapse at 09:17
Ursus Schneider on Ello at 08:48
Volker Weber on Waage at 23:21
Marc Egart on Waage at 23:13
Helmar Steinberg on Ello at 23:10
Volker Weber on Ello :: Ein soziales Netzwerk, das Datenschutz verspricht und auf Werbung verzichtet at 23:05
Alexander Schäfer on Waage at 21:28

Ceci n'est pas un blog

vowe.net is a personal website published by Volker Weber a.k.a. vowe. I am an author, consultant and systems architect based in Darmstadt, Germany.

rss Click here to subscribe

Hello

About me
Contact
Publications
Certificates
Amazon Wish List
Frequently Asked Questions
Follow @vowe on Twitter

Local time is 16:10

visitors.gif

Tip jar

Archives

As most of my articles roll off the front page rather quickly, I am making an archive of previous posts available here. You can also use the handy search box at the top of the page if you are looking for something particular.

Last 30 days
More archives

Mobile tag for this page

© 1992-2014 Volker Weber.
All Rights Reserved.

Impressum