LINE-Break: Cryptanalysis and Reverse Engineering of Letter Sealing

LINE is a popular messaging platform in Southeast Asia -- most notably Japan, Taiwan, Thailand, and Indonesia. It is particularly strong and an essential communication tool in Japan and Taiwan, with more than 85% of user adoption among the population.

We analyze its underlying end-to-end encryption (E2EE) protocol Letter Sealing v2 (LSv2) and show that a TLS Man-in-the-Middle (MitM) or malicious server can compromise integrity, authenticity, and confidentiality in various experimentally verified attacks.

Read the white paper

Overview

Letter Sealing is claimed to provide E2EE for text messages and media streams, ensuring that "no third parties or LINE Corporation can decrypt private calls and messages".

The company asserts confidentiality, partial forward security (between clients and servers only through TLS), integrity and authenticity. LSv2 employs standardized primitives, such as ECDH for static key exchange using X25519, and AES256-GCM for payload encryption.

Threat model

We consider realistic adversaries:

Our results

We present the following attacks:

Combining these attacks, we show how the adversary would theoretically be able to forge communications among a subset of parties in a group chat, or infiltrate a group chat and manipulate its following communication.

Experiments

The experiments were conducted using a MitM setup against an iOS client using a rogue root certificate, such that the adversary would be capable of tampering with protocol metadata in the same way as a malicious server. We captured videos of the replay and sticker leakage attacks in practice.

We interact with LINE servers through both the official application and an independent JavaScript implementation of the client-side portion of the protocol, called LINEJS.

Disclosure

Our findings were disclosed in 06/06/2025 to the LY Corporation Computer Security Incident Response Team and later confirmed by the Letter Sealing Team, who provided a statement in response.

Team

Anonymized due to requirements of an ongoing conference submission.