Systems Architecture Receiver Anonymity Matthias Füssel, Dennis Schneider June 5, 2007.

Slides:



Advertisements
Similar presentations
Public Key Cryptosystem
Advertisements

Data Security 1 El_Gamal Cryptography. Data Security2 Introduction El_Gamal is a public-key cryptosystem technique El_Gamal is a public-key cryptosystem.
CS555Topic 191 Cryptography CS 555 Topic 19: Formalization of Public Key Encrpytion.
Authentication and Digital Signatures CSCI 5857: Encoding and Encryption.
7. Asymmetric encryption-
Reusable Anonymous Return Channels
CC3.12 Erdal KOSE Privacy & Digital Security Encryption.
Certificateless encryption and its infrastructures Dr. Alexander W. Dent Information Security Group Royal Holloway, University of London.
Mar 5, 2002Mårten Trolin1 Previous lecture More on hash functions Digital signatures Message Authentication Codes Padding.
Introduction to Signcryption November 22, /11/2004 Signcryption Public Key (PK) Cryptography Discovering Public Key (PK) cryptography has made.
UMBC Protocol Meeting 10/01/03 Universal Re-encryption: For Mix-Nets and Other Applications (to appear CT-RSA ’04) Paul Syverson NRL Markus Jakobsson Ari.
Fall 2010/Lecture 311 CS 426 (Fall 2010) Public Key Encryption and Digital Signatures.
ASYMMETRIC CIPHERS.
Receiver Anonymity via Incomparable Public Keys Brent R. Waters, Edward W. Felten, and Amit Sahai Department of Computer Science Princeton University.
Public Key Model 8. Cryptography part 2.
CS5204 – Fall Cryptographic Security Presenter: Hamid Al-Hamadi October 13, 2009.
Lecture 19 Page 1 CS 111 Online Symmetric Cryptosystems C = E(K,P) P = D(K,C) E() and D() are not necessarily the same operations.
10/1/2015 9:38:06 AM1AIIS. OUTLINE Introduction Goals In Cryptography Secrete Key Cryptography Public Key Cryptograpgy Digital Signatures 2 10/1/2015.
1 Architectural Support for Copy and Tamper Resistant Software David Lie, Chandu Thekkath, Mark Mitchell, Patrick Lincoln, Dan Boneh, John Mitchell and.
By Yernar.  Background  Key generation  Encryption  Decryption  Preset Bits  Example.
Cryptography and Network Security Chapter 10 Fifth Edition by William Stallings Lecture slides by Lawrie Brown.
Key Exchange Methods Diffie-Hellman and RSA CPE 701 Research Case Study Derek Eiler | April 2012.
CPS 290 Computer Security Network Tools Cryptography Basics CPS 290Page 1.
15-499Page :Algorithms and Applications Cryptography I – Introduction – Terminology – Some primitives – Some protocols.
Authenticated Key Exchange I. Definitions I. MAP I. matching conversations II. oracles II. (I)KA II. AKEP2 III. AKEP2 Security I. Session Keys II. Perfect.
Zero Knowledge Proofs Matthew Pouliotte Anthony Pringle Cryptography November 22, 2005 “A proof is whatever convinces me.” -~ Shimon Even.
Department of Computer Science Chapter 5 Introduction to Cryptography Semester 1.
1 Anonymity. 2 Overview  What is anonymity?  Why should anyone care about anonymity?  Relationship with security and in particular identification 
@Yuan Xue 285: Network Security CS 285 Network Security Digital Signature Yuan Xue Fall 2012.
IMAGE AUTHENTICATION TECHNIQUES Based on Automatic video surveillance (AVS) systems Guided by: K ASTURI MISHRA PRESENTED BY: MUKESH KUMAR THAKUR REG NO:
What is in a name? Identity-based cryptography. How public-key crypto works When you use public key cryptography, you can publish a value (public key)
Cryptography By: Nick Belhumeur. Overview What is Cryptography? What is Cryptography? 2 types of cryptosystems 2 types of cryptosystems Example of Encryption.
최신정보보호기술 경일대학교 사이버보안학과 김 현성.
Basics of Cryptography
Attacks on Public Key Encryption Algorithms
Encryption and Integrity
Key Exchange References: Applied Cryptography, Bruce Schneier
CPS 512 Distributed Systems
Vocabulary Big Data - “Big data is a broad term for datasets so large or complex that traditional data processing applications are inadequate.” Moore’s.
Cryptography Reference: Network Security
Cryptography Reference: Network Security
e-Health Platform End 2 End encryption
Public Key Encryption and Digital Signatures
Some slides borrowed from Philippe Golle, Markus Jacobson
Handbook of Applied Cryptography - CH8, Public-Key Encryption
Encryption
Cryptography.
Presented by: Dr. Munam Ali Shah
NET 311 Information Security
Receiver Anonymity via Incomparable Public Keys
Pooja programmer,cse department
Real-world Security of Public Key Crypto
PART VII Security.
NET 311 Information Security
The Secure Sockets Layer (SSL) Protocol
Key Management Network Systems Security
NET 311 Information Security
Where Complexity Finally Comes In Handy…
Digital Signatures Reference: Pfleeger , Charles P., Security in Computing, 2nd Edition, Prentice Hall, /7/2019 Ref: Pfleeger96, Ch.4.
Key Distribution Reference: Pfleeger, Charles P., Security in Computing, 2nd Edition, Prentice Hall, /18/2019 Ref: Pfleeger96, Ch.4.
Chapter 29 Cryptography and Network Security
Where Complexity Finally Comes In Handy…
Asymmetric Cryptographic Algorithms
Introduction to Cryptography
刘振 上海交通大学 计算机科学与工程系 电信群楼3-509
Review of Cryptography: Symmetric and Asymmetric Crypto Advanced Network Security Peter Reiher August, 2014.
Where Complexity Finally Comes In Handy…
LAB 3: Digital Signature
Presentation transcript:

Systems Architecture Receiver Anonymity Matthias Füssel, Dennis Schneider June 5, 2007

2 May Systems Architecture Overview  Introduction  Examples  Standard communication scenario  Research Overview  Three criteria for receiver anonymity  ElGamal  Incomparable Public Keys  Properties of the Incomparable Public Key system  Open problems and real world usage

3 May Systems Architecture Introduction

4 May Systems Architecture Example 1: Drug Study

5 May Systems Architecture Example 2: National Security

6 May Systems Architecture Standard Communication Scenario

7 May Systems Architecture Research Overview  Pfitzmann and Waidner (1986): multicast, marked messages - Implicit address: only receiver can identify message as being send to him - Invisible implicit address: addresses can't be compared for equivalence - Public key cryptosystem can be used  Bellare et al. (2001): Key-Privacy - Formalized as cryptographic security property - Given 2 public keys and a ciphertext encrypted with one of them, an adversary cannot gain information about what key has been used.

8 May Systems Architecture Research Overview  Chaum (1981), Goldschlag, Reed and Syverson (1997,99): anonymous reply addresses - Reply address: chain of routers and encryption instructions - Each router obscures relation between incoming and outgoing messages  Golle et al. (2003): Universal Reencryption - Can change encrypted message unforeseeably, knowing only the public key - However, same private key can be used to decrypt it

9 May Systems Architecture Three Criteria for receiver anonymity Criteria for receiver-anonymity-assuring systems:  The receiver may generate a multitude of identities: He choses can choose between a large number of identities to use with every sender for every message.  Incomparability of anonymous identities: No adversary can decide weather two identities belong to the same receiver.  Efficiency of the chosen solution: The solution should have reasonable performance.

10 May Systems Architecture Excursus: ElGamal  Asymmetric encryption system  Relies on the security of discrete logarithms Receiver:  Creates an efficient description of a finite cyclic group G of the order q and a generator g of that group  Choses x out of {0,1,..., q-1}, his private key  Calculates h = g x  Publishes his public key (G,g,q,h) Sender, gets (G,g,q,h), wants to send a message m:  Choses a random r out of {0,1,...,q-1}  Calculates c 1 = g r, c 2 = mh r  Transmits (c 1,c 2 )

11 May Systems Architecture Incomparable Public Keys (Waters, Felten, Sahai 2003) Network view:  Messages are sent to multicast groups  Every multicast group member tries to decode every message to that group  Only the intended receiver succeeds Cryptology:  Uses an asymmetric cryptosystem  With many public keys belonging to one private key  Every two public keys are incomparable, i.e. no adversary can tell weather they belong to the same private key  So only one private key suffices

12 May Systems Architecture Incomparable Public Keys: Usage The receiver  generates a private key a  Constructs public keys of the form (g, g a )  Sends his request r, one key pair and his multicast group address d to the sender The sender  Receives the request, generates an answer m  Uses random component r and (g, g a ) to encrypt m  Sends the encrypted message m' to the multicast group

13 May Systems Architecture Key Generation  Choose one prime p with q := (p-1)/2 also prime  Private key: - Choose x < q - Key: x  Public key (for a given private key x) - Randomly choose g: quadratic residue in Z p * - Store (g, g x ) in a hash table - Key: (g, g x )

14 May Systems Architecture Encryption Input: public key (g, g x ), message message  Choose key K for symmetric cipher  Choose exponent r for ElGamal  Encrypt message as: (g r, (g x ) r K), H(r), E K (r, (g, g x ), message) where  E is random encryption with a symmetric cipher  H is a secure random hash function

15 May Systems Architecture Decryption Input: ciphertext ((d, e), h, M), private key x  Calculate K := e / d x  Decrypt M using K: r, (g, g x ), message  Check that h = H(r)  Check that (g, g x ) is a public key in the hash table  Check that g r = d  If all tests pass, output message, otherwise ignore it

16 May Systems Architecture Other Possible Approaches  Standard Asymmetric Key Scheme: one public key for all senders  Several Independent Symmetric Keys: one symmetric key for each sender  Several Independent Public Keys: one public/private key pair per sender  Message Markers: one public/private key pair per sender, marked messages

17 May Systems Architecture Incomparable Public Keys: Properties Advantages  Fulfills 3 criteria - Many public keys for one private key - Public keys are incomparable - Efficient, only one decryption attempt per message  No markers on messages  Robust: message loss is irrelevant  One public key can be used many times w/o loss of anonymity Disadvantages  Ciphertexts have twice the length of the unencrypted messages  Every member of a multicast group tries to decode every message of that group

18 May Systems Architecture Open problems, real world usage  Unsuitable for most communication protocols (which require replies/new requests from our receiver): - Is interaction incompatible with anonymity?  Multicasting is more theory than practice  How are multicast groups formed?  Relies on other methods to distribute public keys  Receiver anonymity has only a few use cases, mainly web access, where multicast does not scale

19 May Systems Architecture References  Waters, Felten, Sahai: Receiver Anonymity via Incomparable Public Keys. in Proceedings of the 10th ACM conference on Computer and communication security, ACM Press, 2003  Danezis: Better Anonymous Communications. University of Cambridge, Computer Laboratory, 2004  Menezes, Oorschot, Vanstone: Handbook of Applied Cryptography, 1996, CRC Press  Wikipedia articles