On the (im)possibility of perennial message recognition protocols without public-key cryptography Peeter Laud Cybernetica AS & University of Tartu

Slides:



Advertisements
Similar presentations
Key Management. Shared Key Exchange Problem How do Alice and Bob exchange a shared secret? Offline – Doesnt scale Using public key cryptography (possible)
Advertisements

MAC Raushan. DES simple fiestel network 3131 PlainText Blocks 2*4=8bits 31 f f =0011 xor 0011=0000 = 0 f(r,k)=(2*r+k^2)%8 f(1,5)=(2*1+5^2)%8=3 xor 3 3.
Last Class: The Problem BobAlice Eve Private Message Eavesdropping.
CIS 725 Key Exchange Protocols. Alice ( PB Bob (M, PR Alice (hash(M))) PB Alice Confidentiality, Integrity and Authenication PR Bob M, hash(M) M, PR Alice.
CSCI283 Fall 2005 GWU All slides from Bishop’s slide set Public Key Infrastructure (PKI)
1 Authenticated key agreement without using one-way hash functions Harn, L.; Lin, H.-Y. Electronics Letters, Volume: 37 Issue: 10, 10 May 2001 Presented.
Proactive Secure Mobile Digital Signatures Work in progress. Ivan Damgård and Gert Læssøe Mikkelsen University of Aarhus.
Symmetric Key Distribution Protocol with Hybrid Crypto Systems Tony Nguyen.
Chap 3: Key exchange protocols In most systems, we distinguish the short term keys from the long term ones: –A short term key (session key) is used to.
CMSC 414 Computer and Network Security Lecture 22 Jonathan Katz.
Modelling and Analysing of Security Protocol: Lecture 1 Introductions to Modelling Protocols Tom Chothia CWI.
EEC 688/788 Secure and Dependable Computing Lecture 7 Wenbing Zhao Department of Electrical and Computer Engineering Cleveland State University
Introduction to Modern Cryptography, Lecture 7/6/07 Zero Knowledge and Applications.
CMSC 414 Computer and Network Security Lecture 6 Jonathan Katz.
Diffie-Hellman Key Exchange
Alexander Potapov.  Authentication definition  Protocol architectures  Cryptographic properties  Freshness  Types of attack on protocols  Two-way.
Csci5233 Computer Security1 Bishop: Chapter 10 Key Management: Digital Signature.
Page 1 Secure Communication Paul Krzyzanowski Distributed Systems Except as otherwise noted, the content of this presentation.
Lecture 14 ISAKMP / IKE Internet Security Association and Key Management Protocol / Internet Key Exchange CIS CIS 5357 Network Security.
Based on Schneier Chapter 5: Advanced Protocols Dulal C. Kar.
Cryptography Wei Wu. Internet Threat Model Client Network Not trusted!!
Key Management Celia Li Computer Science and Engineering York University.
Using Cryptography for Network Security Common problems: –Authentication - A and B want to prove their identities to one another –Key-distribution - A.
Presented by: Suparita Parakarn Kinzang Wangdi Research Report Presentation Computer Network Security.
1 Reasoning about Concrete Security in Protocol Proofs A. Datta, J.Y. Halpern, J.C. Mitchell, R. Pucella, A. Roy.
Chapter 3 (B) – Key Management; Other Public Key Cryptosystems.
Advanced Database Course (ESED5204) Eng. Hanan Alyazji University of Palestine Software Engineering Department.
Correctness Proofs and Counter-model Generation with Authentication-Protocol Logic Koji Hasebe Mitsuhiro Okada Department of Philosophy, Keio University.
Using Cryptography for Network Security Common problems: –Authentication - A and B want to prove their identities to one another –Key-distribution - A.
Authentication Issues and Solutions CSCI 5857: Encoding and Encryption.
1 Chapter 10: Key Management in Public key cryptosystems Fourth Edition by William Stallings Lecture slides by Lawrie Brown (Modified by Prof. M. Singhal,
Diffie-Hellman Key Exchange Color Mixing Example Rick Stroud 21 September 2015 CSCE 522.
Protocol Analysis. CSCE Farkas 2 Cryptographic Protocols Two or more parties Communication over insecure network Cryptography used to achieve goal.
Key Management Network Systems Security Mort Anvari.
Lecture 9 Overview. Digital Signature Properties CS 450/650 Lecture 9: Digital Signatures 2 Unforgeable: Only the signer can produce his/her signature.
SECURITY. Security Threats, Policies, and Mechanisms There are four types of security threats to consider 1. Interception 2 Interruption 3. Modification.
Intrusion Resilience via the Bounded-Storage Model Stefan Dziembowski Warsaw University and CNR Pisa.
Apr 1, 2003Mårten Trolin1 Previous lecture Certificates and key management Non-interactive protocols –PGP SSL/TLS –Introduction –Phases –Commands.
CS480 Cryptography and Information Security Huiping Guo Department of Computer Science California State University, Los Angeles 14. Digital signature.
What is in a name? Identity-based cryptography. How public-key crypto works When you use public key cryptography, you can publish a value (public key)
Inconstructibility of certain two-party protocols in the perfect cryptography model Peeter Laud Cybernetica AS & University of Tartu
Encryption and Integrity
Key Exchange References: Applied Cryptography, Bruce Schneier
Computer Communication & Networks
Cryptographic Hash Function
CS480 Cryptography and Information Security
PPP – Point to Point Protocol
Encryption
Basic Network Encryption
Digital signatures.
The TESLA Broadcast Authentication Protocol CS 218 Fall 2017
Information Security message M one-way hash fingerprint f = H(M)
NET 311 Information Security
Public Key Infrastructure (PKI)
SSH: SECURE LOGIN CONNECTIONS OVER THE INTERNET
Celia Li Computer Science and Engineering York University
Data Integrity: Applications of Cryptographic Hash Functions
CDK4: Chapter 7 CDK5: Chapter 11 TvS: Chapter 9
Key Management Network Systems Security
Efficient Short-Password Key Exchange (ESP-KE)
Bishop: Chapter 10 Key Management: Digital Signature
Outline Using cryptography in networks IPSec SSL and TLS.
Lecture 10: Network Security.
CDK: Chapter 7 TvS: Chapter 9
Basic Network Encryption
Diffie/Hellman Key Exchange
Security: Integrity, Authentication, Non-repudiation
Outline A. Perrig, R. Szewczyk, V. Wen, D. Culler, and J. D. Tygar. SPINS: Security protocols for sensor networks. In Proceedings of MOBICOM, 2001 Sensor.
Secure Diffie-Hellman Algorithm
Presentation transcript:

On the (im)possibility of perennial message recognition protocols without public-key cryptography Peeter Laud Cybernetica AS & University of Tartu (joint work with Madeline González Muñiz)

Message recognition protocols Alice Bob Never met before Know nothing about each other Authentic channel Eve Later wants to send messages in an authentic manner How can we extend authenticity? Bob does not accept a that Eve has not sent This setup corresponds to certain trust models in ad hoc networks

A simple solution ● During the initialization phase, Alice generates signing key and verification key ● Alice sends verification key to Bob ● During the main phase, Alice signs the messages using the newly generated key ● Bob can verify the signatures

Another simple solution ● During the initialization phase, Alice and Bob perform a Diffie-Hellman key exchange ● They agree on a secret ● During the main phase, Alice sends to Bob

What if public-key cryptography is too expensive?

Using hash chains ● During initialization, Alice generates secret and defines ● Alice sends to Bob ● Main phase: the i-th send by Alice (of some M): ● Bob already knows and can verify Hash chains are not cheap, either. Need one of ● time ● memory or a combination of both

Problems: robustness ● Eve can cause Alice and Bob to go “out of sync” ● In the Jane Doe protocol, Bob sends back acknowledgments ● authenticated in the same way – Bob also creates a hash chain ● Alice and Bob do not move forward as long as they have not received the ACK for the previous message ● If Eve stops interfering, the messages from Alice will be accepted by Bob

Perenniality ● What if Eve goes away only after Alice and Bob have consumed their hash chains? ● A message recognition protocol is perennial if the number of rounds Alice and Bob can participate in is not limited during the initialization phase ● Perenniality — if Eve stops interfering then all messages sent by Alice will be accepted by Bob. ● Alice and Bob do not know if/when Eve stops

Authentic and perennial MRP-s ● Are there any authentic and perennial MRP-s that use only symmetric cryptography? ● symmetric encryption, hash functions, MAC-s, random numbers, one-way functions or permutations,... ● not too well defined – not signatures or Diffie-Hellman... ● Some have been proposed, all have been broken. ● We show that the answer is: No

Perfect cryptography model ● Messages — elements of a term algebra ● a given set of constructors ● given set of rules for message construction and taking apart – also applies to the adversary ● possibly: a congruence relation over messages – to model primitives like XOR

Synchronous communication ● Protocol proceeds in rounds ● In a round: Alice and Bob compute Eve computes accept

Communication rounds ● Both initialization and main phase can be modeled like this ● In the initialization phase: ● Alice decides when main phase starts ● Eve decides when to leave ● Payloads that Alice sends to Bob are determined by Eve

Message constructors ● Constants, nonces, payloads are messages ● If are messages then is a message ● If and are messages then is a message ● The congruence on messages expresses the properties of XOR ● there is a constant 0 ● Alice and Bob send sequences of messages to each other

Symmetric cryptography ● Hash functions and XOR capture symmetric cryptography ● is a random function ● Random permutation can be constructed from a random function using the Luby-Rackoff construction

Memories of Alice and Bob ● Alice and Bob have some internal state ● We do not care about its structure ● They also have message stores ● Sequence of messages, containing – nonces generated by him-/herself, – messages (presumably) received from the other party, – for Alice: payloads received from Eve ● Messages received from the network are added to the end of the message stores ● Messages to send to the other party are computed from the message stores

Common secrets ● A message s is a common secret for Alice and Bob, if ● it can be computed from Alice's message store ● it can be computed from Bob's message store ● it cannot be computed from Eve's view ● Proposition. Alice and Bob have no common secrets. ● Proof depends on properties of h and

Attacking the main phase ● There is a finite set of messages Z, such that ● As long as no message from Z “is sent” between Alice and Bob, Eve can simulate the traffic – Authenticity means: before Bob accepts a payload, a message in Z must be sent from Alice to Bob. ● Eve cannot simulate the step containing messages from Z, but can continue simulation after that – these messages are removed from Z ● Perenniality means: while Eve is not noticeable, Alice and Bob must work towards Bob accepting payloads ● Eventually Z will be empty and Eve can masquerade Alice

Simulation: more details ● Z is the set of submessages of messages changed during the initialization phase ● as long as XORs are not used ● Eve rewrites messages by replacing ● elements of Z ● new nonces generated by Alice or Bob ● with new nonces of her own ● if Alice [Bob] sends a message to Bob [Alice], such that an element z ∈ Z can be found then Eve removes z from Z and continues.

Simulation: considering XOR-s ● The set Z also contains the XOR-s of all submessages of messages sent during the initialization phase ● remove from Z the messages that Eve knows ● Now it is possible to learn an element of Z without this element actually being sent as a message

Simulation: about the proof ● A homomorphism of messages is a homomorphism of the underlying algebra ● A party cannot notice a monomorphism applied to its message store ● Eve's translation defines a mapping φ on ● Alice's nonces – φ(r)=r for all nonces r ● messages received from Bob ● We must show φ can be extended to a monomorphism

Conclusions ● We have shown that authentication cannot be extended to infinity using just the primitives of symmetric cryptography. ● The proof had two parts ● no common secrets ● possibility of simulation ● Both parts depended on the choice of primitives

But in the computational model... ● Signature schemes can be constructed from hash functions ● Some constructions do not a priori bound the number of signatures possible – [Merkle, CRYPTO'87] ● MRP-s can be constructed from signature schemes ● If number of signatures is unbounded, then MRP is perennial

No common secrets ● Let be two sets of messages corresponding to how Alice and Bob could compute during the initialization phase ● The set is closed wrt. submessages ● If then or ● same when we swap Alice and Bob ● Let be such, that ● Those conditions keep holding when we apply a single computational step to messages in or and add the result back to this set.

Example: Mashatan-Stinson MRP ● Initialization phase: ● Alice generates nonces and sends to Bob ● Bob generates nonces and sends to Alice ● Note that the protocol uses only hash functions. ● Here the set Z is

Example: Mashatan-Stinson MRP ● Main phase: Alice must transmit a payload generat e check generat e check Increment the indices

Eve's simulation generate remember Bob does not notice a change

Eve's simulation generat e Elements of Z are sent now generate remember Alice does not notice a change

Eve's simulation generat e Bob compares and sees a problem

Resynchronization generate

Eve's simulation: Alice's resynchronization generat e At this point, Eve can masquerade Alice