Some slides borrowed from Philippe Golle, Markus Jacobson

Slides:



Advertisements
Similar presentations
RPC Mixing: Making Mix-Nets Robust for Electronic Voting Ron Rivest MIT Markus Jakobsson Ari Juels RSA Laboratories.
Advertisements

Spring 2000CS 4611 Security Outline Encryption Algorithms Authentication Protocols Message Integrity Protocols Key Distribution Firewalls.
1 Network Security Outline Encryption Algorithms Authentication Protocols Message Integrity Protocols Key Distribution Firewalls.
CS555Topic 241 Cryptography CS 555 Topic 24: Secure Function Evaluation.
Lecture 7.1: Privacy and Anonymity Using Anonymizing Networks - I CS 436/636/736 Spring 2012 Nitesh Saxena Some slides borrowed from Philippe Golle, Markus.
CS555Topic 191 Cryptography CS 555 Topic 19: Formalization of Public Key Encrpytion.
1 Introduction CSE 5351: Introduction to cryptography Reading assignment: Chapter 1 of Katz & Lindell.
Lect. 18: Cryptographic Protocols. 2 1.Cryptographic Protocols 2.Special Signatures 3.Secret Sharing and Threshold Cryptography 4.Zero-knowledge Proofs.
Lecture 3.3: Public Key Cryptography III CS 436/636/736 Spring 2012 Nitesh Saxena.
Reusable Anonymous Return Channels
Research & development A Practical and Coercion-resistant scheme for Internet Voting Jacques Traoré (joint work with Roberto Araújo and Sébastien Foulle)
CMSC 414 Computer and Network Security Lecture 6 Jonathan Katz.
Privacy and Anonymity Using Mix Networks* Nitesh Saxena CS392/6813 Some slides borrowed from Philippe Golle, Markus Jacobson.
ECOMMERCE TECHNOLOGY SUMMER 2002 COPYRIGHT © 2002 MICHAEL I. SHAMOS Cryptographic Security.
ECOMMERCE TECHNOLOGY FALL 2003 COPYRIGHT © 2003 MICHAEL I. SHAMOS Cryptography.
10/25/20061 Threshold Paillier Encryption Web Service A Master’s Project Proposal by Brett Wilson.
Parallel Mixing Philippe Golle, PARC Ari Juels, RSA Labs.
CS 105 – Introduction to the World Wide Web  HTTP Request*  Domain Name Translation  Routing  HTTP Response*  Privacy and Cryptography  Adapted.
CMSC 414 Computer and Network Security Lecture 21 Jonathan Katz.
Electronic Voting Schemes and Other stuff. Requirements Only eligible voters can vote (once only) No one can tell how voter voted Publish who voted (?)
How cryptography is used to secure web services Josh Benaloh Cryptographer Microsoft Research.
UMBC Protocol Meeting 10/01/03 Universal Re-encryption: For Mix-Nets and Other Applications (to appear CT-RSA ’04) Paul Syverson NRL Markus Jakobsson Ari.
Spring 2003CS 4611 Security Outline Encryption Algorithms Authentication Protocols Message Integrity Protocols Key Distribution Firewalls.
CMSC 414 Computer and Network Security Lecture 6 Jonathan Katz.
Lecture 3.2: Public Key Cryptography II CS 436/636/736 Spring 2014 Nitesh Saxena.
Lecture 11: Privacy and Anonymity Using Anonymizing Networks CS 336/536: Computer Network Security Fall 2014 Nitesh Saxena Some slides borrowed from Philippe.
RSA Implementation. What is Encryption ? Encryption is the transformation of data into a form that is as close to impossible as possible to read without.
Untraceable Electronic Mail, Return Addresses, and Digital Pseudonyms David Chaum CACM Vol. 24 No. 2 February 1981 Presented by: Adam Lee 1/24/2006 David.
Optimistic Mixing for Exit-Polls Philippe Golle, Stanford Sheng Zhong, Yale Dan Boneh, Stanford Markus Jakobsson, RSA Labs Ari Juels, RSA Labs.
1 Lecture 9 Public Key Cryptography Public Key Algorithms CIS CIS 5357 Network Security.
How cryptography is used to secure web services Josh Benaloh Cryptographer Microsoft Research.
Lecture 3.4: Public Key Cryptography IV CS 436/636/736 Spring 2013 Nitesh Saxena.
1 Public-Key Cryptography and Message Authentication.
Public Key Encryption with keyword Search Author: Dan Boneh Rafail Ostroversity Giovanni Di Crescenzo Giuseppe Persiano Presenter: 陳昱圻.
The Paillier Cryptosystem
Privacy and Anonymity Using Mix Networks* Slides borrowed from Philippe Golle, Markus Jacobson.
NEW DIRECTIONS IN CRYPTOGRAPHY Made Harta Dwijaksara, Yi Jae Park.
10/25/04 Security of Ad Hoc and Sensor Networks (SASN) 1/22 An Attack on the Proactive RSA Signature Scheme in the URSA Ad Hoc Network Access Control Protocol.
Almost Entirely Correct Mixing With Applications to Voting Philippe Golle Dan Boneh Stanford University.
EE 122: Lecture 24 (Security) Ion Stoica December 4, 2001.
Elgamal Public Key Encryption CSCI 5857: Encoding and Encryption.
Fully Homomorphic Encryption (FHE) By: Matthew Eilertson.
1 Anonymity. 2 Overview  What is anonymity?  Why should anyone care about anonymity?  Relationship with security and in particular identification 
Systems Architecture Receiver Anonymity Matthias Füssel, Dennis Schneider June 5, 2007.
Systems Architecture Anonymous Key Agreement Dominik Oepen
Security Outline Encryption Algorithms Authentication Protocols
Asymmetric-Key Cryptography
Advanced Computer Networks
Crypto in information security
Anonymous Communication
Public Key Encryption and Digital Signatures
Some slides borrowed from Philippe Golle, Markus Jacobson
RSA and El Gamal Cryptosystems
Some slides borrowed from Philippe Golle, Markus Jacobson
Basic Network Encryption
Cryptography CS 555 Lecture 22
0x1A Great Papers in Computer Security
Anonymous Communication
Lecture 4 - Cryptography
Key Management Network Systems Security
Privacy and Anonymity Using Mix Networks* Nitesh Saxena CS392/6813
NET 311 Information Security
Public-Key, Digital Signatures, Management, Security
Basic Network Encryption
Advanced Computer Networks
Privacy and Anonymity Using Mix Networks* Nitesh Saxena CS392/6813
刘振 上海交通大学 计算机科学与工程系 电信群楼3-509
Security: Integrity, Authentication, Non-repudiation
Lecture 6.2: Protocols - Authentication and Key Exchange II
Presentation transcript:

Some slides borrowed from Philippe Golle, Markus Jacobson Lecture 8: Privacy and Anonymity Using Anonymizing Networks CS 336/536: Computer Network Security Fall 2015 Nitesh Saxena Some slides borrowed from Philippe Golle, Markus Jacobson

Course Admin HW/Lab 3 posted Labs active this Friday Questions? Covers Lecture 7 (SSL/TLS) Due Nov 16 Labs active this Friday Questions? 1/11/2019 Lecture 8: Privacy

A Case History: AOL Web Search Query Log Leakage AOL's disturbing glimpse into users' lives, CNET News, August 7, 2006 21 million search queries posed over a 3-month long period; 650,000 users No user identification information released per se, but?? Search Log still available: http://www.gregsadetsky.com/aol-data/ 1/11/2019 Lecture 8: Privacy

Other Scenarios where privacy is important Location-based search Web browsing Electronic voting Electronic payments Email conversation … 1/11/2019 Lecture 8: Privacy

Today’s Outline Anonymizing Network (or Mix Network) Anonymizing Network Applications Requirements Robustness Types of Anonymizing Networks Decryption based (Onion Routing) Re-encryption based 1/11/2019 Lecture 8: Privacy

Definition: Mix Server (or Relay) ? Inputs Outputs A mix server: Receives inputs Produces “related” outputs The relationship between inputs and outputs is secret a mix server receives a set of inputs and produces related outputs so that the relationship between inputs and outputs can not be learned by anyone but the mix server. 1/11/2019 Lecture 8: Privacy

Definition: Mix Network A group of mix servers that operate sequentially. Server 1 Server 2 Server 3 Inputs Outputs ? ? ? a mix server receives a set of inputs and produces related outputs so that the relationship between inputs and outputs can not be learned by anyone but the mix server. 1/11/2019 Lecture 8: Privacy

Applications Hide:  “who voted for whom?”  “who paid whom?”  “who communicated with whom?”  “what is the source of a message?” Good for protecting privacy for election and communication Used as a privacy building block 1/11/2019 Lecture 8: Privacy

Electronic Voting Demonstration “Who do you like best?” Put your ballot into a WHITE envelope and put again in a RED one and sign on it Washington Lincoln Roosevelt Jerry 1/11/2019 Lecture 8: Privacy

Electronic Voting Demo. (Cont’d) Administrators will Verify signatures together 1st Admin. shuffles and opens RED envelopes Send them to 2nd Admin. 2nd Admin. shuffles again and opens WHITE envelopes Count ballots together 1/11/2019 Lecture 8: Privacy

A real system for elections Sign voter 1 (encr(encr (vote1))) Sign voter 2 (encr(encr (vote2))) . Sign voter n (encr(encr (voten))) vote1 vote2 vote3 . voten Mix Net Mix Net Jerry Washington Lincoln Roosevelt 1/11/2019 Lecture 8: Privacy

Electronic Payment Demo. “Choose one person you like to pay $5” Put your ballot into an WHITE envelope and put again in a RED one and sign on it Name of the person ( ___________ ) Jerry 1/11/2019 Lecture 8: Privacy

Electronic Payment Demo. (Cont’d) Administrators will Verify signatures together Deduct $5 from each account 1st Admin. shuffles and opens RED envelopes Send them to 2nd Admin. 2nd Admin. shuffles again and opens WHITE envelopes Credit $5 to recipients 1/11/2019 Lecture 8: Privacy

For Payments payee1 payee2 payee3 . payeen Sign payer 1 (encr(encr (payee1))) Sign payer 2 (encr(encr (payee2))) . Sign payer n (encr(encr (payeen))) D E U C T Mix Net Jerry Credit Name (________ ) 1/11/2019 Lecture 8: Privacy

For email communication . encr (email1, addressee1) encr (email2, addressee2) . encr (emailn, addresseen) Mix Net To: Jerry Don’t forget to have lunch. Deliver 1/11/2019 Lecture 8: Privacy

Other Uses Anonymous web browsing; web searching (Anonymizer) From LPWA homepage 1/11/2019 Lecture 8: Privacy

Other Uses (Cont’d) Location privacy for cellular devices Location-based service is GOOD ! Landline-phone calling to 911 in the US, 112 in Europe All cellular carrier since December 2005 RISK ! Location-based spam Harm to a reputation 1/11/2019 Lecture 8: Privacy

Other Uses Anonymous VoIP calls Anonymous acquisition of security patches 1/11/2019 Lecture 8: Privacy

Other uses (Cont’d) Sometimes abuses Avoid legislation (e.g., piracy) P2P sharing of copyright content Terrorism: communication with media 2008 Mumbai attacks 1/11/2019 Lecture 8: Privacy

Principle Requirements : Chaum ’81 Message 1 Message 2 Privacy server 1 server 2 server 3 Requirements : Privacy Efficiency Trust Robustness 1/11/2019 Lecture 8: Privacy

Requirements Privacy Nobody knows who said what Efficiency Mixing is efficient (= practically useful) Trust How many entities do we have to trust? Robustness Will replacement cheaters be caught? What if a certain number of mix servers fail? 1/11/2019 Lecture 8: Privacy

But what about robustness? I ignore his output But what about robustness? and produce my own STOP encr(Obama) encr(Hillary) Hillary There is no robustness! 1/11/2019 Lecture 8: Privacy

Zoology of Mix Networks Inputs Outputs ? Decryption Mix Nets [Cha81,…]: Inputs: ciphertexts Outputs: decryption of the inputs. Re-encryption Mix Nets[PIK93,…]: Outputs: re-encryption of the inputs 1/11/2019 Lecture 8: Privacy

First Solution Chaum ’81, implemented by Syverson, Goldschlag Not robust (or: tolerates 0 cheaters for correctness) Requires every server to participate (and in the “right” order!) 1/11/2019 Lecture 8: Privacy

Re-encryption Mixnet 0. Setup: mix servers generate a shared key 1. Users encrypt their inputs: Input Pub-key Server 1 Server 2 Server 3 re-encrypt & mix 2. Encrypted inputs are mixed: Proof 3. A quorum of mix servers decrypts the outputs Output Priv-key 1/11/2019 Lecture 8: Privacy

Recall: Discrete Logarithm Assumption p, q primes such that q|p-1 g is an element of order q and generates a group Gq of order q x in Zq, y = gx mod p Given (p, q, g, y), it is computationally hard to compute x No polynomial time algorithm known p should be 1024-bits and q be 160-bits x becomes the private key and y becomes the public key 1/11/2019 Lecture 8: Privacy

ElGamal Encryption Encryption (of m in Gq): Decryption of (k,c) Choose random r in Zq k = gr mod p c = myr mod p Output (k,c) Decryption of (k,c) M = ck-x mod p Secure under discrete logarithm assumption 1/11/2019 Lecture 8: Privacy

ElGamal Example: dummy Let’s construct an example KeyGen: p = 11, q = 2 or 5; let’s say q = 5 2 is a generator of Z11* g = 22 = 4 x = 2; y = 42 mod 11 = 5 Enc(3): r = 4  k = 44 mod 11 = 3 c = 3*54 mod 11 = 5 Dec(3,5): m = 5*3-2 mod 11 = 3 1/11/2019 Lecture 8: Privacy

SECURE (t+1,n)- Secret Sharing INSECURE Motivation: to secure the cryptosystem against t (< n/2) corruptions Split the secret among n entities so that any set of t+1 or more entities can recover the secret an adversary who corrupts at most t entities, learns nothing about the secret Tool: Shamir’s Polynomial Secret Sharing f(z)  degree t polynomial (mod q) f(0)  x f(i)  ssi SECURE Polynomial interpolation: for any G, s.t. |G|=t+1 INSECURE (n=7, t=3) 1/11/2019 Lecture 8: Privacy

Re-encryption technique Input: a ciphertext (k,c) wrt public key y Pick a number r’ randomly from [0…q-1] Compute k’ = kgr’ mod p c’ = cyr’ mod p Output (k’, c’) Same decryption technique! Compute m k’c’-x 1/11/2019 Lecture 8: Privacy

A simple Mix (k1, c1) (k2, c2) . (kn, cn) (k’1,c’1) (k’2,c’2) . R E - N C Y P T R E - N C Y P T (k1, c1) (k2, c2) . (kn, cn) (k’1,c’1) (k’2,c’2) . (k’n,c’n) (k’’1,c’’1) (k’’2,c’’2) . (k’’n,c’’n) Note: different cipher text, different re-encryption exponents! 1/11/2019 Lecture 8: Privacy

And to get privacy… permute, too! (k1, c1) (k2, c2) . (kn, cn) (k’’1,c’’1) (k’’2,c’’2) . (k’’n,c’’n) 1/11/2019 Lecture 8: Privacy

And, finally…the Proof Mix servers must prove correct re-encryption Given n El Gamal ciphertexts E(mi) as input and n El Gamal ciphertexts E(m’i) as output Compute: E( mi) and E(=m’i) Ask Mix for Zero-Knowledge proof that these ciphertexts decrypt to same plaintexts 1/11/2019 Lecture 8: Privacy

Anonymizing Network in practice: Tor A low-latency anonymizing network http://www.torproject.org/ Currently 1000 or so routers distributed all over in the internet Peer-based: a client can choose to be a router A request is routed to/fro a series of a circuit of three routers A new circuit is chosen every 10 minutes No real-world implementation of re-encryption mix as yet 1/11/2019 Lecture 8: Privacy