Discrete Logarithm Integer factorization Complexity Theory Complete read/write access.

Slides:



Advertisements
Similar presentations
An Introduction to Randomness Extractors Ronen Shaltiel University of Haifa Daddy, how do computers get random bits?
Advertisements

Foundations of Cryptography Lecture 3 Lecturer: Moni Naor.
Detection of Algebraic Manipulation with Applications to Robust Secret Sharing and Fuzzy Extractors Ronald Cramer, Yevgeniy Dodis, Serge Fehr, Carles Padro,
Efficient Non-Malleable Codes and Key-derivations against Poly-size Tampering Circuits PRATYAY MUKHERJEE (Aarhus University) Joint work with Sebastian.
Extracting Randomness David Zuckerman University of Texas at Austin.
* Distributed Algorithms in Multi-channel Wireless Ad Hoc Networks under the SINR Model Dongxiao Yu Department of Computer Science The University of Hong.
Distance Bounding Protocols with Void Challenges for RFID Jorge Munilla Fajardo Dpto. Ingeniería de Comunicaciones. E.T.S.I.Telecomunicación. Universidad.
Secure Evaluation of Multivariate Polynomials
Gillat Kol (IAS) joint work with Ran Raz (Weizmann + IAS) Interactive Channel Capacity.
SSL CS772 Fall Secure Socket layer Design Goals: SSLv2) SSL should work well with the main web protocols such as HTTP. Confidentiality is the top.
Rational Oblivious Transfer KARTIK NAYAK, XIONG FAN.
Tight Bounds for Unconditional Authentication Protocols in the Moni Naor Gil Segev Adam Smith Weizmann Institute of Science Israel Modeland Shared KeyManual.
Digital Signatures and Hash Functions. Digital Signatures.
Foundations of Cryptography Lecture 5 Lecturer: Moni Naor.
Paul Cuff THE SOURCE CODING SIDE OF SECRECY TexPoint fonts used in EMF. Read the TexPoint manual before you delete this box.: AA.
Foundations of Cryptography Lecture 4 Lecturer: Moni Naor.
Eran Omri, Bar-Ilan University Joint work with Amos Beimel and Ilan Orlov, BGU Ilan Orlov…!??!!
NON-MALLEABLE EXTRACTORS AND SYMMETRIC KEY CRYPTOGRAPHY FROM WEAK SECRETS Yevgeniy Dodis and Daniel Wichs (NYU) STOC 2009.
Packet Leashes: Defense Against Wormhole Attacks Authors: Yih-Chun Hu (CMU), Adrian Perrig (CMU), David Johnson (Rice)
TAMPER DETECTION AND NON-MALLEABLE CODES Daniel Wichs (Northeastern U)
Complexity 26-1 Complexity Andrei Bulatov Interactive Proofs.
Information Security for Sensors Overwhelming Random Sequences and Permutations Shlomi Dolev, Niv Gilboa, Marina Kopeetsky, Giuseppe Persiano, and Paul.
Session 5 Hash functions and digital signatures. Contents Hash functions – Definition – Requirements – Construction – Security – Applications 2/44.
Secure Data Communication in Mobile Ad Hoc Networks Authors: Panagiotis Papadimitratos and Zygmunt J Haas Presented by Sarah Casey Authors: Panagiotis.
Dr Alejandra Flores-Mosri Message Authentication Internet Management & Security 06 Learning outcomes At the end of this session, you should be able to:
Oblivious Transfer based on the McEliece Assumptions
Secure Localization using Dynamic Verifiers Nashad A. Safa Joint Work With S. Sarkar, R. Safavi-Naini and M.Ghaderi.
1 Introduction to Secure Computation Benny Pinkas HP Labs, Princeton.
04/26/2004CSCI 315 Operating Systems Design1 Computer Networks.
Xiaohua (Edward) Li1 and E. Paul Ratazzi2
On Everlasting Security in the Hybrid Bounded Storage Model Danny Harnik Moni Naor.
1 Message Authentication and Hash Functions Authentication Requirements Authentication Functions Message Authentication Codes Hash Functions Security of.
Lecture slides prepared for “Computer Security: Principles and Practice”, 2/e, by William Stallings and Lawrie Brown, Chapter 21 “Public-Key Cryptography.
Feb 20, 2001CSCI {4,6}900: Ubiquitous Computing1 Announcements.
Securing Every Bit: Authenticated Broadcast in Wireless Networks Dan Alistarh, Seth Gilbert, Rachid Guerraoui, Zarko Milosevic, and Calvin Newport.
Neural Key Exchange Presented by: Jessica Lowell 10 December 2009 CS 6750.
Chapter 7 Low-Level Protocols
Christian Schaffner CWI Amsterdam, Netherlands Quantum Cryptography beyond Key Distribution Workshop on Post-Quantum Security Models Paris, France Tuesday,
Wonders of the Digital Envelope Avi Wigderson Institute for Advanced Study.
Fall 2004/Lecture 201 Cryptography CS 555 Lecture 20-b Zero-Knowledge Proof.
Rei Safavi-Naini University of Calgary Joint work with: Hadi Ahmadi iCORE Information Security.
Introduction to Modern Cryptography Sharif University Spring 2015 Data and Network Security Lab Sharif University of Technology Department of Computer.
1 A Randomized Space-Time Transmission Scheme for Secret-Key Agreement Xiaohua (Edward) Li 1, Mo Chen 1 and E. Paul Ratazzi 2 1 Department of Electrical.
COEN 350 Network Security Introduction. Computer Networks OSI Reference Model Application Layer Presentation Layer Session Layer Transport Layer Network.
Information Theory The Work of Claude Shannon ( ) and others.
Upper OSI Layers Natawut Nupairoj, Ph.D. Department of Computer Engineering Chulalongkorn University.
CS555Topic 251 Cryptography CS 555 Topic 25: Quantum Crpytography.
Lecture 2: Introduction to Cryptography
Quantum Cryptography Slides based in part on “A talk on quantum cryptography or how Alice outwits Eve,” by Samuel Lomonaco Jr. and “Quantum Computing”
Security in Near Field Communication Strengths and Weaknesses
Game-based composition for key exchange Cristina Brzuska, Marc Fischlin (University of Darmstadt) Nigel Smart, Bogdan Warinschi, Steve Williams (University.
Authentication protocol providing user anonymity and untraceability in wireless mobile communication systems Computer Networks Volume: 44, Issue: 2, February.
Potential vulnerabilities of IPsec-based VPN
Hoda Jannati School of Computer Science
PPP Configuration.
Abstract: In many scenarios, wireless presents a tempting "last-mile" alternative to a wired connection for the delivery of internet service. However,
TAMPER DETECTION AND NON-MALLEABLE CODES Daniel Wichs (Northeastern U)
Jonathan Katz University of Maryland Andrew Lindell Aladdin Knowledge Systems and Bar-Ilan University 04/08/08 CRYP-108 Aggregate Message- Authentication.
Quantum Cryptography Antonio Acín
A Key Management Scheme for Distributed Sensor Networks Laurent Eschaenauer and Virgil D. Gligor.
1 Diffie-Hellman (Key Exchange) Protocol Rocky K. C. Chang 9 February 2007.
International Conference Security in Pervasive Computing(SPC’06) MMC Lab. 임동혁.
1 Space-Time Transmissions for Wireless Secret-Key Agreement with Information-Theoretic Secrecy Xiaohua (Edward) Li 1, Mo Chen 1 and E. Paul Ratazzi 2.
1 Diffie-Hellman (Key Exchange) Protocol Rocky K. C. Chang 9 February 2007.
Data Integrity / Data Authentication. Definition Authentication (Signature) algorithm - A Verification algorithm - V Authentication key – k Verification.
Originally by Yu Yang and Lilly Wang Modified by T. A. Yang
Hidden Terminal Decoding and Mesh Network Capacity
Information-Theoretic Security
MPC Scenario 1. “Privacy-protected contingency tables”
Presentation transcript:

Discrete Logarithm Integer factorization Complexity Theory Complete read/write access

Complexity Theory Probability Theory Complete read/write access

TCP/UDP HTTP/FTP IP Physical Secure Message Transmission Oblivious Transfer Bit commitment Secret Key Establishment … Restricted read/write access Our work: Secret Key Establishment Manipulation Detection Distance Bounding Verification

Wiretap Channel [Wy75,CK78] Keyless Information-theoretic  Noisier wiretapping channel Secure Message TransmissionSecret Key Establishment Public Discussion Channel Secure Feedback Channel Correlated Sources More natural settings?

A pair of independent wiretap channels 2 independent wiretap channels w/o initial randomness Two-way wiretap channel Secret Key Establishment Keyless Information-theoretic Cases with less noisy wiretapping channel  Free local randomness  Independent channels No local randomness Noise as a single resource for randomness extraction and key agreement Psbly. higher key rates. Psbly. dependent channels

Wiretap channel Leakage Resilient (LR)-AMD Algebraic Manipulation Detection [CDFPW08]: Information-theoretic  Uses shared key.  No leakage to Eve. Arbitrary bounded leakage Results: Optimal LR-AMD code constructions. Application to robust nonperfect SSS. Application to AMD over wiretap channels. Bitwise MD for binary wiretap channels. SKE/SMT against active adversary. Manipulable channel Algebraic Manipulable Channel with Leakage Message Authentication Code [GMS74]: Paradigm 1: Adversary with full read/write access Using correlated randomness Paradigm 2: Adversary with restricted access Keyless

I am at d c ! OK! Let’s make sure you are not farther! drdr Honest: d r < d c Distance fraud (DFA): d r > d c Mafia fraud (MFA): d r > d c Terrorist fraud (TFA): d r > d c drdr He is at d c ! dcdc drdr

I am at d c ! OK! Let’s make sure you are not farther! Using Time-of-Flight: drdr ΔtΔt → d r =C.Δt+T p Rapid exchange phase. Natural property in physics. Security promises.  Accurate timing. Alternative solutions?

I am at d c ! OK! Let’s make sure you are not farther! I am at d c ! OK! Let’s make sure you are not farther! drdr Using Time-of-Flight: Rapid exchange phase. Natural property in physics. Security promises.  Accurate timing. Alternative solutions? Results: Secure DBV protocols against DFA and MFA. Based on simple challenge-response & MAC.  Impossibility for TFA-security. TFA-secure DBV protocol in the BRM. Using Noise & Attenuation: Wiretap channel model. Matches wireless channels. No time measurement.

Three security functionalities using physical-layer properties. Problem formalization and attractive solutions. Seeking security at physical-layer: advantage to cryptography. Important challenges: Communication models may not match all scenarios! Complete knowledge of the physical-channel behavior! Important directions to future work: Deterministic cryptography using channel noise. Combining physical-layer and upper-layer properties.

XAXA XBXB YAYA YBYB YEYE Two-way DMWC 2DMWC XAXA XBXB Y fE YBYB YAYA Y bE With randomness, p e =0.1 Without randomness, p e =0.2 p e =0.1

TransmissionTampering bit abstractionsignalbit abstractionsignal 0keep flip 1set-to-0 set-to-1 On-off Keying (OOK) Bitwise Manipulation Deetction

Basic protocol: Challenge&Response + MAC BRM-DBV protocol: general adversary BRM-DBV protocol: sampling adversary

Instance 1 (detailed) iCIS Lab, University of Calgary 15 AliceBobAliceBob Eve Round 1 Round 2 - Key - Randomness OUTPUT: INPUT: (Randomness) Instance 2 (abstract) SKE over 2DMWC without Randomness: The Basic Protocol