9/11/2012Pomcor 1 Techniques for Implementing Derived Credentials Francisco Corella Karen Lewison Pomcor (http://pomcor.com/)

Slides:



Advertisements
Similar presentations
Chapter 10 Encryption: A Matter of Trust. Awad –Electronic Commerce 1/e © 2002 Prentice Hall 2 OBJECTIVES What is Encryption? Basic Cryptographic Algorithm.
Advertisements

Kerberos 1 Public domain image of Heracles and Cerberus. From an Attic bilingual amphora, 530–520 BC. From Italy (?).
Virtual Tamper Resistance for a TEE Francisco Corella Karen Lewison 9/30/141 Presentation to the GlobalPlatform.
SPEKE S imple Password-authenticated Exponential Key Exchange Robert Mol Phoenix Technologies.
1 Pascal URIEN, IETF 61th, Washington DC, 10th November 2004 “draft-urien-eap-smartcard-type-00.txt” EAP Smart Card Protocol (EAP-SC)
Hardware Cryptographic Coprocessor Peter R. Wihl Security in Software.
Digital Signatures and Hash Functions. Digital Signatures.
7/11/2011Pomcor 1 Pros and Cons of U-Prove, Idemix and Other Privacy-Enhancing Technologies Francisco Corella Karen Lewison Pomcor.
1 Supplement III: Security Controls What security services should network systems provide? Confidentiality Access Control Integrity Non-repudiation Authentication.
COEN 350: Network Security Authentication. Between human and machine Between machine and machine.
Payment Systems 1. Electronic Payment Schemes Schemes for electronic payment are multi-party protocols Payment instrument modeled by electronic coin that.
10/20/2011Pomcor 1 Deployment and Usability of Cryptographic Credentials Francisco Corella Karen Lewison Pomcor.
1 © NOKIA MitM.PPT/ 6/2/2015 / Kaisa Nyberg (NRC/MNW), N.Asokan (NRC/COM) The Insecurity of Tunnelled Authentication Protocols N. ASOKAN, VALTTERI NIEMI,
Mar 12, 2002Mårten Trolin1 This lecture Diffie-Hellman key agreement Authentication Certificates Certificate Authorities SSL/TLS.
 Key exchange o Kerberos o Digital certificates  Certificate authority structure o PGP, hierarchical model  Recovery from exposed keys o Revocation.
Mobile Mobile OS and Application Team: Kwok Tak Chi Law Tsz Hin So Ting Wai.
It’s always better live. MSDN Events Security Best Practices Part 2 of 2 Reducing Vulnerabilities using Visual Studio 2008.
Introduction to PKI Seminar What is PKI? Robert Brentrup July 13, 2004.
FIT3105 Smart card based authentication and identity management Lecture 4.
Dr. Sarbari Gupta Electrosoft Services Tel: (703) Security Characteristics of Cryptographic.
CMSC 414 Computer and Network Security Lecture 21 Jonathan Katz.
Apr 22, 2003Mårten Trolin1 Agenda Course high-lights – Symmetric and asymmetric cryptography – Digital signatures and MACs – Certificates – Protocols Interactive.
Mar 4, 2003Mårten Trolin1 This lecture Diffie-Hellman key agreement Authentication Certificates Certificate Authorities.
Mar 5, 2002Mårten Trolin1 Previous lecture More on hash functions Digital signatures Message Authentication Codes Padding.
Information Security of Embedded Systems : Algorithms and Measures Prof. Dr. Holger Schlingloff Institut für Informatik und Fraunhofer FIRST.
E-Authentication: What Technologies Are Effective? Donna F Dodson April 21, 2008.
CMSC 414 Computer and Network Security Lecture 14 Jonathan Katz.
Copyright © Clifford Neuman - UNIVERSITY OF SOUTHERN CALIFORNIA - INFORMATION SCIENCES INSTITUTE CSci530: Computer Security Systems Authentication.
Web Cryptography & Utilizing ARM TrustZone® based TEE for Authentication & Cryptography Ilhan Gurel September 10th & 11th, 2014.
Esri UC2013. Technical Workshop. Technical Workshop 2013 Esri International User Conference July 8–12, 2013 | San Diego, California Building Secure Applications.
CAMP - June 4-6, Copyright Statement Copyright Robert J. Brentrup and Mark J. Franklin This work is the intellectual property of the authors.
Computer Science Public Key Management Lecture 5.
Lecture slides prepared for “Computer Security: Principles and Practice”, 2/e, by William Stallings and Lawrie Brown, Chapter 21 “Public-Key Cryptography.
Chapter 10: Authentication Guide to Computer Network Security.
Information Security for Managers (Master MIS)
LEVERAGING UICC WITH OPEN MOBILE API FOR SECURE APPLICATIONS AND SERVICES Ran Zhou 1 9/3/2015.
.Net Security and Performance -has security slowed down the application By Krishnan Ganesh Madras.
Chapter 14 Encryption: A Matter Of Trust. Awad –Electronic Commerce 2/e © 2004 Pearson Prentice Hall 2 OBJECTIVES What is Encryption? Basic Cryptographic.
Introduction to Secure Messaging The Open Group Messaging Forum April 30, 2003.
E-Commerce Security Technologies : Theft of credit card numbers Denial of service attacks (System not availability ) Consumer privacy (Confidentiality.
Solutions for Secure and Trustworthy Authentication Ramesh Kesanupalli
Lecture 11: Strong Passwords
Research at MSEC Vincent Naessens – Jorn Lapon – Jan Vossaert – Koen Decroix – Faysal Boukayoua – Laurens Lemaire.
Chapter 21 Public-Key Cryptography and Message Authentication.
Computer Security: Principles and Practice First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown Chapter 2 – Cryptographic.
Tanenbaum & Van Steen, Distributed Systems: Principles and Paradigms, 2e, (c) 2007 Prentice-Hall, Inc. All rights reserved DISTRIBUTED.
CSCE 522 Identification and Authentication. CSCE Farkas2Reading Reading for this lecture: Required: – Pfleeger: Ch. 4.5, Ch. 4.3 Kerberos – An Introduction.
COEN 350: Network Security Authentication. Between human and machine Between machine and machine.
Data and Applications Security Developments and Directions Dr. Bhavani Thuraisingham The University of Texas at Dallas Lecture #22 Secure Web Information.
Secure Communication between Set-top Box and Smart Card in DTV Broadcasting Authors: T. Jiang, Y. Hou and S. Zheng Source: IEEE Transactions on Consumer.
The FIDO Approach to Privacy Hannes Tschofenig, ARM Limited 1.
Saphe surfing! 1 SAPHE Secure Anti-Phishing Environment Presented by Uri Sternfeld.
COEN 350: Network Security Authentication. Between human and machine Between machine and machine.
Faster Implementation of Modular Exponentiation in JavaScript
Security fundamentals Topic 5 Using a Public Key Infrastructure.
Wireless and Mobile Security
COEN 351 Authentication. Authentication is based on What you know Passwords, Pins, Answers to questions, … What you have (Physical) keys, tokens, smart-card.
Security API discussion Group Name: SEC Source: Shingo Fujimoto, FUJITSU Meeting Date: Agenda Item: Security API.
Secure Mobile Development with NetIQ Access Manager
Security Systems | ST/SRM3-NA | 4/6/2016 © 2016 Robert Bosch LLC and affiliates. All rights reserved. 1 Ensure data security in a hyper-connected world.
Lesson Introduction ●Authentication protocols ●Key exchange protocols ●Kerberos Security Protocols.
05/03/2011Pomcor 1 Meeting the Privacy Goals of NSTIC in the Short Term Presentation at the 2011 Internet Identity Workshop Francisco Corella and Karen.
Biometric Encryption Base RSA Algorithm Supervisor: Ass. Prof. Dr. Dang Tran Khanh Student: Dung Ngo Dinh.
Information Systems Design and Development Security Precautions Computing Science.
Web Applications Security Cryptography 1
Authentication.
E-Authentication: What Technologies Are Effective?
The main cause for that are the famous phishing attacks, in which the attacker directs users to a fake web page identical to another one and steals the.
COEN 351 Authentication.
Presentation transcript:

9/11/2012Pomcor 1 Techniques for Implementing Derived Credentials Francisco Corella Karen Lewison Pomcor (

9/11/2012Pomcor 2 Derived Credential Electronic Authentication Guideline: “ A credential issued based on a proof of possession of a PIV credential ” Motivation Store credential in a mobile device Use it instead of PIV card for logical access (authentication to information systems) s/minutes/ /feb1_der_cred_ferraiolo_h_fips_201-2.pdf s/minutes/ /feb1_der_cred_ferraiolo_h_fips_201-2.pdf

9/11/2012Pomcor 3 Challenges Complexity of cryptographic and biometric processing for app developers No FIPS Level 3 tamper resistant storage in mobile devices

9/11/2012Pomcor 4 Techniques for Addressing Challenges 1. Public key cryptography without certificates 2. Key pair regeneration as an alternative to tamper resistance 3. Encapsulation of cryptographic and biometric processing in black boxes

9/11/2012Pomcor 5 1. Public Key Cryptography without Certificates Mobile device  application (back-end): Database handle of a device record that contains the hash of public key and refers to user record Public key Proof of knowledge of private key Application  directory Database handle of device record Hash of public key Directory  application User identifier(s) and/or attribute(s)

User identifiers and/or attributes Device handle Hash of public key Directory User record Tablet recordPhone record Device handle Hash of public key Mobile device (e.g. smart phone) with application front-end or web browser Key pair Device handle Public key Proof of knowledge of private key Application back-end

9/11/2012Pomcor 7 2. Key Pair Regeneration as an Alternative to Tamper Resistance PIV card stores credentials in tamper-resistant storage But mobile devices do not have tamper-resistant storage  Encrypt private key under key derived from PIN? That would allow offline attack against PIN Instead we propose to regenerate the key pair from the PIN (or from a biometric key)  All PINs produce well-formed key pairs, so PINs cannot be tested and offline attack is not possible

9/11/2012Pomcor 8 RSA Key Pair Regeneration from a PIN Idea Store p, q in device, but not e or d Generate d as a randomized hash of the PIN, of same length as the modulus Compute e such that 1 < e < φ and ed  1 (mod φ) Problem: what if gcd(d,φ)  1? Solution: Remove from d all prime factors r < 100 shared with φ. During initial key generation, if d has prime factors r ’ > 100 shared with φ, we start over with different p and q (probability: 0.2%)

9/11/2012Pomcor 9 Non-problem: Retaining p and q does not reduce security (they could be computed from the key pair) Non-problem: d not vulnerable to small-decryption-exponent attacks RSA Key Pair Regeneration from a PIN (Continued)

Regeneration from Biometric Key Biometric key generated from an iris image (to be taken by device camera) and an auxiliary string F. Hao, R. Anderson, and J. Daugman. Combining Cryptography with Biometric Effectively. IEEE Trans. Comput., 55(9): , Biometric template not at risk because not used Biometric key generation Key pair regeneration Biometric key Key pair Iris image Aux. string pq

9/11/2012Pomcor 11 Three-Factor Authentication Key pair + PIN + iris image Biometric key used to regenerate key pair PIN used to Encrypt auxiliary string, or Scramble the biometric key generation algorithm (suggested by Hao et al.)

9/11/2012Pomcor Encapsulation of Cryptographic and Biometric Processing Application outsources cryptographic and biometric complexities to a Prover Black Box (PBB) and a Verifier Black Box (VBB) PBB is in mobile device VBB online, trusted by application Could be implemented as a generic server appliance Many possible configurations In some configurations, outsourcing protocol uses “ native URLs ” (available in iOS and Android) for interapp communications within the device

Native front-end, native PBB, generic VBB Mobile device App front-end VBB PBB App back-end p, q, s, S, a Device record Dev. handle Hash of PK Directory User record

Mobile device App front-end VBB PBB App back-end p, q, s, S, a PIN and/or iris image Device record Dev. handle Hash of PK Directory User record

Mobile device App front-end Auth token Hash of PK VBB PBB App back-end p, q, s, S, a Public key + proof of knowledge of private key Device record Dev. handle Hash of PK Directory User record

Mobile device App front-end Auth token Hash of PK VBB PBB App back-end p, q, s, S, a Auth token Device record Dev. handle Hash of PK Directory User record

Mobile device App front-end Auth token Hash of PK VBB PBB App back-end p, q, s, S, a Auth token + device handle Device record Dev. handle Hash of PK Directory User record Dev. handle

Mobile device App front-end Auth token Hash of PK VBB PBB App back-end Auth token + device handle Device record Dev. handle Hash of PK Directory User record p, q, s, S, a Dev. handle

Mobile device App front-end Auth token Hash of PK VBB PBB App back-end Auth token Device record Dev. handle Hash of PK Directory User record p, q, s, S, a Dev. handle

Mobile device App front-end VBB PBB App back-end Hash of public key Device record Dev. handle Hash of PK Directory User record p, q, s, S, a Dev. handle

Mobile device App front-end VBB PBB App back-end Device record Dev. handle Hash of PK DirectoryDevice handle + hash of public key User record p, q, s, S, a Dev. handle

Mobile device App front-end VBB PBB App back-end User ID(s) and/or attribute(s) Device record Dev. handle Hash of PK Directory User record p, q, s, S, a Dev. handle

9/11/2012Pomcor 23 Many Possible Configurations App May have native front-end (as shown), or May be accessed through a web browser PBB One credential for multiple apps Different credentials for different apps May be embedded in application front-end Browser plug-in  works on desktops and laptops VBB May be a generic server appliance May be app- or enterprise-specific, and access the directory Multiple security domains

Web-based app, native PBB, generic VBB Mobile device Web browser VBB PBB App back-end Device record Dev. handle Hash of PK Directory User record p, q, s, S, a Dev. handle

Native front-end, native PBB, app-specific or enterprise-specific VBB Mobile device App front-end VBB PBB App back-end Device record Dev. handle Hash of PK Directory User record p, q, s, S, a Dev. handle

Native front-end, PBB embedded in app front-end, generic VBB Mobile device App front-end VBB PBB App back-end Device record Dev. handle Hash of PK Directory User record p, q, s, S, a Dev. handle

Web-based app, PBB as browser plug-in, generic VBB Mobile device Web browser VBB PBB App back-end Device record Dev. handle Hash of PK Directory User record p, q, s, S, a Dev. handle

Mobile device Web browser PBB App back-end Device record Directory User record VBB Device record Directory User record Security domain mapper S E C U R I T Y D O M A I N # 2 Device handler augmented by Security Domain ID S E C U R I T Y D O M A I N # 2 1 Attributes Mapped attributes Multiple security domains Credential

9/11/2012Pomcor 29 Beyond Derived Credentials Password elimination on the Web at large without sacrificing privacy Social login without passwords Effective data protection for locked phones

9/11/2012Pomcor 30 Eliminating Passwords without Sacrificing Privacy Authentication by userid-password provides anonymity, unlinkability and unobservability Alternatives being proposed (OpenID, SAML, etc.) redirect to a third party Third party identifies user  no anonymity Authentication to different relying parties can be linked via the third party identifier Third party observes the transaction Our techniques eliminate passwords and preserves privacy (anonymity, unlinkability and unobservability) because they do not involve a third party

Mobile device App front-end VBB PBB App back-end Device record Dev. handle Hash of PK User database User record Token Social ID Social login without passwords Social ID User data User database User record Social ID Social network (e.g. Facebook) Relying party Social IDToken p, q, s, S, a Dev. handle

9/11/2012Pomcor 32 Data Protection Problem Data protection in iPhone locked by a PIN Data encrypted by key hierarchy including a key derived from PIN and a “ hardware key ” that cannot be extracted from the silicon by a casual user PIN protected against offline attack by hardware key But: Vulnerabilities  hardware key used for offline attack using the phone ’ s own processor; exhaustive attack on 4-digit PIN takes 40 min Hardware key could be extracted by probing the silicon

9/11/2012Pomcor 33 Data Protection Solution Encrypt data under symmetric key Store symmetric key in online server, or split it over several servers using Shamir ’ s k-of-n secret sharing technique Retrieve key over secure connection(s), authenticating with a key pair regenerated from a PIN and/or a biometric, so that tampering with phone does not help attacker

9/11/2012Pomcor 34 Risks of Mobile Applications? Mobile computing architecture potentially more secure Apps are sandboxed But vulnerabilities allow rooting Routinely used for jailbreaking and by forensic tools GMU, NIST, NSA working on hardened Android kernel Hardening should include interapp communications Our data protection technique … Protects data against exploitation of vulnerabilities after seizing device But malware running while legitimate user is using the device could capture PIN or biometric data

9/11/2012Pomcor 35 For more information … Whitepapers