Lecture 7.1: Privacy and Anonymity Using Anonymizing Networks - I CS 436/636/736 Spring 2012 Nitesh Saxena Some slides borrowed from Philippe Golle, Markus.

Slides:



Advertisements
Similar presentations
RPC Mixing: Making Mix-Nets Robust for Electronic Voting Ron Rivest MIT Markus Jakobsson Ari Juels RSA Laboratories.
Advertisements

Spring 2000CS 4611 Security Outline Encryption Algorithms Authentication Protocols Message Integrity Protocols Key Distribution Firewalls.
SECURITY IN E-COMMERCE VARNA FREE UNIVERSITY Prof. Teodora Bakardjieva.
PAYWORD, MICROMINT -TWO MICROPAYMENT SCHEMES PROJECT OF CS 265 SPRING, 2004 WRITTEN BY JIAN DAI.
Lect. 18: Cryptographic Protocols. 2 1.Cryptographic Protocols 2.Special Signatures 3.Secret Sharing and Threshold Cryptography 4.Zero-knowledge Proofs.
Digital Rights Management © Knowledge Books & Software, 2012.
Reusable Anonymous Return Channels
 Guarantee that EK is safe  Yes because it is stored in and used by hw only  No because it can be obtained if someone has physical access but this can.
Privacy and Anonymity Using Mix Networks* Nitesh Saxena CS392/6813 Some slides borrowed from Philippe Golle, Markus Jacobson.
Spring 2002CS 4611 Security Outline Encryption Algorithms Authentication Protocols Message Integrity Protocols Key Distribution Firewalls.
Mar 4, 2003Mårten Trolin1 This lecture Diffie-Hellman key agreement Authentication Certificates Certificate Authorities.
Parallel Mixing Philippe Golle, PARC Ari Juels, RSA Labs.
CS 105 – Introduction to the World Wide Web  HTTP Request*  Domain Name Translation  Routing  HTTP Response*  Privacy and Cryptography  Adapted.
CMSC 414 Computer and Network Security Lecture 21 Jonathan Katz.
Electronic Voting Schemes and Other stuff. Requirements Only eligible voters can vote (once only) No one can tell how voter voted Publish who voted (?)
CMSC 414 Computer and Network Security Lecture 19 Jonathan Katz.
UMBC Protocol Meeting 10/01/03 Universal Re-encryption: For Mix-Nets and Other Applications (to appear CT-RSA ’04) Paul Syverson NRL Markus Jakobsson Ari.
Spring 2003CS 4611 Security Outline Encryption Algorithms Authentication Protocols Message Integrity Protocols Key Distribution Firewalls.
Secure and Efficient Metering by Moni Naor and Benny Pinkas Vincent Collado Olga Toporovsky Alex Kogan Marina Lapkina Igor Iulis.
Staying Safe, Having Fun, And Cruising The ‘Net Daniel Owens IT Security Professional.
CAP6135: Malware and Software Vulnerability Analysis Examples of Term Projects Cliff Zou Spring 2012.
Lecture 9: Security via PGP CS 436/636/736 Spring 2012 Nitesh Saxena.
The Study of Security and Privacy in Mobile Applications Name: Liang Wei
On the Anonymity of Anonymity Systems Andrei Serjantov (anonymous)
Programming Satan’s Computer
Lecture 11: Privacy and Anonymity Using Anonymizing Networks CS 336/536: Computer Network Security Fall 2014 Nitesh Saxena Some slides borrowed from Philippe.
E-Commerce Security Technologies : Theft of credit card numbers Denial of service attacks (System not availability ) Consumer privacy (Confidentiality.
Untraceable Electronic Mail, Return Addresses, and Digital Pseudonyms David Chaum CACM Vol. 24 No. 2 February 1981 Presented by: Adam Lee 1/24/2006 David.
Optimistic Mixing for Exit-Polls Philippe Golle, Stanford Sheng Zhong, Yale Dan Boneh, Stanford Markus Jakobsson, RSA Labs Ari Juels, RSA Labs.
@Yuan Xue CS 285 Network Security Fall 2008.
P2P SIP Names & Security Cullen Jennings
Códigos y Criptografía Francisco Rodríguez Henríquez Security Attacks: Active and Passive Active Masquerade (impersonation) Replay Modification of message.
6. Esoteric Protocols secure elections and multi-party computation Kim Hyoung-Shick.
Lecture 3.4: Public Key Cryptography IV CS 436/636/736 Spring 2013 Nitesh Saxena.
Security protocols  Authentication protocols (this lecture)  Electronic voting protocols  Fair exchange protocols  Digital cash protocols.
Crowds: Anonymity for Web Transactions Michael K. Reiter Aviel D. Rubin Jan 31, 2006Presented by – Munawar Hafiz.
Lecture 5.2: Key Distribution: Private Key Setting CS 436/636/736 Spring 2012 Nitesh Saxena.
Lecture 4.2: Hash Functions: Design* CS 436/636/736 Spring 2012 Nitesh Saxena * some slides borrowed from Gene Tsudik.
Privacy and Anonymity Using Mix Networks* Slides borrowed from Philippe Golle, Markus Jacobson.
Network Security Lecture 27 Presented by: Dr. Munam Ali Shah.
Mobile App Door-to-Door Canvassing Yard Sign Placement Voter Quality Search Mapped Search Results Each pin is tied to the same Voter Data, Contact Info,
This guide will to help your students register for your Poll Everywhere account. Please customize this for your specific situation. Students will need.
Virginia State Military Electronic Absentee Voting.
Lecture 5.1: Message Authentication Codes, and Key Distribution
A Brief Introduction to Mix Networks Ari Juels RSA Laboratories © 2001, RSA Security Inc.
Almost Entirely Correct Mixing With Applications to Voting Philippe Golle Dan Boneh Stanford University.
Cryptography and Network Security Third Edition by William Stallings Lecture slides by Lawrie Brown.
Lecture 11 Overview. Digital Signature Properties CS 450/650 Lecture 11: Digital Signatures 2 Unforgeable: Only the signer can produce his/her signature.
LEFIS ROVANIEMI MEETING 19TH 20TH JANUARY 2007 Privacy In The Web TATYANA STEFANOVA LEX.BG BULGARIA.
Lecture 9 Overview. Digital Signature Properties CS 450/650 Lecture 9: Digital Signatures 2 Unforgeable: Only the signer can produce his/her signature.
Fall 2006CS 395: Computer Security1 Key Management.
Security By Meenal Mandalia. What is ? stands for Electronic Mail. much the same as a letter, only that it is exchanged in a different.
1 Anonymity. 2 Overview  What is anonymity?  Why should anyone care about anonymity?  Relationship with security and in particular identification 
Security Outline Encryption Algorithms Authentication Protocols
Anonymous Communication
Some slides borrowed from Philippe Golle, Markus Jacobson
Digital Forensics 2 Presented by : J.Silaa Lecture: FCI 30 Aug 2017
Some slides borrowed from Philippe Golle, Markus Jacobson
An Introduction to Privacy and Anonymous Communication
Anonymous Communication
Lecture 4 - Cryptography
Some slides borrowed from Philippe Golle, Markus Jacobson
Privacy and Anonymity Using Mix Networks* Nitesh Saxena CS392/6813
Lecture 10: Usable Security
How to Set up Privacy Functions
Advanced Computer Networks
Privacy and Anonymity Using Mix Networks* Nitesh Saxena CS392/6813
Anonymous Communication
Presentation transcript:

Lecture 7.1: Privacy and Anonymity Using Anonymizing Networks - I CS 436/636/736 Spring 2012 Nitesh Saxena Some slides borrowed from Philippe Golle, Markus Jacobson

Course Admin Mid-term graded – Scores posted – To be distributed today – Stats: Mean 87.75; Median 92.5 HW3 to be posted in the next few days 5/3/20152 Lecture 7.1: Privacy and Anonymity Using Anonymizing Networks

A Case History: AOL Web Search Query Log Leakage AOL's disturbing glimpse into users' lives, CNET News, August 7, 2006 AOL's disturbing glimpse into users' lives, CNET News, August 7, 2006 – 21 million search queries posed over a 3-month long period; 650,000 users – No user identification information released per se, but?? Search Log still available: – 5/3/20153 Lecture 7.1: Privacy and Anonymity Using Anonymizing Networks

Other Scenarios where privacy is important Location-based search Web browsing Electronic voting Electronic payments conversation … 5/3/2015 Lecture 7.1: Privacy and Anonymity Using Anonymizing Networks 4

Today’s Outline Anonymizing Network (or Mix Network) Anonymizing Network Applications Requirements Robustness Types of Anonymizing Networks – Decryption based (Onion Routing) – Re-encryption based 5/3/20155 Lecture 7.1: Privacy and Anonymity Using Anonymizing Networks

Definition: Mix Server (or Relay) 5/3/20156 A mix server: Receives inputs Produces “related” outputs The relationship between inputs and outputs is secret InputsOutputs ? Mix Server Lecture 7.1: Privacy and Anonymity Using Anonymizing Networks

Definition: Mix Network 5/3/20157 Mix network A group of mix servers that operate sequentially. Server 1Server 2Server 3 InputsOutputs ??? Lecture 7.1: Privacy and Anonymity Using Anonymizing Networks

Applications Hide:  “who voted for whom?”  “who paid whom?”  “who communicated with whom?”  “what is the source of a message?” Good for protecting privacy for election and communication Used as a privacy building block 5/3/20158 Lecture 7.1: Privacy and Anonymity Using Anonymizing Networks

Electronic Voting Demonstration 1.“Who do you like best?” 2.Put your ballot into a WHITE envelope and put again in a RED one and sign on it 5/3/20159 Jerry  Washington  Lincoln  Roosevelt Lecture 7.1: Privacy and Anonymity Using Anonymizing Networks

Electronic Voting Demo. (Cont’d) Administrators will 1.Verify signatures together 2.1 st Admin. shuffles and opens RED envelopes 3.Send them to 2 nd Admin. 4.2 nd Admin. shuffles again and opens WHITE envelopes 5.Count ballots together 5/3/ Lecture 7.1: Privacy and Anonymity Using Anonymizing Networks

A real system for elections Sign voter 1 (encr(encr (vote 1 ))) Sign voter 2 (encr(encr (vote 2 ))). Sign voter n (encr(encr (vote n ))) 5/3/ Jerry vote 1 vote 2 vote 3. vote n Mix Net  Washington  Lincoln  Roosevelt Mix Net

“Choose one person you like to pay $5” Put your ballot into an WHITE envelope and put again in a RED one and sign on it 5/3/ Jerry Name of the person ( ___________ ) Electronic Payment Demo. Lecture 7.1: Privacy and Anonymity Using Anonymizing Networks

Electronic Payment Demo. (Cont’d) Administrators will 1.Verify signatures together 2.Deduct $5 from each account 3.1 st Admin. shuffles and opens RED envelopes 4.Send them to 2 nd Admin. 5.2 nd Admin. shuffles again and opens WHITE envelopes 6.Credit $5 to recipients 5/3/ Lecture 7.1: Privacy and Anonymity Using Anonymizing Networks

For Payments Sign payer 1 (encr(encr (payee 1 ))) Sign payer 2 (encr(encr (payee 2 ))). Sign payer n (encr(encr (payee n ))) 5/3/ payee 1 payee 2 payee 3. payee n DEDUCTDEDUCT Credit Jerry Name (________ ) Mix Net

For communication encr ( 1, addressee 1 ) encr ( 2, addressee 2 ). encr ( n, addressee n ) 5/3/ Mix Net Deliver To: Jerry Don’t forget to have lunch.

Other Uses Anonymous web browsing; web searching (Anonymizer)Anonymizer 5/3/ From LPWA homepage Lecture 7.1: Privacy and Anonymity Using Anonymizing Networks

Other Uses (Cont’d) 5/3/ Location privacy for cellular devices – Location-based service is GOOD ! Landline-phone calling to 911 in the US, 112 in Europe All cellular carrier since December 2005 – RISK ! Location-based spam Harm to a reputation Lecture 7.1: Privacy and Anonymity Using Anonymizing Networks

Other Uses Anonymous VoIP calls Anonymous acquisition of security patches 5/3/ Lecture 7.1: Privacy and Anonymity Using Anonymizing Networks

Other uses (Cont’d) Sometimes abuses Avoid legislation (e.g., piracy) P2P sharing of copyright content Terrorism: communication with media – Mumbai attacks Mumbai attacks 5/3/ Lecture 7.1: Privacy and Anonymity Using Anonymizing Networks

Principle 5/3/ Chaum ’81 Message 1 Message 2 server 1server 2server 3 Privacy Efficiency Trust Robustness Requirements :

Requirements 1.Privacy Nobody knows who said what 2.Efficiency Mixing is efficient (= practically useful) 3.Trust How many entities do we have to trust? 4.Robustness Will replacement cheaters be caught? What if a certain number of mix servers fail? 5/3/ Lecture 7.1: Privacy and Anonymity Using Anonymizing Networks

But what about robustness? encr(Berry) encr(Kush) 5/3/ Kush STOP I ignore his output and produce my own There is no robustness!

Zoology of Mix Networks Decryption Mix Nets [Cha81,…]: – Inputs: ciphertexts – Outputs: decryption of the inputs. Re-encryption Mix Nets[PIK93,…]: – Inputs: ciphertexts – Outputs: re-encryption of the inputs 5/3/ InputsOutputs ? Lecture 7.1: Privacy and Anonymity Using Anonymizing Networks

First Solution 5/3/ Chaum ’81, implemented by Syverson, GoldschlagSyverson, Goldschlag Not robust (or: tolerates  cheaters for correctness) Requires every server to participate (and in the “right” order!)