Analysis of Direct Anonymous Attestation (DAA) Sudip Regmi Ilya Pirkin.

Slides:



Advertisements
Similar presentations
Secure Naming structure and p2p application interaction IETF - PPSP WG July 2010 Christian Dannewitz, Teemu Rautio and Ove Strandberg.
Advertisements

Key Management. Shared Key Exchange Problem How do Alice and Bob exchange a shared secret? Offline – Doesnt scale Using public key cryptography (possible)
Rennes, 24/10/2014 Cristina Onete CIDRE/ INRIA Privacy in signatures. Hiding in rings, hiding in groups.
MAC Raushan. DES simple fiestel network 3131 PlainText Blocks 2*4=8bits 31 f f =0011 xor 0011=0000 = 0 f(r,k)=(2*r+k^2)%8 f(1,5)=(2*1+5^2)%8=3 xor 3 3.
1 Security in Wireless Protocols Bluetooth, , ZigBee.
Self-Organized Anonymous Authentication in Mobile Ad Hoc Networks Julien Freudiger, Maxim Raya and Jean-Pierre Hubaux SECURECOMM, 2009.
Digital Signatures and Hash Functions. Digital Signatures.
The Attestation Mechanism in Trusted Computing. A Simple Remote Attestation Protocol Platform TPM Verifier Application A generates PK A & SK A 2) computes.
CSCE 715: Network Systems Security Chin-Tser Huang University of South Carolina.
From: Cryptographers’ Track of the RSA Conference 2008 Date: Reporter: Yi-Chun Shih 1.
Luu Anh Tuan. Security protocol Intruder Intruder behaviors Overhead and intercept any messages being passed in the system Decrypt messages that are.
Deeper Security Analysis of Web-based Identity Federation Apurva Kumar IBM Research – India.
Modeling Insider Attacks on Group Key Exchange Protocols Jonathan Katz Ji Sun Shin University of Maryland.
TrustMe: Anonymous Management of Trust Relationships in Decentralized P2P Systems Aameek Singh and Ling Liu Presented by: Korporn Panyim.
CMSC 414 Computer and Network Security Lecture 12 Jonathan Katz.
Environmental Council of States Network Authentication and Authorization Services The Shared Security Component February 28, 2005.
 Authorization via symmetric crypto  Key exchange o Using asymmetric crypto o Using symmetric crypto with KDC  KDC shares a key with every participant.
Trusted Disk Loading in the Emulab Network Testbed Cody Cutler, Mike Hibler, Eric Eide, Rob Ricci 1.
Trusted Platform Modules: Building a Trusted Software Stack and Remote Attestation Dane Brandon, Hardeep Uppal CSE551 University of Washington.
G Robert Grimm New York University Using Encryption for Authentication in Computer Networks.
CMSC 414 Computer and Network Security Lecture 7 Jonathan Katz.
A Secure Fault-Tolerant Conference- Key Agreement Protocol Wen-Guey Tzeng Source : IEEE Transactions on computers Speaker : LIN, KENG-CHU.
CMSC 414 Computer and Network Security Lecture 9 Jonathan Katz.
Providing Trusted Paths Using Untrusted Components Andre L. M. dos Santos Georgia Institute of Technology
CMSC 414 Computer and Network Security Lecture 16 Jonathan Katz.
Modelling and Analysing of Security Protocol: Lecture 1 Introductions to Modelling Protocols Tom Chothia CWI.
CSE331: Introduction to Networks and Security Lecture 24 Fall 2002.
CMSC 414 Computer and Network Security Lecture 23 Jonathan Katz.
CMSC 414 Computer and Network Security Lecture 17 Jonathan Katz.
Computer Security and Penetration Testing
Key Distribution CS 470 Introduction to Applied Cryptography
Long-term Archive Service Requirements draft-ietf-ltans-reqs-00.txt.
CMSC 414 Computer and Network Security Lecture 13 Jonathan Katz.
Alexander Potapov.  Authentication definition  Protocol architectures  Cryptographic properties  Freshness  Types of attack on protocols  Two-way.
Wolfgang Schneider NSI: A Client-Server-Model for PKI Services.
Rennes, 15/10/2014 Cristina Onete Message authenticity: Digital Signatures.
Oblivious Signature-Based Envelope Ninghui Li, Stanford University Wenliang (Kevin) Du, Syracuse University Dan Boneh, Stanford University.
Trusted Computing BY: Sam Ranjbari Billy J. Garcia.
Untraceable Electronic Mail, Return Addresses, and Digital Pseudonyms David Chaum CACM Vol. 24 No. 2 February 1981 Presented by: Adam Lee 1/24/2006 David.
Mobile IPv6 Binding Update: Return Routability Procedure Andre Encarnacao and Greg Bayer Stanford University CS 259 Winter 2008 Andre Encarnacao, Greg.
Dr. L. Christofi1 Local & Metropolitan Area Networks ACOE322 Lecture 8 Network Security.
CS259: Security Analysis of Network Protocols Winter 2008 Project Presentations 2 Day 2 – Feb. 21, 2008.
Evoting using collaborative clustering Justin Gray Osama Khaleel Joey LaConte Frank Watson.
Presented by: Suparita Parakarn Kinzang Wangdi Research Report Presentation Computer Network Security.
Linkability of Some Blind Signature Schemes Swee-Huay Heng 1, Wun-She Yap 1 Khoongming Khoo 2 1 Multimedia University, 2 DSO National Laboratories.
Lecture 16: Security CDK4: Chapter 7 CDK5: Chapter 11 TvS: Chapter 9.
P2: Privacy-Preserving Communication and Precise Reward Architecture for V2G Networks in Smart Grid P2: Privacy-Preserving Communication and Precise Reward.
WISTP’08 ©LAM /05/2008 A Self-Certified and Sybil-Free Framework for Secure Digital Identity Domain Buildup Christer Andersson Markulf Kohlweiss.
6 June Lecture 2 1 TU Dresden - Ws on Proof Theory and Computation Formal Methods for Security Protocols Catuscia Palamidessi Penn State University,
Signatures, etc. Network Security Gene Itkis Signature scheme: Formal definition GenKey Generation: Gen(1 k )   PK, SK  SignSigning: Sign(SK, M) 
Authentication Issues and Solutions CSCI 5857: Encoding and Encryption.
Key Agreement for Heterogeneous Mobile Ad-hoc Groups (µSTR-H) Mark Manulis Horst-Görtz Institute, Bochum (Germany)
Network Security Lecture 27 Presented by: Dr. Munam Ali Shah.
Network Security Continued. Digital Signature You want to sign a document. Three conditions. – 1. The receiver can verify the identity of the sender.
A Simple Traceable Pseudonym Certificate System for RSA-based PKI SCGroup Jinhae Kim.
HACNet Simulation-based Validation of Security Protocols Vinay Venkataraghavan Advisors: S.Nair, P.-M. Seidel HACNet Lab Computer Science and Engineering.
Electronic Voting R. Newman. Topics Defining anonymity Need for anonymity Defining privacy Threats to anonymity and privacy Mechanisms to provide anonymity.
多媒體網路安全實驗室 Anonymous Authentication Systems Based on Private Information Retrieval Date: Reporter: Chien-Wen Huang 出處: Networked Digital Technologies,
Replay Attacks.
1 Authenticated Key Exchange Rocky K. C. Chang 20 March 2007.
ICICS2002, Singapore 1 A Group Signature Scheme Committing the Group Toru Nakanishi, Masayuki Tao, and Yuji Sugiyama Dept. of Communication Network Engineering.
Manu Drijvers, Joint work with Jan Camenisch, Anja Lehmann. March 9 th, 2016 Universally Composable Direct Anonymous Attestation.
Prof. Reuven Aviv, Nov 2013 Public Key Infrastructure1 Prof. Reuven Aviv Tel Hai Academic College Department of Computer Science Public Key Infrastructure.
Cryptographic Hash Function. A hash function H accepts a variable-length block of data as input and produces a fixed-size hash value h = H(M). The principal.
Cryptography and Network Security Chapter 14 Fifth Edition by William Stallings Lecture slides by Lawrie Brown.
On the (im)possibility of perennial message recognition protocols without public-key cryptography Peeter Laud Cybernetica AS & University of Tartu
Foundations of Fully Dynamic Group Signatures
刘振 上海交通大学 计算机科学与工程系 电信群楼3-509
Formal Analysis and Applications of Direct Anonymous Attestation
Presentation transcript:

Analysis of Direct Anonymous Attestation (DAA) Sudip Regmi Ilya Pirkin

Protocol Diagram (Simple Model) Issuer PKI Verifier Platform – {Commit(f),Ni} 1.Join Request – {Commit(f),Ni} Authenticated by EK, using SPK – {DAA- Certificate(Ni, Commit(f), 2. Join Response – {DAA- Certificate(Ni, Commit(f),PKI)} {basename, nonce} 3. Sign Request {basename, nonce} {m, Signature(m, DAA- Certificate, Nv, nonce}} 4. Sign Response - {m, Signature(m, DAA- Certificate, Nv, nonce}}

Security Properties Correctness Correctness The verifier completes the protocol for message m only if: The verifier completes the protocol for message m only if: m was signed by an honest TPM using a DAA-Certificate and verifier’s basename; m was signed by an honest TPM using a DAA-Certificate and verifier’s basename; The DAA-Certificate was issued by an honest Issuer for the TPM before signing message m. The DAA-Certificate was issued by an honest Issuer for the TPM before signing message m. The issuer which the verifier knows is the same as the issuer which generated DAA-Certificate(f) used in the signature The issuer which the verifier knows is the same as the issuer which generated DAA-Certificate(f) used in the signature TPM is not on the rogue list TPM is not on the rogue list

Security Properties Anonymity – A transaction of an honest platform cannot be linked with its Endorsement Key (EK). Anonymity – A transaction of an honest platform cannot be linked with its Endorsement Key (EK). Checked by comparing pseudonyms in the sign response and the join request. If they are equal anonymity breaks Checked by comparing pseudonyms in the sign response and the join request. If they are equal anonymity breaks Unlinkability – Transactions of an honest platform with different Verifiers are not linkable. Unlinkability – Transactions of an honest platform with different Verifiers are not linkable. Checked by comparing PKI, pseudonyms in sign responses. Transactions are linkable if: Checked by comparing PKI, pseudonyms in sign responses. Transactions are linkable if: Values are the same if came from the same TPM Values are the same if came from the same TPM Values are different if came from different TPM Values are different if came from different TPM

Level of Abstraction Simple Model Simple Model Treats host and TPM as one player – the platform. Ignores any interactions between these two players Treats host and TPM as one player – the platform. Ignores any interactions between these two players Only four messages and three player Only four messages and three player Simple Message Format. Simple Message Format. Full Model Full Model Considers interaction between Host and TPM Considers interaction between Host and TPM Messages reflect actual protocol messages with the exception of the interactive proofs of knowledge Messages reflect actual protocol messages with the exception of the interactive proofs of knowledge

Modeling Approach Primitives are secure Primitives are secure Interactive Proof of Knowledge is modeled by limiting Adversary’s capabilities Interactive Proof of Knowledge is modeled by limiting Adversary’s capabilities Can’t replay Join Request Can’t replay Join Request Can’t modify Join Request Can’t modify Join Request

Adversary’s Capabilities Modeled Can intercept messages on the network Can intercept messages on the network Checks for use of different PK in DAA-Certificate Checks for use of different PK in DAA-Certificate Checks to see if he can link two transactions (Join Request with Sign Response, Sign Response with another Sign Response) Checks to see if he can link two transactions (Join Request with Sign Response, Sign Response with another Sign Response) Can replay intercepted messages blindly Can replay intercepted messages blindly Replays Sign Response for a seen Sign Request Randomly Replays Sign Response for a seen Sign Request Randomly Constructs a Sign Response in response to a seen Sign Request(Constructs from an earlier Join and Sign Response) Constructs a Sign Response in response to a seen Sign Request(Constructs from an earlier Join and Sign Response) Constructs a Sign Request with the issuer's basename. (The idea is to make the TPM to generate the same pseudonym as in the join protocol) Constructs a Sign Request with the issuer's basename. (The idea is to make the TPM to generate the same pseudonym as in the join protocol)

Attacks in Simple Model Issuer Verifier Platform 1. Join Request 2. Join Response 3. Sign Request 4. Sign Response For each new Join Request a new Public Key is Used For each new Join Request a new Public Key is Used Fix – Make sure that same is used in as many as n participant to guarantee n-anonymity Fix – Make sure that same is used in as many as n participant to guarantee n-anonymity Rudolph DAA Attack on Anonymity Rudolph DAA Attack on Anonymity Murphi outputs: Error: intruder linked PKI from the same TPM Murphi outputs: Error: intruder linked PKI from the same TPM

Attacks in Simple Model Issuer Intruder Platform Join Request Join Response Sign Request Sign Response Anonymity Attack – Intruder uses Issuer’s basename Anonymity Attack – Intruder uses Issuer’s basename Join Request and Sign Responses have same pseudonym Join Request and Sign Responses have same pseudonym Fix – Include the type of the basename into pseudonym. Fix – Include the type of the basename into pseudonym. Murphi outputs: Error: intruder linked pseudonyms in join and sign requests Murphi outputs: Error: intruder linked pseudonyms in join and sign requests

Attacks in Simple Model Issuer Verifier1 Platform Join Request Join Response Sign Request 1 Sign Response 1 Unlinkability Attack – bsn_v1 = bsn_v2 Unlinkability Attack – bsn_v1 = bsn_v2 Sign Response 1 and Sign Response 2 have same basenames Sign Response 1 and Sign Response 2 have same basenames Intruder Sign Response 2 Sign Request 2

Issues in Simple Model EK is not verified against a revocation list (Rogue Tagging Feature is not setup correctly) EK is not verified against a revocation list (Rogue Tagging Feature is not setup correctly) Correctness Issue – Intruder forwards Platform1’s Messages to Platform2. Correctness Issue – Intruder forwards Platform1’s Messages to Platform2. Verifier1 Intruder Platform1Platform2 Platform1 and Platform2 are on different networks, each correctly joined their issuers Platform1 and Platform2 are on different networks, each correctly joined their issuers Intruder redirects the sign request to a different network Intruder redirects the sign request to a different network Verifier does not check which network the platform is in Verifier does not check which network the platform is in How far does anonymity extends? How far does anonymity extends?

Full model – join protocol

Full model – sign protocol

Conclusion The protocol is well designed The protocol is well designed Using interactive PK and nonces to ensure freshness and integrity of messages Using interactive PK and nonces to ensure freshness and integrity of messages Hashes cover all possible parameters Hashes cover all possible parameters High level of description makes it difficult to verify corner conditions. High level of description makes it difficult to verify corner conditions. Correctness in anonymous system is different from peer-to-peer. Correctness in anonymous system is different from peer-to-peer. Managed to model known attacks, no new findings Managed to model known attacks, no new findings Cross-site attack should be taken care of by users Cross-site attack should be taken care of by users Too Detailed Model runs out of memory Too Detailed Model runs out of memory