Modeling Insider Attacks on Group Key Exchange Protocols Jonathan Katz Ji Sun Shin University of Maryland.

Slides:



Advertisements
Similar presentations
Security attacks. - confidentiality: only authorized parties have read access to information - integrity: only authorized parties have write access to.
Advertisements

Foundations of Cryptography Lecture 10 Lecturer: Moni Naor.
Survey: Secure Composition of Multiparty Protocols Yehuda Lindell Bar-Ilan University.
CS555Topic 241 Cryptography CS 555 Topic 24: Secure Function Evaluation.
11 Provable Security. 22 Given a ciphertext, find the corresponding plaintext.
CIS 5371 Cryptography 3b. Pseudorandomness.
Digital Signatures and Hash Functions. Digital Signatures.
Foundations of Cryptography Lecture 5 Lecturer: Moni Naor.
Key Exchange Using Passwords and Long Keys Vladimir Kolesnikov Charles Rackoff Comp. Sci. University of Toronto.
From: Cryptographers’ Track of the RSA Conference 2008 Date: Reporter: Yi-Chun Shih 1.
Deeper Security Analysis of Web-based Identity Federation Apurva Kumar IBM Research – India.
Computational Security. Overview Goal: Obtain computational security against an active adversary. Hope: under a reasonable cryptographic assumption, obtain.
Amortizing Garbled Circuits Yan Huang, Jonathan Katz, Alex Malozemoff (UMD) Vlad Kolesnikov (Bell Labs) Ranjit Kumaresan (Technion) Cut-and-Choose Yao-Based.
Eran Omri, Bar-Ilan University Joint work with Amos Beimel and Ilan Orlov, BGU Ilan Orlov…!??!!
NON-MALLEABLE EXTRACTORS AND SYMMETRIC KEY CRYPTOGRAPHY FROM WEAK SECRETS Yevgeniy Dodis and Daniel Wichs (NYU) STOC 2009.
1 Vipul Goyal Abhishek Jain Rafail Ostrovsky Silas Richelson Ivan Visconti Microsoft Research India MIT and BU UCLA University of Salerno, Italy Constant.
Improving the Round Complexity of VSS in Point-to-Point Networks Jonathan Katz (University of Maryland) Chiu-Yuen Koo (Google Labs) Ranjit Kumaresan (University.
Rennes, 23/10/2014 Cristina Onete Putting it all together: using multiple primitives together.
Yan Huang, Jonathan Katz, David Evans University of Maryland, University of Virginia Efficient Secure Two-Party Computation Using Symmetric Cut-and-Choose.
Impossibility Results for Concurrent Two-Party Computation Yehuda Lindell IBM T.J.Watson.
Session 5 Hash functions and digital signatures. Contents Hash functions – Definition – Requirements – Construction – Security – Applications 2/44.
CMSC 414 Computer and Network Security Lecture 6 Jonathan Katz.
CMSC 414 Computer (and Network) Security Lecture 2 Jonathan Katz.
Co-operative Private Equality Test(CPET) Ronghua Li and Chuan-Kun Wu (received June 21, 2005; revised and accepted July 4, 2005) International Journal.
CMSC 414 Computer and Network Security Lecture 5 Jonathan Katz.
CMSC 414 Computer and Network Security Lecture 16 Jonathan Katz.
CMSC 414 Computer and Network Security Lecture 22 Jonathan Katz.
Jointly Restraining Big Brother: Using cryptography to reconcile privacy with data aggregation Ran Canetti IBM Research.
CMSC 414 Computer and Network Security Lecture 19 Jonathan Katz.
Survey: Secure Composition of Multiparty Protocols Yehuda Lindell IBM T.J. Watson.
CMSC 414 Computer and Network Security Lecture 6 Jonathan Katz.
CMSC 414 Computer and Network Security Lecture 17 Jonathan Katz.
Hybrid Signcryption with Outsider Security
On Everlasting Security in the Hybrid Bounded Storage Model Danny Harnik Moni Naor.
Universally Composable Symbolic Analysis of Key-Exchange Protocols Jonathan Herzog (Joint work with Ran Canetti) 21 September 2004 The author's affiliation.
K-Anonymous Message Transmission Luis von Ahn Andrew Bortz Nick Hopper The Aladdin Center Carnegie Mellon University.
Universally Composable Symbolic Analysis of Security Protocols Jonathan Herzog (Joint work with Ran Canetti) 7 June 2004 The author's affiliation with.
CMSC 414 Computer and Network Security Lecture 13 Jonathan Katz.
Alexander Potapov.  Authentication definition  Protocol architectures  Cryptographic properties  Freshness  Types of attack on protocols  Two-way.
1 Cross-Domain Secure Computation Chongwon Cho (HRL Laboratories) Sanjam Garg (IBM T.J. Watson) Rafail Ostrovsky (UCLA)
CMSC 414 Computer and Network Security Lecture 3 Jonathan Katz.
CMSC 414 Computer and Network Security Lecture 14 Jonathan Katz.
Information-Theoretic Security and Security under Composition Eyal Kushilevitz (Technion) Yehuda Lindell (Bar-Ilan University) Tal Rabin (IBM T.J. Watson)
Adaptively Secure Broadcast, Revisited
CS555Topic 211 Cryptography CS 555 Topic 21: Digital Schemes (1)
CMSC 414 Computer and Network Security Lecture 6 Jonathan Katz.
Guomin Yang et al. IEEE Transactions on Wireless Communication Vol. 6 No. 9 September
Untraceable Electronic Mail, Return Addresses, and Digital Pseudonyms David Chaum CACM Vol. 24 No. 2 February 1981 Presented by: Adam Lee 1/24/2006 David.
All Rights Reserved © Alcatel-Lucent 2006, 2007 Mistyping in Two-Factor Password- Assisted Key Exchange Vlad Kolesnikov (Bell Labs) Charles Rackoff(U.
Slide 1 Vitaly Shmatikov CS 380S Introduction to Secure Multi-Party Computation.
CMSC 414 Computer and Network Security Lecture 5 Jonathan Katz.
Password Mistyping in Two-Factor Authenticated Key Exchange Vladimir KolesnikovCharles Rackoff Bell LabsU. Toronto ICALP 2008.
On the Communication Complexity of SFE with Long Output Daniel Wichs (Northeastern) joint work with Pavel Hubáček.
CIST/ETRI/ISIT/KDDI/Kyusyu Univ./NICT Joint Research Workshop on Ubiquitous Network Security 2005 Verifier-Based Password-Authenticated Key Exchange Jeong.
Rational Cryptography Some Recent Results Jonathan Katz University of Maryland.
Game-based composition for key exchange Cristina Brzuska, Marc Fischlin (University of Darmstadt) Nigel Smart, Bogdan Warinschi, Steve Williams (University.
M.S. Dousti FORSAKES: A Forward-Secure AKE Mohammad Sadeq Dousti Weekly Seminars on Discrete Mathematics and Computer Science.
Authenticated Key Exchange I. Definitions I. MAP I. matching conversations II. oracles II. (I)KA II. AKEP2 III. AKEP2 Security I. Session Keys II. Perfect.
Feasibility and Completeness of Cryptographic Tasks in the Quantum World Hong-Sheng Zhou (U. Maryland) Joint work with Jonathan Katz (U. Maryland) Fang.
Andrew Lindell Aladdin Knowledge Systems and Bar-Ilan University 04/08/08 CRYP-106 Efficient Fully-Simulatable Oblivious Transfer.
1/28 Chosen-Ciphertext Security from Identity- Based Encryption Jonathan Katz U. Maryland Ran Canetti, Shai Halevi IBM.
1 Authenticated Key Exchange Rocky K. C. Chang 20 March 2007.
CS555Spring 2012/Topic 151 Cryptography CS 555 Topic 15: HMAC, Combining Encryption & Authentication.
Round-Efficient Multi-Party Computation in Point-to-Point Networks Jonathan Katz Chiu-Yuen Koo University of Maryland.
Deadlock Freedom by Construction
Cryptography Lecture 12.
Anonymity, Unlinkability, Undetectability, Unobservability, Pseudonymity and Identity Management – A Consolidated Proposal for Terminology Authors: Andreas.
CMSC 414 Computer and Network Security Lecture 3
On Parallel and Concurrent Security of HB and HB+
Cryptography Lecture 11.
Presentation transcript:

Modeling Insider Attacks on Group Key Exchange Protocols Jonathan Katz Ji Sun Shin University of Maryland

2 Auth. Key Exchange (AKE) Goal:  Enable parties in an insecure network to establish a common (secret) session key …  … and be assured that they share this key with their intended partner(s) Settings:  Two-party AKE well-studied/understood  What about group AKE?

3 Group AKE? Less well-understood than 2-party case  Fewer known protocols  Formal definitions/proofs only recently [BCPQ 01]  New concerns: insider attacks Need to model such attacks Need methods for preventing such attacks

4 Our Motivation There are too many papers on insider attacks!  (Yes, this is odd motivation for writing another one … )  Each paper suggests its own “ ad-hoc ” list of security requirements  Insider attacks on protocols that never claimed security against such attacks  Countermeasures w/o proofs of security

5 Our Contributions Comprehensive model for group AKE which automatically encompasses insider attacks  Security definition in the UC model [C01, CK02] As a “ bonus ”, we get all the benefits of the UC model:  Concurrency, composability, strong corruption model, … Simple, generic mechanism for achieving UC security based on known protocols

6 The Rest of the Talk “ AKE-security ”  Insider attacks on AKE-secure protocols The UC framework UC-secure group AKE  Implies AKE security, security against (previously-suggested) insider attacks Constructing UC-secure protocols

7 AKE Security [BCPQ 01, … ] Basic idea (modulo many details … ):  Adversary interacts with oracles modeling different adversarial capabilities Send, Reveal, Corrupt, …  A protocol is AKE-secure if no poly-time adversary can distinguish the session key of a “ fresh ” instance from a random key

8 Limitations of AKE Security? There are certain attacks not covered by the definition; e.g.:  Outsider impersonation attacks (i.e., there is no explicit authentication)  Insider impersonation attacks: Corrupt U 1 and impersonate U 2 to U 3  Agreement: Parties U 1, U 2 believe they are partnered, but hold different session keys

9 A Fix(?) Why not just add the appropriate definitions “ on top of ” AKE security?  Number of definitions becomes unwieldy  How do we know when we have thought of all possible attacks? Better: (simple) specification of what we want to achieve, rather than a list of everything we want to prevent

The UC Framework (overview)

11 The UC Framework [C01] General-purpose framework for defining/designing secure protocols  Key feature: guarantees security of protocols under arbitrary composition (with arbitrary sets of parties) Note: there are other frameworks with similar guarantees [PW]

12 Real/Ideal Paradigm Two models:  In the ideal world, parties send their inputs to an ideal functionality that computes and sends appropriate outputs  In the real world, parties execute some protocol (without any trusted party)  securely realizes some functionality if the actions of any real-world adversary can be “ simulated ” in the ideal world  Since the ideal-world functionality is secure (by definition),  is secure

13 More Formally … There is an environment Z which provides inputs to all parties, reads their outputs, and interacts with a “ dummy ” adversary Z is an on-line, interactive distinguisher  In particular, Z cannot be rewound

14 Real Model write inputs/ read outputs Environment Z Protocol execution

15 Ideal Model Ideal functionality write inputs/ read outputs Environment Z

16 Definition of UC Security  securely realizes functionality F if: (for the “ dummy ” real-world adversary A) there exists an ideal-model adversary S such that no Z can distinguish whether it is interacting with A (in the real world running  ) or interacting with S (in the ideal world with F)

17 Caveats A UC-secure protocol is only as “ good ” as the ideal functionality it realizes  As usual, a poorly-specified functionality will not provide any security …

Group AKE in the UC Framework

19 UC-Secure Group AKE To define a secure group AKE protocol, all we need to do is define an appropriate ideal functionality

20 Ideal Functionality (overview) Parties begin with input (pid, sid) When F receives (pid, sid) from all parties in pid, enters “ ready ” state F waits for “ ok ” from adversary  Allows player corruption mid-protocol F chooses a key k  If no parties in pid corrupted, k is random  Else, adversary chooses k Adversary schedules delivery of k to each player in pid, via F

21 Sanity Check Any UC-secure protocol satisfies:  AKE security (since k chosen at random)  Security against insider/outsider impersonation (since all parties in pid must communicate with F)  Agreement (since F sends the same key to all parties)

Constructing UC-Secure Protocols

23 Key Result We show a simple, efficient method for “ compiling ” any AKE-secure protocol into a UC-secure protocol Basically, each party signs an “ ack ” message and send it to all other parties  Using MACs will not work (insiders know k)  Ensures the “ ACK ” property [CK02]; needed for security against adaptive corruptions  Some technical subtleties …

24 Details To ensure agreement, need the “ ack ” to correspond to a unique key …  … yet the “ ack ” should not leak information about the key Use “ seed-committing PRFs ” :  PRF F such that F k (0)  F k ’ (0) if k  k ’  Can be constructed in RO model or based on one-way permutations

25 Summary We propose to simplify definitions and constructions of group AKE by working in the UC framework  Esp. useful for modeling insider attacks Simple, generic method for obtaining UC-secure protocols Can we all agree to write fewer papers on group AKE?