Identity-Based Cryptography for Grid Security Hoon Wei Lim Information Security Group Royal Holloway, University of London (Joint work with Kenny Paterson)

Slides:



Advertisements
Similar presentations
Experiences with Massive PKI Deployment and Usage Daniel Kouřil, Michal Procházka Masaryk University & CESNET Security and Protection of Information 2009.
Advertisements

Policy Based Dynamic Negotiation for Grid Services Authorization Infolunch, L3S Research Center Hannover, 29 th Jun Ionut Constandache Daniel Olmedilla.
Authentication Applications. will consider authentication functions will consider authentication functions developed to support application-level authentication.
Securing Critical Unattended Systems with Identity Based Cryptography A Case Study Johannes Blömer, Peter Günther University of Paderborn Volker Krummel.
Cryptography and Network Security Third Edition by William Stallings Lecture slides by Lawrie Brown.
Spring 2000CS 4611 Security Outline Encryption Algorithms Authentication Protocols Message Integrity Protocols Key Distribution Firewalls.
MyProxy: A Multi-Purpose Grid Authentication Service
Grid Computing, B. Wilkinson, 20045a.1 Security Continued.
Public Key Infrastructure (PKI)
Efficient Public Key Infrastructure Implementation in Wireless Sensor Networks Wireless Communication and Sensor Computing, ICWCSC International.
1 Network Security Outline Encryption Algorithms Authentication Protocols Message Integrity Protocols Key Distribution Firewalls.
Encryption Public-Key, Identity-Based, Attribute-Based.
Grid Security Infrastructure Tutorial Von Welch Distributed Systems Laboratory U. Of Chicago and Argonne National Laboratory.
Lecture 2: Security Rachana Ananthakrishnan Argonne National Lab.
Lecture 23 Internet Authentication Applications
Military Technical Academy Bucharest, 2006 GRID SECURITY INFRASTRUCTURE (GSI) - Globus Toolkit - ADINA RIPOSAN Department of Applied Informatics.
Grid Security. Typical Grid Scenario Users Resources.
Environmental Council of States Network Authentication and Authorization Services The Shared Security Component February 28, 2005.
Public Key Infrastructure (PKI) Providing secure communications and authentication over an open network.
DESIGNING A PUBLIC KEY INFRASTRUCTURE
WAP Public Key Infrastructure CSCI – Independent Study Fall 2002 Jaleel Syed Presentation No 5.
SMUCSE 5349/7349 Public-Key Infrastructure (PKI).
CMSC 414 Computer (and Network) Security Lecture 17 Jonathan Katz.
Mar 12, 2002Mårten Trolin1 This lecture Diffie-Hellman key agreement Authentication Certificates Certificate Authorities SSL/TLS.
Introduction to PKI Seminar What is PKI? Robert Brentrup July 13, 2004.
Interoperation Between a Conventional PKI and an ID-Based Infrastructure Geraint Price Royal Holloway University of London joint work with Chris Mitchell.
Spring 2002CS 4611 Security Outline Encryption Algorithms Authentication Protocols Message Integrity Protocols Key Distribution Firewalls.
November 1, 2006Sarah Wahl / Graduate Student UCCS1 Public Key Infrastructure By Sarah Wahl.
EECC694 - Shaaban #1 lec #16 Spring Properties of Secure Network Communication Secrecy: Only the sender and intended receiver should be able.
Spring 2003CS 4611 Security Outline Encryption Algorithms Authentication Protocols Message Integrity Protocols Key Distribution Firewalls.
Key Distribution CS 470 Introduction to Applied Cryptography
Security Management.
1 CS 194: Distributed Systems Security Scott Shenker and Ion Stoica Computer Science Division Department of Electrical Engineering and Computer Sciences.
CAMP - June 4-6, Copyright Statement Copyright Robert J. Brentrup and Mark J. Franklin This work is the intellectual property of the authors.
Public Key Infrastructure from the Most Trusted Name in e-Security.
CSCI 6962: Server-side Design and Programming
Identity Based Encryption Debdeep Mukhopadhyay Associate Professor Dept of Computer Sc and Engg, IIT Kharagpur.
An Efficient Identity-based Cryptosystem for
Cryptography and Network Security Chapter 14 Fifth Edition by William Stallings Lecture slides by Lawrie Brown.
02/22/2005 Joint Seminer Satoshi Koga Information Technology & Security Lab. Kyushu Univ. A Distributed Online Certificate Status Protocol with Low Communication.
Chapter 9: Using and Managing Keys Security+ Guide to Network Security Fundamentals Second Edition.
Public Key Infrastructure (X509 PKI) Presented by : Ali Fanian.
Unit 1: Protection and Security for Grid Computing Part 2
Grid Security 1. Grid security is a crucial component Need for secure communication between grid elements  Authenticated ( verify entities are who they.
Chapter 23 Internet Authentication Applications Kerberos Overview Initially developed at MIT Software utility available in both the public domain and.
Certificate-Based Operations. Module Objectives By the end of this module participants will be able to: Define how cryptography is used to secure information.
06 APPLYING CRYPTOGRAPHY
XMPP Concrete Implementation Updates: 1. Why XMPP 2 »XMPP protocol provides capabilities that allows realization of the NHIN Direct. Simple – Built on.
15.1 Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Key Management.
Tanenbaum & Van Steen, Distributed Systems: Principles and Paradigms, 2e, (c) 2007 Prentice-Hall, Inc. All rights reserved DISTRIBUTED.
Chapter 3 (B) – Key Management; Other Public Key Cryptosystems.
Security Many secure IT systems are like a house with a locked front door but with a side window open -somebody.
Pairing Based Cryptography Standards Terence Spies VP Engineering Voltage Security
Security fundamentals Topic 5 Using a Public Key Infrastructure.
Authorisation, Authentication and Security Guy Warner NeSC Training Team Induction to Grid Computing and the EGEE Project, Vilnius,
Module 2: Introducing Windows 2000 Security. Overview Introducing Security Features in Active Directory Authenticating User Accounts Securing Access to.
Creating and Managing Digital Certificates Chapter Eleven.
Key Management. Authentication Using Public-Key Cryptography  K A +, K B + : public keys Alice Bob K B + (A, R A ) 1 2 K A + (R A, R B,K A,B ) 3 K A,B.
1 Grid School Module 4: Grid Security. 2 Typical Grid Scenario Users Resources.
Mar 28, 2003Mårten Trolin1 This lecture Certificates and key management Non-interactive protocols –PGP SSL/TLS –Introduction –Phases –Commands.
Key Management and Distribution Anand Seetharam CST 312.
Pertemuan #8 Key Management Kuliah Pengaman Jaringan.
 Attacks and threats  Security challenge & Solution  Communication Infrastructure  The CA hierarchy  Vehicular Public Key  Certificates.
Prof. Reuven Aviv, Nov 2013 Public Key Infrastructure1 Prof. Reuven Aviv Tel Hai Academic College Department of Computer Science Public Key Infrastructure.
Key management issues in PGP
Security Outline Encryption Algorithms Authentication Protocols
Grid Security.
刘振 上海交通大学 计算机科学与工程系 电信群楼3-509
刘振 上海交通大学 计算机科学与工程系 电信群楼3-509
Presentation transcript:

Identity-Based Cryptography for Grid Security Hoon Wei Lim Information Security Group Royal Holloway, University of London (Joint work with Kenny Paterson)

The 17 th Global Grid Forum, May 10-12, Tokyo 2 Outline 1.Grid security 2.Identity-based cryptography 3.An identity-based alternative to GSI 4.Performance analysis 5.Benefits and drawbacks 6.Conclusions

The 17 th Global Grid Forum, May 10-12, Tokyo 3 1. Grid Security  Grid security requirements:  Entity authentication  E.g. individual users, resource/service providers.  Single sign-on  Logon once but authenticate to multiple resources.  Delegation  Achieve unattended authentication, allowing an intermediate party to act on user’s behalf.  Credential life-span and renewal  Short-term (proxy) credentials are used to limit the exposure of long-term credentials (private keys)  Authorization and access control  Others: integration and inter-operability, policy management, trust relationships, user privacy, etc.

The 17 th Global Grid Forum, May 10-12, Tokyo 4 GSI: Single sign-on  User’s long-term private key encrypted using key derived from password.  Public key certified by X.509 certificate that is issued by Grid CA.  At logon:  Password unlocks long-term private key.  User’s machine generates proxy/short-term key pair.  Proxy certificate for short-term public key signed using long-term private key.  Proxy private key protected by local file system permissions.  User now uses proxy credential to authenticate, establish secure sessions, etc.  No password re-entry needed and long-term private key protected.

The 17 th Global Grid Forum, May 10-12, Tokyo 5 GSI: Authentication  Mutual authentication performed as part of a TLS handshake protocol.  Needed during job submission and before delegation.  Make uses of standard and proxy certificates in ClientCert and ServerCert.  Proxy private keys are used for signing handshake flows.  Involves transmission and verification of certificate chains.

The 17 th Global Grid Forum, May 10-12, Tokyo 6 GSI: Secure communications  Authenticated session key establishment also as part of the TLS handshake protocol.  Uses RSA encryption to transport keying material securely from client (user) to server (resource).  Proxy keys are used for RSA encryption.  Keying material used to derive keys for TLS secure channel.

The 17 th Global Grid Forum, May 10-12, Tokyo 7 GSI: Delegation  Delegation of rights from one party to another.  For example, a resource X may need to access additional resources on behalf of user A, without user intervention.  Resource X creates proxy key pair.  Proxy request signed using X’s newly created proxy private key and delivered to user A along with proxy public key.  A’s proxy checks request and signature, then creates proxy certificate on resource’s proxy public key and proxy request.  Signature created using A’s proxy private key.  Proxy certificate forwarded to resource X.  A certificate from user (proxy) delegating certain rights to resource.

The 17 th Global Grid Forum, May 10-12, Tokyo 8 Some problems  Large number of signature and certificate chain verifications are needed.  Even for execution of a simple job request.  SSO and delegation require frequent generation of proxy credentials.  Each new credential requiring moderately intensive key generation (typically use 512 and 1024 bit RSA keys).  Several protocol messages and round trips involved in delegation.  High computational and communication overheads.  CRLs as proposed revocation mechanism for long-term keys.  Scalability and timeliness of information.  Does the security architecture scale to production level grids?

The 17 th Global Grid Forum, May 10-12, Tokyo 9 2. Identity-Based Cryptography Original idea due to Shamir (1984):  Public keys derived directly from system identities (e.g. an address or IP address).  Private keys generated and distributed to users in by a trusted authority (TA) who has a master key.  As long as:  Bob is sure of Alice’s identity and  The TA has given the private key to the right entity, then Bob can safely encrypt to Alice without consulting a directory and without checking a certificate.

The 17 th Global Grid Forum, May 10-12, Tokyo 10 Basic idea of IBC TA Private Key Alice’s ID Public Key

The 17 th Global Grid Forum, May 10-12, Tokyo 11 Reality of IBC TA Secure channel Authentic public parameters Alice’s ID

The 17 th Global Grid Forum, May 10-12, Tokyo 12 IBC: A short history  Shamir devised only an ID-based signature scheme.  Construction of truly practical and secure ID-based encryption scheme an open problem until  Sakai, Ohgishi and Kasahara (SCIS, Jan. 2001).  Boneh and Franklin (CRYPTO, Aug. 2001).  Practical and provably secure.  Uses elliptic curve cryptography and pairings on elliptic curves.  Cocks’ scheme (IMA C&C, Dec. 2001).  Scheme based on quadratic residuosity, not bandwidth efficient.  Research done in mid 1990’s at UK government agency.

The 17 th Global Grid Forum, May 10-12, Tokyo 13 Some benefits of IBC  Certificate-free.  No processing, management or distribution of certificates.  Directory-less.  Bob can encrypt for Alice without looking-up Alice’s public key first.  Indeed, Alice need not have her private key when she receives Bob’s encryption.  Automatic revocation.  Simply extend identifier to include a validity period.  Alice’s private key becomes useless at end of each period, because Bob will start to update identifier.  So Alice needs to obtain private key for current period from TA in order to decrypt.

The 17 th Global Grid Forum, May 10-12, Tokyo 14 Hierarchical IBC  Hierarchical identity-based cryptography (HIBC).  Gentry and Silverberg (2002)  Eases the private key distribution problem and improves scalability of the Boneh-Franklin IBE scheme.  Mimics the hierarchy of CA’s often seen in PKI.  HIBE and HIBS schemes.  Architecture:  A root TA at level 0 with a master secret s 0.  Entity at level t -1 in hierarchy has secret s t-1 and issues private keys S t to entities at level t for which it is responsible.  So each entity acts as TA for lower-level entities.  Any entity can encrypt for (or verify signatures of) any other entity in the hierarchy, provided their identity string is known.

The 17 th Global Grid Forum, May 10-12, Tokyo An ID-based Alternative  Main ideas:  Replace Grid CA by Grid TA (or hierarchy of TAs depending on the scale).  Apply the Gentry-Silverberg HIBE and HIBS schemes for encryption/decryption and signature generation/verification.  Eliminate certificates and certificate chains.  Simplify proxy generation and dissemination.  Use automatic revocation feature of HIBC to limit proxy credential lifetimes and to set proxy policies.  Use carefully selected cryptographic parameters to minimise computation and bandwidth requirements.

The 17 th Global Grid Forum, May 10-12, Tokyo 16 ID-based architecture  Bootstrap root TA’s parameters into grid software.  One-time registration of local TAs with root TA.  Local TAs responsible for:  Registration of local users and resources.  Distribution of long-term private keys to local users and resources.  Users and resources in turn act as TAs for their proxies.  Distribution of short-term (proxy) private keys within user machine/resource.

The 17 th Global Grid Forum, May 10-12, Tokyo 17 ID-based architecture Root TA Local TA User User Proxy Local TA Resource Level 0 Level 1 Level 3 Level 2 Resource Proxy

The 17 th Global Grid Forum, May 10-12, Tokyo 18 Single sign-on Root TA Local TA User User Proxy Local TA Level 0 Level 1 Level 3 Level 2 Single Sign On:  Password unlocks user (level 2) private key.  User (level 2) can then create private key for user proxy (level 3).  Level 3 identifier encodes validity period for proxy.  Level 3 identifiers can be parsed by resources when checking proxy signatures and making access control decisions. Resource Resource Proxy

The 17 th Global Grid Forum, May 10-12, Tokyo 19 Delegation  User proxy combines user proxy identifier, resource identifier, validity period and delegated privileges to create identifier for delegated resource (level 4).  Identifier acts as a form of delegation token.  User proxy transports private key matching identifier to resource, e.g. using a shared session key.  Resource can now use private key to vouch that it has received delegated rights from user proxy.  Exploits dynamic nature of HIBC:  User proxy creates a new level below it in hierarchy.  Delegated resource effectively becomes subordinate to user proxy in hierarchy.

The 17 th Global Grid Forum, May 10-12, Tokyo 20 Delegation Root TA Local TA User User Proxy Local TA Delegated Resource Level 0 Level 1 Level 3 Level 2 Level 4 Secure private key transport Resource Resource Proxy

The 17 th Global Grid Forum, May 10-12, Tokyo 21 Delegation: Alternative  A one-pass non-interactive delegation protocol.  When user wants to delegate her credential to resource:  User creates identifier (delegation token) as before.  User signs the identifier (using HIBS) and forwards it to resource.  Resource’s status as the delegation target can be confirmed by a third party by:  Verifying the signed delegation token using user’s ID.  Challenging resource to prove possession of the identity-based private key matching delegation token.

The 17 th Global Grid Forum, May 10-12, Tokyo 22 Resource Proxy Delegation: Alternative Root TA Local TA User User Proxy Local TA Resource Delegated Resource Level 0 Level 1 Level 3 Level 2 Level 4 Signature on token

The 17 th Global Grid Forum, May 10-12, Tokyo 23 Authentication and secure communications  Use identity-based version of TLS.  Gives mutual authentication and establishment of secure communications channel.  Replace RSA signatures by HIBS.  Replace RSA encryption for key transport by HIBE.  Replace ClientCert and ServerCert with ClientIdentifer and ServerIdentifier.  E.g. ClientIdentifier = ID A, LT A  Needs support in TLS for new ID-based ciphersuites.

The 17 th Global Grid Forum, May 10-12, Tokyo 24 Key update and revocation  User long-term keys can be updated on a yearly basis.  Encode year as part of user identifier.  /C=UK/O=eScience/OU=RHUL/CN=Alice/Y=2006  Update requires secure channel from TA to user.  Can use existing user public key to encrypt new private key.  We can use finer-grained identifiers for more regular automated revocation:  /C=UK/O=eScience/OU=RHUL/CN=Alice/Y=2006/M=May  However, if this is still not sufficient, existing PKI revocation mechanisms such as CRLs, OCSP, can be used.  Default lifetime for short-term keys in GSI is 12 hours.  Mimic this by including expiry periods in all proxy identifiers.

The 17 th Global Grid Forum, May 10-12, Tokyo Performance Analysis  Assumptions:  CA’s certificates and TA’s system parameters are pre-distributed.  Size of standard certificate = 1.5 kilobytes (RSA public key, modulus, signature, excluding subject, issuer, validity period).  Size of proxy certificate = 0.8 kilobytes.  Selection of ID-based components to give roughly same security as 1024-bit RSA.  Dominant computational costs:  GSI – RSA key generation.  ID-based GSI – pairing computation.  Dominant communication costs:  GSI – certificates, RSA encryption (512 bits) and signature (512 bits).  ID-based GSI – HIBE encryption (1056 bits) and HIBS signature (816 bits).

The 17 th Global Grid Forum, May 10-12, Tokyo 26 Communication costs  GSI:  Authenticated key agreement: 4 certificates (2 proxy), 1 encryption, 1 signature.  Delegation: 1 proxy certificate, 1 signature, 1 public key.  ID-based GSI:  Authenticated key agreement: 1 encryption, 1 signature.  Delegation: 1 signature. OperationGSI (kbits) ID-based (kbits) Authenticated Key agreement (TLS) Delegation7.80.8

The 17 th Global Grid Forum, May 10-12, Tokyo 27 Computational costs  GSI:  Single sign-on: 1 key generation  Authenticated key agreement (TLS): 6 modular exponentiations (encryption), 2 modular exponentiations (decryption)  Delegation: 1 key generation, 1 modular exponentiation (encryption), 2 modular exponentiations (decryption)  ID-based GSI:  Single sign-on: 1 key generation (1 point multiplication and 1 point addition)  Authenticated key agreement (TLS): 3 point multiplications, 4 pairing computations, 1 point addition.  Delegation: 1 key generation, 1 point multiplication.

The 17 th Global Grid Forum, May 10-12, Tokyo 28 Computational costs  Timings obtained through implementation of RSA and HIBE/HIBS schemes based on the MIRACL library (with C/C++).  Using a Pentium IV 2.4 GHz processor.  Known optimisation techniques were used, e.g. small RSA public exponent, faster RSA decryption (CRT method) and eta pairing.  The two approaches have comparable costs. OperationGSI (ms) ID-based (ms) Long-term key generation Proxy key generation Authenticated Key agreement (TLS) Delegation

The 17 th Global Grid Forum, May 10-12, Tokyo Benefits and Drawbacks Benefits:  Identity-based replication of existing grid security features.  Certificate-free  Reduced bandwidth and comparable computational costs.  More efficient delegation mechanisms.  Automated revocation of keys.  Trivial computation of proxy key pairs.

The 17 th Global Grid Forum, May 10-12, Tokyo 30 Benefits and drawbacks Drawbacks:  Inherent escrow may be a problem in commercially-oriented grid environments.  But MyProxy already in wide-spread use!  Distribution of private keys to users/resources.  Fine-grained revocation requires an additional mechanism.  Current lack of support for and standardization of IBC.

The 17 th Global Grid Forum, May 10-12, Tokyo Conclusions  We have used ID-based techniques to propose an alternative grid security infrastructure.  ID-based techniques seem well-matched to the grid environments.  Our ID-based proposal has significant benefits, but also some drawbacks.  Future work:  Prototyping?  Impact on web services security?  Use of certificateless public key cryptography?