Unifying Equivalence-Based Definitions of Protocol Security A. Datta, R. Küsters, J. C. Mitchell, A. Ramanathan, V. Shmatikov Stanford University SRI International.

Slides:



Advertisements
Similar presentations
Computational Privacy. Overview Goal: Allow n-private computation of arbitrary funcs. –Impossible in information-theoretic setting Computational setting:
Advertisements

Spreading Alerts Quietly and the Subgroup Escape Problem Aleksandr Yampolskiy (Yale) Joint work with James Aspnes, Zoë Diamadi, Kristian Gjøsteen, and.
Foundations of Cryptography Lecture 10 Lecturer: Moni Naor.
Foundations of Cryptography Lecture 11 Lecturer: Moni Naor.
Polling With Physical Envelopes A Rigorous Analysis of a Human–Centric Protocol Tal Moran Joint work with Moni Naor.
CIS 5371 Cryptography 3b. Pseudorandomness.
From: Cryptographers’ Track of the RSA Conference 2008 Date: Reporter: Yi-Chun Shih 1.
On the Composition of Public- Coin Zero-Knowledge Protocols Rafael Pass (Cornell) Wei-Lung Dustin Tseng (Cornell) Douglas Wiktröm (KTH) 1.
Probabilistic Polynomial-Time Process Calculus for Security Protocol Analysis John Mitchell Stanford University P. Lincoln, M. Mitchell, A. Ramanathan,
Modeling Insider Attacks on Group Key Exchange Protocols Jonathan Katz Ji Sun Shin University of Maryland.
Slide 1 Vitaly Shmatikov CS 380S Introduction to Zero-Knowledge.
CS555Spring 2012/Topic 161 Cryptography CS 555 Topic 16: Key Management and The Need for Public Key Cryptography.
Probabilistic Polynomial-Time Process Calculus for Security Protocol Analysis J. Mitchell, A. Ramanathan, A. Scedrov, V. Teague P. Mateus P. Lincoln, M.
Analysis of Security Protocols (V) John C. Mitchell Stanford University.
Daniel Moran & Marina Yatsina. Access control through encryption.
Proactive Secure Mobile Digital Signatures Work in progress. Ivan Damgård and Gert Læssøe Mikkelsen University of Aarhus.
A Secure Fault-Tolerant Conference- Key Agreement Protocol Wen-Guey Tzeng Source : IEEE Transactions on computers Speaker : LIN, KENG-CHU.
Co-operative Private Equality Test(CPET) Ronghua Li and Chuan-Kun Wu (received June 21, 2005; revised and accepted July 4, 2005) International Journal.
Symbolic Logic for Complexity- theoretic Model of Security Protocols Anupam Datta Ante Derek John C. Mitchell Vitaly Shmatikov Mathieu Turuani May 5, 2005.
Practical Techniques for Searches on Encrypted Data Author: Dawn Xiaodong Song, David Wagner, Adrian Perrig Presenter: 紀銘偉.
Probabilistic Polynomial-Time Process Calculus for Security Protocol Analysis J. Mitchell, A. Ramanathan, A. Scedrov, V. Teague P. Lincoln, P. Mateus,
Overview of Cryptography Anupam Datta CMU Fall A: Foundations of Security and Privacy.
Practical Techniques for Searches on Encrypted Data Author:Dawn Xiaodong Song, David Wagner, Adrian Perrig Presenter: 紀汶承.
Stanford vs. UC: The Big Game A. Datta, A. Derek, J. C. Mitchell, A. Ramanathan & A. Scedrov August 16, 2005.
Unifying Equivalence-Based Definitions of Protocol Security A. Datta, R. Küsters, J. C. Mitchell, A. Ramanathan, V. Shmatikov Stanford University SRI International.
1 Ivan Lanese Computer Science Department University of Bologna Italy Concurrent and located synchronizations in π-calculus.
CMSC 414 Computer and Network Security Lecture 6 Jonathan Katz.
Equivalence-Based Security Specifications A. Datta, R Küsters, J. Mitchell, A. Ramanathan, V. Shmatikov A. Scedrov, V. Teague, P. Mateus.
The Power of Simulation Relations Sixty and Beyond Toronto, August 20, 2008 Roberto Segala - University of Verona 1 The Power of Simulation Relations Roberto.
CS555Spring 2012/Topic 41 Cryptography CS 555 Topic 4: Computational Approach to Cryptography.
On Everlasting Security in the Hybrid Bounded Storage Model Danny Harnik Moni Naor.
Universally Composable Symbolic Analysis of Key-Exchange Protocols Jonathan Herzog (Joint work with Ran Canetti) 21 September 2004 The author's affiliation.
Process Calculus and Security 18739A: Foundations of Security and Privacy Anupam Datta Fall
Universally Composable Symbolic Analysis of Security Protocols Jonathan Herzog (Joint work with Ran Canetti) 7 June 2004 The author's affiliation with.
Computer Security CS 426 Lecture 3
Foundations of Cryptography Rahul Jain CS6209, Jan – April 2011
CMSC 414 Computer and Network Security Lecture 3 Jonathan Katz.
Information-Theoretic Security and Security under Composition Eyal Kushilevitz (Technion) Yehuda Lindell (Bar-Ilan University) Tal Rabin (IBM T.J. Watson)
How to play ANY mental game
Security in Process Calculi CS 259 Vitaly Shmatikov.
Provable Unlinkability Against Traffic Analysis Amnon Ta-Shma Joint work with Ron Berman and Amos Fiat School of Computer Science, Tel-Aviv University.
CS555Spring 2012/Topic 51 Cryptography CS 555 Topic 5: Pseudorandomness and Stream Ciphers.
Secure Computation (Lecture 7-8) Arpita Patra. Recap >> (n,t)-Secret Sharing (Sharing/Reconstruction) > Shamir Sharing > Lagrange’s Interpolation for.
The Spi Calculus A Calculus for Cryptographic Protocols Presented By Ramesh Yechangunja.
Stream Ciphers Making the one-time pad practical.
Fall 2004/Lecture 201 Cryptography CS 555 Lecture 20-b Zero-Knowledge Proof.
CS555Spring 2012/Topic 111 Cryptography CS 555 Topic 11: Encryption Modes and CCA Security.
Password Mistyping in Two-Factor Authenticated Key Exchange Vladimir KolesnikovCharles Rackoff Bell LabsU. Toronto ICALP 2008.
Chapter 7 Confidentiality Using Symmetric Encryption.
1 Reasoning about Concrete Security in Protocol Proofs A. Datta, J.Y. Halpern, J.C. Mitchell, R. Pucella, A. Roy.
Security in Process Calculi CS 395T. Overview uPi calculus Core language for parallel programming Modeling security via name scoping uApplied pi calculus.
1 Information Security – Theory vs. Reality , Winter Lecture 10: Garbled circuits and obfuscation Eran Tromer Slides credit: Boaz.
Game-based composition for key exchange Cristina Brzuska, Marc Fischlin (University of Darmstadt) Nigel Smart, Bogdan Warinschi, Steve Williams (University.
Probabilistic Polynomial-Time Process Calculus for Security Protocol Analysis J. Mitchell, A. Ramanathan, A. Scedrov, V. Teague Partially supported by.
Authenticated Key Exchange I. Definitions I. MAP I. matching conversations II. oracles II. (I)KA II. AKEP2 III. AKEP2 Security I. Session Keys II. Perfect.
Fall 2006CS 395: Computer Security1 Confidentiality Using Symmetric Encryption.
CS555Spring 2012/Topic 31 Cryptography CS 555 Topic 3: One-time Pad and Perfect Secrecy.
Logical Foundations for Security Protocol Analysis Patrick Lincoln John Mitchell Mark Mitchell Andre Scedrov.
Key Wrap Algorithm.
Adversary Models in the context of crypto protocols modeling
Topic 36: Zero-Knowledge Proofs
Foundations of Secure Computation
Cryptography Lecture 5.
CMSC 414 Computer and Network Security Lecture 3
Timing Analysis of Keystrokes And Timing Attacks on SSH
Probabilistic Polynomial-Time Calculus
Cryptography Lecture 11.
Cryptography Lecture 5.
Cryptography Lecture 10.
Presentation transcript:

Unifying Equivalence-Based Definitions of Protocol Security A. Datta, R. Küsters, J. C. Mitchell, A. Ramanathan, V. Shmatikov Stanford University SRI International WITS April 4, 2004

Main Result uUniversal composability, black box simulatability and process equivalence express the same properties of a protocol (with asynchronous communication) Result holds for any computational model satisfying standard process calculus equational principles

Outline uEquivalence-Based Specification Main Idea, Examples, Advantages u3 Approaches Models: Turing Machines, IO Automata, Process Calculus Security Notions: UC, BB, PE uComparative Study Relating Security Notions Relating models (WIP)

General approach uReal protocol The protocol we want to use Expressed precisely in some formalism uIdeal protocol Defines the behavior we want from real protocol May use unrealistic mechanisms (e.g., private channels) Expressed precisely in same formalism uSpecification Real protocol indistinguishable from ideal protocol Beaver ‘91, Goldwasser-Levin ‘90, Micali-Rogaway ’91 Depends on some characterization of observability uAchieves compositionality

Secrecy for Challenge-Response uReal Protocol P A  B: { i } K B  A: { f(i) } K uIdeal Protocol Q A  B: { random_number } K B  A: { random_number } K

Specification with Authentication uReal Protocol P A  B: { random i } K B  A: { f(i) } K A  B: “OK” if f(i) received uIdeal Protocol Q A  B: { random i } K B  A: { random j } K i, j A  B: “OK” if private i, j match public msgs public channel private channel public channel private channel

Pseudo-random number generators uSequence from random seed (Real protocol) P n : let b = n k -bit sequence generated from n random bits in PUBLIC  b  end uTruly random sequence (Ideal protocol) Q n : let b = sequence of n k random bits in PUBLIC  b  end uP is crypto strong pseudo-random number generator P  Q Equivalence is asymptotic in security parameter n

Many more… uCommitment Schemes uSignature Schemes uKey Exchange uSecure channels uSecure Multiparty Computation

Compositionality uCrypto primitives Cipher text indistinguishable from noise  encryption secure in all protocols uProtocols Protocol indistinguishable from ideal key distribution  protocol secure in all systems that rely on secure key distributions

Outline uEquivalence-Based Specification u3 Schools of Thought Models: Turing Machines, IO Automata, Process Calculus Security Notions: UC, BB, PE uComparative Study

Three technical settings uCan, …: Universal composability Condition: two adversaries and environment Computation: Communicating Turing machines uPW, … : Black-box simulatability Condition: one adversary, simulator, environment Computation: I/O automata uAG,LMMRST, …: Process equivalence Condition: observational equivalence Computation: ppoly or nondet process calculus

More Background Universal Compos. Black-box Simulat. Observ. Equiv. Communicating Turing Machines Canetti I/O AutomataPfitz-W Nondet. Process Calculus Spi, Applied  Prob Poly Process Calculus LMMRST

This study Universal Compos. Black-box Simulat. Observ. Equiv. Communicating Turing Machines Canetti I/O AutomataPfitz-W Nondet. Process Calculus Spi, Applied  Prob Poly Process Calculus LMMRST Axiomatic Calculus UC BB PE Compare conditions over uniform computation model

Ideal functionality (UC,BB) uWhat is the ideal key exchange protocol? Clients ask server for key, receive response? Server chooses keys and sends secretly? uIssue Easy to distinguish number of messages No “canonical” key exchange protocol is equivalent to all secure key exchange protocols uIdeal functionality Not a protocol with number of messages, etc. A functionality that can be used to create ideal protocols

Adversary vs. Environment (UC,BB) uAdversary Interacts with protocol over network Sees and delivers messages from A to B uEnvironment Represents the configuration of honest users who are trying to use the protocol Provides input to and observes output of protocol uExample - Using SSL protocol through IE: –Input(start session), output(key) of SSL (environment) –actual SSL messages on network (adversary) Separation of net and io channels of a protocol

Universal composability (UC) uGiven Protocol P Ideal functionality F uRequire For every adversary A 1 for P, there exists an adversary A 2 for F revealing same information in any environment E PA1A1 A2A2 F  io net E E   

Black-box simulatability uGiven Protocol P Ideal functionality F uRequire There exists a simulator S such that for any adversary A, protocols P and S  F reveal same information in any environment E PAA  io net E E FS sim    

Observational Equivalence uGiven Protocol P Ideal protocol Q (not functionality F) uRequire Protocols P and Q reveal same information in any context C[] Context = attacker + environment PQ  C[]= E + A  ionetionet

Comparison uUC and BB + ideal functionality: allows single specification, regardless of communication pattern of protocol - Separate adversary and environment :Not clear if useful, except in exposition uObservational equivalence + Standard relation, well-known properties + Bisimulation technique + Proof system - No ideal functionality

Process Equivalence uGiven Protocol P Ideal functionality F uRequire There exists a simulator S such that protocols P and S  F reveal same information in any context C[] Context = attacker + environment PF  C[]= E + A  ionetionet S sim 

Outline uEquivalence-Based Specification u3 Schools of Thought uComparative Study Process calculus syntax Equational Principles Security Definitions Results

Process Calculus uSyntax P :: = 0 | out(c,T). P send | in(c,x). P receive |  c. (P) private channel | [T=T] P test | P | P parallel composition | ! q(|n|). P bounded replication

Equational principles uP | Q  Q | P uP | (Q | R)  (P | Q) | R u  c. P   d. [d/c]P u  c. C[P]  C[  c.P] c  channels( C[0] ) uP  Q  Q  P uP  Q, Q  R  P  R uP  Q  C[P]  C[Q] Prove results using these properties of process calculus

Formal definitions uUniversal composability  A 1  A 2.  net (P | A 1 )   net (F | A 2 ) uBlack-box simulatability  S  A.  net (P | A)   net (  sim (F|S)|A) uProcess equivalence  S. P   sim (F | S) Notes Relation  includes quantifying over environments Scoping restricts access to channels, e.g., environment does not see network

Results uUC and BB Equivalent w/synchronous communication Equivalent w/asynchronous communication uBB and Process Equivalence (PE) PE implies BB in synch communication PE equivalent BB with asynch communication Results hold for any computational framework satisfying standard equational principles (PPC, spi,…)

Proof sketch (also have nice pictures) uPE  BB  UC : Easy. Congruence and quantifier order. uUC  BB uBB  PE

Key Lemmas uDouble buffering One asynchronous buffer is indistinguishable from the composition of two uDummy adversary and buffer Composing a dummy adversary (that just sends network information to the environment) with asynchronous buffer is indistinguishable from a buffer alone

Synchronous communication uBuffering fails (BB does not imply PE) With synchronous communication, adding a buffer or dummy adversary can change the observable order of actions PAAS F net sim  PFS  io net

Conclusions and Future Work uUC, BB, PE: equivalent notions of security. So, use PE (simplest) uComplete this study Relate computational models Do results transfer?

Questions?