Fine-Grained MSR Specifications for Quantitative Security Analysis Iliano Cervesato ITT Industries, NRL Washington, DC

Slides:



Advertisements
Similar presentations
University of Twente The Netherlands Centre for Telematics and Information Technology Constraint Logic Programming for Verifying Security Protocols Sandro.
Advertisements

Software Analysis at Philips Healthcare MSc Project Matthijs Wessels 01/09/2009 – 01/05/2010.
Cryptanalysis of a Communication-Efficient Three-Party Password Authenticated Key Exchange Protocol Source: Information Sciences in review Presenter: Tsuei-Hung.
Lecture 3Dr. Verma1 COSC 6397 – Information Assurance Module M2 – Protocol Specification and Verification University of Houston Rakesh Verma Lecture 3.
On Combinatorial vs Algebraic Computational Problems Boaz Barak – MSR New England Based on joint works with Benny Applebaum, Guy Kindler, David Steurer,
Non-monotonic Properties for Proving Correctness in a Framework of Compositional Logic Koji Hasebe Mitsuhiro Okada (Dept. of Philosophy, Keio University)
Deeper Security Analysis of Web-based Identity Federation Apurva Kumar IBM Research – India.
Specifying Kerberos 5 Cross-Realm Authentication Iliano Cervesato, Aaron D. Jaggard, Andre Scedrov, and Chris Walstad Supported by ONR, NSF, NRL.
Statistical Probabilistic Model Checking Håkan L. S. Younes Carnegie Mellon University.
Introduction to - Cryptography - PKI (Public Key Infrastructure) - Secure with PGP (Pretty Good Privacy) Dr.Tech. Göran Pulkkis Arcada Polytechnic.
Introduction to PKI Seminar What is PKI? Robert Brentrup July 13, 2004.
A Concurrent Logical Framework (Joint work with Frank Pfenning, David Walker, and Kevin Watkins) Iliano Cervesato ITT Industries,
MSR 3: One Year Later Iliano Cervesato ITT Industries, NRL Washington, DC Protocol eXchange.
MSR 3.0: The Logical Meeting Point of Multiset Rewriting and Process Algebra Iliano Cervesato ITT Industries, NRL Washington,
Proactive Secure Mobile Digital Signatures Work in progress. Ivan Damgård and Gert Læssøe Mikkelsen University of Aarhus.
CMSC 414 Computer and Network Security Lecture 21 Jonathan Katz.
Environmental Key Generation towards Clueless Agents James Riordan School of Mathematics University of Minnesota. Bruce Schneier Counterpane Systems. Published:
بسم الله الرحمن الرحيم NETWORK SECURITY Done By: Saad Al-Shahrani Saeed Al-Smazarkah May 2006.
December 7, 2001DIMI, Universita’ di Udine, Italy Graduate Course on Computer Security Lecture 9: Automated Verification Iliano Cervesato
CMSC 414 Computer and Network Security Lecture 9 Jonathan Katz.
Overview of Cryptography Anupam Datta CMU Fall A: Foundations of Security and Privacy.
Secure Localization using Dynamic Verifiers Nashad A. Safa Joint Work With S. Sarkar, R. Safavi-Naini and M.Ghaderi.
Modelling and Analysing of Security Protocol: Lecture 1 Introductions to Modelling Protocols Tom Chothia CWI.
Fault Tree Representation of Security Requirements0.
Maude Implementation of MSR Demo Mark-Oliver Stehr Stefan Reich University of Illinois, Urbana-Champaign (Iliano Cervesato) ITT NRL
CMSC 414 Computer and Network Security Lecture 18 Jonathan Katz.
Just Fast Keying (JFK) Protocol 18739A: Foundations of Security and Privacy Anupam Datta CMU Fall
Fine-Grained MSR Specifications for Quantitative Security Analysis Iliano Cervesato ITT Industries, NRL Washington, DC
CMSC 414 Computer and Network Security Lecture 17 Jonathan Katz.
An Encapsulated Authentication Logic for Reasoning about Key Distribution Protocols Iliano Cervesato Tulane University Protocol eXchangeJune 10, 2005 Catherine.
Introduction to Computer and Network Security Iliano Cervesato 26 August 2008 – Modern Cryptography.
December 6, 2001DIMI, Universita’ di Udine, Italy Graduate Course on Computer Security Lecture 8: Intruder Models Iliano Cervesato
1 Authentication Protocols Celia Li Computer Science and Engineering York University.
Bilinear Mappings in Formal Cryptography
1 Software Testing and Quality Assurance Lecture 33 – Software Quality Assurance.
Interaction Modeling Interaction model describes how objects interact to produce useful results. Interactions can be modeled at different levels of abstraction:
Analysis of Algorithms
BitTorrent Nathan Marz Raylene Yung. BitTorrent BitTorrent consists of two protocols – Tracker HTTP protocol (THP) How an agent joins a swarm How an agent.
Security protocols  Authentication protocols (this lecture)  Electronic voting protocols  Fair exchange protocols  Digital cash protocols.
Security protocols and their verification Mark Ryan University of Birmingham Midlands Graduate School University of Birmingham April 2005 Steve Kremer.
© UCL Crypto group oct.-15 On the Perfect Encryption Assumption in the Study of Security Protocols O. Pereira and J.-J. Quisquater UCL Crypto Group
Protocol Analysis: The SPYCE Perspective Joe Halpern.
A Dynamic Packet Stamping Methodology for DDoS Defense Project Presentation by Maitreya Natu, Kireeti Valicherla, Namratha Hundigopal CISC 859 University.
Password Mistyping in Two-Factor Authenticated Key Exchange Vladimir KolesnikovCharles Rackoff Bell LabsU. Toronto ICALP 2008.
DRKH: A Power Efficient Encryption Protocol for Wireless Devices El Shibani Omar Hamdan Alzahrani.
CSCE 813 Internet Security Cryptographic Protocol Analysis.
Middleware for Secure Environments Presented by Kemal Altıntaş Hümeyra Topcu-Altıntaş Osman Şen.
1 Reasoning about Concrete Security in Protocol Proofs A. Datta, J.Y. Halpern, J.C. Mitchell, R. Pucella, A. Roy.
Correctness Proofs and Counter-model Generation with Authentication-Protocol Logic Koji Hasebe Mitsuhiro Okada Department of Philosophy, Keio University.
A Cost-Based Framework for Analysis of Denial of Service in Networks Author: Catherine Meadows Presenter: Ajay Mahimkar.
Exam 1 Review CS461/ECE422 Fall Exam guidelines A single page of supplementary notes is allowed  8.5x11. Both sides. Write as small as you like.
Faster Implementation of Modular Exponentiation in JavaScript
HACNet Simulation-based Validation of Security Protocols Vinay Venkataraghavan Advisors: S.Nair, P.-M. Seidel HACNet Lab Computer Science and Engineering.
December 6, 2001DIMI, Universita’ di Udine, Italy Graduate Course on Computer Security Lecture 7: Specification Languages Iliano Cervesato
December 14, 2000Securely Available Credentails (SACRED) - Framework Draft 1 Securely Available Credentials (SACRED) Protocol Framework, Draft Specification.
Complexity 24-1 Complexity Andrei Bulatov Interactive Proofs.
Fuzzy Logic Placement Emily Blem ECE556 Final Project December 14, 2004 Reference: E. Kang, R.B. Lin, and E. Shragowitz. “Fuzzy Logic Approach to VLSI.
Chapter 3 Basic Protocols. 3.1 Key Exchange n Session Key - Why? n Key Exchange with Symmetric Cryp. KDC request E KA (K AB ), E KB (K AB ) E KB (K AB.
Model Checking for Security Protocols Will Marrero, Edmund Clarke, Shomesh Jha.
1 Authentication Celia Li Computer Science and Engineering York University.
Cryptography and Network Security Chapter 13
Outline The basic authentication problem
Iliano Cervesato ITT Industries, NRL Washington, DC
Analysis of Algorithms
Security Protocols Analysis
Strong Password Authentication Protocols
EEC 688/788 Secure and Dependable Computing
Security Analysis of Network Protocols
EEC 688/788 Secure and Dependable Computing
EEC 688/788 Secure and Dependable Computing
Presentation transcript:

Fine-Grained MSR Specifications for Quantitative Security Analysis Iliano Cervesato ITT Industries, NRL Washington, DC Protocol Analysis Seminar, NPS, Monterey, CAFebruary 9, 2004

Quantitative Security Analysis1/25 Seminar Web Page

Quantitative Security Analysis2/25 Qualitative (Dolev-Yao) Analysis  Classifies protocol operations in  Possible (Dolev-Yao)  Reception/transmission  Crypto with key, …  Impossible  Guessing keys  Breaking crypto, …  Security assessed only on possible ops  “Easily” achieved by most current tools  What next? “Easy” (polynomial) “Hard” (exponential)

Quantitative Security Analysis3/25 Analysis beyond Dolev-Yao D a t a CryptoCrypto Perfect Real SymbolicBit-oriented More ops - xor - DH, … Type confusion Guessing Probabilistic Crypto hybrid - probability - complexity Cost-aware

Quantitative Security Analysis4/25 Cost-Aware Security Analysis  Assign cost to operations [Meadows,01]  Including non Dolev-Yao  Discrete logarithm, factoring, …  (Verifiable) guessing [Lowe,02]  Principal subversion, …  Applications  Estimate actual resources needed for attacks  Resources limitation (smart cards, PDAs, …)  DoS resistance assessment  Comparing attacks or protocols

Quantitative Security Analysis5/25 Outline  Protocol specification  MSR  Fine-Grained MSR  Technique applies to other languages  Traces and Scripts  Cost Model  Operations  Scripts  Cost-aware Security  Threshold analysis  Comparative analysis

Quantitative Security Analysis6/25 MSR  Executable protocol specification language  Theoretical results  Decidability  Most powerful intruder, …  3 generations already  MSR 1: (here)  MSR 2: 1 + strong typing  MSR 3: 2 +  -multisets  Based on MultiSet Rewriting  Foundations in (linear) logic  Ties to Petri nets and process algebra  Practice  Kerberos V  Implementation underway

Quantitative Security Analysis7/25 Multiset Rewriting …  Multiset: set with repetitions allowed  a,b,c  a,a,b,c,c,c  Rewrite rule: r: N 1  N 2  Application: M’, N 1  M’, N 2 M 1  M 2 state

Quantitative Security Analysis8/25 … with Existentials  msets of 1 st -order atomic formulas  Rules: r: F(x)   n. G(x,n)  Application M’, F(t)  M’, G(t,c) M 1  M 2 c not in M 1

Quantitative Security Analysis9/25 Traces and Scripts  Traces  Rewrite sequence (r 1,  1 ),…,(r n,  n ) from M 0 to M n  Rules r i  Substitutions  i  Scripts  Parametric traces  S, (r,  )  S 1 + S 2  ! n S  Normal run: S NR  Attack scripts: S A

Quantitative Security Analysis10/25 MSR for Security Protocols  Messages  A, k, n,…Princ., keys, nonces, …  {m} k, (m,m’), …Encryption, concat., …  Predicates  N(m)Network messages  M * (t 1,…,t n ) Public data  M A (t 1,…,t n )Private data  I(m)Intruder info.  L v (t 1,…,t n )Local states

Quantitative Security Analysis11/25 Example  Needham-Schroeder protocol  Initiator role A  B: {n A, A} kB B  A: {n A, n B } kA A  B: {n B } kB L (k A,k’ A,k B,n A ), N ({n A,n B } kA ) PrvK A (k A,k’ A ), PubK * (B,k B ) PrvK A (k A,k’ A ), PubK * (B,k B ), L (k A,k’ A,k B,n A ), N ({n A,A} kB ) N ({n B } kB )    n A.

Quantitative Security Analysis12/25 Preparing for Cost Assignment  Isolate operations  Verification  Success  Failure  Construction  Apply rule in stages  Pre-screening  Detailed verification  Split LHS in atomic steps  Allow failure

Quantitative Security Analysis13/25 Fine-Grained MSR (1)  Rules  Clean-uplhs  rhs else cr  Predicates  RegistersR v (m)  HeadersN h (m)  Phased execution  Select rule based only on predicates  Verify if arguments match  Allow failure

Quantitative Security Analysis14/25 Fine-Grained MSR (2)  Verification rules  N h (x)  R(x)  L v (x)  R(x)  R(y), R’(op y (x))  R’’(x)else cr  R(x), R’(x) .else cr  R(x)  R’(m)  …  Construction rules  Remain the same

Quantitative Security Analysis15/25 Fine-Grained Intruder Dolev-Yao style SubversionGuessing  N h (x)  I(x)  M*(x)  I(x)  I(y), I(op y (x))  I(x)  I(x)  N h (x) .   x. I(x)  I(x)  I(op(x)) .  X(A)  X(A) .  X(A), M A (x)  X(A), I(x) …  G(x) …  V 1 (m 1 ) …  V 2 (m 2 ) G(x), V 1 (y), V 2 (y)  I(x) I(g), I(g x )  I(x)

Quantitative Security Analysis16/25 Cost  v  A   : cost type  Time, space, energy, …  A: principal incurring cost  v: amount of cost  Physical measurements  0 /  (Dolev-Yao model)  Complexity classes

Quantitative Security Analysis17/25 Assigning Cost – Basic Operations  Network  Storage  Operations  Construction  Successful verification  Failed verification  Subversion  Guessing  Various ways  Supports very high precision  Difficulty depends on precision  Possibly subjective

Quantitative Security Analysis18/25 Assigning Costs – Traces & Scripts  Traces:  (T)  Add up basic costs  Monotonic costs: time, energy, …  Non-monotonic: space, …  Scripts:  (S)  Interval arithmetic  Script alternative

Quantitative Security Analysis19/25 Quantitative Security Analysis  A model checking view C  0 (Dolev-Yao) C   1 C   2

Quantitative Security Analysis20/25 Threshold Analysis   (S NR )   HW/HCI  ?  Cost of normal run acceptable?  PDAs, cell phones, …   (S A )   I  ?  Cost of attack/defense acceptable?  Cost of candidate attack vs. resources  Non Dolev-Yao operations  min x.  (S A (x))   I++  ?  Design protocol  Fine-tuning parameters

Quantitative Security Analysis21/25 Comparative Analysis   (S A1 )   (S A2 )  ?  Comparing attacks  Protocol can always be attacked   (S P1 )   (S P2 )  ?  Comparing protocols   B (S A )   I (S A )  ?  Comparing attack and defense costs  Denial of Service

Quantitative Security Analysis22/25 Typical Client/Server Exchange Client Server request challenge response ok scqscq sccscc scrscr scosco tcqtcq tcctcc tcrtcr tcotco ssqssq sscssc -(s s q +s s c ) 0 tsqtsq tsctsc tsrtsr tsotso  T  B

Quantitative Security Analysis23/25 Time DoS q c tcqtcq 0 tsqtsq tsctsc q c  tcqtcq 0  tsqtsq tsctsc tsrtsr   tsqtsq  Service rate  1/(t s q + t s c + t s r )  Attack rate  1/t c q  Service rate: 1/t s q  Usually dominated by networking costs  Service rate  1/(t s q + t s c )  Attack rate  1/t c q Better attack

Quantitative Security Analysis24/25 Space DDoS  Max concurrent requests  B / (s s q + s s c )  Space allocation rate  (s s q + s s c ) / (t s q + t s c )  Space reclamation rate  B / T  Max. concurrent attacks  ssqssq sscssc -(s s q +s s c )  T q c  tcqtcq 0  tsqtsq tsctsc tsrtsr  B B (t s q + t s c ) (s s q + s s c ) T n   Use large B  Keep T small

Quantitative Security Analysis25/25 Conclusions  Quantitative protocol analysis  Cost conscious attacks (non Dolev-Yao)  Fine-Grained specification languages (MSR)  Paper:  Related work  C. Meadows: Cost framework for DoS  G. Lowe: guessing attacks  D. Tomioka, et al: cost for spi-calculus  Future work  Attack costs: WEP  DoS aware protocols: JFK, puzzle-based Client/Server  Complexity-based costs  Mixing probability