Birthday Attack on Efficient and Anonymous Buyer-Seller Watermarking Protocol BY Qurat-ul-Ain M. Mahboob Yasin COMSATS Institute of Information Technology,

Slides:



Advertisements
Similar presentations
Chapter 10 Encryption: A Matter of Trust. Awad –Electronic Commerce 1/e © 2002 Prentice Hall 2 OBJECTIVES What is Encryption? Basic Cryptographic Algorithm.
Advertisements

Introduction of Grid Security
Spring 2000CS 4611 Security Outline Encryption Algorithms Authentication Protocols Message Integrity Protocols Key Distribution Firewalls.
Efficient Public Key Infrastructure Implementation in Wireless Sensor Networks Wireless Communication and Sensor Computing, ICWCSC International.
A New Scheme For Robust Blind Digital Video Watermarking Supervised by Prof. LYU, Rung Tsong Michael Presented by Chan Pik Wah, Pat Mar 5, 2002 Department.
Digital Signatures and Hash Functions. Digital Signatures.
Lect. 18: Cryptographic Protocols. 2 1.Cryptographic Protocols 2.Special Signatures 3.Secret Sharing and Threshold Cryptography 4.Zero-knowledge Proofs.
1 Digital Signatures & Authentication Protocols. 2 Digital Signatures have looked at message authentication –but does not address issues of lack of trust.
Anonymous Fingerprinting Paper by: Birgit Pfitzmann, and Michael Waidner Presentation by: James Campbell.
N-Secure Fingerprinting for Copyright Protection of Multimedia
1 A Buyer-Seller Watermarking Protocol IEEE Trans. On Image Processing, Vol.10,No.4, pp , April 2001 Multimedia Security.
Department of Information Engineering1 Major Concerns in Electronic Commerce Authentication –there must be proof of identity of the parties in an electronic.
Mar 12, 2002Mårten Trolin1 This lecture Diffie-Hellman key agreement Authentication Certificates Certificate Authorities SSL/TLS.
CSCE 715 Ankur Jain 11/16/2010. Introduction Design Goals Framework SDT Protocol Achievements of Goals Overhead of SDT Conclusion.
ICWS 2003 Implementing Watermark Token in WS-Security for Digital Contents Distribution Presenter: Patrick Hung Co-authors:
An Efficient and Anonymous Buyer- Seller Watermarking Protocol C. L. Lei, P. L. Yu, P. L. Tsai and M. H. Chan, IEEE Transactions on Image Processing, VOL.
Buyer-Seller Watermarking (BSW) Protocols Geong Sen Poh 31 Oct 2006.
Mar 4, 2003Mårten Trolin1 This lecture Diffie-Hellman key agreement Authentication Certificates Certificate Authorities.
Symmetric Key Distribution Protocol with Hybrid Crypto Systems Tony Nguyen.
Cryptographic Technologies
In the last part of the course we make a review of selected technical problems in multimedia signal processing First problem: CONTENT SECURITY AND WATERMARKING.
ITIS 6200/8200. time-stamping services Difficult to verify the creation date and accurate contents of a digital file Required properties of time-stamping.
Anonymity and Security in Public Internet Forums Ho-fung LEUNG Senior Member, IEEE Dept. of Computer Science & Engineering The Chinese University of Hong.
Freenet A Distributed Anonymous Information Storage and Retrieval System I Clarke O Sandberg I Clarke O Sandberg B WileyT W Hong.
E-Government Security and necessary Infrastructures Dimitrios Lekkas Dept. of Systems and Products Design Engineering University of the Aegean
Key Distribution CS 470 Introduction to Applied Cryptography
Introduction to Public Key Infrastructure (PKI) Office of Information Security The University of Texas at Brownsville & Texas Southmost College.
ICEC 2002 A Watermarking Infrastructure for Digital Rights Protection Presenter S.C. Cheung Department of Computer Science.
Security Management.
Safeguarding and Charging for Information on the Internet Hector Garcia-Molina, Steven P.Ketchpel, Narayanan Shivakumar Stanford University ICDE 1998.
Computer Science Public Key Management Lecture 5.
COEN 351 Non-Repudiation. A non-repudiation service provides assurance of the origin or delivery of data in order to protect the sender against false.
Secure Systems Research Group - FAU Patterns for Digital Signature using hashing Presented by Keiko Hashizume.
Chapter 31 Network Security
1 Cryptography Cryptography is a collection of mathematical techniques to ensure confidentiality of information Cryptography is a collection of mathematical.
Bob can sign a message using a digital signature generation algorithm
1 Introduction to Security and Cryptology Enterprise Systems DT211 Denis Manley.
Digital Cash By Gaurav Shetty. Agenda Introduction. Introduction. Working. Working. Desired Properties. Desired Properties. Protocols for Digital Cash.
An Efficient Identity-based Cryptosystem for
IT 221: Introduction to Information Security Principles Lecture 6:Digital Signatures and Authentication Protocols For Educational Purposes Only Revised:
Chapter 4: Intermediate Protocols
MIME Object Security Services (MOSS). Privacy Enhanced Mail (PEM) was the first Internet standard to address security in messages. The MOSS protocol.
Digital Inheritance of Personal and Commercial Content Using DRM H. Li, NXP Research M. Petkovic, Philips Research CCNC’07 DRM workshop, Jan
Cryptography, Authentication and Digital Signatures
Lecture 8 e-money. Today Secure Electronic Transaction (SET) CyberCash On line payment system using e-money ECash NetCash MilliCent CyberCoin.
10. Key Management. Contents Key Management  Public-key distribution  Secret-key distribution via public-key cryptography.
Chapter 3: Basic Protocols Dulal C. Kar. Key Exchange with Symmetric Cryptography Session key –A separate key for one particular communication session.
Software Security Seminar - 1 Chapter 5. Advanced Protocols 조미성 Applied Cryptography.
Presented by: Suparita Parakarn Kinzang Wangdi Research Report Presentation Computer Network Security.
Advanced Database Course (ESED5204) Eng. Hanan Alyazji University of Palestine Software Engineering Department.
1 Common Secure Index for Conjunctive Keyword-Based Retrieval over Encrypted Data Peishun Wang, Huaxiong Wang, and Josef Pieprzyk: SDM LNCS, vol.
31.1 Chapter 31 Network Security Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
DIGITAL SIGNATURE.
Security fundamentals Topic 5 Using a Public Key Infrastructure.
Network Security Continued. Digital Signature You want to sign a document. Three conditions. – 1. The receiver can verify the identity of the sender.
Deck 10 Accounting Information Systems Romney and Steinbart Linda Batch March 2012.
COMP 424 Computer Security Lecture 09 & 10. Protocol ● An orderly sequence of steps agreed upon by two or more parties in order to accomplish a task ●
Group 9 Chapter 8.3 – 8.6. Public Key Algorithms  Symmetric Key Algorithms face an inherent problem  Keys must be distributed to all parties but kept.
Key Management. Authentication Using Public-Key Cryptography  K A +, K B + : public keys Alice Bob K B + (A, R A ) 1 2 K A + (R A, R B,K A,B ) 3 K A,B.
1 Diffie-Hellman (Key Exchange) Protocol Rocky K. C. Chang 9 February 2007.
Fall 2006CS 395: Computer Security1 Key Management.
Secret computation of purchase history data using somewhat homomorphic encryption Date: Reporter: 許哲毓.
SECURITY. Security Threats, Policies, and Mechanisms There are four types of security threats to consider 1. Interception 2 Interruption 3. Modification.
Cryptographic methods. Outline  Preliminary Assumptions Public-key encryption  Oblivious Transfer (OT)  Random share based methods  Homomorphic Encryption.
Security. Security Needs Computers and data are used by the authorized persons Computers and their accessories, data, and information are available to.
Fourth Edition by William Stallings Lecture slides by Lawrie Brown
1 Digital Water Marks. 2 History The Italians where the 1 st to use watermarks in the manufacture of paper in the 1270's. A watermark was used in banknote.
Presentation transcript:

Birthday Attack on Efficient and Anonymous Buyer-Seller Watermarking Protocol BY Qurat-ul-Ain M. Mahboob Yasin COMSATS Institute of Information Technology, Islamabad

Presentation Scheme What is a Digital Watermark Use of the digital watermarks Watermarking Protocols: Qiao and K. Nahrstedt watermarking Protocol Memon and Wong watermarking Protocol Lie et all watermarking protocol Birthday Paradox Birthday Attack on Efficient and Anonymous Buyer- Seller Watermarking Protocol Proposed Solution Conclusion

What are Digital Watermarks? Copyright marks embedded into digital content to prove legal ownership of an intellectual property The embedding is performed with the help of a key and recovery of the embedded mark will reveal the actual owner of the digital contents

Customers’ Right Problem A B O Digital Content X’ with W Digital Content X’ with W Cant tell who is has legally bought the product. Its impossible to pinpoint who is behind pirating the contents if illegal copies are found X W X’ +

Protecting rightful ownership and customer’s rights The buyer sends the encrypted data to the seller. The seller generates a unique watermark based on the encrypted data received and inserts it into the digital content Seller sends X‘ to the buyer. The buyer can prove his possession of the watermarked copy. E KB (Bits) X’ BuyerSeller [L Qiao and K. Nahrstedt, Sept 98]

What if The Seller is Malicious As the seller has the exact watermarked copy which is sold to the buyer, an illegal copy cannot prove a buyer guilty of pirating the copy after analyzing the embedded watermark. [N. Memon and P. W. Wong, Apr ]

How Memon & Wong Solved the Problem There is a third trusted party, to generate watermarks, called WCA. Seller need not to know the watermark. The seller inserts the watermark in encrypted domain. So seller has no access to the final water marked copy which the buyer gets

Privacy Homomorphic Encryption function Epk is privacy homomorphic if following equation holds Epk (a  b)= Epk (a)  Epk (b)  a & b

Memon and Wong Watermarking Protocol ID B, P B E PB (W), S WCA (E PB (W)) E PB (X``) BuyerWCA Seller

Unbinding Problem Unable to bind a watermark to particular digital contents or transaction. [C.L. Lei, P.L. YU, P.L Tsai and M.H Chan, Dec 2004 ]

Example: A buys digital contents X’’ containing watermark Wx. Now if X’ is illegally distributed by A, the seller can extract the watermark from the pirated copy and insert it to the other expensive product Y to get Y’’ and can prove that Y’ is being pirated to be compensated more. Secondly seller can ignore the watermark and insert the previously used watermark by the same buyer in some previous transaction to prove piracy of both digital contents if the buyer illegally distribute one.

Efficient and Anonymous Buyer-Seller Watermarking Protocol Buyer can remain anonymous by getting several anonymous certificate from a CA. Buyer has to generate new public private key for each transaction to solve the unbinding problem.

Continued… Cert CA (p B ), Cert pB (pk*), ARG, Spk*(ARG) Cert pB (pk*), ARG, Spk*(ARG), X` E pk* (W), pk WCA (W), Sign WCA (E pk* (W),pk*, S pk* (ARG)) E pk* (X``) The Seller The Watermark Certification Authority WCA The Buyer [C.L. Lei, P.L. YU, P.L Tsai and M.H Chan, Dec 2004 ]

Problems with EASBW Protocol Buyer’s anonymity allows a malicious buyer to collect digital content time and again and abort the transaction saying he cannot decrypt the contents provided. Seller sends the watermark copy X’ to WCA. With X’ in hand WCA can generate X’’. Seller is maintaining a huge database having unique public key for each transaction.

Birthday Paradox What is the minimum value of k such that the probability is nearly 50% that at least 2 people in a group of k people have the same birthday

Example: In a group of 23 people, though the probability that birthday a member A shares his birthday with another group member is 23/365, but the probability is more than 50% that at least two of them will have the same birthday.

Birthday Attack on the EABSW protocol The security of EASBW requires that for each transaction buyer must generate new public private key pair. The final watermarked copy is encrypted using the key generated for a specific transaction.

Continued… Suppose a seller has a million entries for different buyers and the seller generates a million entries for different private public key of n bits in size. For the probability of success in matching to be 50%, the database size should be √n that is much less than n as expected from a key size of n bits The probability of a success increases if elliptic curve cryptography is used

What if The Attack is successful Cert pB (pk*), ARG, Spk*(ARG), X E pk* (W), pk WCA (W), S WCA (E pk* (W),pk*, S pk* (ARG)) The SellerThe Watermark Certification Authority WCA

Arbitration Process Seller generate X’’ by inserting W after decrypting Epk*(W). In arbitration process the seller has all the evidence to prove an innocent buyer guilty of pirating the digital contents.

Proposed Solution Watermarking Certification Authority should not be memory less WCA should maintain a database of public keys used in each transaction. Before generating watermark WCA must ensure pk* is not used in any transaction. Seller must only give specification to WCA not the Watermarked copy X’ to prevent WCA of pirating digital contents

Conclusions The watermark certification authority should maintain a database of all public keys against which it has issued watermarks. We propose that the seller may only tell the characteristics of the original digital contents. If anonymity is given to the buyer then there should be a mechanism to avoid malicious buyer to cancel the transaction.

Questions?