Unifying Equivalence-Based Definitions of Protocol Security A. Datta, R. Küsters, J. C. Mitchell, A. Ramanathan, V. Shmatikov Stanford University SRI International.

Slides:



Advertisements
Similar presentations
Synthesis of Protocol Converter Using Timed Petri-Nets Anh Dang Balaji Krishnamoorthy Manoj Iyer Presented by:
Advertisements

Universally Composable Symbolic Analysis of Cryptographic Protocols
Computational Privacy. Overview Goal: Allow n-private computation of arbitrary funcs. –Impossible in information-theoretic setting Computational setting:
Spreading Alerts Quietly and the Subgroup Escape Problem Aleksandr Yampolskiy (Yale) Joint work with James Aspnes, Zoë Diamadi, Kristian Gjøsteen, and.
Foundations of Cryptography Lecture 10 Lecturer: Moni Naor.
Foundations of Cryptography Lecture 11 Lecturer: Moni Naor.
Polling With Physical Envelopes A Rigorous Analysis of a Human–Centric Protocol Tal Moran Joint work with Moni Naor.
1 Vipul Goyal Abhishek Jain UCLA On the Round Complexity of Covert Computation.
CS555Topic 241 Cryptography CS 555 Topic 24: Secure Function Evaluation.
CIS 5371 Cryptography 3b. Pseudorandomness.
Key Exchange Using Passwords and Long Keys Vladimir Kolesnikov Charles Rackoff Comp. Sci. University of Toronto.
Computational Security. Overview Goal: Obtain computational security against an active adversary. Hope: under a reasonable cryptographic assumption, obtain.
Behavioral Equivalence Hossein Hojjat Formal Lab University of Tehran.
On the Composition of Public- Coin Zero-Knowledge Protocols Rafael Pass (Cornell) Wei-Lung Dustin Tseng (Cornell) Douglas Wiktröm (KTH) 1.
Probabilistic Polynomial-Time Process Calculus for Security Protocol Analysis John Mitchell Stanford University P. Lincoln, M. Mitchell, A. Ramanathan,
Modeling Insider Attacks on Group Key Exchange Protocols Jonathan Katz Ji Sun Shin University of Maryland.
Slide 1 Vitaly Shmatikov CS 380S Introduction to Zero-Knowledge.
Course on Probabilistic Methods in Concurrency (Concurrent Languages for Probabilistic Asynchronous Communication) Lecture 1 The pi-calculus and the asynchronous.
CS555Spring 2012/Topic 161 Cryptography CS 555 Topic 16: Key Management and The Need for Public Key Cryptography.
Analysis of Security Protocols (I) John C. Mitchell Stanford University.
Probabilistic Polynomial-Time Process Calculus for Security Protocol Analysis J. Mitchell, A. Ramanathan, A. Scedrov, V. Teague P. Mateus P. Lincoln, M.
Analysis of Security Protocols (V) John C. Mitchell Stanford University.
Proactive Secure Mobile Digital Signatures Work in progress. Ivan Damgård and Gert Læssøe Mikkelsen University of Aarhus.
A Secure Fault-Tolerant Conference- Key Agreement Protocol Wen-Guey Tzeng Source : IEEE Transactions on computers Speaker : LIN, KENG-CHU.
Co-operative Private Equality Test(CPET) Ronghua Li and Chuan-Kun Wu (received June 21, 2005; revised and accepted July 4, 2005) International Journal.
Symbolic Logic for Complexity- theoretic Model of Security Protocols Anupam Datta Ante Derek John C. Mitchell Vitaly Shmatikov Mathieu Turuani May 5, 2005.
Practical Techniques for Searches on Encrypted Data Author: Dawn Xiaodong Song, David Wagner, Adrian Perrig Presenter: 紀銘偉.
Probabilistic Polynomial-Time Process Calculus for Security Protocol Analysis J. Mitchell, A. Ramanathan, A. Scedrov, V. Teague P. Lincoln, P. Mateus,
Unifying Equivalence-Based Definitions of Protocol Security A. Datta, R. Küsters, J. C. Mitchell, A. Ramanathan, V. Shmatikov Stanford University SRI International.
Overview of Cryptography Anupam Datta CMU Fall A: Foundations of Security and Privacy.
CMSC 414 Computer and Network Security Lecture 22 Jonathan Katz.
SSH : The Secure Shell By Rachana Maheswari CS265 Spring 2003.
1 Ivan Lanese Computer Science Department University of Bologna Italy Concurrent and located synchronizations in π-calculus.
CMSC 414 Computer and Network Security Lecture 6 Jonathan Katz.
Equivalence-Based Security Specifications A. Datta, R Küsters, J. Mitchell, A. Ramanathan, V. Shmatikov A. Scedrov, V. Teague, P. Mateus.
The Power of Simulation Relations Sixty and Beyond Toronto, August 20, 2008 Roberto Segala - University of Verona 1 The Power of Simulation Relations Roberto.
CS555Spring 2012/Topic 41 Cryptography CS 555 Topic 4: Computational Approach to Cryptography.
On Everlasting Security in the Hybrid Bounded Storage Model Danny Harnik Moni Naor.
Universally Composable Symbolic Analysis of Key-Exchange Protocols Jonathan Herzog (Joint work with Ran Canetti) 21 September 2004 The author's affiliation.
Process Calculus and Security 18739A: Foundations of Security and Privacy Anupam Datta Fall
Universally Composable Symbolic Analysis of Security Protocols Jonathan Herzog (Joint work with Ran Canetti) 7 June 2004 The author's affiliation with.
Computer Security CS 426 Lecture 3
CMSC 414 Computer and Network Security Lecture 3 Jonathan Katz.
Information-Theoretic Security and Security under Composition Eyal Kushilevitz (Technion) Yehuda Lindell (Bar-Ilan University) Tal Rabin (IBM T.J. Watson)
How to play ANY mental game
Cryptography Lecture 8 Stefan Dziembowski
Security in Process Calculi CS 259 Vitaly Shmatikov.
Provable Unlinkability Against Traffic Analysis Amnon Ta-Shma Joint work with Ron Berman and Amos Fiat School of Computer Science, Tel-Aviv University.
CS555Spring 2012/Topic 51 Cryptography CS 555 Topic 5: Pseudorandomness and Stream Ciphers.
The Spi Calculus A Calculus for Cryptographic Protocols Presented By Ramesh Yechangunja.
Fall 2004/Lecture 201 Cryptography CS 555 Lecture 20-b Zero-Knowledge Proof.
CS555Spring 2012/Topic 111 Cryptography CS 555 Topic 11: Encryption Modes and CCA Security.
Password Mistyping in Two-Factor Authenticated Key Exchange Vladimir KolesnikovCharles Rackoff Bell LabsU. Toronto ICALP 2008.
1 Reasoning about Concrete Security in Protocol Proofs A. Datta, J.Y. Halpern, J.C. Mitchell, R. Pucella, A. Roy.
Security in Process Calculi CS 395T. Overview uPi calculus Core language for parallel programming Modeling security via name scoping uApplied pi calculus.
1 Information Security – Theory vs. Reality , Winter Lecture 10: Garbled circuits and obfuscation Eran Tromer Slides credit: Boaz.
Game-based composition for key exchange Cristina Brzuska, Marc Fischlin (University of Darmstadt) Nigel Smart, Bogdan Warinschi, Steve Williams (University.
Probabilistic Polynomial-Time Process Calculus for Security Protocol Analysis J. Mitchell, A. Ramanathan, A. Scedrov, V. Teague Partially supported by.
CS555Spring 2012/Topic 31 Cryptography CS 555 Topic 3: One-time Pad and Perfect Secrecy.
Logical Foundations for Security Protocol Analysis Patrick Lincoln John Mitchell Mark Mitchell Andre Scedrov.
Key Wrap Algorithm.
Adversary Models in the context of crypto protocols modeling
Topic 36: Zero-Knowledge Proofs
Foundations of Secure Computation
Cryptography Lecture 5.
CMSC 414 Computer and Network Security Lecture 3
Probabilistic Polynomial-Time Calculus
Cryptography Lecture 11.
Cryptography Lecture 5.
Cryptography Lecture 10.
Presentation transcript:

Unifying Equivalence-Based Definitions of Protocol Security A. Datta, R. Küsters, J. C. Mitchell, A. Ramanathan, V. Shmatikov Stanford University SRI International

Main Result uUniversal composability, black box simulatability and process equivalence express the same properties of a protocol (with asynchronous communication) Result holds for any computational model satisfying standard process calculus equational principles

Outline uEquivalence-Based Specification Main Idea, Examples, Advantages u3 Approaches Models: Turing Machines, IO Automata, Process Calculus Security Notions: UC, BB, PE uComparative Study Relating Security Notions Relating models (WIP)

General approach uReal protocol The protocol we want to use Expressed precisely in some formalism uIdeal protocol Defines the behavior we want from real protocol May use unrealistic mechanisms (e.g., private channels) Expressed precisely in same formalism uSpecification Real protocol indistinguishable from ideal protocol Beaver ‘91, Goldwasser-Levin ‘90, Micali-Rogaway ’91 Depends on some characterization of observability uAchieves compositionality

Secrecy for Challenge-Response uReal Protocol P A  B: { i } K B  A: { f(i) } K uIdeal Protocol Q A  B: { random_number } K B  A: { random_number } K

Specification with Authentication uReal Protocol P A  B: { random i } K B  A: { f(i) } K A  B: “OK” if f(i) received uIdeal Protocol Q A  B: { random i } K B  A: { random j } K i, j A  B: “OK” if private i, j match public msgs public channel private channel public channel private channel

Pseudo-random number generators uSequence from random seed (Real protocol) P n : let b = n k -bit sequence generated from n random bits in PUBLIC  b  end uTruly random sequence (Ideal protocol) Q n : let b = sequence of n k random bits in PUBLIC  b  end uP is crypto strong pseudo-random number generator P  Q Equivalence is asymptotic in security parameter n

Many more… uCommitment Schemes uSignature Schemes uKey Exchange uSecure channels uSecure Multiparty Computation

Compositionality uCrypto primitives Cipher text indistinguishable from noise  encryption secure in all protocols uProtocols Protocol indistinguishable from ideal key distribution  protocol secure in all systems that rely on secure key distributions

Outline uEquivalence-Based Specification u3 Schools of Thought Models: Turing Machines, IO Automata, Process Calculus Security Notions: UC, BB, PE uComparative Study

Three technical settings uCan, …: Universal composability Condition: two adversaries and environment Computation: Communicating Turing machines uPW, … : Black-box simulatability Condition: one adversary, simulator, environment Computation: I/O automata uAG,LMMRST, …: Process equivalence Condition: observational equivalence Computation: ppoly or nondet process calculus

More Background Universal Compos. Black-box Simulat. Observ. Equiv. Communicating Turing Machines Canetti I/O AutomataPfitz-W Nondet. Process Calculus Spi, Applied  Prob Poly Process Calculus LMMRST

This study Universal Compos. Black-box Simulat. Observ. Equiv. Communicating Turing Machines Canetti I/O AutomataPfitz-W Nondet. Process Calculus Spi, Applied  Prob Poly Process Calculus LMMRST Axiomatic Calculus UC BB PE Compare conditions over uniform computation model

Ideal functionality (UC,BB) uWhat is the ideal key exchange protocol? Clients ask server for key, receive response? Server chooses keys and sends secretly? uIssue Easy to distinguish number of messages No “canonical” key exchange protocol is equivalent to all secure key exchange protocols uIdeal functionality Not a protocol with number of messages, etc. A functionality that can be used to create ideal protocols

Adversary vs. Environment (UC,BB) uAdversary Interacts with protocol over network Does not choose messages to send, contract to sign, certificate authority,… uEnvironment Represents the configuration of honest users who are trying to use the protocol Provides input to and observes output of protocol Example –Kerberos TGS, KDC, clients, servers set by environment Separation of net and io channels of a protocol

Universal composability (UC) uGiven Protocol P Ideal functionality F uRequire For every adversary A 1 for P, there exists an adversary A 2 for F revealing same information in any environment E PA1A1 A2A2 F  io net E E   

Black-box simulatability uGiven Protocol P Ideal functionality F uRequire There exists a simulator S such that for any adversary A, protocols P and S  F reveal same information in any environment E PAA  io net E E FS sim    

Observational Equivalence uGiven Protocol P Ideal protocol Q (not functionality F) uRequire Protocols P and Q reveal same information in any context C[] Context = attacker + environment PQ  C[]= E + A  ionetionet

Comparison uUC and BB + ideal functionality: allows single specification, regardless of communication pattern of protocol - Separate adversary and environment :Not clear if useful, except in exposition uObservational equivalence + Standard relation, well-known properties + Bisimulation technique + Proof system - No ideal functionality

Process Equivalence uGiven Protocol P Ideal functionality F uRequire There exists a simulator S such that protocols P and S  F reveal same information in any context C[] Context = attacker + environment PF  C[]= E + A  ionetionet S sim

Outline uEquivalence-Based Specification u3 Schools of Thought uComparative Study Process calculus Equational Principles Security Definitions Results

Process Calculus uSyntax P :: = 0 | out(c,T). P send | in(c,x). P receive |  c. (P) private channel | [T=T] P test | P | P parallel composition | ! q(|n|). P bounded replication

Equational principles uP | Q  Q | P uP | (Q | R)  (P | Q) | R uP | 0  P u  c. P   d. [d/c]P u  c. C[P]  C[  c.P] c  channels( C[0] ) uP  Q  Q  P uP  Q, Q  R  P  R uP  Q  C[P]  C[Q] Prove results using these properties of process calculus

Formal definitions uUniversal composability  A 1  A 2.  net (P | A 1 )   net (F | A 2 ) uBlack-box simulatability  S  A.  net (P | A)   net (  sim (F|S)|A) uProcess equivalence  S. P   sim (F | S) Notes Relation  includes quantifying over environments Divide channels into network channels, environment (io) channels

Results uUC and BB Equivalent w/synchronous communication Equivalent w/asynchronous communication uBB and Process Equivalence (PE) PE implies BB in synch communication PE equivalent BB with asynch communication Results hold for any computational framework satisfying standard equational principles (PPC, spi,…)

Proof sketch (also have nice pictures) uPE  BB  UC : Easy. Congruence and quantifier order. uUC  BB uBB  PE

Key Lemmas uLemma 6. Scope Extrusion  c. (P | Q)  (  c.P) | Q c  channels( Q ) uLemma 8. Double buffering One asynchronous buffer is indistinguishable from the composition of two uLemma 9. Dummy adversary and buffer Composing a dummy adversary (that just sends network information to the environment) with asynchronous buffer is indistinguishable from a buffer alone

Synchronous communication uBuffering fails (BB does not imply PE) With synchronous communication, adding a buffer or dummy adversary can change the observable order of actions PAAS F net sim  PFS  io net

Conclusions and Future Work uUC, BB, PE: equivalent notions of security. So, use PE (simplest) uComplete this study Relate computational models Do results transfer?

Questions?

Language Approach uWrite protocol in process calculus Accepted and long-studied approach to concurrency uExpress security using observational equivalence Standard relation from programming language theory P  Q iff for all contexts C[ ], same observations about C[P] and C[Q] Inherently compositional Context represents adversary uUse proof rules for  to prove security Protocol is secure if no adversary can distinguish it from some idealized version of the protocol