Seeing-Is-Believing: using camera phones for human-verifiable authentication Jonathan M. McCune, Adrian Perrig and Michael K. Reiter Int. J. Security and.

Slides:



Advertisements
Similar presentations
1 Security for Ad Hoc Network Routing. 2 Ad Hoc Networks Properties Mobile Wireless communication Medium to high bandwidth High variability of connection.
Advertisements

Usable Bootstrapping of Secure Ad Hoc Communication Ersin Uzun PARC 1.
ECE454/CS594 Computer and Network Security Dr. Jinyuan (Stella) Sun Dept. of Electrical Engineering and Computer Science University of Tennessee Fall 2011.
1 Security in Wireless Protocols Bluetooth, , ZigBee.
CS470, A.SelcukCryptographic Authentication1 Cryptographic Authentication Protocols CS 470 Introduction to Applied Cryptography Instructor: Ali Aydin Selcuk.
SSL CS772 Fall Secure Socket layer Design Goals: SSLv2) SSL should work well with the main web protocols such as HTTP. Confidentiality is the top.
Efficient Public Key Infrastructure Implementation in Wireless Sensor Networks Wireless Communication and Sensor Computing, ICWCSC International.
Secure In-Band Wireless Pairing Shyamnath Gollakota Nabeel Ahmed Nickolai Zeldovich Dina Katabi.
Topic 7: Using cryptography in mobile computing. Cryptography basics: symmetric, public-key, hash function and digital signature Cryptography, describing.
Unit 1 Understanding computer systems: How ICT can be used to meet business needs OCR Cambridge Nationals in ICT Level 1/2 © Hodder & Stoughton 2013 Connecting.
Hacking WLAN // BRUTE FORCE CRACKER // TCP/IP. WLAN HACK Wired Equivalent Privacy (WEP) encryption was designed to protect against casual snooping, but.
LANs and WANs. 2 Chapter Contents Section A: Network Building Blocks Section B: Wired Networks Section C: Wireless Networks Section D: Using LANs Section.
Session 5 Hash functions and digital signatures. Contents Hash functions – Definition – Requirements – Construction – Security – Applications 2/44.
WiFi Security. What is WiFi ? Originally, Wi-Fi was a marketing term. The Wi-Fi certified logo means that the product has passed interoperability tests.
Dr Alejandra Flores-Mosri Message Authentication Internet Management & Security 06 Learning outcomes At the end of this session, you should be able to:
Wired Equivalent Privacy (WEP)
CMSC 414 Computer and Network Security Lecture 16 Jonathan Katz.
CS 239: Advanced Security Spring 04 Security in Pervasive and Ubiquitous Environments Sam Irvine
CMSC 414 Computer and Network Security Lecture 22 Jonathan Katz.
SSH : The Secure Shell By Rachana Maheswari CS265 Spring 2003.
CMSC 414 Computer and Network Security Lecture 18 Jonathan Katz.
Information Security of Embedded Systems : Algorithms and Measures Prof. Dr. Holger Schlingloff Institut für Informatik und Fraunhofer FIRST.
Networks Olga Agnew Bryant Likes Daewon Seo.
CMSC 414 Computer and Network Security Lecture 11 Jonathan Katz.
CMSC 414 Computer and Network Security Lecture 13 Jonathan Katz.
Wireless Network Security. Wireless Security Overview concerns for wireless security are similar to those found in a wired environment concerns for wireless.
Alexander Potapov.  Authentication definition  Protocol architectures  Cryptographic properties  Freshness  Types of attack on protocols  Two-way.
Seeing-Is-Believing: Using Camera Phones for Human- Verifiable Authentication Jonathan M. McCune Adrian Perrig Michael K. Reiter Carnegie Mellon University.
Trusted Computing Technologies for Embedded Systems and Sensor Networks Adrian Perrig Carnegie Mellon University.
SSH Secure Login Connections over the Internet
31.1 Chapter 31 Network Security Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Physical Contact in Ad-Hoc Wireless Network Nie Pin
1 The public switched telephone network (PSTN) is a combination of many central offices throughout the country and the world connected by copper cables,
“Security Weakness in Bluetooth” M.Jakobsson, S.Wetzel LNCS 2020, 2001 The introduction of new technology and functionality can provides its users with.
8-1Network Security Chapter 8 roadmap 8.1 What is network security? 8.2 Principles of cryptography 8.3 Message integrity, authentication.
1 Low-cost Manufacturing, Usability, and Security: An Analysis of Bluetooth Simple Pairing and Wi-Fi Protected Setup Cynthia KuoCarnegie Mellon University.
Network Security. Security Threats 8Intercept 8Interrupt 8Modification 8Fabrication.
COEN 351 E-Commerce Security Essentials of Cryptography.
569 Semantic Web. Dr. J. Lu University of windsor, Project Presentation Encrypted Web service application Encrypted Web Application Presented by:
Cryptography, Authentication and Digital Signatures
Lecture 11: Strong Passwords
Center for Cyber-Security and Privacy1 Loud And Clear Security Michael T. Goodrich, Michael Sirivianos, John Solis, Gene Tsudik and Ersin Uzun.
4 th lecture.  Message to be encrypted: HELLO  Key: XMCKL H E L L O message 7 (H) 4 (E) 11 (L) 11 (L) 14 (O) message + 23 (X) 12 (M) 2 (C) 10 (K) 11.
Fall 2002CS 395: Computer Security1 Chapter 11: Message Authentication and Hash Functions.
Cryptography Wei Wu. Internet Threat Model Client Network Not trusted!!
WEP Protocol Weaknesses and Vulnerabilities
Facilities for Secure Communication The Internet is insecure The Internet is a shared collection of networks. Unfortunately, that makes it insecure An.
Secure Component Composition for Personal Ubiquitous Computing Project Overview and Potential Techniques —————— 16 th May 2003 —————— David Llewellyn-Jones.
Upper OSI Layers Natawut Nupairoj, Ph.D. Department of Computer Engineering Chulalongkorn University.
31.1 Chapter 31 Network Security Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
20 November 2015 RE Meyers, Ms.Ed., CCAI CCNA Discovery Curriculum Review Networking for Home and Small Businesses Chapter 7: Wireless Technologies.
Authentication. Goal: Bob wants Alice to “prove” her identity to him Protocol ap1.0: Alice says “I am Alice” Failure scenario?? “I am Alice”
Lecture 24 Wireless Network Security
Focus On Bluetooth Security Presented by Kanij Fatema Sharme.
COEN 351 E-Commerce Security
Seeing-Is-Believing: Using Camera Phones for Human-Verifiable Authentication McCune, J.M., Perrig, A., Reiter, M.K IEEE Symposium on Security and.
Wireless Network Security CSIS 5857: Encoding and Encryption.
Erik Nicholson COSC 352 March 2, WPA Wi-Fi Protected Access New security standard adopted by Wi-Fi Alliance consortium Ensures compliance with different.
Cryptography Hyunsung Kim, PhD University of Malawi, Chancellor College Kyungil University February, 2016.
1/18 Talking to Strangers: Authentication in Ad-Hoc Wireless Networks Dirk Balfanz 외 2 명 in Xerox Palo Alto Research Center Presentation: Lee Youn-ho.
Software Security Seminar - 1 Chapter 2. Protocol Building Blocks 발표자 : 최두호 Applied Cryptography.
Cryptographic Hash Function. A hash function H accepts a variable-length block of data as input and produces a fixed-size hash value h = H(M). The principal.
Key management issues in PGP
Computer Communication & Networks
Cryptographic Hash Function
Intrusion Tolerance for NEST
Chapter -7 CRYPTOGRAPHIC HASH FUNCTIONS
Chapter 3 - Public-Key Cryptography & Authentication
刘振 上海交通大学 计算机科学与工程系 电信群楼3-509
Chapter 8 roadmap 8.1 What is network security?
Presentation transcript:

Seeing-Is-Believing: using camera phones for human-verifiable authentication Jonathan M. McCune, Adrian Perrig and Michael K. Reiter Int. J. Security and Networks Payas Gupta

Problem  How do we authenticate each other on daily basis? By seeing each other  In real-life we do authenticate to various devices using Physical connection such as cable  Cumbersome to carry with you all the time  Not feasible Wireless communication  Invisible to humans  Open to MITM attacks Infrared rays etc…

Problem  MITM attack An out-of-band communication channel that provides authenticity suffices to defeat MITM attacks.  Diffie and Hellman key establishment The challenge is to construct this kind of channel Many techniques provide key exchange but all require a shared secret password between the two entities, which may be cumbersome to establish in many mobile settings. May be manual transmission or comparison.

Seeing-Is-Believing (SiB)  A visual channel to achieve demonstrating identification of communicating devices.  In SiB, one device uses its camera to take a snapshot of a barcode encoding cryptographic material identifying, e.g., the public key of another device. We term this a visual channel.

Seeing-Is-Believing (SiB)  In SiB, a mobile phone’s integrated camera serves as a visual channel to provide demonstrative identification Meaning the property that the user is sure her device is communicating with that other device. In SiB this is done visually Defeating MITM attacks and can authenticate and exchange keys.  What better way for a user to tell device A that it should communicate securely with device B than to take a picture of device B using device A’s integrated camera?

Find mode Show mode  In later sections we will discuss on using SiB with devices that may be lacking a display or a camera or Both  Assumptions Mobile phone is not compromised Mobile phones are secure against active adversaries

2D barcodes as a visual channel  Bob use his camera in viewfinder mode  Updating the image in real time  Once barcode is recognized, stop  Barcode recognition and error-correcting algorithms

Pre-authentication

Can a device of type X authenticate a device of type Y? Camera Display

Bidirectional authentication  Both devices should have cameras

 Privacy can be protected by avoiding the transmission of their public key on the wireless network.  Key can be encoded in a barcode directly, or in a sequence of barcodes if a single barcode has insufficient data capacity.

Unidirectional Authentication  Device X has a camera and device Y lacks a display and a camera. Mobile phone with camera and Access Point (AP)

 Device Y must be equipped with a long-term public/private keypair, and a sticker containing a barcode of a commitment to its public key must be affixed to its housing.  As device Y is displayless, so per-interaction public keys no longer applies.  Example – Printer in a public place

Presence Confirmation  A display-only device (cameraless, but display equipped) is unable to strongly authenticate other devices using SiB.  But they can obtain a property called ‘presence’. Meaning confirming the presence of some other device in line-of-sight with its display.

Presence confirmation  TV wants to authenticate DVD Player  Both are cameraless devices, but equipped with display.  A user can use SiB to stringly authenticate the DVD player to her phone through the barcode attached to the DVD player.  She can demonstrate the DVD player’s presence to the TV by sending it the public key of the DVD player, along with a MAC over the DVD player’s public key.

 Presence property is quite weak The display-only device has no way of knowing how many device can see its display. It can only compute MAC over the data received And can measure the time delay between the displaying the barcode and receiving the MAC on the wireless channel.

Implementation Details  Application was developed on Series 60 phones  File size 52 KB  For a secure and usable Sib exchange, Show device needs to convey 48 bits of Bluetooth address 160 bits of SHA-1 output  Visual Code barcode has a useful data capacity of only 68 bits So need 4 barcodes to accommodate all

Application of Seeing-Is-Believing  Seeing-Is-Believing and the Grey Project  SiB has been in use at Carnegie Mellon for several years (around 5-6)

 Group Key establishment It is same as bidirectional authentication using SiB But noticed few difficulties in using  User’s usually switch to other phones without completing the second half of authentication

Security Analysis  Cryptography Implementation uses cycling barcodes that provide sufficient bandwidth to convey a full 160-bit SHA-1 hash. Barcodes need to be secure against active attacks, which can be achieved using SiB.

 Selecting an authentication channel  COTS – Commercial Off-The-Shelf products

Attacks against SiB  A sophisticated adversary may be able to measure emitted electromagnetic radiation (Kuhn and Anderson, 1998), or to assemble the contents of the CRT by looking at reflected light from the CRT (Kuhn, 2002).  An attacker can disrupt the lighting conditions in an attempt to disrupt SiB.  A more sophisticated, and subtle, attack is to use infrared radiation or a carefully aimed laser to overwhelm the CCD in a phone’s camera.

Concluding Remarks  Nice and interesting approach of authentication.  Analysed the establishment of secure, authenticated sessions between SiB-enabled devices and devices missing either a camera, a display, or both, and found that secure communication is possible in many situations.  The visual channel has the desirable property that it provides demonstrative identification of the communicating parties.