On the Risks of IBE Himanshu Khurana and Jim Basney NCSA, University of Illinois International Workshop on Applied PKC (IWAP), Dalian, China, Nov 2006.

Slides:



Advertisements
Similar presentations
Efficient Public Key Infrastructure Implementation in Wireless Sensor Networks Wireless Communication and Sensor Computing, ICWCSC International.
Advertisements

Encryption Public-Key, Identity-Based, Attribute-Based.
Computer Security: Principles and Practice EECS710: Information Security Professor Hossein Saiedian Fall 2014 Chapter 23: Internet Authentication Applications.
Symmetric Key Infrastructure Karel Masarik, Daniel Cvrcek Faculty of Information Technology Brno University of Technology
RIKE Using Revocable Identities to Support Key Escrow in PKIs Nan Zhang, Jingqiang Lin, Jiwu Jing, Neng Gao State Key Laboratory of Information Security,
Authentication Cristian Solano. Cryptography is the science of using mathematics to encrypt and decrypt data. Public Key Cryptography –Problems with key.
An Introduction to Identity-based Cryptography
Pretty Good Privacy (PGP). How PGP works PGP uses both public-key cryptography and symmetric key cryptography, and includes a system which binds the public.
WAP Public Key Infrastructure CSCI – Independent Study Fall 2002 Jaleel Syed Presentation No 5.
National Center for Supercomputing Applications PKI and CKM ® Scaling Study NCASSR Kick-off Meeting June 11-12, 2003 Jim Basney
An In-Depth Examination of PKI Strengths, Weaknesses and Recommendations.
Chapter 9: Using and Managing Keys Security+ Guide to Network Security Fundamentals Second Edition.
Security Overview Hofstra University University College for Continuing Education - Advanced Java Programming Lecturer: Engin Yalt May 24, 2006.
EEC 693/793 Special Topics in Electrical Engineering Secure and Dependable Computing Lecture 6 Wenbing Zhao Department of Electrical and Computer Engineering.
Introduction to PKI Seminar What is PKI? Robert Brentrup July 13, 2004.
CMSC 414 Computer and Network Security Lecture 21 Jonathan Katz.
Interoperation Between a Conventional PKI and an ID-Based Infrastructure Geraint Price Royal Holloway University of London joint work with Chris Mitchell.
Certificateless encryption and its infrastructures Dr. Alexander W. Dent Information Security Group Royal Holloway, University of London.
Public Key Management Brent Waters. Page 2 Last Time  Saw multiple one-way function candidates for sigs. OWP (AES) Discrete Log Trapdoor Permutation.
November 1, 2006Sarah Wahl / Graduate Student UCCS1 Public Key Infrastructure By Sarah Wahl.
Identity Based Encryption
Introduction to PKI Mark Franklin September 10, 2003 Dartmouth College PKI Lab.
Kemal AkkayaWireless & Network Security 1 Department of Computer Science Southern Illinois University Carbondale CS 591 – Wireless & Network Security Lecture.
Strongly Secure Certificateless Encryption Alexander W. Dent Information Security Group
Key Distribution CS 470 Introduction to Applied Cryptography
CAMP - June 4-6, Copyright Statement Copyright Robert J. Brentrup and Mark J. Franklin This work is the intellectual property of the authors.
C HAPTER 13 Asymmetric Key Cryptography Slides adapted from "Foundations of Security: What Every Programmer Needs To Know" by Neil Daswani, Christoph Kern,
Computer Science Public Key Management Lecture 5.
Public Key Infrastructure Ammar Hasayen ….
Privacy in Encrypted Content Distribution Using Private Broadcast Encryption Adam Barth Dan Boneh Brent Waters.
Russ Housley IETF Chair Founder, Vigil Security, LLC 8 June 2009 NIST Key Management Workshop Key Management in Internet Security Protocols.
Strong Cryptographic Infrastructure and its Applications Dr Lucas Hui Center for Information Security & Cryptography Department of Computer Science & Information.
Part Two Network Security Applications Chapter 4 Key Distribution and User Authentication.
Chapter 14 Encryption: A Matter Of Trust. Awad –Electronic Commerce 2/e © 2004 Pearson Prentice Hall 2 OBJECTIVES What is Encryption? Basic Cryptographic.
Identity Based Encryption Debdeep Mukhopadhyay Associate Professor Dept of Computer Sc and Engg, IIT Kharagpur.
An Efficient Identity-based Cryptosystem for
Cryptography and Network Security Chapter 14 Fifth Edition by William Stallings Lecture slides by Lawrie Brown.
Introduction to Secure Messaging The Open Group Messaging Forum April 30, 2003.
Network Security. Security Threats 8Intercept 8Interrupt 8Modification 8Fabrication.
02/22/2005 Joint Seminer Satoshi Koga Information Technology & Security Lab. Kyushu Univ. A Distributed Online Certificate Status Protocol with Low Communication.
Chapter 9: Using and Managing Keys Security+ Guide to Network Security Fundamentals Second Edition.
Lecture 5.3: Key Distribution: Public Key Setting CS 436/636/736 Spring 2012 Nitesh Saxena.
James Higdon, Sameer Sherwani
Configuring Directory Certificate Services Lesson 13.
10. Key Management. Contents Key Management  Public-key distribution  Secret-key distribution via public-key cryptography.
IS511 Introduction to Information Security Lecture 4 Cryptography 2
Module 9: Fundamentals of Securing Network Communication.
David Evans CS588: Security and Privacy University of Virginia Computer Science Lecture 14: Public Key Infrastructure.
Review of Certificateless Cryptography Yu-Chi Chen.
1. 2 Overview In Exchange security is managed by assigning permissions in Active Directory Exchange objects are secured with DACL and ACEs Permissions.
1 Introduction The State of the Art in Electronic Payment Systems, IEEE Computer, September 1997.
Security Many secure IT systems are like a house with a locked front door but with a side window open -somebody.
Pairing Based Cryptography Standards Terence Spies VP Engineering Voltage Security
Security fundamentals Topic 5 Using a Public Key Infrastructure.
Fall, Privacy&Security - Virginia Tech – Computer Science Click to edit Master title style Cryptographic Security Identity-Based Encryption.
1 Hello World and Welcome to The simple crypt Key=23 {txzr7c x7Cr 7d~zg{r 7tengc Private-key Cryptography.
Lecture 11 Overview. Digital Signature Properties CS 450/650 Lecture 11: Digital Signatures 2 Unforgeable: Only the signer can produce his/her signature.
Lecture 14 Public Key Cryptography and RSA. Summary principles of public-key cryptography principles of public-key cryptography RSA algorithm, implementation,
SELS: A Secure List Service Himanshu Khurana, Adam Slagell, Rafael Bonilla NCSA, University of Illinois Appeared in the ACM Symposium of Applied.
Security. Cryptography (1) Intruders and eavesdroppers in communication.
SDSM IN MOBILE CLOUD COMPUTING By- ID NO-1069 K.C. SHARMILAADEVI Sethu Institute Of Tech IV year-ECE Department CEC Batch: AUG 2012.
Encryption and Security Tools for IA Management Nick Hornick COSC 481 Spring 2007.
Prof. Reuven Aviv, Nov 2013 Public Key Infrastructure1 Prof. Reuven Aviv Tel Hai Academic College Department of Computer Science Public Key Infrastructure.
Department of Computer Science Chapter 5 Introduction to Cryptography Semester 1.
Cryptography and Network Security Chapter 14 Fifth Edition by William Stallings Lecture slides by Lawrie Brown.
刘振 上海交通大学 计算机科学与工程系 电信群楼3-509
Install AD Certificate Services
刘振 上海交通大学 计算机科学与工程系 电信群楼3-509
Presentation transcript:

On the Risks of IBE Himanshu Khurana and Jim Basney NCSA, University of Illinois International Workshop on Applied PKC (IWAP), Dalian, China, Nov 2006

Introduction Identity based cryptography flourishing  Initial work by Cocks, Boneh and Franklin Encrypted is a killer app for IBE (Identity Based Encryption)  Primary benefit: eliminate key distribution We analyze IBE for and argue that:  IBE brings significant risks to security Stronger trust assumptions Unnecessarily complex cryptosystem  Can easily be replaced by other cryptosystems; e.g., RSA

Secure with RSA (SMIME) SMIME: {m} PK R PK R Domain ADomain B CA A (SK A, PK A ) CA B (SK B, PK B ) Sender (ID S ) Receiver (ID R ) {PK R } SK B

IBE: {m} PK R PK R = f(PK PKG B, ID R, policy) Secure with IBE Domain ADomain B PKG A (SK A, PK A ) PKG B (SK B, PK B ) Sender (ID S ) Receiver (ID R ) PK PKG B SK R

Benefits of IBE Eliminate User Key Distribution  One key fetch per domain (PKG)  Sender generates public keys of domain users Policy-based encryption  E.g., “open after Monday” Implicit user mobility  Recipient can get private key from any location onto any device

Trust Assumptions IBEvs.RSA Fully trusted PKG  Generates private keys Online PKG  Revocation via short- lived keys Weaker end-to-end encryption  PKG can decrypt messages Partially trusted CA  Users generate keys Offline CA  Revocation via CRLs, OCSP Strong end-to-end encryption  Only recipient can decrypt messages

IBE Revocation Goal: Minimize extent of compromise IBE time-based sender policy [Boneh03]  How does sender determine appropriate policy?  Requires policy standardization Update domain parameters [Smetters03] Revoke the identity?

RSA-based IBE Can we implement IBE for using RSA? Prior work:  J. Callas. Identity-Based Encryption with Conventional Public-Key Infrastructure. In 4th Annual PKI R&D Workshop, number 7224 in Interagency Reports, pages 102–115. NIST,  X. Ding and G. Tsudik. Simple Identity-Based Cryptography with Mediated RSA. In CT-RSA, Lecture Notes in Computer Science 2612, Springer, pages 193–210, 2003.

IBE with Conventional PKI (Callas, 2005) Recipient Domain PKG (SK PKG ) Sender (ID S ) Receiver (ID R ) (PK R,SK R ) = f(SK PKG,ID R ) SK R {m} PK R PK R ID R

IB-mRSA (Ding and Tsudik, 2003) Recipient Domain Sender (ID S ) Receiver (ID R ) Cert Org SEMCA SK R,U SK R,SEM {m} PK R PK R = f(Cert Org,ID R ) {m} PK R {{m} PK R } SK R,SEM

Secure with IB-MKD (Identity Based - Message Key Distribution) PK KDC Recipient Domain KDC (SK, PK) Sender (ID S ) Receiver (ID R ) KDC = Key Distribution Center {m} k denotes symmetric encryption {x} PK denotes asymmetric encryption {k||ID R ||policy} PK KDC k E(m) E(m) = {{m} k,{k||ID R ||policy} PK KDC }

Object-Based Key Distribution (Ford and Wiener, 1994) PK KRA Recipient Domain Key Release Agent (SK, PK) Sender (ID S ) Receiver (ID R ) {k||policy} PK KRA k E(m) E(m) = {{m} k,{k||policy} PK KRA }

Analysis IB-MKD achieves IBE benefits, same trust assumptions  Using widely-accepted RSA cryptosystem  Previous RSA-based IBE work fails to do so Protocol differences in IB-MKD  User encrypts with domain public key Highlights weaker notion of end-to-end encryption Does not change security properties  Policy itself is encrypted Additional feature not provided in IBE  Recipient must contact KDC for every message More overhead than IBE but comparable to POP over SSL Provides timely policy evaluation and immediate revocation

System Comparison S/MIMEIBEIB-mRSACallasIB-MKD Trusted Entities CA is partially trusted for public key distribution. PKG is fully trusted.CA and SEM are fully trusted. PKG is fully trusted. KDC is fully trusted. End-to-end Encryption CA can’t decrypt messages. PKG can decrypt messages. CA can decrypt messages but SEM cannot. PKG can decrypt messages. KDC can decrypt messages. Encryption Key Fetch One key fetch per recipient. One key fetch per domain. One key fetch per recipient. One key fetch per domain. Decryption Key Fetch Offline. Recipient generates the private key. One key fetch per policy. Contact SEM for partial decryption of each message. One key fetch per policy. Obtain symmetric key from KDC for each message. RevocationOCSP/CRLs.Short-lived keys.Immediate revocation via SEM. Could support short-lived keys. Immediate revocation via KDC. Policy-based Encryption No direct support.Policy included in key generation. No direct support.Could be extended to support. Policy associated with message key. Recipient Mobility Requires smartcard or key repository. Implicit. Recipient fetches key from PKG. Requires smartcard or key repository. Implicit. Recipient fetches key from PKG. Implicit. Recipient fetches key from KDC. Encryption Key/Target Recipient key. KDC public key.

Online versus Offline RSA-based IBE approaches assume online operation  Contact SEM/KDC for every message  Contact PKG for every recipient [Callas05] IBE’s strength may be offline environments  Pre-distribute PKG parameters and secret keys  If timely revocation is not a strong requirement Can RSA simulate offline IBE?

Conclusions Secure with IBE has strong trust assumptions  Need to be evaluated carefully before deployment IBE’s complex cryptography may be unnecessary  IB-MKD achieves goals with RSA Questions?  