Formal Analysis of Security Protocols Dr. Changyu Dong

Slides:



Advertisements
Similar presentations
Modelling and Analysing Security Protocol: Lecture 4 Attacks and Principles Tom Chothia CWI.
Advertisements

AUTHENTICATION AND KEY DISTRIBUTION
CMSC 414 Computer (and Network) Security Lecture 22 Jonathan Katz.
Chapter 10 Real world security protocols
Key Management. Shared Key Exchange Problem How do Alice and Bob exchange a shared secret? Offline – Doesnt scale Using public key cryptography (possible)
CSC 474 Information Systems Security
Last Class: The Problem BobAlice Eve Private Message Eavesdropping.
CIS 725 Key Exchange Protocols. Alice ( PB Bob (M, PR Alice (hash(M))) PB Alice Confidentiality, Integrity and Authenication PR Bob M, hash(M) M, PR Alice.
CS470, A.SelcukCryptographic Authentication1 Cryptographic Authentication Protocols CS 470 Introduction to Applied Cryptography Instructor: Ali Aydin Selcuk.
1 Security Handshake Pitfalls. 2 Authentication Handshakes Secure communication almost always includes an initial authentication handshake: –Authenticate.
Luu Anh Tuan. Security protocol Intruder Intruder behaviors Overhead and intercept any messages being passed in the system Decrypt messages that are.
BAN Logic A Logic of Authentication Presentation by Heather Goldsby Michelle Pirtle (Mike Burrows, Marin Abadi, Roger Needham) Published 1989, SRC Research.
1 Digital Signatures & Authentication Protocols. 2 Digital Signatures have looked at message authentication –but does not address issues of lack of trust.
 Authorization via symmetric crypto  Key exchange o Using asymmetric crypto o Using symmetric crypto with KDC  KDC shares a key with every participant.
 Public key (asymmetric) cryptography o Modular exponentiation for encryption/decryption  Efficient algorithms for this o Attacker needs to factor large.
CS555Spring 2012/Topic 161 Cryptography CS 555 Topic 16: Key Management and The Need for Public Key Cryptography.
Modelling and Analysing of Security Protocol: Lecture 3 Protocol Goals Tom Chothia CWI.
G Robert Grimm New York University Using Encryption for Authentication in Computer Networks.
Cryptography1 CPSC 3730 Cryptography Chapter 10 Key Management.
Symmetric Key Distribution Protocol with Hybrid Crypto Systems Tony Nguyen.
EEC 693/793 Special Topics in Electrical Engineering Secure and Dependable Computing Lecture 7 Wenbing Zhao Department of Electrical and Computer Engineering.
Modelling and Analysing of Security Protocol: Lecture 1 Introductions to Modelling Protocols Tom Chothia CWI.
A Logic of Authentication Michael Burrows, Martin Abadi, Roger Needham BAN Logic Presented by : Wenjin Hu.
1 Protocols are programs too The meta-heuristic search for security protocols By John A. Clark.
More on AuthenticationCS-4513 D-term More on Authentication CS-4513 Distributed Computing Systems (Slides include materials from Operating System.
EEC 688/788 Secure and Dependable Computing Lecture 7 Wenbing Zhao Department of Electrical and Computer Engineering Cleveland State University
Chapter 2 Protocols Controlling communications of principals in systems.
CSE Michigan State University Extensions of BAN by Heather Goldsby Michelle Pirtle.
Information Security of Embedded Systems : Algorithms and Measures Prof. Dr. Holger Schlingloff Institut für Informatik und Fraunhofer FIRST.
Protocol Composition Logic Arnab Roy joint work with A. Datta, A. Derek, N. Durgin, J.C. Mitchell, D. Pavlovic CS259: Security Analysis of Network Protocols,
Modelling and Analysing of Security Protocol: Lecture 5 BAN logic Tom Chothia CWI.
Copyright © Clifford Neuman - UNIVERSITY OF SOUTHERN CALIFORNIA - INFORMATION SCIENCES INSTITUTE CSci530: Computer Security Systems Authentication.
Security 2 Distributed Systems Lecture# 15. Overview Cryptography Symmetric Assymeteric Digital Signature Secure Digest Functions Authentication.
Information Security of Embedded Systems : BAN-Logic Prof. Dr. Holger Schlingloff Institut für Informatik und Fraunhofer FIRST.
1 Authentication Protocols Celia Li Computer Science and Engineering York University.
Alexander Potapov.  Authentication definition  Protocol architectures  Cryptographic properties  Freshness  Types of attack on protocols  Two-way.
BAN LOGIC Amit Chetal Monica Desai November 14, 2001
Network Security Lecture 23 Presented by: Dr. Munam Ali Shah.
Security protocols  Authentication protocols (this lecture)  Electronic voting protocols  Fair exchange protocols  Digital cash protocols.
Security protocols and their verification Mark Ryan University of Birmingham Midlands Graduate School University of Birmingham April 2005 Steve Kremer.
Fall 2010/Lecture 321 CS 426 (Fall 2010) Key Distribution & Agreement.
CSCE 813 Internet Security Cryptographic Protocol Analysis.
Lecture 16: Security CDK4: Chapter 7 CDK5: Chapter 11 TvS: Chapter 9.
Digital Signatures, Message Digest and Authentication Week-9.
1 Needham-Schroeder A --> S: A,B, N A S --> A: {N A,B,K AB,{K AB,A} KBS } KAS A --> B:{K AB,A} KBS B --> A:{N B } KAB A --> B:{N B -1} KAB.
6 June Lecture 2 1 TU Dresden - Ws on Proof Theory and Computation Formal Methods for Security Protocols Catuscia Palamidessi Penn State University,
Network Protocols Network Systems Security Mort Anvari.
CSCE 715: Network Systems Security Chin-Tser Huang University of South Carolina.
The School of Electrical Engineering and Computer Science (EECS) CS/ECE Network Security Dr. Attila Altay Yavuz Authentication Protocols (I): Secure Handshake.
Network Security Continued. Digital Signature You want to sign a document. Three conditions. – 1. The receiver can verify the identity of the sender.
Private key
User Authentication  fundamental security building block basis of access control & user accountability  is the process of verifying an identity claimed.
Identify Friend or Foe (IFF) Chapter 9 Simple Authentication protocols Namibia Angola 1. N 2. E(N,K) SAAF Impala Russian MIG 1 Military needs many specialized.
Chapter 9 Simple Authentication Protocols Simple Security Protocol Authentication Protocols Authentication and TCP Chapter 9 Simple Authentication protocols.
KERBEROS SYSTEM Kumar Madugula.
1 Chapter 3-3 Key Distribution. 2 Key Management public-key encryption helps address key distribution problems have two aspects of this: –distribution.
Lesson Introduction ●Authentication protocols ●Key exchange protocols ●Kerberos Security Protocols.
SECURITY. Security Threats, Policies, and Mechanisms There are four types of security threats to consider 1. Interception 2 Interruption 3. Modification.
Pertemuan #8 Key Management Kuliah Pengaman Jaringan.
Dr. Nermi hamza.  A user may gain access to a particular workstation and pretend to be another user operating from that workstation.  A user may eavesdrop.
Dr. Nermin Hamza.  Attacks:  Traffic Analysis : traffic analysis occurs when an eavesdroppers observes message traffic on network. Not understand the.
Tanenbaum & Van Steen, Distributed Systems: Principles and Paradigms, 2e, (c) 2007 Prentice-Hall, Inc. All rights reserved DISTRIBUTED SYSTEMS.
1 Authentication Celia Li Computer Science and Engineering York University.
刘振 上海交通大学 计算机科学与工程系 电信群楼3-509
Logic for Computer Security Protocols
CDK4: Chapter 7 CDK5: Chapter 11 TvS: Chapter 9
CDK: Chapter 7 TvS: Chapter 9
刘振 上海交通大学 计算机科学与工程系 电信群楼3-509
AIT 682: Network and Systems Security
Presentation transcript:

Formal Analysis of Security Protocols Dr. Changyu Dong

Security Protocols Are protocols concerning with security properties, e.g. integrity and confidentiality. For example – SSL, Kerberos, WPA, CHAP, Contract signing, E- voting, E-money. They have to be right, but they often aren’t.

Formal Analysis There are now several methods for analysing security protocols, based on: – Modal and temporal logics – Process algebras (CSP, pi-calculus) – Theorem-proving tools They have resulted in: – increased confidence in some protocols, – discovery of many protocol flaws, – a better understanding of how to design robust protocols.

BAN Logic Named after its authors Burrows, Abadi and Needham. A modal logic for analysing authentication protocols. First formal analysis technique for Security Protocols. Easy to use. Finds many attacks on known protocols.

Authentication, an Intuitive Example Imaging you received this from your best friend’s address. Would you click the link? Hi, Here are some wonderful pictures. Click the link below: flickr.com Tom

Authentication, an Intuitive Example Now imaging the is written in this way Hi, Remember the guy who drank beer through his nose last night in the pub? I’ve put some photos online. Click the link below: flickr.com Tom Would you click the link?

Authentication, an Intuitive Example Now imaging you received this and your friend Bob told you he received the same message and the link was genuine. Hi, Here are some wonderful pictures. Click the link below: flickr.com Tom Would you click the link?

The Key Factors in Authentication Some secrets Or some trust And …

Authentication, an Intuitive Example Imaging you received this again one week later Hi, Remember the guy who drank beer through his nose last night in the pub? I’ve put some photos online. Click the link below: flickr.com Tom Would you click the link?

The Key Factors in Authentication Some secrets Or some trust And Freshness

BAN Logic: Basic Notations P believes X: Principle P believes X. P acts as if X is true. P knows X is indeed true or the truth of X is justified by some evidence. P sees X: The principal P receives a message containing X. Seeing is NOT believing. P does not necessarily believes X even if P sees X. P said X: At some point in the past, P is known to have sent a message including X. P controls X: P has jurisdiction over X, or P is trusted as an authority on X.

BAN Logic: Basic Notations Fresh (X): X is recent or has not been used before. It is a fresh value (nonce, timestamp). P Q: P and Q may used the shared key K to communicate. K is only known to P and Q or a principal trusted by P and Q (such as an authentication server). P: P has K as a public key. The private key (K -1 ) is known only to P. P Q: X is a shared secret between P and Q. X

BAN Logic: Basic Notations {X} K : X is encrypted under the key K. Y : X is combined with a secret Y. X,Y means X and Y

Authentication goals: formalised Mutually Authenticated key establishment between A and B: Mutually Authenticated & confirmed key establishment between A and B: Data Origin Authentication

Inference Rules Message-meaning K is a key shared between Q and P, so if P sees a message encrypted by K, it must come from Q (P ignores its own messages). Similarly:

Inference Rules Nonce-verification If P believes that Q once said X, then P believes that Q once believed X. If X is fresh, then Q should still hold this belief.

Inference Rules Jurisdiction rule If P trusts Q as an authority on X, then P should believe X if Q does so.

Inference Rules Decomposition rules Decryption rules

Inference Rules Freshness rule If part of the message is fresh, then the whole message is also fresh.

Protocol Analysis with BAN Logic Idealise the protocol by replacing concrete messages by idealised messages. State the initial assumptions Apply the inference rules to each message and interpret the meaning of derived formulas.

Idealise the Protocol Drop unencrypted messages, because they do not contribute to the growth of principle’s beliefs. Drop all other data that does not contribute to the growth of beliefs. (Usually nonces and timestamps need to be left in.) Understand the real meaning of messages and represent the meaning in the idealised messages using correct formulas.

Andrew Secure RPC Idealise This protocol is intended to distribute a new session key between two principals A and B who share a long-term key.

Initial Assumptions K ab is pre-shared K’ ab is generated by B N a is generated by A N b is generated by B

Analyse the Protocol The goal of the protocol is to distribute a new shared keys between A and B. That means, at the end of the protocol, A should believe that it shares K ab ’ with B and B should believe that it shares K ab ’ with A. The first goal is in the initial assumptions, how about the second?

Analyse the Protocol Let’s go backwards:

Analyse the Protocol

How to prove ? Unfortunately, we cannot. That means the protocol has a flaw. – A cannot verify the new key is fresh. – An attacker can mount a replay attack.

Modified Protocol

A Few Words at the End BAN logic can help you find flaws – But not all the flaws The Needham-Schroeder public-key protocol was proved to be correct in the BAN logic paper, but later was found flawed. The original paper is worth reading – A Logic of Authentication, M Burrows, M Abadi, R Needham, ACM Transactions on Computer Systems 1990