``Chaffing and Winnowing’’ & Crypto Policy Comments Ronald L. Rivest Cryptography and Information Security Group MIT Lab for Computer Science April 1998.

Slides:



Advertisements
Similar presentations
Chapter 3 Public Key Cryptography and Message authentication.
Advertisements

Spring 2000CS 4611 Security Outline Encryption Algorithms Authentication Protocols Message Integrity Protocols Key Distribution Firewalls.
Internet and Intranet Protocols and Applications Lecture 9a: Secure Sockets Layer (SSL) March, 2004 Arthur Goldberg Computer Science Department New York.
1 Network Security Outline Encryption Algorithms Authentication Protocols Message Integrity Protocols Key Distribution Firewalls.
Public Key Cryptography & Message Authentication By Tahaei Fall 2012.
CS 483 – SD SECTION BY DR. DANIYAL ALGHAZZAWI (4) Information Security.
15-1 Last time Internet Application Security and Privacy Public-key encryption Integrity.
Session 5 Hash functions and digital signatures. Contents Hash functions – Definition – Requirements – Construction – Security – Applications 2/44.
TCP/IP Protocol Suite 1 Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Chapter 29 Cryptography and Network.
Introduction to PKI Seminar What is PKI? Robert Brentrup July 13, 2004.
OOP/Java1 Public Key Crytography From: Introduction to Algorithms Cormen, Leiserson and Rivest.
Security Chapters 14,15. The Security Environment Threats Security goals and threats.
ECOMMERCE TECHNOLOGY SUMMER 2002 COPYRIGHT © 2002 MICHAEL I. SHAMOS Cryptographic Security.
BY MUKTADIUR RAHMAN MAY 06, 2010 INTERODUCTION TO CRYPTOGRAPHY.
Public Key Crytography1 From: Introduction to Algorithms Cormen, Leiserson and Rivest.
ECOMMERCE TECHNOLOGY FALL 2003 COPYRIGHT © 2003 MICHAEL I. SHAMOS Cryptography.
8-1 What is network security? Confidentiality: only sender, intended receiver should “understand” message contents m sender encrypts message m receiver.
Symmetric Key Distribution Protocol with Hybrid Crypto Systems Tony Nguyen.
Henric Johnson1 Chapter3 Public-Key Cryptography and Message Authentication Henric Johnson Blekinge Institute of Technology, Sweden
Cryptography (continued). Enabling Alice and Bob to Communicate Securely m m m Alice Eve Bob m.
WS Algorithmentheorie 03 – Randomized Algorithms (Public Key Cryptosystems) Prof. Dr. Th. Ottmann.
EECC694 - Shaaban #1 lec #16 Spring Properties of Secure Network Communication Secrecy: Only the sender and intended receiver should be able.
Spring 2003CS 4611 Security Outline Encryption Algorithms Authentication Protocols Message Integrity Protocols Key Distribution Firewalls.
Introduction to Public Key Infrastructure (PKI) Office of Information Security The University of Texas at Brownsville & Texas Southmost College.
Remarks on Voting using Cryptography Ronald L. Rivest MIT Laboratory for Computer Science.
Public Key Cryptography RSA Diffie Hellman Key Management Based on slides by Dr. Lawrie Brown of the Australian Defence Force Academy, University College,
Chapter 8.  Cryptography is the science of keeping information secure in terms of confidentiality and integrity.  Cryptography is also referred to as.
Cryptographic Security Cryptographic Mechanisms 1Mesbah Islam– Operating Systems.
Computer Science Public Key Management Lecture 5.
Introduction to Public Key Cryptography
31.1 Chapter 31 Network Security Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
1 Public-Key Cryptography and Message Authentication Ola Flygt Växjö University, Sweden
Page 1 Secure Communication Paul Krzyzanowski Distributed Systems Except as otherwise noted, the content of this presentation.
1 Cryptography Basics. 2 Cryptography Basic terminologies Symmetric key encryption Asymmetric key encryption Public Key Infrastructure Digital Certificates.
Behzad Akbari Spring In the Name of the Most High.
Cryptography: RSA & DES Marcia Noel Ken Roe Jaime Buccheri.
10/1/2015 9:38:06 AM1AIIS. OUTLINE Introduction Goals In Cryptography Secrete Key Cryptography Public Key Cryptograpgy Digital Signatures 2 10/1/2015.
Symmetric versus Asymmetric Cryptography. Why is it worth presenting cryptography? Top concern in security Fundamental knowledge in computer security.
Protecting Internet Communications: Encryption  Encryption: Process of transforming plain text or data into cipher text that cannot be read by anyone.
Cryptography, Authentication and Digital Signatures
Public-Key Cryptography CS110 Fall Conventional Encryption.
CSCD 218 : DATA COMMUNICATIONS AND NETWORKING 1
4 th lecture.  Message to be encrypted: HELLO  Key: XMCKL H E L L O message 7 (H) 4 (E) 11 (L) 11 (L) 14 (O) message + 23 (X) 12 (M) 2 (C) 10 (K) 11.
Chapter 31 Cryptography And Network Security Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Cryptography Wei Wu. Internet Threat Model Client Network Not trusted!!
Advanced Database Course (ESED5204) Eng. Hanan Alyazji University of Palestine Software Engineering Department.
1 Normal executable Infected executable Sequence of program instructions Entry Original program Entry Jump Replication and payload Viruses.
Cryptography 1 Crypto Cryptography 2 Crypto  Cryptology  The art and science of making and breaking “secret codes”  Cryptography  making “secret.
31.1 Chapter 31 Network Security Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Authentication. Goal: Bob wants Alice to “prove” her identity to him Protocol ap1.0: Alice says “I am Alice” Failure scenario?? “I am Alice”
+ Security. + What is network security? confidentiality: only sender, intended receiver should “understand” message contents sender encrypts message receiver.
Encryption CS110: Computer Science and the Internet.
Mort Anvari Introduction to Encryption Technology To insert your company logo on this slide From the Insert Menu Select “Picture” Locate your logo file.
Electronic Commerce School of Library and Information Science PGP and cryptography I. What is encryption? Cryptographic systems II. What is PGP? How does.
Private key
IT 221: Introduction to Information Security Principles Lecture 5: Message Authentications, Hash Functions and Hash/Mac Algorithms For Educational Purposes.
ECE Prof. John A. Copeland fax Office: GCATT Bldg.
6.033 Quiz3 Review Spring How can we achieve security? Authenticate agent’s identity Verify the integrity of the request Check the agent’s authorization.
Cryptography services Lecturer: Dr. Peter Soreanu Students: Raed Awad Ahmad Abdalhalim
Public-Key Cryptography and Message Authentication
Computer Communication & Networks
What is network security?
Chapters 14,15 Security.
Chapters 14,15 Security.
Lecture 10: Network Security.
Chapter 3 - Public-Key Cryptography & Authentication
Chapter 29 Cryptography and Network Security
Introduction to Encryption Technology
Presentation transcript:

``Chaffing and Winnowing’’ & Crypto Policy Comments Ronald L. Rivest Cryptography and Information Security Group MIT Lab for Computer Science April 1998

Outline u Confidentiality and Authentication u Chaffing and Winnowing u Comments on Crypto Policy

Confidentiality u A message is confidential if it can only be understood by the intended recipient. (An eavesdropper does not get the message. u There are two standard ways of achieving confidentiality: –steganography: hiding the real message inside a larger one –encryption: transforming the plaintext message into ciphertext, using cryptography u We add a third: chaffing and winnowing.

Authentication u A message has been authenticated if the recipient can reliably identify the sender and confirm that the message was received exactly as sent. u There are two standard authentication techniques: –Public-key Digital Signatures (e.g. RSA, DSS) –Message Authentication Codes (or MAC’s, e.g. HMAC), based on a secret key shared between sender and receiver.

Confidentiality vs Authentication u These are traditionally viewed as separate goals, achievable by separate techniques. u ``Key recovery’’ advocates normally focus on encryption, and ignore escrow or recovery of authentication keys. u The new chaffing technique demonstrates that you can obtain confidentiality using Message Authentication Codes.

How do MAC’s work? u Divide a message into blocks (packets). u Append to each block a MAC computed from message block and secret key: Message = “Hi Alice” MAC = “89310” Message = “See you soon” MAC = “32451” Message = “Love, Bob” MAC = “24550” u Receiver can re-compute, and check, each MAC using the same secret key. Blocks with bad MAC’s can be discarded as damaged or forged.

MAC’s are not encryption u An eavesdropper still sees the message. u There is no way to ``decrypt’’ a MAC to obtain the message block. Indeed, the message block may be 1000 times as long as the MAC. The receiver recomputes the MAC from the message block and the secret key in the same way the sender did. u Software that uses MAC’s for authentication are routinely approved for export.

What is Chaffing? u Chaffing is the process of adding bogus message blocks with bogus MAC’s to an authenticated message: “Hi Al”, <-- chaff “Hi Alice”, “See you soon”, “4PM at Oval Office”, <-- chaff “Love, Bob”, “Bill”, <-- chaff

Chaffing provides confidentiality u Without knowing the secret MAC key, an eavesdropper can’t tell the good packets (wheat) from the bogus (chaff): “Hi Al”, ?? “Hi Alice”, ?? “See you soon”, ?? “4PM at Oval Office”, ?? “Love, Bob”, ?? “Bill”, ??

Small packets give more confidentiality u Imagine packets were only one letter long: HABTUDVIXWTUQOPWEUEGECATHNEAN (MACs not shown) u But now we show letters with good MACs: HABTUDVIXWTUQOPWEUEGECATHNEAN ==> HI PETE u Bit-by-bit packets are even more secure. u Other techniques can also yield high degree of security while using larger packets.

Third party can add chaff! u Note that Alice and Bob may not even care for confidentiality; they just use MACs for authentication of message contents. u A third party (Charles) can add chaff, without knowing secret authentication key! u Alice and Bob are not encrypting. u Charles has no secret key to give to recover.

Alice can be framed u We note that since anyone can add chaff, Alice could be framed for violating a (hypothetical) anti-confidentiality law by a rogue LE agent who added chaff himself.

Alice can hide many messages u By using several authentication keys, Alice can hide more than one message in the chaff. u When challenged by LE to reveal her authentication key, she could yield one that discloses an innocuous message, while “real” message is still buried in the chaff.

Policy implications u Any crypto policy that required recovery of encryption keys would also have to require recovery of message authentication keys. u But: knowledge of message authentication keys allows impersonation! Why should LE be able to impersonate one Federal Reserve Bank to another??? u Authentication keys are foundation of integrity of information infrastructure; their compromise could be catastrophic.

Digital Signatures still OK u Note that chaffing and winnowing only works for MACs, not digital signatures, since anyone can verify a digital signature using public key of signer. u LE would not need access to signature keys.

Do CA’s relate to policy? u Certificate authorities must not escrow private signing keys; only signer herself should know her signing key. u Certificate authorities should not know (or escrow) encryption or MAC keys, since these are usually ephemeral (per session). u Trying to burden CA’s with key escrow or recovery responsibility is likely to make them economically unviable. u ==> CA’s can not implement crypto policy.

A Metaphor: Crypto = Gloves u Imagine that gloves just dropped in price from $10,000/pair to $10/pair. u Gloves, like crypto, are protective: –Gardener, electrician, doctor, skier. u Gloves, like crypto, are cheap, importable. u Nearly everyone uses gloves. u LE complains that gloves leave no fingerprints, and wants mfrs to make only “fingerprint-recovery’’ gloves…(!?)

My recommendations u No restrictions on domestic use of cryptography. (This is NRC recommendation.) u Increase LE budget to compensate for increased difficulty crypto may cause them. u Remove all export regs once GAO determines that there are more than 1,000 foreign crypto products for sale with “strong crypto” (56 bits or above), except to Iraq, etc. (Now are hundreds of products.)