Based on Schneier Chapter 5: Advanced Protocols Dulal C. Kar.

Slides:



Advertisements
Similar presentations
Key Management. Shared Key Exchange Problem How do Alice and Bob exchange a shared secret? Offline – Doesnt scale Using public key cryptography (possible)
Advertisements

Last Class: The Problem BobAlice Eve Private Message Eavesdropping.
Lecture 15 Zero-Knowledge Techniques. Peggy: “I know the password to the Federal Reserve System computer, the ingredients in McDonald’s secret sauce,
Lect. 18: Cryptographic Protocols. 2 1.Cryptographic Protocols 2.Special Signatures 3.Secret Sharing and Threshold Cryptography 4.Zero-knowledge Proofs.
Authentication and Digital Signatures CSCI 5857: Encoding and Encryption.
15-1 Last time Internet Application Security and Privacy Public-key encryption Integrity.
Introduction to Modern Cryptography, Lecture 13 Money Related Issues ($$$) and Odds and Ends.
ECOMMERCE TECHNOLOGY SUMMER 2002 COPYRIGHT © 2002 MICHAEL I. SHAMOS Cryptographic Security.
ECOMMERCE TECHNOLOGY FALL 2003 COPYRIGHT © 2003 MICHAEL I. SHAMOS Cryptography.
Introduction to Modern Cryptography Homework assignments.
ITIS 6200/8200. time-stamping services Difficult to verify the creation date and accurate contents of a digital file Required properties of time-stamping.
Electronic Voting Schemes and Other stuff. Requirements Only eligible voters can vote (once only) No one can tell how voter voted Publish who voted (?)
Overview Beyond basic cryptography:
Introduction to Modern Cryptography, Lecture 7/6/07 Zero Knowledge and Applications.
Optimistic Synchronous Multi-Party Contract Signing N. Asokan, Baum-Waidner, M. Schunter, M. Waidner Presented By Uday Nayak Advisor: Chris Lynch.
Introduction to Modern Cryptography, Lecture 9 More about Digital Signatures and Identification.
Chapter 9 Cryptographic Protocol Cryptography-Principles and Practice Harbin Institute of Technology School of Computer Science and Technology Zhijun Li.
ELECTRONIC PAYMENT SYSTEMSFALL 2001COPYRIGHT © 2001 MICHAEL I. SHAMOS Electronic Payment Systems Lecture 6 Epayment Security II.
K-Anonymous Message Transmission Luis von Ahn Andrew Bortz Nick Hopper The Aladdin Center Carnegie Mellon University.
Module 8 – Anonymous Digital Cash Blind Signatures DigiCash coins.
Slide 1 Vitaly Shmatikov CS 380S Oblivious Transfer and Secure Multi-Party Computation With Malicious Parties.
J. Wang. Computer Network Security Theory and Practice. Springer 2008 Chapter 4 Data Authentication Part II.
Lecture 6: Public Key Cryptography
Public Key Model 8. Cryptography part 2.
Strong Password Protocols
8. Data Integrity Techniques
Csci5233 Computer Security1 Bishop: Chapter 10 Key Management: Digital Signature.
DNSSEC Cryptography Review Track 2 Workshop July 3, 2010 American Samoa Hervey Allen.
Page 1 Secure Communication Paul Krzyzanowski Distributed Systems Except as otherwise noted, the content of this presentation.
Tonga Institute of Higher Education Design and Analysis of Algorithms IT 254 Lecture 9: Cryptography.
Cryptology Digital Signatures and Digital Certificates Prof. David Singer Dept. of Mathematics Case Western Reserve University.
Digital Cash By Gaurav Shetty. Agenda Introduction. Introduction. Working. Working. Desired Properties. Desired Properties. Protocols for Digital Cash.
14.1 Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Chapter 14 Entity Authentication.
Part Two Network Security Applications Chapter 4 Key Distribution and User Authentication.
Chapter 4: Intermediate Protocols
Cryptography, Authentication and Digital Signatures
Wonders of the Digital Envelope Avi Wigderson Institute for Advanced Study.
Digital Signatures A primer 1. Why public key cryptography? With secret key algorithms Number of key pairs to be generated is extremely large If there.
CS526: Information Security Prof. Sam Wagstaff September 16, 2003 Cryptography Basics.
Chapter 3: Basic Protocols Dulal C. Kar. Key Exchange with Symmetric Cryptography Session key –A separate key for one particular communication session.
4 th lecture.  Message to be encrypted: HELLO  Key: XMCKL H E L L O message 7 (H) 4 (E) 11 (L) 11 (L) 14 (O) message + 23 (X) 12 (M) 2 (C) 10 (K) 11.
Software Security Seminar - 1 Chapter 5. Advanced Protocols 조미성 Applied Cryptography.
Chapter 6:Esoteric Protocols Dulal C Kar. Secure Elections Ideal voting protocol has at least following six properties 1.Only authorized voters can vote.
Introduction to Modern Cryptography Sharif University Spring 2015 Data and Network Security Lab Sharif University of Technology Department of Computer.
Presented by: Suparita Parakarn Kinzang Wangdi Research Report Presentation Computer Network Security.
Chapter 4 Using Encryption in Cryptographic Protocols & Practices (Part B)
Chapter 3 (B) – Key Management; Other Public Key Cryptosystems.
Advanced Database Course (ESED5204) Eng. Hanan Alyazji University of Palestine Software Engineering Department.
Chapter 4 Using Encryption in Cryptographic Protocols & Practices.
Digital Signatures, Message Digest and Authentication Week-9.
14.1 Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Chapter 14 Entity Authentication.
Protocols Chapter 2 Protocol: A series of steps, involving two or more parties, designed to accomplish a task. All parties involved must know the protocol.
1 Needham-Schroeder A --> S: A,B, N A S --> A: {N A,B,K AB,{K AB,A} KBS } KAS A --> B:{K AB,A} KBS B --> A:{N B } KAB A --> B:{N B -1} KAB.
Zero-knowledge proof protocols 1 CHAPTER 12: Zero-knowledge proof protocols One of the most important, and at the same time very counterintuitive, primitives.
Network Security Continued. Digital Signature You want to sign a document. Three conditions. – 1. The receiver can verify the identity of the sender.
Zero Knowledge Proofs Matthew Pouliotte Anthony Pringle Cryptography November 22, 2005 “A proof is whatever convinces me.” -~ Shimon Even.
Software Security Seminar - 1 Chapter 4. Intermediate Protocols 발표자 : 이장원 Applied Cryptography.
Key Management Network Systems Security Mort Anvari.
Lecture 9 Overview. Digital Signature Properties CS 450/650 Lecture 9: Digital Signatures 2 Unforgeable: Only the signer can produce his/her signature.
 5.1 Zero-Knowledge Proofs  5.2 Zero-Knowledge Proofs of Identity  5.3 Identity-Based Public-Key Cryptography  5.4 Oblivious Transfer  5.5 Oblivious.
Zero-Knowledge Proofs Ben Hosp. Classical Proofs A proof is an argument for the truth or correctness of an assertion. A classical proof is an unambiguous.
David Evans CS588: Security and Privacy University of Virginia Computer Science Lecture 15: From Here to Oblivion.
1 The RSA Algorithm Rocky K. C. Chang February 23, 2007.
SECURITY. Security Threats, Policies, and Mechanisms There are four types of security threats to consider 1. Interception 2 Interruption 3. Modification.
Bit Commitment, Fair Coin Flips, and One-Way Accumulators Matt Ashoff 11/9/2004 Cryptographic Protocols.
Software Security Seminar - 1 Chapter 2. Protocol Building Blocks 발표자 : 최두호 Applied Cryptography.
IP, (NON)ISOGRAPH and Zero Knowledge Protocol COSC 6111 Advanced Algorithm Design and Analysis Daniel Stübig.
Big Numbers: Mathematics and Internet Commerce
Course Business I am traveling April 25-May 3rd
ITIS 6200/8200 Chap 5 Dr. Weichao Wang.
Presentation transcript:

Based on Schneier Chapter 5: Advanced Protocols Dulal C. Kar

Zero-Knowledge Proofs Peggy wants to prove to Victor that she has a piece of valuable information but she does not want to reveal it to Victor at all Develop a protocol for this

Basic Idea: Zero-Knowledge Protocol Refer to fig 5.1, page 102 Assume, Peggy knows the magic words that can open the secret door between C and D. She wants to prove her knowledge of the cave to Victor without revealing the words An Analogous Protocol 1.Victor stands at point A 2.Peggy walks all the way into the cave, either point C or point D 3.After Peggy has disappeared into the cave, Victor walks to point B 4.Victor shouts to Peggy, asking her either to: 1.Come out of the left passage or 2.Come out of the right passage 5.Peggy complies, using the magic words to open the secret door if she has to. 6.Peggy and Victor repeats steps (1) through (5) n times.

Cut and Choose Basic Zero-Knowledge Protocol is similar to classic “cut and choose” protocol for dividing anything fairly: 1.Alice cuts the thing in half 2.Bob chooses one of the halves for himself 3.Alice takes the remaining half

Basic Zero-Knowledge Protocol (cont’d) Observation –It is impossible for Victor to convince a third party of the proof’s validity –It proves that the protocol is zero-knowledge –Protocol works because there is no way Peggy can repeatedly guess which side Victor will ask her to come out –Chance of fooling Victor by Peggy is 50% in one round, 25% in two rounds, and 1 in 2 n in n rounds

Basic Zero-Knowledge Protocol Assume –Peggy knows some information which is a solution of a hard problem and wants to prove it to Victor without revealing the solution Protocol 1.Using her information and a random number, Peggy generates a new problem, isomorphic to the original problem and obtains a solution of the new problem 2.Peggy commits to the solution using a bit-commitment scheme 3.Peggy reveals to Victor the new instance 4.Victor asks Peggy either to: Prove to him that old and new instances are isomorphic, or Open the solution she committed to in step (2) and prove that it is a solution to the new instance 5.Peggy complies 6.Peggy and Victor repeat steps (1) through (5) n times

Graph Isomorphism Assume that Peggy knows, graphs G 1 and G 2 are isomorphic and wants to convince Victor of her knowledge Protocol 1.Peggy randomly permutes G 1 to produce a graph H, isomorphic to G 1. Finding an isomorphism between G 1 and H or between H and G 2 is just as hard as finding an isomorphism between G 1 and G 2 2.Peggy sends H to Victor 3.Victor asks Peggy either to: Prove that H and G 1 are isomorphic, or that H and G 2 are isomorphic 4.Peggy complies. She either: Proves that H and G 1 are isomorphic, without proving that H and G 2 are isomorphic, or Proves that H and G 2 are isomorphic, without proving that H and G 1 are isomorphic 5.Peggy and Victor repeat steps (1) through (4) n times Notice, in each round, Victor receives a new random permutation of H, along with an isomorphism between H and either G 1 or G 2

Non-interactive Zero Knowledge Proofs Carol, a third party, cannot be convinced because she is not involved in interaction Peggy wants to publish her proof to convince anyone takes time to check Protocol using one-way hash function 1.Peggy uses her information and n random numbers to transform the hard problem into n different isomorphic problems. Using information and random numbers, she solves n new hard problems 2.Peggy commits to solutions of n new hard problems 3. Peggy uses all commitments as a single input to a one-way hash function and saves first n bits of the output 4.For each ith new hard problem in turn, she takes ith bit of those n bits and: If it is a 0, she proves that the old and new problems are isomorphic, or It is a 1, she opens the solution she committed in step (2) and proves that it is a solution to new problem 5.Peggy publishes all the commitments from step (2) as well as the solutions in step (4) 6.Victor or Carol or whoever else is interested, verifies that steps (1) through (5) were executed properly Important point: Peggy cannot predict the output of the hash function

Zero-Knowledge Proofs of Identity Real world proofs of identity –Passports, driver’s licenses containing picture, signature or thumbprint In digital world –One’s private key can be his/her identity –Using a zero-knowledge proof, he/she proves that he/she knows the private key and therefore, proves his/her identity

Abuses of Zero-Knowledge Proofs of Identity Chess Grandmaster Problem –Alice does not know chess but can defeat a grandmaster –Two grandmasters are in separate room and do not know presence of other –Alice travels back and forth between rooms and copies each grandmaster’s move to play with other This type of attack can be used against zero-knowledge proofs of identity –While Alice is proving her identity to Mallory, Mallory can simultaneously prove to Bob that he is alive

Abuses of Zero-Knowledge Proofs of Identity (cont’d) The Mafia Fraud –Alice –Bob (fraud) –Carol (fraud) –Dave –Alice proves her identity to Bob, Bob radios Carol and Carol performs the same protocol with Dave Multiple Identity Fraud –In some implementations, there is no check when an individual registers a public key –One can have several private keys and therefore, several identities

Blind Signatures Suppose we want people to sign documents without ever seeing their contents

Completely Blind Signatures Bob –A Notary Public –Not interested in doc Protocol 1.Alice takes the document and multiplies it by a random value called a blinding factor 2.Alice sends the blinded document to Bob 3.Bob signs the blinded document 4.Alice divides out the blinding factor, leaving the original document signed by Bob Protocol works if the signature function and multiplication are commutative

Properties of Completely Blind Signatures Bob’s signature on the document is valid. It will convince Bob that he signed the document if shown to him Bob cannot correlate the signed document with act of signing the document. Even if keeps records of every blind signatures he makes, he cannot determine when he signed any given document

Blind Signatures Suppose Bob wants to know what he is signing, while still maintaining the useful properties of a blind signature Heart of the protocol is cut-and-choose technique

Protocol: Blind Signatures (?) 1.Bob prepares n documents, each using a different cover name 2.Bob blinds each document with a distinct blinding factor 3.Bob sends n blinded documents to Alice 4.Alice chooses n-1 documents at random and asks Bob for their blinding factors 5.Bob sends Alice the appropriate blinding factors 6.Alice opens (removes blinding factors) n-1 documents to make sure they are correct 7. Alice signs the remaining document and sends it to Bob 8.Bob removes the blinding factor and read his new name “The Crimson Streak.”

Oblivious Transfer Alice transmits a group of messages to Bob Bob receives some subset of those messages Alice does not know which ones Bob receives Alice has to convince Bob that the bits she sent are part of a group of messages

Oblivious Transfer Protocol 1.Alice generates two public-key/private-key key pairs. She sends both public keys to Bob. 2.Bob chooses a DES key and encrypts it with one of Alice’s public key randomly and sends it 3.Alice decrypts Bob’s key twice, once with each of her private keys. She recovers DES key and meaningless random key 4.Alice encrypts both of her messages, one with real DES key and other with meaningless random key and sends them to Bob 5.Bob decrypts each of them with his DES key, one he can read and the other is gibberish to him (Note: Alice does not know which one Bob was able to read) 6.At end, Alice must give Bob her private keys so that he can verify she did not cheat and she did not send the same message with both keys in step 4

Simultaneous Contract Signing with an Arbitrator 1.Alice signs a copy of the contract and sends it to Trent 2.Bob signs a copy of the contract and sends it to Trent 3.Trent sends a message to both Alice and Bob indicating that the other has signed the contract 4.Alice signs two copies of the contract and sends them to Bob 5.Bob signs both copies and keeps one and sends other to Alice 6.Alice and Bob both inform Trent 7.Trent tears up his two copies signed by one only

Simultaneous Contract Signing without Arbitrator (Face-to-face) 1.Alice signs first letter of her name and passes the contract to Bob 2.Bob signs first letter of his name and passes the contract to Alice 3.This continues until both Alice and Bob have signed their entire names 4.After each party has signed several letters, a judge could probably be convinced that both parties had signed the contract

Simultaneous Contract Signing without an Arbitrator (Not face-to-face) 1.Alice and Bob agree on a date by which the signing protocol should be completed 2.Alice and Bob decide on a probability difference. Call Alice’s difference a; call Bob’s difference b. 3.Alice sends Bob a signed message with p = a 4.Bob sends Alice a signed message with p = a + b 5.Let p be probability of the message Alice received in the previous step from Bob. Alice sends Bob a signed message with p’ = p + a or 1, whichever is smaller 6. Let p be probability of the message Bob received in the previous step from Alice. Bob sends Alice a signed message with p’ = p + b or 1, whichever is smaller 7. Alice and Bob continue alternating steps (5) and (6) until both have received messages with p = 1 or until the date agreed to in step (1) has passed

Simultaneous Contract Signing without an Arbitrator (Not face-to-face) As the protocol proceeds, both Alice and Bob agree to be bound to the contract with a greater and greater probability

Simultaneous Contract signing without an Arbitrator (Using Cryptography) 1.Both Alice and Bob randomly select 2n DES keys, grouped in pairs. 2.Both Bob and Alice generate n pairs of messages, L i and R i. L i : left half of the ith signature and R i : right half of the ith signature. The contract is signed if other party can produce both halves, L i and R i, of a single signature pair 3.Both Alice and Bob encrypt their message pairs in each of the DES key pairs, the left message with left key in the pair and the right message with the right key in the pair 4.Alice and Bob send each other their pile of 2n encrypted messages, making clear which messages are which halves of which pairs

Simultaneous Contract signing without an Arbitrator (Using Cryptography) (cont’d) 5.Alice and Bob send each other every key pair using the oblivious transfer protocol for each pair. Now both Alice and Bob have one key in each key pair, but neither knows which halves the other has 6.Both Alice and Bob decrypts the message halves that they can, using keys they received 7.Alice and Bob send each other the first bits of all 2n DES keys 8.Alice and Bob repeat step (7) for the second bits of all 2n DES keys, the third bits, and so on, until all the bits of all the DES keys have been transferred 9.Alice and Bob decrypt the remaining halves of the message pairs and the contract is signed 10.Alice and Bob exchange the private keys used during the oblivious transfer protocol in step (5) and each verifies that the other did not cheat

Digital Certified Mail Suppose Alice wants to send a message to Bob, but she does not want him to read it without signing a receipt Protocol 1.Alice encrypts her message using a random DES key, and sends the message to Bob 2.Alice generates n pairs of DES keys. The first key of each pair is generated at random, the second key of each pair is the XOR of the first key and the message encryption key 3.Alice encrypts a dummy message with each of her 2n keys 4.Alice sends the whole pile of encrypted messages to Bob, making sure he knows which messages are which halves of which pairs 5.Bob generates n pairs of random DES keys 6. Bob generates a pair of messages that indicates a valid receipt. He makes n receipt pairs of “left half” and “right half”, each numbered. A receipt is considered valid, if Alice can produce it from both halves

Digital Certified Mail (cont’d) 7.Bob encrypts each ith message pair with ith DES key pair, (left with left …) 8.Bob sends all message pairs to Alice and tells Alice which messages are which halves of which pairs 9.Alice and Bob send each other every key pair using the oblivious transfer protocol 10.Both Alice and Bob decrypts the halves they can and make sure that the decrypted messages are valid 11.Alice and Bob send each other the first bits of all 2n DES keys 12.Alice and Bob repeat step (11) for the second bits of all 2n DES keys, the third bits, and so on, until all the bits of all the DES keys have been transferred 13.Alice and Bob decrypt the remaining halves of the message pairs. Alice has a valid receipt from Bob, and Bob can XOR any key pair to get the original message encryption key 14.Alice and Bob exchange the private keys used during the oblivious transfer protocol and each verifies that the other did not cheat