1 July, 2002 doc:.: 802.15-02/275r0 Daniel V. Bailey, Ari Singer, NTRU 1 Project: IEEE P802.15 Working Group for Wireless Personal Area Networks (WPANs)

Slides:



Advertisements
Similar presentations
1 November, 2002 doc:.: /480r0 Daniel V. Bailey, Ari Singer, NTRU 1 Project: IEEE P Working Group for Wireless Personal Area Networks (WPANs)
Advertisements

Doc.: IEEE a-Updating-15-7-security Submission May 2015 Robert Moskowitz, HTT ConsultingSlide 1 Project: IEEE P Working Group for.
Doc.: IEEE s Submission January 2015 Mineo Takai, Space-Time EngineeringSlide 1 Project: IEEE P Working Group for Wireless Personal.
Submission January, 2005 Rene Struik, Certicom Corp.Slide 1 Project: IEEE P Working Group for Wireless Personal Area Networks.
1 September, 2002 doc:.: /386r0 Daniel V. Bailey, William Whyte, Ari Singer, NTRU 1 Project: IEEE P Working Group for Wireless Personal.
Doc.: IEEE /xxxr0 Submission Phil Jamieson November 2002 Project: IEEE P Working Group for Wireless Personal Area Networks (WPANs) Submission.
Submission January, 2005 Rene Struik, Certicom Corp.Slide 1 Project: IEEE P Working Group for Wireless Personal Area Networks.
Doc.: IEEE Submission Slide 1 Project: IEEE P Working Group for Wireless Personal Area Networks (WPANs) Submission Title: [Drafting of IEEE e.
Doc.: IEEE KMP-Transport-Joint Submission July 2012 Robert Moskowitz, Verizon Slide 1 Project: IEEE P Working Group for Wireless.
Doc.: IEEE /0xxr0 Submission January, 2001 Allen Heberling, Eastman Kodak CompanySlide 1 Project: IEEE P Working Group for Wireless Personal.
1 April, 2002 doc:.: /207r1 Daniel V. Bailey, Ari Singer, NTRU 1 Project: IEEE P Working Group for Wireless Personal Area Networks (WPANs)
Doc.: IEEE Submission September 16, 2004 Poor & Struik / Ember & CerticomSlide 1 Project: IEEE P Working Group for Wireless Personal.
Doc.: IEEE e Submission Project: IEEE P Working Group for Wireless Personal Area Networks (WPANs) Submission Title: [Security.
Doc.: IEEE Submission March 17, 2005 Poor & Struik / Ember & CerticomSlide 1 Project: IEEE P Working Group for Wireless Personal.
Doc.: b Submission Mar Song-Lin Young[Sharp Labs.] Slide 1 Project: IEEE P Working Group for Wireless Personal Area Networks.
Doc.: IEEE /407r2 Submission 30 January 2000 James Gilb, Mobilian Project: IEEE P Working Group for Wireless Personal Area Networks (WPANs)
Doc.: IEEE /115r0 Submission February 2001 Mark Schrader, Eastman Kodak Co.Slide 1 Project: IEEE P Working Group for Wireless Personal Area.
Doc.: IEEE /115r1 Submission February 2001 Mark Schrader, Eastman Kodak Co.Slide 1 Project: IEEE P Working Group for Wireless Personal Area.
Doc.: IEEE /315r1 Submission July 2001 Slide 1 Project: IEEE P Working Group for Wireless Personal Area Networks (WPANs) Submission Title:
Doc.: IEEE /134r0 Submission March 2004 Peter Johansson (Congruent Software, Inc.)Slide 1 Project: IEEE P a Study Group for Wireless Personal.
Doc.: IEEE xxxxx Submission doc. : IEEE Slide 1 Junbeom Hur and Sungrae Cho, Chung-Ang University Project: IEEE P
Doc.: IEEE Submission, Slide 1 Project: IEEE P Working Group for Wireless Personal Area Networks (WPANs) Submission Title: [Communicating.
Doc.: IEEE g TG4g Presentation Jan 2010 C.S. Sum1 Project: IEEE P Working Group for Wireless Personal Area Networks (WPANs)‏
Doc.: IEEE f Submission f TG September 2009 Slide 1 Project: IEEE P Working Group for Wireless Personal Area Networks.
Doc.: IEEE /250r0 Submission, Slide 1 Project: IEEE P Working Group for Wireless Personal Area Networks (WPANs) Submission Title: IEEE :
Doc.: IEEE Submission ETRI May 2015 Slide 1 Project: IEEE P Working Group for Wireless Personal Area Networks (WPANs) Submission.
Doc.: IEEE /0111r1 Submission May 2006 LEE, CUNYSlide 1 Project: IEEE P Working Group for Wireless Personal Area Networks (WPANs) Submission.
Doc.: IEEE /440r2 Submission, Slide 1 Project: IEEE P Working Group for Wireless Personal Area Networks (WPANs) Submission Title: IEEE :
Submission doc.: IEEE /0339r0 Jul 2004 Slide 1 Project: IEEE P Working Group for Wireless Personal Area Networks (WPANs) Submission Title:
Doc.: IEEE e Submission July 2009 Andy Summers, Skip Ashton, EmberSlide 1 Project: IEEE P Working Group for Wireless Personal.
Doc.: IEEE Submission, Slide 1 NOTE: Update all red fields replacing with your information; they are required. This is a manual.
Doc.: IEEE /076r0 Submission Feb Dr. William ShvodianSlide 1 Project: IEEE P Working Group for Wireless Personal Area Networks (WPANs)
Doc: IEEE Submission April 2015 Hernandez,Li,Dotlić,Miura (NICT)Slide 1 Project: IEEE P Working Group for Wireless Personal.
14 March 2002 doc.: IEEE /152r2 Gregg Rasor, MotorolaSlide 1Submission Project: IEEE P Working Group for Wireless Personal Area Networks.
2018/4/ /4/18 Project: IEEE P Working Group for Wireless Personal Area Networks (WPANs) Submission Title: Overview of Date Submitted:
June 16, 2018 doc.: IEEE r0 January, 2005
June 17, 2018 doc.: IEEE r0 January, 2005
Submission Title: [NTRU Security Tutorial]
doc.: IEEE <01/xxx>
November 2017 Project: IEEE P Working Group for Wireless Personal Area Networks (WPANs) Submission Title: [AES-256 for ] Date Submitted:
<month year> doc.: IEEE <# > <April 2008>
Name - WirelessHD doc.: IEEE g July 2010
November 2008 doc.: IEEE November 2008
doc.: IEEE <02/139r0> <January 2002> May, 2009
May 2018 Project: IEEE P Working Group for Wireless Personal Area Networks (WPANs) Submission Title: [Considerations on general MAC frame] Date Submitted:
NOV 01 Project: IEEE P Working Group for Wireless Personal Area Networks (WPANs) Submission Title: [Application Specific Information Element] Date.
Submission Title: [NTRU Security Tutorial]
March 2018 Project: IEEE P Working Group for Wireless Personal Area Networks (WPANs) Submission Title: [SG SECN Call for Proposals] Date Submitted:
Submission Title: IEEE : Management Slots in the MAC.
Project: IEEE P Working Group for Wireless Personal Area Networks (WPANs) Submission Title: [Improved Delayed ACK response Frame for.
Submission Title: [Common rate resolution]
January 16, 2019 doc.: IEEE r0 September, 2004
November 2018 Project: IEEE P Working Group for Wireless Personal Area Networks (WPANs) Submission Title: [SG SECN Amendment text] Date Submitted:
Submission Title: IEEE : Management Slots in the MAC.
<month year> <doc.: IEEE doc> December 2015
<month year> <doc.: IEEE doc> December 2015
November 2009 doc.: IEEE /0825r0 November 2009
<month year> <doc.: IEEE doc> Julyl 2015
Doc.: IEEE b 17 March, 2004 Project: IEEE P Working Group for Wireless Personal Area Networks (WPANs) Submission Title: [Associated.
May 2018 Project: IEEE P Working Group for Wireless Personal Area Networks (WPANs) Submission Title: [Considerations on general MAC frame] Date Submitted:
<month year> <doc.: IEEE doc> Julyl 2015
doc.: IEEE <doc#>
July 2010 <month year> doc.: IEEE g Doc.: IEEE g
doc.: IEEE <doc# >
doc.: IEEE <doc# >
Submission Title: [Common rate resolution]
Submission Title: [Common rate resolution]
August 2019 Project: IEEE P Working Group for Wireless Personal Area Networks (WPANs) Submission Title: CID 422 Proposal Date Submitted: 14 August,
August 2019 Project: IEEE P Working Group for Wireless Personal Area Networks (WPANs) Submission Title: CID 422 Proposal Date Submitted: 14 August,
Submission Title: TG9ma Closing Report for July Meeting
Presentation transcript:

1 July, 2002 doc:.: /275r0 Daniel V. Bailey, Ari Singer, NTRU 1 Project: IEEE P Working Group for Wireless Personal Area Networks (WPANs) Submission Title: [Security Comments on D10] Date Submitted: [July 6, 2002] Source: [Daniel V. Bailey, Product Manager for Wireless Networks and Ari Singer, Principal Engineer] Company [NTRU] Address [5 Burlington Woods, Burlington, MA 01803] Voice:[(781) ], FAX: [(781) ], Re: [Draft P /D14] Abstract:[This presentation gives an overview of some security comments on D10.] Purpose:[To familiarize the working group with security-related comments.] Notice:This document has been prepared to assist the IEEE P It is offered as a basis for discussion and is not binding on the contributing individual(s) or organization(s). The material in this document is subject to change in form and content after further study. The contributor(s) reserve(s) the right to add, amend or withdraw material contained herein. Release:The contributor acknowledges and accepts that this contribution becomes the property of IEEE and may be made publicly available by P

2 July, 2002 doc:.: /275r0 Daniel V. Bailey, Ari Singer, NTRU 2 AES-CCM is the symmetric cipher –Provides encryption and integrity on data to be transmitted over the radio –Mode selected by TG4 and received a majority of support in i ECIES is the mandatory public-key algorithm, selected in LB16 NTRUEncrypt is an optional public-key algorithm Review of Algorithm Choices In D10

3 July, 2002 doc:.: /275r0 Daniel V. Bailey, Ari Singer, NTRU 3 Change Mandatory Suite to RSA as Defined in 02/228r1 RSA algorithm well-studied since 1977 Patent expired September 20, /228r1 based on PKCS #1 v. 2.1 standard Extremely wide deployment and scrutiny: it’s in your web browser –More than 500,000,000 implementations according to RSA Security

4 July, 2002 doc:.: /275r0 Daniel V. Bailey, Ari Singer, NTRU 4 Why Change to RSA? Faster than ECC on many microcontrollers such as ST19KF16 NIST recommends use of 1024-bit RSA keys until 2016 for sensitive but unclassified U.S. government data Mandatory to implement algorithm in TLS and widely used in IETF RFCs Mandatory to implement algorithm in EMVCo –Europay, Mastercard, and Visa’s joint venture to develop EMV Integrated Circuit Card Specifications for Payment Systems –“EMVCo has executed a feasibility study on the potential introduction of elliptic curves next to RSA. The conclusion of the study is that at this point in time there is no reason to do so. “ from Click on frequently asked questions … securitywww.emvco.com RSA OAEP included in OpenSSL toolkit

5 July, 2002 doc:.: /275r0 Daniel V. Bailey, Ari Singer, NTRU 5 Add entries to the semantics tables: MLME-XXX.indication (or.confirm) ( SecurityUse, ACLEntry ) SecurityUse indicates a received frame was secured ACLEntry indicates a received frame came from a device in the device’s ACL Allows security to be turned on/off on a frame by frame basis MLME-XXX.indication (or.confirm)

6 July, 2002 doc:.: /275r0 Daniel V. Bailey, Ari Singer, NTRU 6 Add entries to the semantics tables: MLME-XXX.request (or.response) ( KeySelection ) A device may share several keys with another device –PICONET-MGMT, the key management key I share with the PNC –PICONET-DATA, the payload protection key I share with the rest of the piconet –PEER-MGMT, a key management key I share with another device –PEER-DATA, a payload protection key I share with another device KeySelection field tells the MAC which key to use MLME-XXX.request (or.response)

7 July, 2002 doc:.: /275r0 Daniel V. Bailey, Ari Singer, NTRU 7 We need a way to indicate to the DME that a security error occurred: MLME-SECURITY-ERROR.indication ( SrcID, DestID, SECID, ReasonCode ) SECID tells you which key was purportedly used ReasonCode is UNAVAILABLE-KEY, FAILED-SECURITY- CHECK, BAD-TIME-TOKEN MLME-SECURITY-ERROR.indication

8 July, 2002 doc:.: /275r0 Daniel V. Bailey, Ari Singer, NTRU 8 Recall that in AES-CCM mode we need a unique 13-byte nonce for each frame We can construct most of the nonce from data we know before seeing this particular frame like: –1-byte source DEV ID –1-byte destination DEV ID –6-byte current TimeToken –2-byte secure frame counter –3-byte fragmentation control field from the MAC header The secure frame counter is 2 octets sent with every secure frame Tells you how many times that key was used within a superframe for this sender Nonce in CCM

9 July, 2002 doc:.: /275r0 Daniel V. Bailey, Ari Singer, NTRU 9 Security Session Identifier, formerly SSID It’s actually a key identifier Reduced from 8 bytes down to 2 bytes To avoid collisions, change the high-order 2 bits to indicate the key’s function: –MSB: Piconet or peer-to-peer key? –Next-MSB: Management key or data key? SECID

10 July, 2002 doc:.: /275r0 Daniel V. Bailey, Ari Singer, NTRU 10 Recommend text to better explain how security is to be used –Applying and removing security to frames –Using security in beacons Integrity is computed on the entire frame except for the FCS The retry field in the frame control field in the MAC header needs to be set to 0 before computing integrity code in order to allow retransmission of frames without recomputing the CCM operations. The DME informs the DEV which key should be used to protect a given frame Encryption is only used for keys and data - not on commands or beacons Section 9 descriptive text on secure frame processing