Doc.: 11-12-1243r1 Submission October 30, 2012 René Struik (Struik Security Consultancy)Slide 1 Discussion of Outstanding TGai Security Topics Date: 2012-10-30.

Slides:



Advertisements
Similar presentations
Doc.: IEEE /1012r0 Submission September 2009 Dan Harkins, Aruba NetworksSlide 1 Suite-B Compliance for a Mesh Network Date: Authors:
Advertisements

Securing Critical Unattended Systems with Identity Based Cryptography A Case Study Johannes Blömer, Peter Günther University of Paderborn Volker Krummel.
Efficient Public Key Infrastructure Implementation in Wireless Sensor Networks Wireless Communication and Sensor Computing, ICWCSC International.
Doc.: IEEE /770r0 Submission July 2009 Slide 1 TGs Authenticated Encryption Function Date: Authors: Russ Housley (Vigil Security), et.
Cryptography and Network Security Chapter 13 Fourth Edition by William Stallings Lecture slides by Lawrie Brown.
1 Digital Signatures & Authentication Protocols. 2 Digital Signatures have looked at message authentication –but does not address issues of lack of trust.
1 Chapter 13 – Digital Signatures & Authentication Protocols Fourth Edition by William Stallings Lecture slides by Lawrie Brown (modified by Prof. M. Singhal,
Submission doc.: IEEE 11-12/1253r1 November 2012 Dan Harkins, Aruba NetworksSlide 1 Why Use SIV for 11ai? Date: Authors:
WAP Public Key Infrastructure CSCI – Independent Study Fall 2002 Jaleel Syed Presentation No 5.
November 1, 2006Sarah Wahl / Graduate Student UCCS1 Public Key Infrastructure By Sarah Wahl.
Cryptography1 CPSC 3730 Cryptography Chapter 10 Key Management.
Cryptography and Network Security Chapter 10. Chapter 10 – Key Management; Other Public Key Cryptosystems No Singhalese, whether man or woman, would venture.
CSE 597E Fall 2001 PennState University1 Digital Signature Schemes Presented By: Munaiza Matin.
C HAPTER 13 Asymmetric Key Cryptography Slides adapted from "Foundations of Security: What Every Programmer Needs To Know" by Neil Daswani, Christoph Kern,
ASYMMETRIC CIPHERS.
Alexander Potapov.  Authentication definition  Protocol architectures  Cryptographic properties  Freshness  Types of attack on protocols  Two-way.
Computer Science Public Key Management Lecture 5.
Information Security and Management 13. Digital Signatures and Authentication Protocols Chih-Hung Wang Fall
Chapter 5 Digital Signatures MSc. NGUYEN CAO DAT Dr. TRAN VAN HOAI 1.
Bob can sign a message using a digital signature generation algorithm
Lecture slides prepared for “Computer Security: Principles and Practice”, 2/e, by William Stallings and Lawrie Brown, Chapter 21 “Public-Key Cryptography.
Information Security Principles Assistant Professor Dr. Sana’a Wafa Al-Sayegh 1 st Semester ITGD 2202 University of Palestine.
CMSC 414 Computer and Network Security Lecture 6 Jonathan Katz.
8-1Network Security Chapter 8 roadmap 8.1 What is network security? 8.2 Principles of cryptography 8.3 Message integrity, authentication.
1 Optimal Mail Certificates in Mail Payment Applications Leon Pintsov Pitney Bowes 2nd CACR Information Security Workshop 31 March 1999.
Doc.: r3 Submission August 31, 2012 René Struik (Struik Security Consultancy)Slide 1 Authentication with Local Authentication and Optional Remote.
Ad Hoc Networks Curtis Bolser Miguel Turner Kiel Murray.
CS 627 Elliptic Curves and Cryptography Paper by: Aleksandar Jurisic, Alfred J. Menezes Published: January 1998 Presented by: Sagar Chivate.
Key Management Workshop November 1-2, Cryptographic Algorithms, Keys, and other Keying Material  Approved cryptographic algorithms  Security.
Chapter 21 Public-Key Cryptography and Message Authentication.
1 The Cryptographic Token Key Initialization Protocol (CT-KIP) KEYPROV BOF IETF-67 San Diego November 2006 Andrea Doherty.
Key Management. Session and Interchange Keys  Key management – distribution of cryptographic keys, mechanisms used to bind an identity to a key, and.
Cryptography and Network Security (CS435) Part Eight (Key Management)
23-1 Last time □ P2P □ Security ♦ Intro ♦ Principles of cryptography.
Doc.: r05 Submission December 15, 2011 René Struik (Struik Security Consultancy)Slide 1 IEEE TGai  Some Notes and Thoughts on TGai Security.
Cryptography and Network Security Chapter 13 Fifth Edition by William Stallings Lecture slides by Lawrie Brown.
Doc.: IEEE /1429r2 Submission January 2012 Dan Harkins, Aruba NetworksSlide 1 A Protocol for FILS Authentication Date: Authors:
Network Security7-1 CIS3360: Chapter 8: Cryptography Application of Public Cryptography Cliff Zou Spring 2012 TexPoint fonts used in EMF. Read the TexPoint.
Cryptography and Network Security Chapter 13 Fourth Edition by William Stallings.
Doc.: IEEE /495r1 Submission July 2001 Jon Edney, NokiaSlide 1 Ad-Hoc Group Requirements Report Group met twice - total 5 hours Group size ranged.
PAWS: Security Considerations Yizhuang WU, Yang CUI PAWS WG
Chapter 3 (B) – Key Management; Other Public Key Cryptosystems.
Cryptography and Network Security Chapter 13 Fourth Edition by William Stallings Lecture slides by Lawrie Brown & Süleyman KONDAKCI.
1 Chapter 10: Key Management in Public key cryptosystems Fourth Edition by William Stallings Lecture slides by Lawrie Brown (Modified by Prof. M. Singhal,
12 March 2002 doc.: IEEE /144r0 Gregg Rasor, MotorolaSlide 1Submission Project: IEEE P Working Group for Wireless Personal Area Networks.
Doc.: Submission May 13, 2013 Rene Struik (Struik Security Consultancy)Slide 1 FILS Handling of Large Objects, FILS Piggy-Backing Date:
Doc.: Submission January 22, 2014 Rene Struik (Struik Security Consultancy)Slide 1 TGai Motions Date: Authors: NameCompanyAddressPhone .
IPSec is a suite of protocols defined by the Internet Engineering Task Force (IETF) to provide security services at the network layer. standard protocol.
Doc.: Submission March 21, 2013 René Struik (Struik Security Consultancy)Slide 1 FILS Handling of Large Objects Date: Authors:
Lecture 9 Overview. Digital Signature Properties CS 450/650 Lecture 9: Digital Signatures 2 Unforgeable: Only the signer can produce his/her signature.
1 Chapter 3-3 Key Distribution. 2 Key Management public-key encryption helps address key distribution problems have two aspects of this: –distribution.
ECC Design Team: Initial Report Brian Minard, Tolga Acar, Tim Polk November 8, 2006.
Doc.: Submission April 22, 2013 René Struik (Struik Security Consultancy)Slide 1 FILS Handling of Large Objects, FILS Piggy-Backing Date:
Submission doc.: IEEE 11-13/0324r0 March 2013 M. Emmelmann, FOKUSSlide 1 TGai Principles and Mechanisms (Joint TGai and TGaq Meeting) Date:
Doc.: Submission February 5, 2013 René Struik (Struik Security Consultancy)Slide 1 FILS Handling of Large Objects Date: Authors:
Key Management public-key encryption helps address key distribution problems have two aspects of this: – distribution of public keys – use of public-key.
Doc.: Submission May 14, 2013 Rene Struik (Struik Security Consultancy)Slide 1 FILS Piggy-Backing Aspects Date: Authors: NameCompanyAddressPhone .
Fourth Edition by William Stallings Lecture slides by Lawrie Brown
Discussion of Outstanding TGai Security Topics
B. R. Chandavarkar CSE Dept., NITK Surathkal
FILS Handling of Large Objects
FILS Handling of Large Objects, FILS Piggy-Backing
FILS Handling of Large Objects
FILS Handling of Large Objects
TGai Motions Date: Authors: January 22, 2014 Name Company
FILS Handling of Large Objects
27 Febraury 2002 Project: IEEE P Working Group for Wireless Personal Area Networks (WPANs) Submission Title: Security Sub-committee Status Report.
July 15, 2019 doc.: IEEE r0 May, 2002 Project: IEEE P Working Group for Wireless Personal Area Networks (WPANs) Submission Title: [AES.
Chapter 8 roadmap 8.1 What is network security?
Presentation transcript:

doc.: r1 Submission October 30, 2012 René Struik (Struik Security Consultancy)Slide 1 Discussion of Outstanding TGai Security Topics Date: Authors: NameCompanyAddressPhone René StruikStruik Security Consultancy Toronto ON, CanadaUSA: +1 (415) Toronto: +1 (647) Skype: rstruik

doc.: r1 Submission October 30, 2012 Background The following contributions provide background: Presentations  ai-authentication-with-local-authentication-and-optional-remote-authorization Specification text:  ai-suggested-edits-to ai-tgai-spec-text-proposal-for-fils-authentication  ai-suggested-edits-to ai-tgai-spec-text-proposal-for-fils-authentication- protocol-draft  ai-tgai-spec-text-proposal-for-fils-authentication-protocol Updates provided now:  Elaboration on questions resulting from Palm Springs meeting  Details of cryptographic protocol ingredients (shown in context) – most already originally in 12/794r3 Main message: Opportunity for full conversion on protocol details, so as to arrive at solid, well-understood, yet nimble and flexible protocol and that is even already standardized elsewhere

doc.: r1 Submission October 30, 2012 Outline 1.Protocol recap 2.Computational cost public-key crypto 3.Certificate structure 4.“piggy-backed data” along key confirmation flows Note: Our exposition is relative to certificate-based public-key protocol (i.e., without online third party), but does leave out details not necessary for current discussion

doc.: r1 Submission October 30, 2012 René Struik (Struik Security Consultancy)Slide 4 Protocol Recap Security properties:  Key establishment, mutual entity authentication, implicit key authentication, mutual key confirmation, etc. A Random X, Cert CA (Id A,Q A ) MAC k1 (Id A || Id B || X || Y ) Key Establishment Key Confirmation B Random Y, Cert CA (Id A, Q B ) MAC k1 (Id B || Id A || Y || X ) STAAP

doc.: r1 Submission October 30, 2012 René Struik (Struik Security Consultancy)Slide 5 Computational Cost Public-Key Crypto Implementation cost ECC on constrained platforms:  ATMega 128, MHz platform [1]: Koblitz curve K-163: 0.32s; K-233 curve: 0.73s (in assembly)  Hardware-assisted implementation: much faster Anecdotal evidence: required with constrained smartgrid applications (e.g., US, Germany, France, etc.) Ref: [1] Diego F. Aranha, Julio López, Leonardo B. Oliveira and Ricardo Dahab. Efficient implementation of elliptic curves on sensor nodes. Conference on Hyperelliptic curves, discrete Logarithms, Encryption, etc., Frutillar, Chile, 2009Efficient implementation of elliptic curves on sensor nodes Options, as specified with 12/1172r0:  Prime curve: P-256  FIPS Pub 186-3, NIST SP a, ANSI X  Binary curve: K-283  FIPS Pub 18-3, NIST SP a, ANSI X Motivation:  Prime curves:  more vulnerable to crypto implementation attacks (side channel/fault attacks) and denial of service attack;  most suitable when implemented on platform with efficient integer arithmetic;  Binary curves:  less vulnerable to crypto implementation attacks (side channel/fault attacks) and denial of service attacks;  most suitable for resource-constrained, sensor-style platforms (e.g., af, low energy mode)  Legacy constructs: RSA, ordinary DLP not specified, since not meeting FILS requirements

doc.: r1 Submission October 30, 2012 René Struik (Struik Security Consultancy)Slide 6 Key Info Field - Certificates (1) Function of KeyInfo field Distribution of authentic long-term public keys Q A and Q B Options  Device Certificates: KeyInfo A = “Cert CA (Id A, Q A )”Example: X509v3-style, etc.  Logical separation of identifier space and public keys (same Id A can get new public key Q A )  Device configuration does not bind elements of identifier space and public keys  Assignment of identifier could precede crypto operations (e.g., transceiver chip with Id, with higher-layer crypto and binding added later on when building system)  Independent verification of authenticity binding possible, trivial key extraction  Authorization based on management of device identities  Requires CA who binds elements of identifier space and public keys  Manual “Certificates”: KeyInfo A = “(Id A, Q A )”Example: hashed public keys, etc.  Logical binding of identifier space and public keys (new public key Q A results in loss of Id A )  Device configuration binds elements of identifier space and public keys  Assignment of identifiers cannot precede crypto operations (e.g., transceiver chip can only obtain Id once higher-layer crypto added later on when building system)  Independent verification of binding possible, trivial key extraction  Authorization based on management of public-key related identities  Does not require CA for authentic binding, but no evidence on “sanity checks” key generation Both require authentic authorization operations (device provisioning, personalization, etc.)

doc.: r1 Submission October 30, 2012 René Struik (Struik Security Consultancy)Slide 7 Key Info Field – Certificates (2) Function in context of key authentication Verification that only party that may be capable of computing the key is indeed its perceived communicating party Options, as specified with 12/1172r0: KeyInfo verification  Device Certificates: KeyInfo A = “Cert CA (Id A, Q A )”  X509v3-style ECDSA certificate, with SHA-256 hash function  Cryptographic scheme standardized with FIPS Pub 180-2, FIPS Pub 186-3, ANSI X  Certificate scheme standardized with RFC 3280, RFC 5480  Manual “Certificates”: KeyInfo A = “(Id A, Q A )”  Same as device certificate, but now without signature field  Scheme standardized with IETF: approved draft farrell-decade-ni-10 (“Naming things with hashes”) Note: KeyInfo A can be locally stored as hashed version (e.g., using SHA-256 hash function) Question: Does specifying ordinary certificates and manual certs (“hashed keys”) suffice? (I did not hear any further feedback from Palm Springs participants after September 2012 meeting)

doc.: r1 Submission October 30, 2012 René Struik (Struik Security Consultancy)Slide 8 “Piggy-Backed Info” (1) Basic Protocol: Security properties:  Key establishment, mutual entity authentication, implicit key authentication, mutual key confirmation, etc. A Random X, Cert CA (Id A,Q A ) MAC k1 (Id A || Id B || X || Y ) Key Establishment Key Confirmation B Random Y, Cert CA (Id A, Q B ) MAC k1 (Id B || Id A || Y || X ) STAAP

doc.: r1 Submission October 30, 2012 René Struik (Struik Security Consultancy)Slide 9 “Piggy-Backed Info” (2) Extended Protocol #1: (with “piggy-backing”) Security properties:  Key establishment, mutual entity authentication, implicit key authentication, mutual key confirmation, etc. Additional functionality:  Authentication of exchanged “piggy-backed info” Text A and Text B (if any), via authentication tags key confirmation messages A Random X, Cert CA (Id A,Q A ) MAC k1 (Id A || Id B || X || Y || [Text A ]), Text A Key Establishment Key Confirmation B Random Y, Cert CA (Id A, Q B ) MAC k1 (Id B || Id A || Y || X || [Text B ]), Text B STAAP Piggy-backed info may originate remotely

doc.: r1 Submission October 30, 2012 René Struik (Struik Security Consultancy)Slide 10 “Piggy-Backed Info” (3) Extended Protocol #2: (with “piggy-backing”) Security properties:  Key establishment, mutual entity authentication, implicit key authentication, mutual key confirmation, etc. Additional functionality:  Authentication of exchanged “piggy-backed info” Text A and Text B (if any), via authentication tags already in key confirmation messages (if field present)  Confidentiality and authenticity of exchanged “piggy-backed info” Text A and Text B (if any), via special enciphering function not present on basic protocol A Random X, Cert CA (Id A,Q A ) MAC k1 (Id A || Id B || X || Y || [Text A ]), [Text A ] k2 Key Establishment Key Confirmation B Random Y, Cert CA (Id A, Q B ) MAC k1 (Id B || Id A || Y || X || [Text B ]), [Text B ] k2 STAAP Piggy-backed info may originate remotely

doc.: r1 Submission October 30, 2012 René Struik (Struik Security Consultancy)Slide 11 “Piggy-Backed Info” (4) Options for securing “piggy-backed data”: 1.Data authenticity only: Simply use authentication tag key confirmation 2.Data authenticity via key confirmation tag, confidentiality separately: use, e.g., CTR mode construct 1 3.Both authenticity and confidentiality separately: use any combined authentication and encryption mode (AEAD mode), e.g., CCM, GCM, OCB Notes:  With options #2, #3, so-called “nonce misuse resistance” is a non-issue, since  Enciphering function uses “fresh” key across different invocations along key confirmation message flows  Nonce space of both protocol parties easy to separate  Easy to use two “fresh” keys if really desired (use one key in each direction)  Simplest option is to reuse (elements of) existing constructs, so as to save implementation cost (Option #2: CTR mode; option #3: CCM mode)  Alignment of nonce structure with reused construct beneficial (depending on prevalent hardware [RS: please drop me a note!])  Fully compliant with standards (NIST, ANSI, etc.) 1 See, e.g., 12/1151r3, §11.9a.2.4b, 11.9a.2.5b

doc.: r1 Submission October 30, 2012 René Struik (Struik Security Consultancy)Slide 12 Other Considerations  Use standards whenever possible:  Reuses existing implementations and makes compliance process easier  Fosters interoperability, confidence in sufficient scrutiny E.g., use standard representations ECC point, reference NIST SP a schemes  Keep protocol engine separate from usual frame processing state machine  Allows reuse of existing crypto state machines, without specific “tweaks” of general components  Allows reuse of key agreement engine for other applications besides ai (e.g., NFC protocol on WiFi-enabled device)  Avoids convoluted security arguments (easier to study properties of protocol) E.g., no enciphering of entire Association Request/Response frame, but only payload fields (where key agreement flows reside)

doc.: r1 Submission October 30, 2012 René Struik (Struik Security Consultancy)Slide 13 List of Questions after Palm Springs meeting (no doubt, partial – additions welcome)

doc.: r1 Submission October 30, 2012 Questions Resulting from Palm Springs Meeting (1) TGai mailing list: (David Goodall, as of September 21, 2012, 7.35pm EDT) 1. What functionality or advantages do we lose when we lose the EAPOL key frames? A specific example is that the multi-band operations introduced in 11ad require use of fields which were added to EAPOL key frames 1-4. If we don’t have the EAPOL key frames in the 11ai mechanism, and we want the multi-band operation, then we need to do some extra specification work. This should be do-able but there may be an ongoing requirement to maintain this part of the multi-band functionality in more than one place in the specification. I need to review further to see if there any other similar issues. 2. Will 11ai fast initial link setup be fast for low power, CPU-challenged devices? An example is a mobile battery powered RFID sensor tag with perhaps a 50 MHz 32 bit CPU. I gather that the current non-TTP proposal will take perhaps 10 ms on a smart phone with a 1 GHz processor so it does not appear suitable for low power devices. Rene Struik has indicated that this issue can be addressed with a different selection of elliptic curve and various processing techniques.

doc.: r1 Submission October 30, 2012 Questions Resulting from Palm Springs Meeting (2) Main outstanding topics resulting from Palm Springs sessions on TGai security: 1.Certificate structure 2.Mechanism for authentication and (possibly) encryption of “piggy-backed data” along key confirmation Other topics: 1.Reuse of existing crypto and security functionality 2.Compliance to external specifications (e.g., key wrap?)