Attacking Cryptographic Schemes Based on ‘Perturbation Polynomials’ Martin Albrecht (Royal Holloway), Craig Gentry (IBM), Shai Halevi (IBM), Jonathan Katz.

Slides:



Advertisements
Similar presentations
Attacking Cryptographic Schemes Based on Perturbation Polynomials Martin Albrecht (Royal Holloway), Craig Gentry (IBM), Shai Halevi (IBM), Jonathan Katz.
Advertisements

Shahzad Basiri Imam Hossein university Workshop on key distribution Tuesday, May 24, 2011 Linear Key Predistribution Scheme.
Cryptography and Network Security Chapter 9
A Survey of Key Management for Secure Group Communications Celia Li.
Foundations of Cryptography Lecture 10 Lecturer: Moni Naor.
ECE454/CS594 Computer and Network Security Dr. Jinyuan (Stella) Sun Dept. of Electrical Engineering and Computer Science University of Tennessee Fall 2011.
Latent Semantic Indexing (mapping onto a smaller space of latent concepts) Paolo Ferragina Dipartimento di Informatica Università di Pisa Reading 18.
Distribution and Revocation of Cryptographic Keys in Sensor Networks Amrinder Singh Dept. of Computer Science Virginia Tech.
Queensland University of Technology CRICOS No J Mitigating Sandwich Attacks against a Secure Key Management in WSNs for PCS/SCADA Hani Alzaid, DongGook.
URSA: Providing Ubiquitous and Robust Security Support for MANET
Computer Science Dr. Peng NingCSC 774 Adv. Net. Security1 CSC 774 Advanced Network Security Topic 7. Wireless Sensor Network Security.
Improving the Round Complexity of VSS in Point-to-Point Networks Jonathan Katz (University of Maryland) Chiu-Yuen Koo (Google Labs) Ranjit Kumaresan (University.
Using Auxiliary Sensors for Pair-Wise Key Establishment in WSN Source: Lecture Notes in Computer Science (2010) Authors: Qi Dong and Donggang Liu Presenter:
Yan Huang, Jonathan Katz, David Evans University of Maryland, University of Virginia Efficient Secure Two-Party Computation Using Symmetric Cut-and-Choose.
Secure and Efficient Key Management in Mobile Ad Hoc Networks Bing Wu, Jie Wu, Eduardo B. Fernandez, Mohammad Ilyas, Spyros Magliveras Department of Computer.
CS555Spring 2012/Topic 161 Cryptography CS 555 Topic 16: Key Management and The Need for Public Key Cryptography.
A Pairwise Key Pre-Distribution Scheme for Wireless Sensor Networks Wenliang (Kevin) Du, Jing Deng, Yunghsiang S. Han and Pramod K. Varshney Department.
Efficient Statistical Pruning for Maximum Likelihood Decoding Radhika Gowaikar Babak Hassibi California Institute of Technology July 3, 2003.
Random Key Predistribution Schemes for Sensor Networks Authors: Haowen Chan, Adrian Perrig, Dawn Song Carnegie Mellon University Presented by: Johnny Flowers.
Asymmetric Cryptography part 1 & 2 Haya Shulman Many thanks to Amir Herzberg who donated some of the slides from
CMSC 414 Computer and Network Security Lecture 2 Jonathan Katz.
CMSC 414 Computer and Network Security Lecture 14 Jonathan Katz.
Oded Regev Tel-Aviv University On Lattices, Learning with Errors, Learning with Errors, Random Linear Codes, Random Linear Codes, and Cryptography and.
Cryptography1 CPSC 3730 Cryptography Chapter 9 Public Key Cryptography and RSA.
CMSC 414 Computer and Network Security Lecture 14 Jonathan Katz.
On Everlasting Security in the Hybrid Bounded Storage Model Danny Harnik Moni Naor.
Establishing Pairwise Keys in Distributed Sensor Networks Donggang Liu, Peng Ning Jason Buckingham CSCI 7143: Secure Sensor Networks October 12, 2004.
1 Pertemuan 08 Public Key Cryptography Matakuliah: H0242 / Keamanan Jaringan Tahun: 2006 Versi: 1.
HumanAUT Secure Human Identification Protocols Adam Bender Avrim Blum Manuel Blum Nick Hopper The ALADDIN Center Carnegie Mellon University.
1 NTRU: A Ring-Based Public Key Cryptosystem Jeffrey Hoffstein, Jill Pipher, Joseph H. Silverman LNCS 1423, 1998.
Computer Science 1 Research on Sensor Network Security Peng Ning Cyber Defense Laboratory Department of Computer Science NC State University 2005 TRES.
Polynomial Factorization Olga Sergeeva Ferien-Akademie 2004, September 19 – October 1.
Cryptography Lecture 8 Stefan Dziembowski
KAIS T A lightweight secure protocol for wireless sensor networks 윤주범 ELSEVIER Mar
A scalable key pre-distribution mechanism for large-scale wireless sensor networks Author: A. N. Shen, S. Guo, H. Y. Chien and M. Y. Guo Source: Concurrency.
Click to edit Master title style Fall, Privacy&Security - Virginia Tech – Computer Science Cryptographic Security Secret Sharing, Vanishing Data.
Selecting Class Polynomials for the Generation of Elliptic Curves Elisavet Konstantinou joint work with Aristides Kontogeorgis Department of Information.
Group Rekeying for Filtering False Data in Sensor Networks: A Predistribution and Local Collaboration-Based Approach Wensheng Zhang and Guohong Cao.
Cryptographic Security Secret Sharing, Vanishing Data 1Dennis Kafura – CS5204 – Operating Systems.
1 Public-Key Cryptography and Message Authentication.
Cryptanalysis and Improvement of an Access Control in User Hierarchy Based on Elliptic Curve Cryptosystem Reporter : Tzer-Long Chen Information Sciences.
© 2013 Toshiba Corporation An Estimation of Computational Complexity for the Section Finding Problem on Algebraic Surfaces Chiho Mihara (TOSHIBA Corp.)
Chapter 7 – Confidentiality Using Symmetric Encryption.
PUBLIC-KEY CRYPTOGRAPH IT 352 : Lecture 2- part3 Najwa AlGhamdi, MSc – 2012 /1433.
A Two-Layer Key Establishment Scheme for Wireless Sensor Networks Yun Zhou, Student Member, IEEE, Yuguang Fang, Senior Member, IEEE IEEE TRANSACTIONS ON.
1 Diversifying Sensors to Improve Network Resilience Wenliang (Kevin) Du Electrical Engineering & Computer Science Syracuse University.
A Passive Approach to Sensor Network Localization Rahul Biswas and Sebastian Thrun International Conference on Intelligent Robots and Systems 2004 Presented.
Chapter 3 – Public Key Cryptography and RSA (A). Private-Key Cryptography traditional private/secret/single-key cryptography uses one key shared by both.
10/25/04 Security of Ad Hoc and Sensor Networks (SASN) 1/22 An Attack on the Proactive RSA Signature Scheme in the URSA Ad Hoc Network Access Control Protocol.
Author: Hangyang Dai and Hongbing Xu
PROACTIVE SECRET SHARING Or: How to Cope With Perpetual Leakage Herzberg et al. Presented by: Avinash Ravi Kevin Skapinetz.
Lattice-based cryptography and quantum Oded Regev Tel-Aviv University.
Interleaving and Collusion Attacks on a Dynamic Group Key Agreement Scheme for Low-Power Mobile Devices * Junghyun Nam 1, Juryon Paik 2, Jeeyeon Kim 2,
Robust and Efficient Password- Authenticated Key Agreement Using Smart Cards Authors: Wen-Shenq Juang, Sian-Teng Chen and Horng-Twu Liaw Src: IEEE Transaction.
Informal Security Seminar: Key Pre-distribution Scheme for Wireless Sensor Networks Joengmin Hwang Dept. Computer Science Univ. of Minnesota, Twin Cities.
Key Pre-distribution Approach in Wireless Sensor Networks Using LU Matrix Authors: Hangyang Dai and Hongbing Xu Source: IEEE Sensor Journal, vol.10, no.8,
Key Management Network Systems Security Mort Anvari.
Cryptography and Network Security Third Edition by William Stallings Lecture slides by Lawrie Brown.
1/16 Seeing through M IST given a Small Fraction of an RSA Private Key Colin D. Walter Comodo Research Lab (Bradford, UK)
1 Diffie-Hellman (Key Exchange) Protocol Rocky K. C. Chang 9 February 2007.
Threshold password authentication against guessing attacks in Ad hoc networks ► Chai, Zhenchuan; Cao, Zhenfu; Lu, Rongxing ► Ad Hoc Networks Volume: 5,
1 Diffie-Hellman (Key Exchange) Protocol Rocky K. C. Chang 9 February 2007.
Round-Efficient Multi-Party Computation in Point-to-Point Networks Jonathan Katz Chiu-Yuen Koo University of Maryland.
Key Exchange in Systems VPN usually has two phases –Handshake protocol: key exchange between parties sets symmetric keys –Traffic protocol: communication.
Towards Human Computable Passwords
On the Size of Pairing-based Non-interactive Arguments
MinJi Kim, Muriel Médard, João Barros
Human Computable Passwords
Cryptographic Hash Functions Part I
Lattices. Svp & cvp. lll algorithm. application in cryptography
Presentation transcript:

Attacking Cryptographic Schemes Based on ‘Perturbation Polynomials’ Martin Albrecht (Royal Holloway), Craig Gentry (IBM), Shai Halevi (IBM), Jonathan Katz (Univ. of MD)

The moral  Implementing secure protocols in MANETs/ sensor-networks can be challenging Low bandwidth, memory, computational power Limited battery life  Much work designing new and highly efficient protocols tailored to this setting  Sometimes, rigorous security analysis sacrificed for better efficiency Replaced with heuristic analysis This is a bad idea!

Outline of the talk  Key predistribution  An optimal, information-theoretic scheme  A modified scheme by Zhang et al.  Attacking the modified scheme  Extensions and conclusions

Key predistribution  Goal: distribute keying material to N nodes, so each pair can compute a shared key Off-line key-predistribution On-line computation of shared keys  Two trivial solutions: One key shared by all nodes  Compromise of one node compromises entire network Independent key shared by each pair of nodes  O(N) storage per node  A not-so-trivial solution [Sakai et al. 2000]: Identity-based key agreement  O(1) storage, full resilience  But expensive computation (pairing)

‘Optimal’ storage/resilience tradeoff  [Blom ‘84], [Blundo et al. ‘98]  These schemes guarantee the following: Any pair of nodes shares a key A key shared by uncompromised nodes is information-theoretically secret As long as t or fewer nodes are compromised  Storage O(t) per node This is optimal for schemes satisfying the above  Computation is “cheap” No “public key operations”

The scheme of Blundo et al.  Choose a random symmetric polynomial F(x,y) of degree t in each variable F(x,y)= F(y,x)  Node i given coefficients of (univariate) polynomial s i (y) = F(i,y)  Key shared by i and j is s i (j) = F(i,j) = s j (i)  After compromising t+1 nodes, attacker can recover F(x,y) by interpolation

Better than Blundo?  If t large, even O(t) storage is expensive  Can we do better? E.g., by giving up info-theoretic security Without paying in expensive operations?

Perturbation polynomial  [Zhang et al., MobiHoc ’07] Other variations by Zhang et al. (INFOCOM ’08), Subramanian et al. (PerCom ’07)  Basic idea: Give node i a polynomial s i (y) that is “close”, but not equal, to F(i,y) Nodes i and j generate a shared key using the high-order bits of s i (j), s j (i), respectively Harder(?) for an adversary to recover F(x,y), even after compromising many nodes

The scheme of Zhang et al.  p a prime, r < p a “noise parameter”  Choose random symmetric F(x,y) as before  Choose random degree-t univariate g(y), h(y) Find i’s such that both g(i) and h(i) are small SMALL = {i : 0 ≤ g(i), h(i) ≤ r} (mod p)  For i  SMALL, choose random b ← {0,1} Node is given “name” i and coefficients of s i (y) = F(i,y) + g(y) if b = 0 s i (y) = F(i,y) + h(y) if b = 1  |s i (j) – s j (i)| ≤ r for any i, j  SMALL Nodes i, j agree on a shared key using high-order bits

Suggested parameters  p≈2 32, r≈2 22, t=76  Number of bits in key = log(p/r) = 10 Run scheme many times for more key bits  Storage per node: (t+1) log p ≈ 2460 bits  Storage per key bit ≈ 246 bits  Blundo scheme with this much storage is resilient to ≈ 246 corruptions  Zhang et al. claim resistance against arbitrarily many corruptions

“Warm-up attack” using list decoding  Compromise n=4t+1 nodes Learn coefficients of s 1 (y),…, s n (y)  For any victim j *, set y i = s i (j * )  Note: y i  {f 0 (i), f 1 (i)} f 0 (y) = F(y,j * )+g(j * ), f 1 (y) = F(y,j * )+h(j * )  For some b, more than half the y i ’s = f b (i) Use list decoding to recover this f b (y)  Algorithm of [Ar et al. 1998] Compute shared key between j* and any i*  s j* (i * ) ≈ f b (i * )

The “real attack”  Breaks “generalized” version of scheme with more noise: s i (y) = F(i,y) +  i g(y) +  i h(y) Small  i,  i  [-u, u]  Only needs to corrupt t+3 nodes  Takes time O(t 3 + t u 3 ) Note: u cannot be too large, to share even a 1-bit key we need 4ur < p Attack is faster than key setup

Implementation  Attack implemented on a desktop PC prtsetup timeattack time min 1060 min 10 min 8 min It takes a long time to compute the set SMALL = {i : 0 ≤ g(i), h(i) ≤ r}

Overview of the “real attack”  The “noise space” is spanned by g(), h() Two dimensional space, can be identified after corrupting (t+1)+2 = t+3 nodes  For i  SMALL, g(i), h(i) are small Use lattice-reduction to find g(), h() Low-dimensional noise-space  only need to reduce lattices of low dimension  Dimension < 20 for the suggested parameters  Once g(), h() are found, easy to recover the master polynomial F(x,y) The info-theoretic protection Noise dimensio n

Step 1: identify the noise space  Corrupt n=t+3 nodes, get s i = f i +  i g +  i h  We know f t+1 = Σ i=0…t i f i and f t+2 = Σ i=0…t ’ i f i  So: v = s t+1 - Σ i=0…t i s i  span(g, h) v’= s t+2 - Σ i=0…t ’ i s i  span(g, h)  v,v’ likely to be linearly independent Likely to be a basis for span(g, h)!

Step 2: find g and h  We have v, v’ s.t. span(v,v’) = span(g,h)  Find g, h using the fact that g(id), h(id) are “small” modulo p  To do this, find short vectors in the lattice: v(x 1 )v(x 2 )…v(x k ) v’(x 1 )v’(x 2 )…v’(x k ) p0…0 0p…0 ………… 00…p k can be small (k < 20)

Step 3: find F  F is symmetric, so for all i, j s i (j)  i g(j)  i h(j) = s j (i)  j g(i)  j h(i) Gives O(n 2 ) equations in 2n unknowns ( i,  i ) But under-determined!  Exactly 3 degrees of freedom  Exhaustive search for three of the  i,  i in [-u, u] Total time O(t 3 + t u 3 ) Or use lattices to do it even faster..

Other Perturbation Polynomial Schemes  Authentication scheme by Zhang et al. from INFOCOM 2008  Access-control scheme by Subramanian et al. from PerCom 2007  The same type of attacks apply there too Attacks are actually easier

Conclusions The ‘perturbation polynomials’ approach is dead Moral: rigorous security analysis is crucial

Thank you!