1 Signature Protocol for Peer-to- peer Massively Multiplayer Online Games Speaker: Shu-Fen Chiou ( 邱淑芬 )

Slides:



Advertisements
Similar presentations
Security and Privacy over the Internet Chan Hing Wing, Anthony Mphil Yr. 1, CSE, CUHK Oct 19, 1998.
Advertisements

Key distribution and certification In the case of public key encryption model the authenticity of the public key of each partner in the communication must.
A Survey of Key Management for Secure Group Communications Celia Li.
多媒體網路安全實驗室 An efficient and security dynamic identity based authentication protocol for multi-server architecture using smart cards 作者 :JongHyup LEE 出處.
ECE454/CS594 Computer and Network Security Dr. Jinyuan (Stella) Sun Dept. of Electrical Engineering and Computer Science University of Tennessee Fall 2011.
11 Efficient and Secure Certificateless Authentication and Key Agreement Protocol for Hybrid P2P Network Authors: Z. B. Xu and Z. W. Li Source: The 2nd.
CS470, A.SelcukCryptographic Authentication1 Cryptographic Authentication Protocols CS 470 Introduction to Applied Cryptography Instructor: Ali Aydin Selcuk.
Further improvement on the modified authenticated key agreement scheme Authors: N.Y. Lee and M.F. Lee Source: Applied Mathematics and Computation, Vol.157,
Cheat-Proofing P2P Online-gaming Albert Lee Spring 2008 Comp 424.
TLS Introduction 14.2 TLS Record Protocol 14.3 TLS Handshake Protocol 14.4 Summary.
Implementation of a Two-way Authentication Protocol Using Shared Key with Hash CS265 Sec. 2 David Wang.
Online Security Tuesday April 8, 2003 Maxence Crossley.
CMSC 414 Computer (and Network) Security Lecture 21 Jonathan Katz.
A Secure Fault-Tolerant Conference- Key Agreement Protocol Wen-Guey Tzeng Source : IEEE Transactions on computers Speaker : LIN, KENG-CHU.
A password authentication scheme with secure password updating SEC 期末報告 學號: 姓名:翁玉芬.
CMSC 414 Computer and Network Security Lecture 16 Jonathan Katz.
孫國偉 Efficient Password authenticated key agreement using smart cards Author : Wen-Shenq Juang* Date : in Computers & Security.
More on AuthenticationCS-4513 D-term More on Authentication CS-4513 Distributed Computing Systems (Slides include materials from Operating System.
Multicast Security May 10, 2004 Sam Irvine Andy Nguyen.
A more efficient and secure dynamic ID- based remote user authentication scheme Yan-yan Wang, Jia-yong Liu, Feng-xia Xiao, Jing Dan in Computer Communications.
Alexander Potapov.  Authentication definition  Protocol architectures  Cryptographic properties  Freshness  Types of attack on protocols  Two-way.
Computer Science Public Key Management Lecture 5.
Csci5233 Computer Security1 GS: Chapter 6 Using Java Cryptography for Authentication.
AQA Computing A2 © Nelson Thornes 2009 Section Unit 3 Section 6.4: Internet Security Digital Signatures and Certificates.
1 Anonymous Roaming Authentication Protocol with ID-based Signatures Lih-Chyau Wuu Chi-Hsiang Hung Department of Electronic Engineering National Yunlin.
An Efficient and Secure Event Signature (EASES) Protocol for Peer-to-Peer Massively Multiplayer Online Games Mo-Che Chan, Shun-Yun Hu and Jehn-Ruey Jiang.
An efficient secure distributed anonymous routing protocol for mobile and wireless ad hoc networks Authors: A. Boukerche, K. El-Khatib, L. Xu, L. Korba.
1 Authentication and Digital Signature Schemes and Their Applications to E-commerce ( 身份認證與數位簽章技術及其在電子商務上的應用 ) Advisor: Chin-Chen Chang 1, 2 Student: Ya-Fen.
SecureMR: A Service Integrity Assurance Framework for MapReduce Author: Wei Wei, Juan Du, Ting Yu, Xiaohui Gu Source: Annual Computer Security Applications.
1 Section 10.9 Internet Security Association and Key Management Protocol ISAKMP.
02/22/2005 Joint Seminer Satoshi Koga Information Technology & Security Lab. Kyushu Univ. A Distributed Online Certificate Status Protocol with Low Communication.
1 A secure model for controlling the hubs in P2P wireless network based on trust value Authors: Y. Liu, N. Xiong, K. Xu, J. H. Park, and C. Lin Source:
An Authenticated Payword Scheme without Public Key Cryptosystems Author: Chia-Chi Wu, Chin-Chen Chang, and Iuon-Chang Lin. Source: International Journal.
6. Esoteric Protocols secure elections and multi-party computation Kim Hyoung-Shick.
Chapter 21 Distributed System Security Copyright © 2008.
Digital Envelopes, Secure Socket Layer and Digital Certificates By: Anthony and James.
Software Security Seminar - 1 Chapter 5. Advanced Protocols 조미성 Applied Cryptography.
Evoting using collaborative clustering Justin Gray Osama Khaleel Joey LaConte Frank Watson.
Authentication of Signaling in VoIP Applications Authors: Srinivasan et al. (MIT Campus of Anna University, India) Source: IJNS review paper Reporter:
1 Lecture 9: Cryptographic Authentication objectives and classification one-way –secret key –public key mutual –secret key –public key establishing session.
Lecture 16: Security CDK4: Chapter 7 CDK5: Chapter 11 TvS: Chapter 9.
1 A peer mutual authentication method on super peer based peer-to- peer network Authors: Byeong-Thaek Oh, Sang-Bong Lee, and Ho-Jin Park Source: IEEE International.
Multicast Security: A Taxonomy and Some Efficient Constructions By Cannetti et al, appeared in INFOCOMM 99. Presenter: Ankur Gupta.
Partition and multi-path transmission-An encryption-free reputation sharing protocol in Gnutella-like peer-to-peer network Author: X. X. Ma, and Z. G.
1 Needham-Schroeder A --> S: A,B, N A S --> A: {N A,B,K AB,{K AB,A} KBS } KAS A --> B:{K AB,A} KBS B --> A:{N B } KAB A --> B:{N B -1} KAB.
1 A connection management protocol for promoting cooperation in Peer-to-Peer networks Authors: Murat Karakaya, Ibrahim Korpeoglu, and Ozgur Ulusoy Source:
1 Efficient User Authentication and Key Management for Peer-to- Peer Live Streaming Systems Authors: X. Liu, Y. Hao, C. Lin, and C. Du Source: Tsinghua.
Secure Communication between Set-top Box and Smart Card in DTV Broadcasting Authors: T. Jiang, Y. Hou and S. Zheng Source: IEEE Transactions on Consumer.
Computer Science 1 TinySeRSync: Secure and Resilient Time Synchronization in Wireless Sensor Networks Speaker: Sangwon Hyun Acknowledgement: Slides were.
Data Integrity Proofs in Cloud Storage Author: Sravan Kumar R and Ashutosh Saxena. Source: The Third International Conference on Communication Systems.
On the Security of Polling Protocols in Peer-to-Peer Systems Bartlomiej Sieka (U. Illinois-Chicago) Ajay D. Kshemkalyani (U. Illinois-Chicago) Mukesh Singhal.
Establishing authenticated channels and secure identifiers in ad-hoc networks Authors: B. Sieka and A. D. Kshemkalyani (University of Illinois at Chicago)
Secure Messenger Protocol using AES (Rijndael) Sang won, Lee
Protocol Analysis. CSCE Farkas 2 Cryptographic Protocols Two or more parties Communication over insecure network Cryptography used to achieve goal.
Interleaving and Collusion Attacks on a Dynamic Group Key Agreement Scheme for Low-Power Mobile Devices * Junghyun Nam 1, Juryon Paik 2, Jeeyeon Kim 2,
Robust and Efficient Password- Authenticated Key Agreement Using Smart Cards Authors: Wen-Shenq Juang, Sian-Teng Chen and Horng-Twu Liaw Src: IEEE Transaction.
TrustMe: Anonymous Management of Trust Relationships in Decentralized P2P System Aameek Singh, Ling Liu College of Computing, Georgia Tech International.
Lecture 11 Overview. Digital Signature Properties CS 450/650 Lecture 11: Digital Signatures 2 Unforgeable: Only the signer can produce his/her signature.
1 An Ordered Multi-Proxy Multi-Signature Scheme Authors: Min-Shiang Hwang, Shiang-Feng Tzeng, Shu-Fen Chiou Speaker: Shu-Fen Chiou.
Efficient Pairwise Key Establishment Scheme Based on Random Pre-Distribution Keys in Wireless Sensor Networks Source: Lecture Notes in Computer Science,
SPEAKER: HONG-JI WEI DATE: Efficient and Secure Anonymous Authentication Scheme with Roaming Used in Mobile Networks.
EE 122: Lecture 24 (Security) Ion Stoica December 4, 2001.
VANETs. Agenda System Model → What is VANETs? → Why VANETs? Threats Proposed Protocol → AOSA → SPCP → PARROTS Evaluation → Entropy → Anonymity Set → Tracking.
多媒體網路安全實驗室 An ID-based client authentication with key agreement protocol for mobile client–server environment on ECC with provable security Date:2012/02/16.
 Attacks and threats  Security challenge & Solution  Communication Infrastructure  The CA hierarchy  Vehicular Public Key  Certificates.
Cryptography CSS 329 Lecture 13:SSL.
Whatsapp Security Ahmad Hijazi Systèmes de Télécommunications & Réseaux Informatiques (STRI) 20 April 2016.
An Efficient and Practical Authenticated Communication Scheme for Vehicular Ad Hoc Networks Source: IEEE Transactions on Vehicular Technology, Reviewing.
Efficient password authenticated key agreement using smart cards
Date:2011/09/28 報告人:向峻霈 出處: Ren-Chiun Wang  Wen-Shenq Juang 
Presentation transcript:

1 Signature Protocol for Peer-to- peer Massively Multiplayer Online Games Speaker: Shu-Fen Chiou ( 邱淑芬 )

2 Introduction- MMOGs Massively multiplayer online games (MMOGs) Server player1player2player3 ‧‧ ‧ player1player2player3 ‧‧ ‧ Client-server server Server-cluster

3 Introduction- MMOGs In client-server and server-cluster Server maintains game states. Users send event to server. Server sends information to users. Server player1player2player3 ‧‧ ‧ time round

4 Introduction-P2P virtual environment Game state is maintained by peers in P2P environments. Some players may gain advantages unfairly. B A C CA A B C

5 Protocols NEO (New-Event Ordering) protocol (GauthierDickey et al., 2004) SEA (Secure Event Agreement) protocol (Corman et al., 2006) EASES (Efficient And Secure Event Signature) protocol (Chan et al., 2008)

6 Requirements Security Prevent cheats Fixed-delay Cheat (NEO, SEA) Timestamp Cheat (NEO, SEA) Suppressed Update Cheat (NEO, SEA) Inconsistency Cheat (SEA) Collusion Cheat (NEO, SEA)

7 Requirements Replay attack (SEA) Spoofing attack (SEA) Unforgeability (EASES) Verifiability (EASES) Communication All connect communication Performance Low computation (NEO, SEA, EASES) B A C

8 NEO (New-Event Ordering) protocol A B C Round 1: M 1 A =E(S A (U 1 A, t)) Round 2: M 2 A =E(S A (U 2 A, t)), K A 1, S A (V A 1 ), V A 1 = 1,1,1 M r A =E(S A (U r A )), K A r-1, S A (V A r-1 ) r: The rth round E(): Encrypt key S A : A ’ s signature U r A : Update message K A r-1 : previous round ’ s key V A r-1 : previous round ’ s vote vector

9 Attacks for NEO protocol Corman et al. claim the NEO has three attacks: Replay attack Spoofing attack A B C Round 1: M 1 A =E(S A (U 1 A, t)) Round 2: M 2 A =E(S A (U 2 A, t)), K A 1, S A (V A 1 ), V A 1 = 1,1,1 Round 3: M 3 A=E(S A (U 3 A, t)), K A 2, S A (V A 2 ), V A 2 = 1,1,1 Attacker: M 3 A=E(S A (U 2 A, t)), K A 2, S A (V A 2 ), V A 2 = 0,0,0

10 SEA (Secure Event Agreement) protocol A B C Commit r A =H(U r A, n r, SessID, ID A ) M r A =S A (Commit r A, U A r-1, Vh r-1 A, n r-1, r) r: The rth round H(): Encrypt hash function U r A : Update message n r : A nouce SessID: Session ID ID A : A ’ s ID S A : A’s signature Vh r-1 A : vote vector with hash function Round 1: Commit 1 A =H(U 1 A, n 1, N 1, ID A ) M 1 A =S A (Commit 1 A, 1) Round 2: Commit 2 A=H(U 2 A, n 2, N2, ID A ) M 2 A =S A (Commit 2 A, U 1 A, Vh 1 A, N 1, 2)

11 EASES – Initialization phase Use a random number as the master key MK i Generate one-time signature keys EX: K A 10 =H(MK A ) K A 9 =H(K A 10 ) K A 8 =H(K A 9 ) K A 7 =H(K A 8 ) ‧ K A 2 =H(K A 3 ) K A 1 =H(K A 2 ) K A 0 =H(K A 1 ) △ A =S sk (K A 0 )

12 EASES – Signing phase EX: M A 1 = H(K A 1 |U A 1 ), △ A, K A 0 M A 2 = H(K A 2 |U A 2 ), K A 1, U A 1 M A 3 = H(K A 3 |U A 3 ), K A 2, U A 2 ‧ M A 9 = H(K A 9 |U A 9 ), U A 8, K A 8 M A 10 = H(K A 10 |U A 10 ), U A 9, K A 9 M i 1 = H(K i 1 |U i 1 ), △ i, K i 0 M i n = H(K i n |U i n ), U i n-1, K i n-1 first round subsequent round A B C

13 EASES – Verification phase In first round Decrypts △ i =S sk (K i 0 ), with player i ’ s public- key and Verifies In subsequent round K i n-2 =H(K i n-1 ) ? M i n-1 =H(K i n-1 |U i n-1 ) ? B uses A’s pk to decrypt △ A verity K A 0 legitimate? AB M A 1 = H(K A 1 |U A 1 ), △ A, K A 0 M A 2 = H(K A 2 |U A 2 ), K A 1, U A 1 1 st 2 nd B computes Hash(K A 1 )=K A 0 Hash(K A 1 |U A 1 ) = M A 1 not tamper?

14 EASES – Re-initialization phase 11 th : B computes Hash(K A 10 |U A 10 |NewK A 0 ) = M A 10, authenticate NewK A 0 ? 12 th : B computes Hash(MK A ) = K A 10 ? M newA 1 =H(NewK A 1 |U A 12 ), △ NewA, NewK A 0 M newA 2 =H(NewK A 2 |U A 13 ), U A 12, NewK A 1 M newA 3 =H(NewK A 3 |U A 14 ), U A 13, NewK A 2 ‧ IN n round, re-generated new one-time signature NewK i 0, NewK i 1, ‧ ‧ ‧ ‧ ‧ NewK i m 10 th : M A 10 =H(K A 10 |U A 10 |NewK A 0 ), U A 9, K A 9 A B 12 th : MK A 11 th : M A 11 =H(NewK A 1 |U A 11 ), U A 10, K A 10, NewK A 0 New rounds

15 EASES – Late joining M A 1 = H(K A 1 |U A 1 ), △ A, K A 0 M A 2 = H(K A 2 |U A 2 ), K A 1, U A 1 AB 1 st 2 nd C Join in 2 nd △ A =S sk (K A 0 ), K A 0, K A 1 M A 2 = H(K A 2 |U A 2 ) Authenticate Key 3rd M A 3 = H(K A 3 |U A 3 ), K A 2, U A 2

16 Dynamic EASES – Signing phase 1 st : S sk (H(U A 1 |K A 1 ) 2 nd : S sk (H(U A 2 |K A 2 |K A 1 )) 3 rd : H(U A 3 |K A 3 |K A 2 )), K A 1, U A 1 4 th : H(U A 4 |K A 4 |K A 3 )), K A 2, U A 2 ‧ n th : H(U A n |K A n |K A n-1 ), K A n-2, U A n-2 Like EASES-based authentication Don ’ t prepare generation hash-chain keys

17 Dynamic EASES – Verification phase In 1 st & 2 nd, B verifies the signatures In 3 rd, authenticity H(U A 1 |K A 1 ) In subsequent, authenticity H(U A n-2 |K A n- 2 |K A n-3 ) AB 1 st : S sk (H(U A 1 |K A 1 )) & 2 nd : S sk (H(U A 2 |K A 2 |K A 1 ))1 st & 2 nd : decrypts and stores 3 rd : H(U A 3 |K A 3 |K A 2 )), K A 1, U A 1 4 th : H(U A 4 |K A 4 |K A 3 )), K A 2, U A 2 Subsequent round: verifies the message of (n-2) round In n round

18 Comparison

19 Comment – Signing phase EX: M A 1 = H(K A 1 |U A 1 |t), △ A, K A 0, ID A M A 2 = H(K A 2 |U A 2 |t), K A 1, U A 1 M A 3 = H(K A 3 |U A 3 |t), K A 2, U A 2 ‧ M A 9 = H(K A 9 |U A 9 |t), U A 8, K A 8 M A 10 = H(K A 10 |U A 10 |t), U A 9, K A 9 Add timestamp t, and user ’ s id M i 1 = H(K i 1 |U i 1 |t), △ i, K i 0, ID i M i n = H(K i n |U i n |t), U i n-1, K i n-1, first round subsequent round A B C

20 Communication method Broadcast communication AB G D C E F

21 Reference C. Dickey, D. Zappala, V. Lo, J. Marr, Low latency and cheat- proof event ordering for peer-to-peer games, in: Proceedings of the ACM International Workshop on Network and Operating System Support for Digital Audio and Video (NOSSDAV), Kinsale, County Cork, Ireland, 2004, pp. 134 – 139. A. Corman, S. Douglas, P. Schachte, V. Teague, A secure event agreement (SEA) protocol for peer-to-peer games, in: Proceedings of the First International Conference on Availability, Reliability and Security, M. C. Chan, S. Y. Hu, and J. R. Jiang, An efficient and secure event signature (EASES) protocol for peer-to-peer massively multiplayer online games, Computer Networks, vol. 52, pp – 1845, 2008.