HumanAut (or SecHCI: Secure Human- Computer Identification System against Peeping Attacks) Shujun LI Xi’an Jiaotong Univ. Oct. 2002.

Slides:



Advertisements
Similar presentations
Attacking Cryptographic Schemes Based on Perturbation Polynomials Martin Albrecht (Royal Holloway), Craig Gentry (IBM), Shai Halevi (IBM), Jonathan Katz.
Advertisements

ONE WAY FUNCTIONS SECURITY PROTOCOLS CLASS PRESENTATION.
Differential Fault Analysis on AES Variants Kazuo Sakiyama, Yang Li The University of Electro-Communications Nagoya, Japan.
Fast Algorithms For Hierarchical Range Histogram Constructions
Digital Signatures and Hash Functions. Digital Signatures.
Foundations of Cryptography Lecture 4 Lecturer: Moni Naor.
Eran Omri, Bar-Ilan University Joint work with Amos Beimel and Ilan Orlov, BGU Ilan Orlov…!??!!
NON-MALLEABLE EXTRACTORS AND SYMMETRIC KEY CRYPTOGRAPHY FROM WEAK SECRETS Yevgeniy Dodis and Daniel Wichs (NYU) STOC 2009.
Model Assessment, Selection and Averaging
CS426Fall 2010/Lecture 81 Computer Security CS 426 Lecture 8 User Authentication.
Theoretical Program Checking Greg Bronevetsky. Background The field of Program Checking is about 13 years old. Pioneered by Manuel Blum, Hal Wasserman,
Chapter 19 Confidence Intervals for Proportions.
Trustworthy Computing in My Mind: A Case Study on Visual Password Shujun Li Visiting Student at VC Group, Microsoft Research Asia Institute of Image Processing.
Ai in game programming it university of copenhagen Statistical Learning Methods Marco Loog.
3d ..
The Simple Linear Regression Model: Specification and Estimation
Session 5 Hash functions and digital signatures. Contents Hash functions – Definition – Requirements – Construction – Security – Applications 2/44.
Introduction to Cryptography and Security Mechanisms: Unit 5 Theoretical v Practical Security Dr Keith Martin McCrea
Co-operative Private Equality Test(CPET) Ronghua Li and Chuan-Kun Wu (received June 21, 2005; revised and accepted July 4, 2005) International Journal.
Introduction to Hypothesis Testing
Business Statistics: A Decision-Making Approach, 6e © 2005 Prentice-Hall, Inc. Chap 7-1 Introduction to Statistics: Chapter 8 Estimation.
Oded Regev Tel-Aviv University On Lattices, Learning with Errors, Learning with Errors, Random Linear Codes, Random Linear Codes, and Cryptography and.
HumanAUT Secure Human Identification Protocols Adam Bender Manuel Blum Nick Hopper The ALADDIN Center Carnegie Mellon University.
Sampling Distributions
Part III: Inference Topic 6 Sampling and Sampling Distributions
Session 6: Introduction to cryptanalysis part 1. Contents Problem definition Symmetric systems cryptanalysis Particularities of block ciphers cryptanalysis.
The Calibration Process
HumanAUT Secure Human Identification Protocols Adam Bender Avrim Blum Manuel Blum Nick Hopper The ALADDIN Center Carnegie Mellon University.
CS Bayesian Learning1 Bayesian Learning. CS Bayesian Learning2 States, causes, hypotheses. Observations, effect, data. We need to reconcile.
Information Theory and Security Prakash Panangaden McGill University First Canada-France Workshop on Foundations and Practice of Security Montréal 2008.
Secure Human-Computer Identification against Peeping Attacks (SecHCI): A Survey Shujun LiShujun Li, Harry ShumHarry Shum Visual Computing Group Microsoft.
Confidence Intervals and Hypothesis Testing - II
Ch 8.1 Numerical Methods: The Euler or Tangent Line Method
Towers of Hanoi. Introduction This problem is discussed in many maths texts, And in computer science an AI as an illustration of recursion and problem.
Linear Fault Analysis of Block Ciphers Zhiqiang Liu 1, Dawu Gu 1, Ya Liu 1, Wei Li 2 1. Shanghai Jiao Tong University 2. Donghua University ACNS 2012 June.
Block ciphers 2 Session 4. Contents Linear cryptanalysis Differential cryptanalysis 2/48.
1 CSI5388: Functional Elements of Statistics for Machine Learning Part I.
PROBABILITY (6MTCOAE205) Chapter 6 Estimation. Confidence Intervals Contents of this chapter: Confidence Intervals for the Population Mean, μ when Population.
Neural Key Exchange Presented by: Jessica Lowell 10 December 2009 CS 6750.
© 2009 IBM Corporation 1 Improving Consolidation of Virtual Machines with Risk-aware Bandwidth Oversubscription in Compute Clouds Amir Epstein Joint work.
Disclosure risk when responding to queries with deterministic guarantees Krish Muralidhar University of Kentucky Rathindra Sarathy Oklahoma State University.
NSRI1 Security of Wireless LAN ’ Seongtaek Chee (NSRI)
Theory of Computation II Topic presented by: Alberto Aguilar Gonzalez.
1 A Randomized Space-Time Transmission Scheme for Secret-Key Agreement Xiaohua (Edward) Li 1, Mo Chen 1 and E. Paul Ratazzi 2 1 Department of Electrical.
PRBG Based on Couple Chaotic Systems & its Applications in Stream- Cipher Cryptography Li Shujun, Mou Xuanqin, Cai Yuanlong School of Electronics & Information.
1 Chapter 10: Introduction to Inference. 2 Inference Inference is the statistical process by which we use information collected from a sample to infer.
On the Cost of Reconstructing a Secret, or VSS with Optimal Reconstruction Phase Ronald Cramer, Ivan Damgard, Serge Fehr.
Secure Communication between Set-top Box and Smart Card in DTV Broadcasting Authors: T. Jiang, Y. Hou and S. Zheng Source: IEEE Transactions on Consumer.
Securing Passwords Against Dictionary Attacks Presented By Chad Frommeyer.
Chapter 8: Simple Linear Regression Yang Zhenlin.
Shoulder-Surfing Safe Login in a Partially Observable Attacker Model (Short Paper) FC 2010 Toni Perković joint work with Mario Čagalj and Nitesh Saxena.
Breaking Undercover: Exploiting Design Flaws and
多媒體網路安全實驗室 Anonymous Authentication Systems Based on Private Information Retrieval Date: Reporter: Chien-Wen Huang 出處: Networked Digital Technologies,
1/16 Seeing through M IST given a Small Fraction of an RSA Private Key Colin D. Walter Comodo Research Lab (Bradford, UK)
WISA 2007 Jeju Island, Korea, 27th – 29th Aug 2007 Longer Randomly Blinded RSA Keys may be Weaker than Shorter Ones Colin D. Walter
Statistics for Business and Economics 8 th Edition Chapter 7 Estimation: Single Population Copyright © 2013 Pearson Education, Inc. Publishing as Prentice.
Statistical Properties of Digital Piecewise Linear Chaotic Maps and Their Roles in Cryptography & Pseudo-Random Coding Li ShujunLi Shujun 1, Li Qi 2, Li.
Cryptographic Hash Function. A hash function H accepts a variable-length block of data as input and produces a fixed-size hash value h = H(M). The principal.
The simple linear regression model and parameter estimation
Copyright © Cengage Learning. All rights reserved.
Authentication Schemes for Session Passwords using Color and Images
Reusable Fuzzy Extractors for Low-Entropy Distributions
Cryptographic Hash Function
Ch3: Model Building through Regression
Hypothesis Testing and Confidence Intervals (Part 1): Using the Standard Normal Lecture 8 Justin Kern October 10 and 12, 2017.
Statistical Data Analysis
Data Mining Lecture 11.
Chapter 10: Solving Linear Systems of Equations
Estimating with Confidence
Statistical Data Analysis
Presentation transcript:

HumanAut (or SecHCI: Secure Human- Computer Identification System against Peeping Attacks) Shujun LI Xi’an Jiaotong Univ. Oct. 2002

A Brief Introduction Exchange opinions on the definition and meaning of HumanAut/SecHCI. Explain the meaning of so-called “peeping attacks”.

What is HumanAut or SecHCI? In Prof. M. Blum’s words : HumanAut is such a system, by which a “naked” human inside a “glass” house can authenticate securely to a non-trusted terminal. In My Opinion In real world : against peeping attacks (also called observer attacks or shoulder-surfing attacks) In theoretical world: providing security in identification (authentication) systems with untrustworthy devices. Another meaning of SecHCI is Secure Human- Computer Interface against peeping attack.

HumanAut/SecHCI: In Graphical Words Powerful Adversary What adversaries can not see What adversaries can see I am not secure  HumanComputer Interface me too 

Peeping Attacks: Classification Passive (Weak) Peeping Attacks: adversaries can only passively monitor legal users’ responses Active (Strong) Peeping Attacks: adversaries control the communication channels and can disguise themselves as fake verifiers Hidden Peeping Attacks: adversaries are hard to be detected (such as hidden cameras) Open Peeping Attacks: adversaries can be easily detected by users (such as your friends standing besides you)

Why Normal Identification Systems are not OK against Peeping Attacks? Three Types of Identifications Knowledge-based – what do you know Token-based – what do you have Biometrics-based – what are you Most identification systems are Absolutely insecure to peeping attacks, such as fixed passwords. Secure to peeping attacks but require trustable devices, such as RSA SecurID ® card.

Some Solutions of HumanAut/SecHCI? Matsumoto-Imai Protocol in EuroCrypt’91: cryptanalyzed by C.-H. Wang et al. in EuroCrypt’95 Matsumoto Protocols in ACM CCS’96: can only resist O(v) observations, where v is the size of each challenge question. Hopper-Blum Protocols in AsiaCrypt’2001: the best ones from the viewpoint of security till now, but better usability is wanted.

Two More Points on HumanAut/SecHCI CAPTCHA is useful to relax the security requirement on online attacks, since humans can only carry out attacks with much lower speed than computers. So, can we use the same challenges to realize identification and CAPTCHA simultaneously? HumanAut/SecHCI can be extended as tools of AVT – age-verification technology. AVT is used to protect kids from improper (especially pornographic) materials on computer/Internet. The responses to challenges should be designed to be almost impossible (i.e., very very difficult) for kids (even teaching them how to use the protocols is difficult), but capable for most adults (usability can be relaxed, for example, it is still OK if some training is needed).

Our Ideas on HumanAut/SecHCI Introduce our basic ideas on the design of HumanAut/SecHCI. Hope that Prof. Blum can point out problems in our proposals, and give some suggestions on our future research. Since ALADDIN Center is doing the best research on HumanAut, Harry and I would like to make joint research with Prof. Blum’s group.

How Does a Peeping Attack Works: I Conceptually, let us write a challenge-response pair as an equation f(c(P), P)=r, where P is the password with k secret parameters. Assume an attacker A has observed n challenge- response pairs, then he gets an equation system with k unknown variables, which is shown in the right side.

How Does a Peeping Attack Works: II Attacks: apparently, when n is large enough, it is possible for A to exactly or numerically solve this equation system to get the password P. In Matsumoto Protocols [ACM CCS’96] and Hopper-Blum Protocols [AsiaCrypt’2001], the equation system is linear and k independent equations are enough to unique solution. Uncertainty: frustrate the above attack If c i and/or r i are uncertain, the solution becomes probabilistic. Uncertainty can be exerted on the left side (challenge) or right side (response). In Hopper-Blum Protocols, uncertainty is provided on the right side by introducing intentional errors.

Some Design Factors? Uncertainty is the basic tool to frustrate peeping attacks. Intentional response errors and/or redundancies may be useful to enhance security. A problem of uncertainty is that usability must be sacrificed to some extent. Balance is important to provide “effective” uncertainty in HumanAut/SecHCI, otherwise the difference can be useful for attackers to clarify uncertainty In Hopper-Blum Protocol 1, the insecurity to active peeping attacks is partially caused by the fact of  ≠1- . Visual/graphical implementations may be helpful to enhance usability, and the security against dictionary attacks (it is much difficult to compose a graphical dictionary than a textual one).

New Ways to Uncertainty: I A generalized version of Hopper-Blum Protocol 1 with balance property (but can be naturally extended to any protocol) C=>H: c 1, c 2 H=>C: r 1, r 2, where only one response is right and another is intentionally wrong with private (and balanced) coin-toss Repeat the above steps for m rounds Security Analysis The coin-toss should be really private and balanced. The success probability of guessing n right responses is 2 - n/2, which should be small enough to provide acceptable security. More attacks? Usability Analysis The extra wrong responses (half of all ones) make the usability worse than protocols in which all responses are right. It is generally hard for humans to make really good coin-toss.

New Ways to Uncertainty: II A general model to introduce uncertainty Mapped Response r Balanced Multiple-to-One Map One round of the proposed model for SecHCI protocols Challenge Unique Response r ’ Time-Variant (Pseudorandom) Source Generic Challenge-Response Protocol Password Also, can be a Probabilistic (or Fuzzy) Map HumanComputer

Some Points on the Model The multiple-to-one (or probabilistic, fuzzy) map should be human-executable (adults- executable for AVT). Such a map can be also considered a classifier, which outputs the class number for each input. Here, each class should contain at least two elements to make the classifier be a multi-to-one map. Apparently, r should have at least 2 different values, so r ’ should have at least 4 values.

An Example Protocol Given a set O containing n objects, Password P is a k -size subset of O, where k > 4. Given a subset C of O, similarity of C is defined as the size of P  C and denoted by Sim(C). Here, C is also called a challenge-cell. One round of the protocol is as follows: Computer=>Human (Challenge): C 1, C 2, C 3, C 4 Human=>Computer (Response):

How to Realize Balance in the Proposed Protocol: I To make r balanced, Sim(C 1 )+Sim(C 2 ) and Sim(C 3 )+Sim(C 4 ) should be distributed in the set {0,1,2,3} uniformly. A simple way to realize the uniform distribution is to generate C 1, C 2, C 3, C 4 in all subsets whose similarities are 0,1,2,3 with 1:1:1:1 ratio (Rule A). But such a way causes attacks based on partially- known password. When a passive attacker get k ’  3 elements in P, he can get some challenge-cells whose similarities are 3. These cells can reveal which elements are not included in P. As a result, one of C 1, C 2 (and C 3, C 4 ) must be generated at random in all subsets (Rule B).

How to Realize Balance in the Proposed Protocol: II For challenge-cells generated with Rule A, the occurrence probability in challenges of elements in P and the probability of the elements not in P should be balanced, too. Since n should be large enough to provide security, we prefer to using fixed-size challenge-cells to reduce the number of displayed objects in screen. Assume the size of each challenge-cell is l, from the balance of the occurrence probability, 1.5n=kl, where 1.5 is the mean similarity of all challenge-cells generated with Rule A.

A Textual Implementation Password: P={m, a, n, u, e, l, b, u} (which means Manuel Blum ) Challenge: C 1 ={c, m, q, z, *, i, k, u} (Sim=2) C 2 ={a, r, &, i, e, 2, k, l} (Sim=3) C 3 ={g, r, o, d, f, !, q, w} (Sim=0) C 4 = {p, e, b, y, h, j,., s} (Sim=1) Response:

A Graphical Implementation Password Challenge Sim=3Sim=2 Sim=0 Sim=1 Response

Security Analysis: I For passive peeping attacks, the proposed protocol seems secure with 2 n complexity. For active peeping attacks, the adversaries can successfully find the challenge-cells generated with Rule B, since the response has unbalanced relationship with the similarities of such cells. But the multi-to-one map makes the right similarity uncertain, and the success probability is not greater than p -n, where

Security Analysis: II Attacks? Prof. Blum’s criticism Our further investigations Modifications? Prof. Blum’s suggestions Our further investigations

Usability Analysis: I Because of 1.5n=kl, k and l will be a little large since n must be large enough. Generally, for active peeping attacks, assume p=0.75 (an approximate value), n  150 for O(2 60 ) attack complexity, n  200 for O(2 80 ) complexity, and n  250 for O(2 100 ) complexity. Too many symbols must be displayed on the screen: 4l for each challenge. Text/icon-based implementation will be useful to relax this problem, where “icon” means graphics with small size. Drawing-based implementation may be another candidate to solve this problem. A typical idea is reported in DAS graphical passwords [USENIX Security ’99]. Assume elements in O are different strokes in a m  n grid, it is possible to display multiple strokes in a same grid, which save display space dramatically.

Usability Analysis: II The consuming time for each identification is t 0 *m, where t 0 is the mean time for one round and m is the round number. The larger k, l, m are, the larger the time will be. A textual implementation shows that the consuming time is rather great, so graphical implementations are needed to solve this problem. More Problems and Solutions? Prof. Blum’s criticism and suggestions Our further investigations

More Protocols? In fact, based the idea of introducing uncertainty in responses by multiple-to-one map, many different protocols can be constructed. Hopper-Blum Protocol defined on {0,1,2,3,4,5,6,7,8,9} [AsiaCrypt’ 2001] may also be modified. Extended models? Can we generalize the model to introduce uncertainty in the challenge side and both sides?