Physically Restricted Authentication with Trusted Hardware Michael Kirkpatrick, Elisa Bertino Department of Computer Science 4 th Annual Workshop on Scalable.

Slides:



Advertisements
Similar presentations
The Diffie-Hellman Algorithm
Advertisements

Thomas S. Messerges, Ezzat A. Dabbish Motorola Labs Shin Seung Uk.
© 2004 Mobile VCE 3G © 2004 Mobile VCE 3G th October 2004 Regional Blackouts: Protection of Broadcast.
1 U NIVERSITY OF M ICHIGAN Reliable and Efficient PUF- Based Key Generation Using Pattern Matching Srini Devadas and Zdenek Paral (MIT), HOST 2011 Thomas.
Physical Unclonable Functions
NPLA: Network Prefix Level Authentication Ming Li,Yong Cui,Matti Siekkinen,Antti Ylä-Jääski Aalto University, Finland Tsinghua University, China.
TCP Performance in Wireless Multi-hop Networks Mario Gerla, Ken Tang, Rajive Bagrodia Wireless Adaptive Mobility Laboratory Computer Science Department.
URSA: Providing Ubiquitous and Robust Security Support for MANET
Trustworthy Services from Untrustworthy Components: Overview Fred B. Schneider Department of Computer Science Cornell University Ithaca, New York
Slender PUF Protocol Authentication by Substring Matching M. Majzoobi, M. Rostami, F. Koushanfar, D. Wallach, and S. Devadas* International Workshop on.
General Cryptographic Protocols (aka secure multi-party computation) Oded Goldreich Weizmann Institute of Science.
Fuzzy extractor based on universal hashes
Implementation of LSI for Privacy Enhancing Computation Kazue Sako, Sumio Morioka
Chapter 4: Security Policies Overview The nature of policies What they cover Policy languages The nature of mechanisms Types Secure vs. precise Underlying.
Secure Space: Location-based Secure Wireless Group Communication Arunesh Mishra, Suman Banerjee Department of Computer Science, University of Maryland,
An Operational Perspective on BGP Security Geoff Huston GROW WG IETF 63 August 2005.
Apr 22, 2003Mårten Trolin1 Agenda Course high-lights – Symmetric and asymmetric cryptography – Digital signatures and MACs – Certificates – Protocols Interactive.
Chapter 1 Introduction. Chapter Overview Overview of Operating Systems Secure Operating Systems Basic Concepts in Information Security Design of a Secure.
CMSC 414 Computer and Network Security Lecture 19 Jonathan Katz.
Secure Group Communications in Wireless Sensor Networks December 8, 2003 CS 526 Advance Internet and Web Systems Patrick D. Cook.
The Diffie-Hellman Algorithm Riley Lochridge April 11, 2003.
Trustworthy Services from Untrustworthy Components: Overview Fred B. Schneider Department of Computer Science Cornell University Ithaca, New York
RRB/STS ORNL Workshop Integrated Hardware/Software Security Support R. R. BrooksSam T. Sander Associate ProfessorAssistant Professor Holcombe Department.
Secure Embedded Processing through Hardware-assisted Run-time Monitoring Zubin Kumar.
Patterns for Secure Boot and Secure Storage in Computer Systems By: Hans L¨ohr, Ahmad-Reza Sadeghi, Marcel Winandy Horst G¨ortz Institute for IT Security,
Introduction to Secure Messaging The Open Group Messaging Forum April 30, 2003.
Hardware Support for Trustworthy Systems Ted Huffmire ACACES 2012 Fiuggi, Italy.
Protecting Cryptographic Keys from Memory Disclosure Attacks Presented by John Shu Shouhuai Xu and Keith Harrison UTSA, Dept. Computer Science.
Computer Science Open Research Questions Adversary models –Define/Formalize adversary models Need to incorporate characteristics of new technologies and.
GZ06 : Mobile and Adaptive Systems A Secure On-Demand Routing Protocol for Ad Hoc Networks Allan HUNT Wandao PUNYAPORN Yong CHENG Tingting OUYANG.
Protecting Internet Communications: Encryption  Encryption: Process of transforming plain text or data into cipher text that cannot be read by anyone.
1 UCR Hardware Security Primitives with focus on PUFs Slide credit: Srini Devedas and others.
Chapter 23 Internet Authentication Applications Kerberos Overview Initially developed at MIT Software utility available in both the public domain and.
Fall 2004/Lecture 201 Cryptography CS 555 Lecture 20-b Zero-Knowledge Proof.
Introduction to Public Key Infrastructure January 2004 CSG Meeting Jim Jokl.
Kyushu University Koji Inoue ICECS'061 Supporting A Dynamic Program Signature: An Intrusion Detection Framework for Microprocessors Koji Inoue Department.
Physically Unclonable Function– Based Security and Privacy in RFID Systems Leonid Bolotnyy and Gabriel Robins Dept. of Computer Science University of Virginia.
Presented by: Suparita Parakarn Kinzang Wangdi Research Report Presentation Computer Network Security.
Chapter 7 – Confidentiality Using Symmetric Encryption.
Copyright © cs-tutorial.com. Overview Introduction Architecture Implementation Evaluation.
Enforcing Cyber security in Mobile Applications – Public Sector Use Case SAPHINA MCHOME, VIOLA RUKIZA TANZANIA REVENUE AUTHORITY INFORMATION AND COMMUNICATION.
Ingredients of Information Security. - Who has access the asset? - Is the asset correct? - Is the asset accessible? …uncorrupted? …authentic?
CS453: Introduction to Information Security for E-Commerce Prof. Tom Horton.
Guidelines for Cryptographic Algorithm Agility Russ Housley IETF 89 - SAAG Session.
1 Security for distributed wireless sensor nodes Ingrid Verbauwhede Department of Electrical Engineering University of California Los Angeles
Traditional Security Issues Confidentiality –Prevent unauthorized access or reading of information Integrity –Insure that writing or operations are allowed.
Site Security Policy Case 01/19/ : Information Assurance Policy Douglas Hines, Jr.
Data Integrity Proofs in Cloud Storage Author: Sravan Kumar R and Ashutosh Saxena. Source: The Third International Conference on Communication Systems.
Security Issues in Distributed Sensor Networks Yi Sun Department of Computer Science and Electrical Engineering University of Maryland, Baltimore County.
Operating Systems: Wrap-Up Questions answered in this lecture: What is an Operating System? Why are operating systems so interesting? What techniques can.
Approaches for Ensuring Security and Privacy in Unplanned Ubiquitous Computing Environments V. Ramakrishna, Kevin Eustice, Matthew Schnaider Laboratory.
Zero Knowledge Proofs Matthew Pouliotte Anthony Pringle Cryptography November 22, 2005 “A proof is whatever convinces me.” -~ Shimon Even.
Interleaving and Collusion Attacks on a Dynamic Group Key Agreement Scheme for Low-Power Mobile Devices * Junghyun Nam 1, Juryon Paik 2, Jeeyeon Kim 2,
Chapter 19: Building Systems with Assurance Dr. Wayne Summers Department of Computer Science Columbus State University
Tamper Resistant Software: An Implementation By David Aucsmith, IAL In Information Hiding Workshop, RJ Anderson (ed), LNCS, 1174, pp , “Integrity.
Design of Physically Unclonable Functions Using FPGAs
Verifiable Mixing Protocol How can a mixer prove its integrity?
Impossibility proofs for RSA signatures in the standard model Pascal Paillier Topics in Cryptology – CT-RSA 2007.
LINUX Presented By Parvathy Subramanian. April 23, 2008LINUX, By Parvathy Subramanian2 Agenda ► Introduction ► Standard design for security systems ►
Feige-Fiat-Shamir Zero Knowledge Proof Based on difficulty of computing square roots mod a composite n Given two large primes p, q and n=p * q, computing.
1© Copyright 2012 EMC Corporation. All rights reserved. Authentication Manager Integration Services (AMIS) RSA Global Services Customer Presentation SP.
4. NCdisk SP-based SoC Architecture 5. NCdisk Security Protocol
Official levels of Computer Security
Chapter 19: Building Systems with Assurance
SPINS: Security Protocols for Sensor Networks
How to Mitigate the Consequences What are the Countermeasures?
SPINS: Security Protocols for Sensor Networks
Module 2 OBJECTIVE 14: Compare various security mechanisms.
Internal components of a computer.
Lightweight Security Scheme for Vehicle Tracking System Using CoAP
Presentation transcript:

Physically Restricted Authentication with Trusted Hardware Michael Kirkpatrick, Elisa Bertino Department of Computer Science 4 th Annual Workshop on Scalable Trusted Computing (STC)

Agenda Introduction Physically Unclonable Functions (PUFs) Design Requirements Protocols Future Work Conclusions

Agenda Introduction Physically Unclonable Functions (PUFs) Design Requirements Protocols Future Work Conclusions

Chicago Los Angeles Miami New York Introduction

Full access provided to trusted devices ▫Fine-grained access control at application layer Permit mobility of the device Mitigate insider threats Minimize computation overhead ▫Applicable for low-power embedded devices

Agenda Introduction Physically Unclonable Functions (PUFs) Design Requirements Protocols Future Work Conclusions

PUFs Functions ▫Given challenge C, provides response R ▫Output is consistent for same input Unclonable ▫Cannot be predicted, controlled, or duplicated Physical ▫HW instance resolves non-determinism

PUFs Counter Compare 1/0 C R C

Agenda Introduction Physically Unclonable Functions (PUFs) Design Requirements Protocols Future Work Conclusions

Design Requirements Avoid chain-of-trust assumptions ▫No PKI Zero-knowledge proof is critical ▫PUF behavior must be protected ▫Adaptation of Feige-Fiat-Shamir Intractability of modular square roots

Agenda Introduction Physically Unclonable Functions (PUFs) Design Requirements Protocols Future Work Conclusions

Protocols Installation & Commitment ▫Secret sharing for symmetric key K ▫Each administrator gets one C i ▫X i = R i  b i  GCD(X i,N) = 1

Protocols Authentication ▫C picks a random r ▫I* indicates a random set of C i ▫Accept if y 2 = +/- r 2 X X k 2

Agenda Introduction Physically Unclonable Functions (PUFs) Design Requirements Protocols Future Work Conclusions

Future Work Implementing PUFs ▫Trade-offs of size, performance, randomness ▫What vulnerabilities exist? Designing new protocols ▫PUF-based signatures ▫Zero-knowledge proofs without intractability assumptions Additional applications

Agenda Introduction Physically Unclonable Functions (PUFs) Design Requirements Protocols Future Work Conclusions

PUFs can enforce physical access control restrictions ▫Can be used where TPMs cannot Protection of PUF behavior is vital PUF-specific protocols and applications can help the technology grow