Download presentation
Presentation is loading. Please wait.
1
BROADCAST AUTHENTICATION
TESLA EMMS Dr. Attila A. Yavuz CS/ECE 519/ Adv Applied Cryptography
2
What Is Broadcast Authentication?
One sender; multiple receivers All receivers need to authenticate messages from the sender.
3
Challenges in Broadcast Authentication
Can we use symmetric cryptography in the same way as in point-to-point authentication? How about public key cryptography? Effectiveness? Cost? Research in broadcast authentication Reduce the number of public key cryptographic operations
4
Outline Two schemes TESLA EMSS Sender authentication
Strong loss robustness High scalability Minimal overhead (-) Lack of immediate verification EMSS Non-repudiation High loss robustness Low overhead
5
TESLA – Overview Timed Efficient Stream Loss–tolerant Authentication
Based on timed and delayed release of keys by the sender High level ideas Sender commits to a random key K and transmits the commitment to the receivers without revealing it Sender attaches a MAC to the next packet Pi with K as the MAC key Sender releases the key in packet Pi+1 and receiver uses this key K to verify Pi
6
TESLA – Scheme I Each packet Pi+1 authenticates Pi Problems?
Ki’=F’(Ki) Each packet Pi+1 authenticates Pi Problems? Security? Robustness?
7
TESLA – Scheme I (Cont’d )
If attacker gets Pi +1 before receiver gets Pi, it can forge Pi Security Condition ArrTi + t < Ti +1 Sender’s clock is no more than t seconds ahead of that of the receivers One simple way: constant data rate Packet loss not tolerated
8
TESLA – Scheme II Generate a sequence of keys {Ki} with one-way function F Randomly generate Kn Ki = Fn-i(Kn) Commitment Ko = Fn (Kn) Attacker cannot invert F or compute any Kj given Ki, where j>i Receiver can compute all Kj from Ki, where j < i Kj = Fi-j (Ki); K’i = F’ (Ki)
9
TESLA – Scheme II (Cont’d)
10
TESLA – Scheme III Remaining problems with Scheme II Scheme III
Inefficient for fast packet rates Sender cannot send Pi+1 until all receivers receive Pi Scheme III Does not require that sender wait for receiver to get Pi before it sends Pi+1 Basic idea: Disclose Ki in Pi+d instead of Pi+1
11
TESLA – Scheme III (Cont’d)
Disclosure delay d = (tMax + dNMax)r tMax: maximum clock discrepancy dNMax: maximum network delay r: packet rate Security Condition: ArrTi + t < Ti+d
12
TESLA – Scheme IV Deal with dynamic transmission rates Idea
Divide time into intervals Use the same Ki to compute the MAC of all packets in the same interval i All packets in the same interval disclose the key Ki-d Achieve key disclosure based on intervals rather than on packet indexes
13
TESLA – Scheme IV (Cont’d)
14
TESLA – Scheme IV (Cont’d)
Interval index: i = (t – To)/T Ki’ = F’(Ki) for each packet in interval i Pj = <Mj, i, Ki-d, MAC(Ki’, Mj, i, Ki-d) >
15
TESLA – Scheme V In Scheme IV: Scheme V
A small d will force remote users to drop packets A large d will cause unacceptable delay for fast receivers Scheme V Use multiple authentication chains with different values of d Receiver verifies one security condition for each chain Ci, and drops the packet if none is satisfied
16
TESLA--Immediate Authentication
Mj+vd can be immediately authenticated once packet j is authenticated Not to be confused with packet j+vd being authenticated
17
EMSS Efficient Multichained Streamed Signature Useful where
Non Repudiation required Time synchronization may be a problem Based on signing a small number of special packets in the stream Each packet linked to a signed packet via multiple hash chains
18
EMSS – Basic Signature Scheme
19
EMSS – Basic Signature Scheme (Cont’d)
Sender sends periodic signature packets Pi is verifiable if there exists a path from Pi to any signature packet Sj
20
EMSS – Extended Scheme More resiliency:
Split hash into k chunks, where any k’ chunks are sufficient to allow the receivers to validate the information Rabin’s Information Dispersal Algorithm Sosme upper few bits of hash Requires any k’ out of k packets to arrive More robust
Similar presentations
© 2024 SlidePlayer.com. Inc.
All rights reserved.