Download presentation
Presentation is loading. Please wait.
1
Sec final project A Preposition Secret Sharing Scheme for Message Authentication in Broadcast Networks 90321019 王怡君
2
Outline Introduction Methods for Message Authentication A key transport scheme for message authentication
3
1.Introduction Four important objective of information security Authentication Confidentiality ( 可靠度 ) Data integrity ( 資料完整 ) Non-repudiation
4
Message Protocol AB Message M Communication channel Figure1. Two-party communication Party A is sender of message M,and party B is receiver. B would require one or more of the message : 1. Authentication of the message 2. Integrity of the data include in the message 3. Authentication of sender A
5
Authentication method can be in two group Message authentication – Provides assurance of the identity of A – Includes an evidence of data integrity Entity authentication – To avoid replay attacks, time-variant data (ex : time stamps) can be added to the message.
6
2.Method for Message Authentication arbitrary length fixed length (use hash function) In cryptographic applications, the hash value is consider to be a shorter representation of the actual message. Hash function are classified into two groups : Unkeyed hash function(only input=>message) Keyed hash function(two input=>message&secret key)
7
The keyed hash functions that are used for message authentication are grouped under Message Authentication Codes (MACs) ( 訊息認證碼 ) Unkeyed hash function => Manipulation Detection Codes (MDCs) ( 轉換探測碼 ) MACs can be customize, constructed using block ciphers.
8
h(M) : hashing of message M with an MDC h k (M) : hashing of message M with an MAC with key K M 1 ||M 2 : Concatenation of message M 1 with message M 2 E k (M) : Encryption of massage M with key K S k private : Signing of message M with private key K private
9
Method 1. Using a MAC M||h k (M)
10
Method 2. Encrypting the message
11
Method 3. Signing the message
12
disadvantage Potential cryptographic weakness Lack of capability to authenticate message with different keys
13
Potential cryptographic weakness(1) MACs : Attack on the key space For a key size of t bits and a fixed input,the probability of finding correct n-bit MAC is about 2^t Attack on MAC value If hacker can determine the MACs key, he can create a MAC value for any message.
14
Potential cryptographic weakness(2) Encryption : If encryption is used along for message authentication, it is vulnerable to brute- force attacks. In the recent years,several powerful attacks have been developed against modern ciphers. (More attack like linear or differential cryptanalysis allow key recovery with less processor time. )
15
Potential cryptographic weakness(3) Digital signatures Form a theoretical viewpoint, no popular public-key signature algorithm is proven to be secure. Their security is base on the difficulty of computing discrete logarithm or factoring large number. With a fixed public/private key pair,attacks are possible using the public key of signatures on message.
16
Lack of capability to authenticate message with different key In some applications, there may be a need to send a message to a specific group of receiver. We would like to have a scheme that makes it possible to used a new key for each new message and to generate different keys for different group of receiver.
17
3. A key transport scheme for message authentication Threshold schemes A Preposition Secret Sharing Scheme for key transport Security analysis
18
Threshold schemes A (t,n) threshold scheme (t<=n) is the method by which n secret sharing S i (1<= i <= n),are computed from S in such a way that least t shares are required to reconstruct S. Ex: Bank manager divide combination of the bank safe among his five teller in such a way that any two tellers can open the safe.
19
In Shamir ’ s (t,n) threshold scheme 1.Choose a prime p large than n and the secret S 2.Define S to be the constant a 0 3.Construct f(x) by selecting (t-1) random coefficients a 1,…,a t-1 4.Compute the shares by evaluate f(x) at n distinct point, and distribute them to n user
20
Useful Group signatures Key recovery Discussing the application of threshold scheme to key distribution in broadcast network. If (t-1) shares are broadcast, the secret can be constructed by any receiver using the (t-1) shares and its distinct shares. Form a security viewpoint, the hacker needs to know only a signal share to brake the system. Use Shamir ’ s threshold in new way …
21
A Preposition Secret Sharing Scheme for key transport Simple example Three levels Activating share Level1 : one common share Level2 : an additional common share Level3 : a unique additional share
22
Let p = 31
23
3.3 security analysis In the scheme, the shared is used to generate a message authenticator which is broadcast with the message and the activating share. For small value of t (low polynomials), the system may be exposed to brute- force attacks.
24
t = 2 The system is most vulnerable if first degree polynomials are used. t > 2 The security is based on the difficulty of estimating the prepositioned information in the receiver.
25
Several modifications are possible to increase the robustness Define the authentication key as a function of shared secret. Make t a time-dependent secret system parameter “ Mask ” the activating share before distribution Add redundant activating shares.
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.