Title: Fault Injection into Railway Target
1Digital Signaturesin Fault-Tolerant Protocols
Klaus Echtle ICB, University of
Duisburg-Essenechtle_at_dc.uni-due.de
2Reason for using signatures
Who has sent what ?
- Security, protection against attacks
- Safety, fault tolerance, protection against
faults
Yes and no.
Common objectives ?
Common techniques ?
Yes
no.
and
3Objective 1 in fault tol. Origin
Identify origin of (wrong or correct)
information. Fault in original sender ?
4Objective 1 in fault tol. Origin
... otherwise (without signatures)
?
detection
5Objective 2 in fault tol. Forwarding
Fault in forwarding node ?
Distant fault detection.
6Objective 2 in fault tol. Forwarding
... otherwise (without signatures)
detection
7Objective 3 in fault tol. Replication
Replication fault by original sender ?(Byzantine
behaviour)
s
s
8Objective 3 in fault tol. Replication
... otherwise(withoutsignatures)
9Usage of signatures in protocols
- Signed messages agreement protocol
- Membership protocol of Flaviu Cristian
- Reliable broadcast protocol of Flaviu Cristian
- Pendulum protocol for agreement
- and many others
10Benefit of signatures
Agreement protocols, n nodes, f of which are
faulty.
Protocol execution by m messages in p phases.
11Benefit of signatures
12Benefit of signatures
n 11 nodes
13Signature techniques for fault tolerance
- Cryptographically strong signatures
- Efficient signaturesno intelligent attacks
just arbitrary stupid faults
14Simple CRC-based signature
not individual
NeverthelessUndetectable modificationis very
unlikely
Send signatured message
contents
sender id
Check signature
15Signature based on multiplication
individual
Generate
Choose a and b, calculate c a ? b
mod 2d
16Signature schemes for fault tolerance
17Relative signature
firstletter
secondletter
thirdletter
18Relative signature
f, g global
actual sign.
f ', g, ?' global
authenticator
Check
19Properties of relative signatures
All functions are global ? no key distribution.
? appropriate for dynamic networks(nodes
entering and leaving),applied in network
membership protocols)
Functions are one way? faulty nodes cannot
steal sender identifiers.
Nodes create identifiers themselves? redundant
identifier space and creation during startup
only prevent creation of multiple identifiers
per node
20Relative signatures
If receiver finds faulty message contents then
all messages from respective sendermay be
ignored.
Similarities in security field ? restriction to
relative comparison,no key distribution,etc.
21Unique signature UniSig
Guarantee both signed messagesare identical (in
the context of a sequence number) no message
exchange among the receivers !
22UniSig
23UniSig functions
Choose 60-bit number odd b.Calculate d
(p q) ? a ? b mod 260.
24UniSig functions
c(n) (p q) ? a ? n
s x ? (p q) ? a ? nnew
25UniSig functions
Sent
26Properties of UniSig
Unique signed message for each sequence number.
- Implementation such that violations are very
unlikely,no copies of pair (n, c) etc. - absolute adressing
- UniSig program created by redundant nodes
- once pair (n, c) is lost? recovery by redundant
nodes - etc.
27Applying UniSig to protocol SM
- Distribute values (as in original SM)
- No need to distribute deviating values? fewer
messages (in the presence of faults)
- Co-signatures are necessary (need not be UniSig)
- f 1 phases (same as original SM),however
phases can be shorter (less messages)? protocol
can execute faster
28Applying UniSig to protocol SM
Worst-case 2n(n 1)(n 2)without UniSig n(n
1)2with UniSig
29UniSig
If receiver obtains UniSigned message, then it
knowns other receivers will not get a different
message in the same context.
Similarities in security field ? need for this
property ?chance to implement it ?
30Conclusion