Advanced Security Constructions and Key Management - PowerPoint PPT Presentation

About This Presentation
Title:

Advanced Security Constructions and Key Management

Description:

Advanced Security Constructions and Key Management Class 16 Outline One-Time Signatures Lamport s signature Improved signature constructions Merkle-Winternitz ... – PowerPoint PPT presentation

Number of Views:337
Avg rating:3.0/5.0
Slides: 31
Provided by: Adrian372
Learn more at: http://www.cs.cmu.edu
Category:

less

Transcript and Presenter's Notes

Title: Advanced Security Constructions and Key Management


1
Advanced Security Constructionsand Key Management
  • Class 16

2
Outline
  • One-Time Signatures
  • Lamports signature
  • Improved signature constructions
  • Merkle-Winternitz Signature
  • Efficient Authenticators (amortize signature)
  • One-way chains (self-authenticating values)
  • Chained hashes
  • Merkle Hash Trees
  • Applications
  • Efficient short-lived certificates, S/Key
  • Untrusted external storage
  • Stream signatures (Gennaro, Rohatgi)
  • Zhou Haass key distribution

3
One-Time Signatures
  • Challenge digital signatures expensive for
    generation and verification
  • Goal amortize digital signature

4
One-Time Signatures
  • Use one-way functions without trapdoor
  • Efficient for signature generation and
    verification
  • Caveat can only use one time
  • Example 1-bit one-time signature
  • P0, P1 are public values (public key)
  • S0, S1 are private values (private key)

S0
P0
S0
S0
P
S1
P1
S1
S1
5
Lamports One-Time Signature
  • Uses 1-bit signature construction to sign
    multiple bits

S0
S0
S0
S0
Private values
Sign 0
P0
P0
P0
P0

Public values
P1
P1
P1
P1
S1
S1
S1
S1
Private values
Sign 1
Bit 0
Bit 1
Bit 2
Bit n
6
Improved Construction I
  • Uses 1-bit signature construction to sign
    multiple bits

c0
c0
c0
S0
S0
S0
S0


p0
p0
p0
P0
P0
P0
P0
Bit 0
Bit 1
Bit 2
Bit n
Bit 0
Bit 1
Bit log(n)
Sign message
Checksum bits encode of signature bits 0
7
Improved Construction II
  • Lamport signature has high overhead
  • Goal reduce size of public and private key
  • Approach use one-way hash chains
  • S1 F( S0 )

Sig(0)
Sig(1)
Sig(2)
Sig(3)
Signature chain
S2
P
S3
S0
S1
8
Merkle-Winternitz Construction
  • Intuition encode sum of checksum chain

Signature Bits 0,1
S2
S3
S0
S1
Signature Bits 2,3
S2
S3
S0
S1
Signature Bits 4,5
S2
P
S3
S0
S1
Checksum Bits 0,1
C1
C0
C3
C2
Checksum Bits 2,3
C1
C0
C3
C2
9
Efficient Authenticators
  • One-way chains
  • Chained hashes
  • Merkle hash trees

10
Recall One-Way Hash Chains?
  • Versatile cryptographic primitive
  • Construction
  • Pick random rN and public one-way function F
  • ri F(ri1)
  • Secret value rN , public value r0
  • Properties
  • Use in reverse order of construction r1 , r2
    rN
  • Infeasible to derive ri from rj (jlti)
  • Efficiently authenticate ri knowing rj
    (jlti)verify rj Fi-j(ri)
  • Robust to missing values

F
F
F
F
r6
r7
r5
11
One-Way Chain Application
  • S/Key one-time password system
  • Goal
  • Use a different password at every login
  • Server cannot derive password for next login
  • Solution one-way chain
  • Pick random password PL
  • Prepare sequence of passwords Pi F(Pi1 )
  • Use passwords P0 , P1 , , PL-1 , PL
  • Server can easily authenticate user

F
F
F
F
p6
p7
p5
12
Chained Hashes
  • More general construction than one-way hash
    chains
  • Useful for authenticating a sequence of data
    values D0 , D1 , , DN
  • H authenticates entire chain

DN-1
DN-2
D0

DN
HN-1
H0
H
HN-2
H( DN-1 HN-1 )
H(DN)
13
Merkle Hash Trees
  • Authenticate a sequence of data values D0 , D1 ,
    , DN
  • Construct binary tree over data values

T0
T1
T2
T3
T4
T5
T6
D0
D2
D3
D1
D4
D6
D7
D5
14
Merkle Hash Trees II
  • Verifier knows T0
  • How can verifier authenticate leaf Di ?
  • Solution recompute T0 using Di
  • Example authenticate D2 , send D3 T3 T2
  • Verify T0 H( H( T3 H( D2 D3 )) T2 )

T0
T1
T2
T3
T4
T5
T6
D0
D2
D3
D1
D4
D6
D7
D5
15
Untrusted External Storage
  • Problem how can we store memory of a secure
    coprocessor in untrusted storage?
  • Solution construct Merkle hash tree over all
    memory pages

Mallorys Storage
Secure Coprocessor
Small persistent storage
16
Stream Signatures
  • Gennaro Rohatgi, Crypto 97
  • Problem
  • Sender sends a sequence of packets to receiver
  • Receiver wants to immediately authenticate each
    packet
  • Efficient authentication of packets
  • On-line case (real-time data), off-line case
    (stored data)

17
Off-line Case
  • Sender know entire stream before sending
  • Use chained hashes, precompute Hi
  • Digitally sign the first packet ?(H)
  • Each packet authenticates the next packet

PN-1
PN-2
P0

PN
HN-1
H0
H
HN-2
18
On-line Case
  • Use a one-time signature to authenticate packets
  • Sender has regular signature (SK,PK)
  • Sender signs public key of one-time signature
    ?SK(pk0)
  • Sign packet Pi and one-time public key pki with
    pki-1

P0
P1
pk1
pk2
?sk0(P0 pk1)
?sk1(P1 pk2)
19
Stream Signature Discussion
  • Computation and communication cost
  • Robustness to DoS attack (packet injection)
  • Robustness to packet loss
  • Loss of a single packet prevents authentication
    of subsequent packets
  • How could we improve the loss robustness?

20
Alternative Stream Signature
  • Add hashes to later packets
  • Periodically send a signature packet

21
Improving Robustness
Packet 1
Packet 2
Packet 3
Hash(P1)
Hash(P2)
Signature Packet
Hash(P3)
Signature
22
Securing Ad Hoc Networks
  • Zhou Haas, IEEE Network Magazine 99
  • Security goals
  • Availability
  • Confidentiality
  • Integrity
  • Authentication
  • Secure Routing
  • Key management

23
Attacker Assumptions
  • Attacker can physically compromise nodes
  • Mobile Adversary
  • Adversary can compromise any node
  • Temporarily compromises node, then moves on to
    next node
  • Every node may be compromised at one time
  • Attacker compromises at most t nodes at any one
    moment

24
Secure Routing
  • Authenticate all routing messages, to prevent
    external attackers
  • Proposes to use multiple paths to tolerate
    internal attackers
  • Drawback internal attackers could easily fake
    multiple paths

25
Key Management Service
  • Consider public-key infrastructure (PKI)
  • Everybody trusts certification authority (CA)
  • CA authenticates and signs public keys of other
    nodes
  • PKI drawbacks
  • Revocation requires on-line PKI
  • Single point of failure, CA replication increases
    vulnerability to node compromise
  • Solution distributed CA

26
Distributed CA Model
  • Private CA key is shared among set of nodes
  • Signing needs coalition of t1 correct nodes
  • Secret sharing prevents t malicious nodes from
    reconstructing CA private key
  • Requirements for key management service
  • Robustness service available to answer requests
    correctly
  • Confidentiality adversary never learns CA
    private key

27
Threshold Cryptography
  • Share secret S among n nodes, require t1 nodes
    for reconstruction
  • (n, t1) secret sharing scheme
  • Share private key K among n nodes, require t1
    nodes for signing
  • (n, t1) threshold signature scheme
  • Node i gets share ki
  • For signing, nodes send partial signature to
    combiner
  • Combiner collects 2t1 partial signatures

28
Proactive Security
  • Use share refreshing against mobile adversaries
  • If (s1, s2, , sn) is a sharing of k, and(s1,
    s2, , sn) is a sharing of k,then (s1 s1,
    s2 s2, , sn sn) is a correct sharing of k
    k
  • Trick, set k 0, so new sharing also represents
    k

29
Share Refreshing
s1
s2
s3
sn
30
Discussion
  • How can share refreshing tolerate faulty nodes?
  • How can we tolerate compromised combiner?
  • Who decides to be a combiner?
  • How can we bootstrap this system?
  • How can we introduce a new node?
  • Why should node sign a message?
  • How does node authenticate message?
  • Is signature combination expensive if we have t
    faulty nodes?
Write a Comment
User Comments (0)
About PowerShow.com