AuCPace: Efficient Verifier-Based PAKE protocol tailored for the IIoT - - PowerPoint PPT Presentation

aucpace efficient verifier based pake protocol tailored
SMART_READER_LITE
LIVE PREVIEW

AuCPace: Efficient Verifier-Based PAKE protocol tailored for the IIoT - - PowerPoint PPT Presentation

Products Solutions Services AuCPace: Efficient Verifier-Based PAKE protocol tailored for the IIoT Bjrn Haase, Benot Labrique Endress + Hauser Conducta GmbH & Co. KG. Slide 1 07/22/2019 B. Haase, B. Labrique AuCPace: Efficient


slide-1
SLIDE 1

07/22/2019 Products Solutions Services

AuCPace: Efficient Verifier-Based PAKE protocol tailored for the IIoT

Björn Haase, Benoît Labrique Endress + Hauser Conducta GmbH & Co. KG.

Slide 1

  • B. Haase, B. Labrique
slide-2
SLIDE 2

07/22/2019 AuCPace: Efficient Verifier-Based PAKE protocol tailored for the IIoT

Highly relevant topic in today’s HMI authentication systems

  • B. Haase, B. Labrique

Slide 2

slide-3
SLIDE 3

07/22/2019 AuCPace: Efficient Verifier-Based PAKE protocol tailored for the IIoT

Highly relevant topic in today’s HMI authentication systems

  • B. Haase, B. Labrique

Slide 3

Passwords …

slide-4
SLIDE 4

07/22/2019 AuCPace: Efficient Verifier-Based PAKE protocol tailored for the IIoT

Highly relevant topic in today’s HMI authentication systems

  • B. Haase, B. Labrique

Slide 4

Passwords …

This Talk: … In case that we are forced to accept that we can’t avoid them: How could we at least make their use as secure as possible … even when facing tight resource constraints.

slide-5
SLIDE 5

07/22/2019 AuCPace: Efficient Verifier-Based PAKE protocol tailored for the IIoT

Highly relevant topic in today’s HMI authentication systems

  • B. Haase, B. Labrique

Slide 5

Passwords …

This Talk: … In case that we are forced to accept that we can’t avoid them: How could we at least make their use as secure as possible … even when facing tight resource constraints.

System-level approach

slide-6
SLIDE 6

07/22/2019 AuCPace: Efficient Verifier-Based PAKE protocol tailored for the IIoT

Examples for process industry installations and field devices

  • B. Haase, B. Labrique

Slide 6

slide-7
SLIDE 7

07/22/2019 AuCPace: Efficient Verifier-Based PAKE protocol tailored for the IIoT

Examples for process industry installations and field devices

  • B. Haase, B. Labrique

Slide 7

Many installations: critical infrastructure Security should be mandatorily considered !

slide-8
SLIDE 8

07/22/2019

Security for industrial control equipment

  • Security: A rather new topic for industrial control
  • First step for security: focus on machine-to-machine interfaces and protocols.
  • HMI interfaces often considered in a second step only.
  • E+H: Remote HMI service access mostly provides an even larger attack vector!
  • Most widespread authentication mechanism for HMI interfaces 2019: Passwords

AuCPace: Efficient Verifier-Based PAKE protocol tailored for the IIoT Slide 8

  • B. Haase, B. Labrique
slide-9
SLIDE 9

07/22/2019

Requirements derived when planning the E+H BlueConnect App Architecture

  • In very important settings no PKI at the customer installation!

=> HMI security solution shall not rely on PKI.

  • Network access to central authentication servers is not always available

(Subnetworks “air-gapped” for security reasons / Devices integrated to legacy fieldbuses) => Support required for “offline” authentication with local storage of credentials

  • Some devices have extremely tight resource constraints.

(Intrinsically safe explosion protection by power and energy limits, See [HL17])

  • Devices might become physically accessible for the adversary.
  • We shall prepare the architecture for two-factor authentication, but need to accept that our

customers will often stick to the concept of “passwords” for HMI authentication only.

AuCPace: Efficient Verifier-Based PAKE protocol tailored for the IIoT Slide 9

  • B. Haase, B. Labrique
slide-10
SLIDE 10

07/22/2019 AuCPace: Efficient Verifier-Based PAKE protocol tailored for the IIoT

Result of our assessment

  • B. Haase, B. Labrique

Slide 10

We are forced to work with passwords?

Lets then do our very best to protect our customer’s installations!

We need a combination of two elements:

  • Verifier-based password authenticated key exchange (V-PAKE)
  • State-of-the-art memory-hard password hashes

Astonishingly there is no established industry standard solution!

slide-11
SLIDE 11

07/22/2019 AuCPace: Efficient Verifier-Based PAKE protocol tailored for the IIoT

Our protocol proposals

  • B. Haase, B. Labrique

Slide 11

  • “Augmented Composable Password-Authenticated Connection Establishment”

AuCPace

  • “Composable Password-Authenticated Connection Establishment”

CPace

  • Constructions were designed for allowing freely usable implementations avoiding patents in order

to make it suitable for more widespread use and, possibly, standardization.

  • Motivation for this paper: Security proof will be pre-condition for more widespread use.
  • This talk also considers preliminary results from the second review round carried out

in the context of the CFRG PAKE selection process.

slide-12
SLIDE 12

07/22/2019

Outline of this talk

  • AuCPace and CPace protocols and their security analysis
  • Comparison with other V-PAKE nominations from current CFRG selection process
  • Implementation strategy and results on ARM Cortex-M4 and Cortex-M0
  • Summary

AuCPace: Efficient Verifier-Based PAKE protocol tailored for the IIoT Slide 12

  • B. Haase, B. Labrique
slide-13
SLIDE 13

07/22/2019

CHES2017: Typical budget constraints for Ex-ia field devices

  • Ignition by hot surfaces  Limit peak supplied electrical power
  • Ignition by Sparks  Limit size of energy buffers (e.g. capacitors)

Add-on feature “HMI interface and security” will be granted only a small fraction of the available power / transient buffer budget!

Making Password Authenticated Key Exchange Suitable For Resource Constrained Industrial Control Devices Slide 13 Björn Haase, Benoît Labrique

28 28 1.5 1 0,5

slide-14
SLIDE 14

07/22/2019 AuCPace: Efficient Verifier-Based PAKE protocol tailored for the IIoT

Optimization strategy

  • B. Haase, B. Labrique

Slide 14

  • Protocol level
  • Allow for fast curves: X25519 Diffie-Hellman
  • “x-coordinate-only” solution avoids need for point compression
  • Secure quadratic twist of Curve25519: AuCPace simplified point verification
  • No hash over full protocol transcripts required
  • Refer the password hash to the powerful client
  • Curve25519 group element operations
  • Optimization of Elligator2 in comparison to [HL17] by using method from [BDL+11]
  • Fe25519 field operations
  • Optimized assembly-level code using register-allocating code-generator tool
slide-15
SLIDE 15

07/22/2019 AuCPace: Efficient Verifier-Based PAKE protocol tailored for the IIoT

The modular AuCPace protocol construction

  • B. Haase, B. Labrique

Slide 15

AuCPace is a two-party verifier-based Password-Authenticated Key Exchange (PAKE) protocol

slide-16
SLIDE 16

07/22/2019 AuCPace: Efficient Verifier-Based PAKE protocol tailored for the IIoT

The modular AuCPace protocol construction

  • B. Haase, B. Labrique

Slide 16

AuCPace is a two-party verifier-based Password-Authenticated Key Exchange (PAKE) protocol

  • Client side (e.g. tablet PC):

Clear-text password (“pw”) available

slide-17
SLIDE 17

07/22/2019 AuCPace: Efficient Verifier-Based PAKE protocol tailored for the IIoT

The modular AuCPace protocol construction

  • B. Haase, B. Labrique

Slide 17

AuCPace is a two-party verifier-based Password-Authenticated Key Exchange (PAKE) protocol

  • Client side (e.g. tablet PC):

Clear-text password (“pw”) available

Typically large memory, powerful computation capabilities. (scrypt/Argon2)

slide-18
SLIDE 18

07/22/2019 AuCPace: Efficient Verifier-Based PAKE protocol tailored for the IIoT

The modular AuCPace protocol construction

  • B. Haase, B. Labrique

Slide 18

AuCPace is a two-party verifier-based Password-Authenticated Key Exchange (PAKE) protocol

  • Client side (e.g. tablet PC):

Clear-text password (“pw”) available

  • Server side (e.g. field device)

Password verifier (“W”)

slide-19
SLIDE 19

07/22/2019 AuCPace: Efficient Verifier-Based PAKE protocol tailored for the IIoT

The modular AuCPace protocol construction

  • B. Haase, B. Labrique

Slide 19

AuCPace is a two-party verifier-based Password-Authenticated Key Exchange (PAKE) protocol

  • Client side (e.g. tablet PC):

Clear-text password (“pw”) available

  • Server side (e.g. field device)

Password verifier (“W”)

Strongly constrained device

slide-20
SLIDE 20

07/22/2019 AuCPace: Efficient Verifier-Based PAKE protocol tailored for the IIoT

The modular AuCPace protocol construction

  • B. Haase, B. Labrique

Slide 20

AuCPace is a two-party verifier-based Password-Authenticated Key Exchange (PAKE) protocol

  • Client side (e.g. tablet PC):

Clear-text password (“pw”) available

  • Server side (e.g. field device)

Password verifier (“W”) V-PAKE: Knowledge of password verifier W does not allow for taking over the client role.

slide-21
SLIDE 21

07/22/2019 AuCPace: Efficient Verifier-Based PAKE protocol tailored for the IIoT

The modular AuCPace protocol construction

  • B. Haase, B. Labrique

Slide 21

Three subcomponents within AuCPace

  • AuCPace augmentation layer
  • CPace balanced PAKE protocol
  • Optional explicit mutual authentication
slide-22
SLIDE 22

07/22/2019 AuCPace: Efficient Verifier-Based PAKE protocol tailored for the IIoT

AuCPace in a nutshell

  • B. Haase, B. Labrique

Slide 22

1. Password verifiers W 2. Session establishment

slide-23
SLIDE 23

07/22/2019 AuCPace: Efficient Verifier-Based PAKE protocol tailored for the IIoT

AuCPace in a nutshell

  • B. Haase, B. Labrique

Slide 23

The password verifier W is calculated in two steps.

slide-24
SLIDE 24

07/22/2019 AuCPace: Efficient Verifier-Based PAKE protocol tailored for the IIoT

AuCPace in a nutshell

  • B. Haase, B. Labrique

Slide 24

The password verifier W is calculated in two steps.

  • Memory hard password hash
slide-25
SLIDE 25

07/22/2019 AuCPace: Efficient Verifier-Based PAKE protocol tailored for the IIoT

AuCPace in a nutshell

  • B. Haase, B. Labrique

Slide 25

The password verifier W is calculated in two steps as a combination of a

  • Memory hard password hash

AuCPace25519: scrypt, s = (r = 8, N = 32768, p = 1)

slide-26
SLIDE 26

07/22/2019 AuCPace: Efficient Verifier-Based PAKE protocol tailored for the IIoT

AuCPace in a nutshell

  • B. Haase, B. Labrique

Slide 26

The password verifier W is calculated in two steps as a combination of a

  • Memory hard password hash
  • Fixed-Base-Point Diffie-Hellman group operation

AuCPace25519: X25519

slide-27
SLIDE 27

07/22/2019 AuCPace: Efficient Verifier-Based PAKE protocol tailored for the IIoT

AuCPace in a nutshell

  • B. Haase, B. Labrique

Slide 27

The password verifier W is calculated in two steps as a combination of a

  • Memory hard password hash
  • Fixed-Base-Point Diffie-Hellman group operation

AuCPace proofs explicitly consider non-prime-order groups with small co-factors

slide-28
SLIDE 28

07/22/2019 AuCPace: Efficient Verifier-Based PAKE protocol tailored for the IIoT

The modular AuCPace protocol construction

  • B. Haase, B. Labrique

Slide 28

Session key establishment: Client has access to clear-text password “pw” Server has access to verifier “W”

slide-29
SLIDE 29

07/22/2019 AuCPace: Efficient Verifier-Based PAKE protocol tailored for the IIoT

AuCPace in a nutshell

  • B. Haase, B. Labrique

Slide 29

slide-30
SLIDE 30

07/22/2019 AuCPace: Efficient Verifier-Based PAKE protocol tailored for the IIoT

AuCPace in a nutshell

  • B. Haase, B. Labrique

Slide 30

Server generates DH key pair (x , X) Ephemeral: “full augmentation” or static: “partial augmentation”

slide-31
SLIDE 31

07/22/2019 AuCPace: Efficient Verifier-Based PAKE protocol tailored for the IIoT

AuCPace in a nutshell

  • B. Haase, B. Labrique

Slide 31

Username and password hashing information is exchanged

slide-32
SLIDE 32

07/22/2019 AuCPace: Efficient Verifier-Based PAKE protocol tailored for the IIoT

AuCPace in a nutshell

  • B. Haase, B. Labrique

Slide 32

Password verifier lookup // Password hash calculation

slide-33
SLIDE 33

07/22/2019 AuCPace: Efficient Verifier-Based PAKE protocol tailored for the IIoT

AuCPace in a nutshell

  • B. Haase, B. Labrique

Slide 33

Client and server generate a shared DH-style secret PRS (Password-Related String)

slide-34
SLIDE 34

07/22/2019 AuCPace: Efficient Verifier-Based PAKE protocol tailored for the IIoT

AuCPace in a nutshell

  • B. Haase, B. Labrique

Slide 34

PRS is passed as parameter to the balanced CPace protocol substep

slide-35
SLIDE 35

07/22/2019 AuCPace: Efficient Verifier-Based PAKE protocol tailored for the IIoT

The modular AuCPace protocol construction

  • B. Haase, B. Labrique

Slide 35

Three subcomponents within AuCPace

slide-36
SLIDE 36

07/22/2019 AuCPace: Efficient Verifier-Based PAKE protocol tailored for the IIoT

AuCPace in a nutshell

  • B. Haase, B. Labrique

Slide 36

slide-37
SLIDE 37

07/22/2019 AuCPace: Efficient Verifier-Based PAKE protocol tailored for the IIoT

AuCPace in a nutshell

  • B. Haase, B. Labrique

Slide 37

Both sides calculate an ephemeral generator G for DH (as in PACE [BFK09])

slide-38
SLIDE 38

07/22/2019 AuCPace: Efficient Verifier-Based PAKE protocol tailored for the IIoT

AuCPace in a nutshell

  • B. Haase, B. Labrique

Slide 38

This also involves all relevant associated data to authenticate (“channel identifier” CI)

slide-39
SLIDE 39

07/22/2019 AuCPace: Efficient Verifier-Based PAKE protocol tailored for the IIoT

AuCPace in a nutshell

  • B. Haase, B. Labrique

Slide 39

AuCPace25519 uses Elligator2 and SHA512

slide-40
SLIDE 40

07/22/2019 AuCPace: Efficient Verifier-Based PAKE protocol tailored for the IIoT

AuCPace in a nutshell

  • B. Haase, B. Labrique

Slide 40

Diffie-Hellman step allows for x-coordinate-only algorithms

slide-41
SLIDE 41

07/22/2019 AuCPace: Efficient Verifier-Based PAKE protocol tailored for the IIoT

AuCPace in a nutshell

  • B. Haase, B. Labrique

Slide 41

Design allows for simplified point verification for groups with a secure quadratic twist.

slide-42
SLIDE 42

07/22/2019 AuCPace: Efficient Verifier-Based PAKE protocol tailored for the IIoT

AuCPace in a nutshell

  • B. Haase, B. Labrique

Slide 42

Generated session keys match iff both input parameters PRS and associated data “CI” match

slide-43
SLIDE 43

07/22/2019 AuCPace: Efficient Verifier-Based PAKE protocol tailored for the IIoT

AuCPace in a nutshell

  • B. Haase, B. Labrique

Slide 43

Optionally, session keys are explicitly authenticated

slide-44
SLIDE 44

07/22/2019 AuCPace: Efficient Verifier-Based PAKE protocol tailored for the IIoT

The modular AuCPace protocol construction

  • B. Haase, B. Labrique

Slide 44

Three subcomponents within AuCPace

slide-45
SLIDE 45

07/22/2019 AuCPace: Efficient Verifier-Based PAKE protocol tailored for the IIoT

AuCPace in a nutshell

  • B. Haase, B. Labrique

Slide 45

Note that no communication transcripts were necessary for generating the session keys and authentication messages!

slide-46
SLIDE 46

07/22/2019 AuCPace: Efficient Verifier-Based PAKE protocol tailored for the IIoT

The modular AuCPace protocol construction // Security analysis

  • B. Haase, B. Labrique

Slide 46

Three subcomponents within AuCPace

  • AuCPace augmentation layer
  • CPace balanced PAKE protocol
  • Optional explicit mutual authentication
slide-47
SLIDE 47

07/22/2019 AuCPace: Efficient Verifier-Based PAKE protocol tailored for the IIoT

The modular AuCPace protocol construction

  • B. Haase, B. Labrique

Slide 47

Security analysis – 1 – Proof that CPace protocol executions are indistinguishable from an ideal functionality [CHK+05] for an observing environment for all real-world adversaries under the specified hardness assumptions

slide-48
SLIDE 48

07/22/2019 AuCPace: Efficient Verifier-Based PAKE protocol tailored for the IIoT

The modular AuCPace protocol construction

  • B. Haase, B. Labrique

Slide 48

Security analysis – 2 – Replace CPace in AuCPace with

slide-49
SLIDE 49

07/22/2019 AuCPace: Efficient Verifier-Based PAKE protocol tailored for the IIoT

The modular AuCPace protocol construction

  • B. Haase, B. Labrique

Slide 49

Security analysis – 3 – Proof that execution of AuCPace protocol runs that use are indistinguishable from executions using the ideal functionality [GMR06]

slide-50
SLIDE 50

07/22/2019 AuCPace: Efficient Verifier-Based PAKE protocol tailored for the IIoT

The modular AuCPace protocol construction

  • B. Haase, B. Labrique

Slide 50

Security analysis – 4 – Conclusion: AuCPace is a secure verifier-based PAKE protocol

slide-51
SLIDE 51

07/22/2019 AuCPace: Efficient Verifier-Based PAKE protocol tailored for the IIoT

The modular AuCPace protocol construction

  • B. Haase, B. Labrique

Slide 51

Security analysis – 4 – Conclusion: AuCPace is a secure verifier-based PAKE protocol optionally allowing for explicit mutual authentication

  • f session keys
slide-52
SLIDE 52

07/22/2019 AuCPace: Efficient Verifier-Based PAKE protocol tailored for the IIoT

The modular AuCPace protocol construction

  • B. Haase, B. Labrique

Slide 52

AuCPace security assumptions:

  • Computational Diffie-Hellman problem (CDH)
  • Discrete log of S’ = Map2Point(s) unknown.
  • Programmable random oracle
  • Upon availability of an inverse map

Map2Point-1 security also maintained with respect to adaptive adversaries.

slide-53
SLIDE 53

07/22/2019 AuCPace: Efficient Verifier-Based PAKE protocol tailored for the IIoT

Concurrent sessions within the UC framework

  • B. Haase, B. Labrique

Slide 53

  • UC[Can01] allows for an unlimited number of concurrently executed protocol

instances distinguished by a session ID (sid) (sid,ssid pair in JUC [CR03]) sid 1 sid 2 sid n sid 1 sid 2 sid n

... ...

Party a Party b

Message: sid ## data

slide-54
SLIDE 54

07/22/2019 AuCPace: Efficient Verifier-Based PAKE protocol tailored for the IIoT

Concurrent sessions within the UC framework

  • B. Haase, B. Labrique

Slide 54

  • Straight-forward approach for establishing sid in the real world:

nonce-round prior to the protocol.

  • In the literature this complexity coming with any UC security proof is not always considered

to the same extend [JKX18,GMR06].

slide-55
SLIDE 55

07/22/2019 AuCPace: Efficient Verifier-Based PAKE protocol tailored for the IIoT

Concurrent sessions within the UC framework

  • B. Haase, B. Labrique

Slide 55

  • Proof technicality: sid needed for addressing purposes in the simulation environment

(the UC Turing machines don’t have something such as “concurrent TCP channels”) sid 1 sid 2 sid n sid 1 sid 2 sid n

... ...

Party a Party b

Message: sid ## data

slide-56
SLIDE 56

07/22/2019 AuCPace: Efficient Verifier-Based PAKE protocol tailored for the IIoT

Concurrent sessions within the UC framework

  • B. Haase, B. Labrique

Slide 56

  • Proof technicality: sid needed for addressing purposes in the simulation environment

(Need for addressing => Technical need for establishment prior to the protocol run) sid 1 sid 2 sid n sid 1 sid 2 sid n

... ...

Party a Party b

Message: sid ## data

slide-57
SLIDE 57

07/22/2019 AuCPace: Efficient Verifier-Based PAKE protocol tailored for the IIoT

Concurrent sessions within the UC framework

  • B. Haase, B. Labrique

Slide 57

  • Session IDs are sometimes also used for a session specific nonce value

(Here: No technical need for nonce agreement prior to entering the protocol) sid 1 sid 2 sid n sid 1 sid 2 sid n

... ...

Party a Party b

Message: sid ## data

slide-58
SLIDE 58

07/22/2019 AuCPace: Efficient Verifier-Based PAKE protocol tailored for the IIoT

Use of the UC session ID as ephemeral nonce value in the AuCPace protocol

  • B. Haase, B. Labrique

Slide 58

  • AuCPace uses sid as nonce
  • sid prepended to hash inputs

=> outputs become ephemeral => different sid never share queries to Küsters, Tüngerthal and Rausch [KTR13]: doing so is important for composability guarantees when combining joint state with global random oracles (IITM model).

slide-59
SLIDE 59

07/22/2019 AuCPace: Efficient Verifier-Based PAKE protocol tailored for the IIoT

Comparison of different PAKE protocols

  • B. Haase, B. Labrique

Slide 59

Following slides: Comparison of AuCPace with the other augmented PAKE protocols that come with proven forward security.

  • VTBPEKE:

Pointcheval and Wang [PW17]

  • OPAQUE:

Jarecki, Krawczyk and Xu [JKX18] Other related V-PAKE protocols:

  • BSPAKE, SPAKE2+:

(no security proof provided)

slide-60
SLIDE 60

07/22/2019 AuCPace: Efficient Verifier-Based PAKE protocol tailored for the IIoT

Comparison of different PAKE protocols

  • B. Haase, B. Labrique

Slide 60

Following slides: Comparison of AuCPace with the other augmented PAKE protocols that come with proven forward security.

  • VTBPEKE:

Pointcheval and Wang [PW17]

  • OPAQUE:

Jarecki, Krawczyk and Xu [JKX18] Other related V-PAKE protocols:

  • BSPAKE, SPAKE2+:

(no security proof provided)

Protocols nominated in the currently ongoing PAKE selection process at CFRG

slide-61
SLIDE 61

07/22/2019 AuCPace: Efficient Verifier-Based PAKE protocol tailored for the IIoT

Efficiency comparison of different PAKE protocols

  • B. Haase, B. Labrique

Slide 61

slide-62
SLIDE 62

07/22/2019 AuCPace: Efficient Verifier-Based PAKE protocol tailored for the IIoT

Efficiency comparison of different PAKE protocols

  • B. Haase, B. Labrique

Slide 62

AuCPace and OPAQUE provide stronger security guarantees than VTBPEKE by offering pre-computation attack resistance and universal composability. In comparison to OPAQUE, AuCPace considers a more powerful adaptive adversary model.

slide-63
SLIDE 63

07/22/2019 AuCPace: Efficient Verifier-Based PAKE protocol tailored for the IIoT

Pre-computation attack resistance option of AuCPace

  • B. Haase, B. Labrique

Slide 63

  • Pre-computation attack resistance as introduced by Jarecki, Krawczyk and Xu [JKX18]
  • The salt value for password hashing is kept secret from the adversary.
  • Offline attacks become possible only after stealing the password database.
  • See Appendix C of the updated eprint paper version as prepared for

CFRG PAKE selection process (https://eprint.iacr.org/2018/286.pdf)

  • Cost of this additional security feature for AuCPace:

+1 scalar multiplication for server, +2 scalar multiplications + 1 inversion for client.

slide-64
SLIDE 64

07/22/2019 AuCPace: Efficient Verifier-Based PAKE protocol tailored for the IIoT

Efficiency comparison of different PAKE protocols

  • B. Haase, B. Labrique

Slide 64

OPAQUE and VTBPEKE are monolithic constructions and merge authentication and session key generation. Require one message less than AuCPace.

slide-65
SLIDE 65

07/22/2019 AuCPace: Efficient Verifier-Based PAKE protocol tailored for the IIoT

Efficiency comparison of different PAKE protocols

  • B. Haase, B. Labrique

Slide 65

For OPAQUE the parallelism comes at the cost of significantly larger password verifiers, even when considering point compression.

slide-66
SLIDE 66

07/22/2019 AuCPace: Efficient Verifier-Based PAKE protocol tailored for the IIoT

Efficiency comparison of different PAKE protocols

  • B. Haase, B. Labrique

Slide 66

AuCPace needs particularly little computational resources on constrained servers in the partially augmented configuration. Main design target for our specific

  • setting. [HL17]
slide-67
SLIDE 67

07/22/2019 AuCPace: Efficient Verifier-Based PAKE protocol tailored for the IIoT

Efficiency comparison of different PAKE protocols

  • B. Haase, B. Labrique

Slide 67

Unlike VTBPEKE both, AuCPace and OPAQUE don’t mandatorily require explicit mutual authentication. In case that explicit mutual authentication is not required by the application, one communication round could be avoided.

slide-68
SLIDE 68

07/22/2019 AuCPace: Efficient Verifier-Based PAKE protocol tailored for the IIoT

Efficiency comparison of different PAKE protocols

  • B. Haase, B. Labrique

Slide 68

AuCPace: modular construction Separation into an augmentation layer and balanced CPace. Possible advantage for V-PAKE integration into transport layer User account complexity of augmented PAKE could be better kept away from transport layer software components.

slide-69
SLIDE 69

07/22/2019 Considerations regarding PAKE integration into TLS

CFRG PAKE selection process: Suggestion for augmented PAKE (V-PAKE)

  • B. Haase

Slide 69

Client Server TLS implements a tunneling mechanism for authentication message exchange TLS implements UC-secure balanced PAKE CPace UC-Secure “augmentation layer” establishes ephemeral PRS on both sides using tunneled information messages in the TLS handshake and post-handshake phases.

GUI client (e.g. Web server) TLS client with CPace V-PAKE authentication GUI handler Implements AuCPace augmentation layer Implements GUI masks for login Arranges for account management (e.g. password changes) TCP /IP TLS server with CPace Gui server V-PAKE server (with user credentials database) Implements AuCPace augmentation layer TCP /IP PRS PRS

slide-70
SLIDE 70

07/22/2019 Considerations regarding PAKE integration into TLS

Suggestion

  • B. Haase

Slide 70

Client Server Future extensions (e.g. “UC-Secure smart-card-based authentication”, “UC-Secure fingerprint-based” authentication, RADIUS-server based authentication) could use the same TLS-CPace APIs for future extensions without need of modification of the TLS stack core. Different ways of calculating the PRS input to CPace will be possible. TLS-CPace just manages session confidentiality, integrity, forward secrecy and authenticates PRS.

GUI client (e.g. Web browser) TLS client with CPace V-PAKE + Smart-Card GUI handler PRS contains Smart-Card based authenticator in addition/as replacement to user password TCP /IP TLS server with CPace Web server V-PAKE server (with user credentials database) Requests Smart-Card authentication in addition/as replacement to password. TCP /IP PRS PRS

slide-71
SLIDE 71

07/22/2019 Considerations regarding PAKE integration into TLS

Machine-Machine balanced Use-Case

  • B. Haase

Slide 71

  • Machine/Machine interfaces could use CPace without an augmentation layer based on

a pre-shared secret “PRS” which may be of low entropy.

TLS client with CPace TCP /IP TLS server with CPace TCP /IP Low-entropy secret PRS Low-entropy secret PRS

slide-72
SLIDE 72

07/22/2019 AuCPace: Efficient Verifier-Based PAKE protocol tailored for the IIoT

Efficiency comparison of different PAKE protocols

  • B. Haase, B. Labrique

Slide 72

AuCPace specifically designed for avoiding implementation pitfalls and for ease-of- implementation

slide-73
SLIDE 73

07/22/2019 AuCPace: Efficient Verifier-Based PAKE protocol tailored for the IIoT

Improvements regarding Elligator2 in comparison to [HL17]

  • B. Haase, B. Labrique

Slide 73

  • Standard (naive) implementation of Elligator2 [BHKL13] requires two separate field

exponentiations (one for the inverse and one for the Legendre symbol).

  • Using the inverse square root algorithm of [BDL+11]: one single exponentiation.
  • Improvement accounts for about 4% of speed/power improvement regarding the

balanced CPace protocol on a Cortex M0

  • (Recall Riad Wahby‘s talk yesterday)
slide-74
SLIDE 74

07/22/2019 AuCPace: Efficient Verifier-Based PAKE protocol tailored for the IIoT

Fe25519 field operations on ARM Cortex M4

  • B. Haase, B. Labrique

Slide 74

  • Schoolbook multiplication strategy
  • Sequence of partial word products optimized for

keeping input operands and partial results in registers

  • Important difference in comparison to previous speed

record Hayato Fujii and Diego Aranha [FA17]: Merging integer arithmetic with reduction

  • A+B, A-B, A + 121666 B as inline assembly
slide-75
SLIDE 75

07/22/2019 AuCPace: Efficient Verifier-Based PAKE protocol tailored for the IIoT

Fe25519 field operations on ARM Cortex M4

  • B. Haase, B. Labrique

Slide 75

  • Schoolbook multiplication strategy
  • Sequence of partial word products optimized for

keeping input operands and partial results in registers

  • Important difference in comparison to previous speed

record [FA17]: Merging integer arithmetic with reduction

  • A+B, A-B, A + 121666 B as inline assembly

Assembly code created by use

  • f automatic code generator

handling register allocation. (correctness issue!)

slide-76
SLIDE 76

07/22/2019 AuCPace: Efficient Verifier-Based PAKE protocol tailored for the IIoT

Experimental results for fe25519 field operations

  • B. Haase, B. Labrique

Slide 76

  • Significant cycle-count improvement in comparison to previous speed record [FA17]
slide-77
SLIDE 77

07/22/2019 AuCPace: Efficient Verifier-Based PAKE protocol tailored for the IIoT

Speed results for X25519 on Cortex M0 and Cortex M4

  • B. Haase, B. Labrique

Slide 77

  • Speed of X25519 competitive even in comparison with solutions using endomorphisms.
slide-78
SLIDE 78

07/22/2019 AuCPace: Efficient Verifier-Based PAKE protocol tailored for the IIoT

Speed results for X25519 and AuCPace

  • B. Haase, B. Labrique

Slide 78

  • Speed of our X25519 competitive even in comparison with solutions using endomorphisms.

Update August 2019: New X25519 speed record by Emil Lenngren [LEN18] Full X25519 in assembly using non-standard ABI function calls passing full fe25519 operands in registers. => even fewer operand load/store operations

slide-79
SLIDE 79

07/22/2019 AuCPace: Efficient Verifier-Based PAKE protocol tailored for the IIoT

RAM/ROM requirements for AuCPace

  • B. Haase, B. Labrique

Slide 79

slide-80
SLIDE 80

07/22/2019 AuCPace: Efficient Verifier-Based PAKE protocol tailored for the IIoT

Summary

  • B. Haase, B. Labrique

Slide 80

  • If you cannot avoid using password for remote access authentication, we recommend:

V-PAKE + memory hard password hashing

  • Result of our system-level optimization strategy for constrained servers:

AuCPace and CPace

  • AuCPace / CPace analysis in the UC framework
  • AuCPace25519 and X25519 very efficient on ARM Cortex-M0 and M4, competitive even with

the fastest known approaches benefiting from endomorphisms. We thank all reviewers/referees from CHES and CFRG for their care with the manuscript and the constructive and helpful feedback.

slide-81
SLIDE 81

07/22/2019 Products Solutions Services

Updates from summer 2019 included in eprint version of the TCHES paper https://eprint.iacr.org/2018/286.pdf (pre-computation attack resistance option)

Thank you very much for your attention

Slide 81

  • B. Haase, B. Labrique