SLIDE 1 Cliptography: Clipping The Power Of Kleptographic Attacks
Qiang Tang New Jersey Institute of Technology
Joint work with Alexander Russell(UConn), Moti Yung(Snapchat & Columbia), and Hong-Sheng Zhou(VCU)
SLIDE 2
Modern Crypto
SLIDE 3
- “Precise” models to capture attacks
- “Rigorous” proofs to establish security
Modern Crypto
SLIDE 4
- “Precise” models to capture attacks
- “Rigorous” proofs to establish security
Modern Crypto
Still long way to go
SLIDE 5 The “Security Divide”
crypto
security
SLIDE 6
An Implicit Assumption
SLIDE 7
An Implicit Assumption
Tradition: after cryptographers design the crypto tools, someone will implement them correctly for use
SLIDE 8
Implementations are Untrustworthy
SLIDE 9
Implementations are Untrustworthy
SLIDE 10
Implementations are Untrustworthy
SLIDE 11
Implementations are Untrustworthy
SLIDE 12
- The science of stealing information securely and
subliminally from black-box cryptographic implementations
Kleptography
Young & Yung ’96, ’97
SLIDE 13 RSA Key Generation
RSA KeyGen
SLIDE 14 A Subverted Implementation
RSA KeyGen
SLIDE 15 A Subverted Implementation
RSA KeyGenz (A “backdoor”)
SLIDE 16 The Attack:
RSA KeyGenz (A “backdoor”)
SLIDE 17 The Attack:
RSA KeyGen Having the backdoor z, adversary can learn p from pk
z
(A “backdoor”)
SLIDE 18 The Attack:
RSA KeyGen Having the backdoor z, adversary can learn p from pk
z
(A “backdoor”) Without z, e looks randomly distributed as in the SPEC
SLIDE 19
Two Decades Later
SLIDE 20
Two Decades Later
SLIDE 21 Two Decades Later
- Theory can go to practice!
SLIDE 22
Backdoored Dual EC
SLIDE 23
- Remarkably, an adversarially implemented
cryptographic algorithm may…
The Threat of Klepto Attacks
SLIDE 24
- Remarkably, an adversarially implemented
cryptographic algorithm may…
- leak private information to the implementer
The Threat of Klepto Attacks
SLIDE 25
- Remarkably, an adversarially implemented
cryptographic algorithm may…
- leak private information to the implementer
- while adhering perfectly to the specification.
The Threat of Klepto Attacks
SLIDE 26 Sudden Renewed Attention
Bellare-Paterson-Rogaway’14, Bellare-Hoang’15, Dodis-Ganesh-Golovnev-Juels-Ristenpart’15, Mironov-Stevens-Davidovitz’15, Degabriele-Farshim-Pottering’15, Ateniese-Magri-Venturi’15,Bellare-Jaeger-Kane’15, Rogaway’15 Russell-T
- Yung-Zhou’15A, Russell-T
- Yung-Zhou’15B,
Dodis-Mironov-Davidovitz’16,Bellare-Kane-Rogaway’16 Degabriele-Paterson-Schult-Woodage’16 Russell-T
- Yung-Zhou‘16A,Russell-T
- Yung-Zhou’16B
13
SLIDE 27 Sudden Renewed Attention
Bellare-Paterson-Rogaway’14, Bellare-Hoang’15, Dodis-Ganesh-Golovnev-Juels-Ristenpart’15, Mironov-Stevens-Davidovitz’15, Degabriele-Farshim-Pottering’15, Ateniese-Magri-Venturi’15,Bellare-Jaeger-Kane’15, Rogaway’15 Russell-T
- Yung-Zhou’15A, Russell-T
- Yung-Zhou’15B,
Dodis-Mironov-Davidovitz’16,Bellare-Kane-Rogaway’16 Degabriele-Paterson-Schult-Woodage’16 Russell-T
- Yung-Zhou‘16A,Russell-T
- Yung-Zhou’16B
13
Mostly depressing results
SLIDE 28 Subliminal Channel Attack
[BPR14]
A Secret s Subverted implementation of randomized algorithm can leak secrets exclusively to backdoor holder via public communication channel using steganography by doing rejection sampling
SLIDE 29
Status-of-the-Art for Defending
SLIDE 30
- Give up on randomized algorithms
Status-of-the-Art for Defending
SLIDE 31
- Give up on randomized algorithms
- assume key generation algorithm is
honest
Status-of-the-Art for Defending
SLIDE 32
- Give up on randomized algorithms
- assume key generation algorithm is
honest
- consider deterministic encryption
algorithm only
Status-of-the-Art for Defending
SLIDE 33
- Give up on randomized algorithms
- assume key generation algorithm is
honest
- consider deterministic encryption
algorithm only
Status-of-the-Art for Defending
SLIDE 34
- Give up on randomized algorithms
- assume key generation algorithm is
honest
- consider deterministic encryption
algorithm only
- Assumed correctness
- Assuming trusted randomness (for
re-randomizer)
Status-of-the-Art for Defending
SLIDE 35
- Give up on randomized algorithms
- assume key generation algorithm is
honest
- consider deterministic encryption
algorithm only
- Assumed correctness
- Assuming trusted randomness (for
re-randomizer)
Status-of-the-Art for Defending
SLIDE 36
Current Status: Wide Open
SLIDE 37
- No wide agreement on models
Current Status: Wide Open
SLIDE 38
- No wide agreement on models
- Very few defending mechanisms known: no idea
what to do with randomized algorithms
Current Status: Wide Open
SLIDE 39
- No wide agreement on models
- Very few defending mechanisms known: no idea
what to do with randomized algorithms
- Very few functionalities have been considered
Current Status: Wide Open
SLIDE 40
- No wide agreement on models
- Very few defending mechanisms known: no idea
what to do with randomized algorithms
- Very few functionalities have been considered
Current Status: Wide Open
Far from being understood
SLIDE 41
- Revisit cryptography, build cliptography—
clipping the power of kleptographic attacks
Long Term Goal
SLIDE 42 Our Initial Results
18
SLIDE 43
- Modeling: a general definitional framework, a hierarchy of
- definitions. all algorithms are subverted by the adversary;
Our Initial Results
18
SLIDE 44
- Modeling: a general definitional framework, a hierarchy of
- definitions. all algorithms are subverted by the adversary;
- Mitigating: properly control the public channel to salvage
primitives even if subliminal channel exists—immediately deployable with minimal change of the specification
Our Initial Results
18
SLIDE 45
- Subversion resistant (TD)OWP
- Subversion resistant PRGs
- Subversion resistant signature with an online watchdog
Our Defending Results
19
SLIDE 46 Cliptographic Model
20
SLIDE 47 Cliptographic Model
G
20
SLIDE 48 Cliptographic Model
G
20
SLIDE 49 Cliptographic Model
G
20
SLIDE 50 Cliptographic Model
G
a4t*#f-1zd f%5u7(bg@
20
SLIDE 51 Cliptographic Model
G
a4t*#f-1zd f%5u7(bg@
SLIDE 52 Cliptographic Model
G G
SPEC
a4t*#f-1zd f%5u7(bg@
SLIDE 53 Cliptographic Model
G G
SPEC
a4t*#f-1zd f%5u7(bg@
G
SLIDE 54 Cliptographic Model
G G
SPEC
a4t*#f-1zd f%5u7(bg@
G
SLIDE 55 Cliptographic Model
G G
SPEC
a4t*#f-1zd f%5u7(bg@
G
SLIDE 56
The Model(s)
Three participants:
SLIDE 57 The Model(s)
Three participants:
- The Adversary, who provides
implementations of cryptographic algorithms, and later attempts to “break” them;
SLIDE 58 The Model(s)
Three participants:
- The Adversary, who provides
implementations of cryptographic algorithms, and later attempts to “break” them;
- The Challenger(User), who uses the
subverted implementations.
SLIDE 59 The Model(s)
Three participants:
- The Adversary, who provides
implementations of cryptographic algorithms, and later attempts to “break” them;
- The Challenger(User), who uses the
subverted implementations.
- The Watchdog, who tests the
implementations against their specification;
SLIDE 60 The Model(s)
Three participants:
- The Adversary, who provides
implementations of cryptographic algorithms, and later attempts to “break” them;
- The Challenger(User), who uses the
subverted implementations.
- The Watchdog, who tests the
implementations against their specification; The adversary is proud-but-malicious
SLIDE 61 The Basic Notion of Security
A primitive is cliptographically secure/subversion resistant if there exists a watchdog so that, for any efficient adversary,:
SLIDE 62 The Basic Notion of Security
A primitive is cliptographically secure/subversion resistant if there exists a watchdog so that, for any efficient adversary,:
- Either the watchdog can distinguish
IMPL from SPEC, or
SLIDE 63 The Basic Notion of Security
A primitive is cliptographically secure/subversion resistant if there exists a watchdog so that, for any efficient adversary,:
- Either the watchdog can distinguish
IMPL from SPEC, or
- The primitive is still secure according
to the “adapted’’ security game.
SLIDE 64 The Basic Notion of Security
A primitive is cliptographically secure/subversion resistant if there exists a watchdog so that, for any efficient adversary,:
- Either the watchdog can distinguish
IMPL from SPEC, or
- The primitive is still secure according
to the “adapted’’ security game. Several variants depending on the watchdog power, form of the implementation, etc
SLIDE 65
What Can the Watchdog Guarantee?
SLIDE 66 What Can the Watchdog Guarantee?
- W can guarantee that deterministic algorithms
with public input distribution are (almost) consistent with the specification.
- W can guarantee the randomness generation
algorithms produce unpredictable outputs.
SLIDE 67 Mitigating Subliminal Channel
Key Generation must be randomized
SLIDE 68
- A one-way permutation: A permutation that is
- Easy to compute;
- Hard to invert.
- Fundamental tool for constructing PRGs,
symmetric encryption.
One-Way Permutation
SLIDE 69 Subvertible OWPs:
Gen i, y = fi(x) Adversary can win this game…and…
SLIDE 70 Subvertible OWPs
SPEC Gen Gen Two index distributions are indistinguishable
SLIDE 71 Subvertible OWPs
SPEC Gen Gen Two index distributions are indistinguishable OK to ignore Eval as it is deterministic with a public input distribution
SLIDE 72
- SPEC: Outputs random i,k; here {gi} is a TDOWP
.
, and k=SEnc(z,d); here d is the trapdoor.
Random Padding is Dangerous
Index
SLIDE 73 Mitigating Subliminal Channel
Key Generation must be randomized
SLIDE 74
Conventional Wisdom
SLIDE 75 Conventional Wisdom
Nothing up my sleeve numbers
SLIDE 76 Conventional Wisdom
Nothing up my sleeve numbers
- π = 3.1415926535897932384626432832795..…. some bits of it were
used as constants in some hash function (BLAKE), block cipher (Blowfish) and more
SLIDE 77 Conventional Wisdom
Nothing up my sleeve numbers
- π = 3.1415926535897932384626432832795..…. some bits of it were
used as constants in some hash function (BLAKE), block cipher (Blowfish) and more
- e = 2.7182818284590452353602874713527……some bits of it were
used as constants in an AES candidate block cipher (RC5) and more
SLIDE 78 Mitigating Subverted KG
Nothing up my sleeve parameters/keys
SLIDE 79 Mitigating Subverted KG
Gen Hash Nothing up my sleeve parameters/keys
SLIDE 80 Mitigating Subverted KG: Intuition
z
SLIDE 81 Mitigating Subverted KG: Intuition
z Any backdoor can be used to invert a sparse subset of functions, otherwise SPEC is insecure
SLIDE 82 Mitigating Subverted KG: Intuition
z z H Any backdoor can be used to invert a sparse subset of functions, otherwise SPEC is insecure
SLIDE 83 Mitigating Subverted KG: Intuition
z z H Any backdoor can be used to invert a sparse subset of functions, otherwise SPEC is insecure “Dispersing” the index to a “safe” place
SLIDE 84 Gen Hash Theorem: {gi} is a family of subversion resistant OWPs.
Mitigating Subverted KG
SLIDE 85 Gen Hash Assuming the SPEC of h is RO, and index domain is “simple” Theorem: {gi} is a family of subversion resistant OWPs.
Mitigating Subverted KG
SLIDE 86
Further Implications
SLIDE 87
- Similarly salvage Duel_EC PRNG: it was shown to be
impossible to sanitize the output.
Further Implications
SLIDE 88
- Similarly salvage Duel_EC PRNG: it was shown to be
impossible to sanitize the output.
- Similarly salvage trapdoor OWP
, then further save the KG
- f the full domain hash digital signature scheme
Further Implications
SLIDE 89
Further Results
SLIDE 90
- Reduction of FDH does not go through, modification
needed
Further Results
SLIDE 91
- Reduction of FDH does not go through, modification
needed
- Reduction from clipto-secure OWP to PRG preserves
Further Results
SLIDE 92 Conventional FDH Proof
Embed the TDOWP challenge to one RO query answer:
A
Reduction
SLIDE 93 Conventional FDH Proof
Embed the TDOWP challenge to one RO query answer:
A
i, y = fi(x) Reduction
SLIDE 94 Conventional FDH Proof
Embed the TDOWP challenge to one RO query answer:
A
i, y = fi(x) Reduction
SLIDE 95 Conventional FDH Proof
Embed the TDOWP challenge to one RO query answer:
A
i, y = fi(x) Reduction
SLIDE 96 FDH in the Clipto Setting
A
i, y = fi(x) Reduction
SLIDE 97 FDH in the Clipto Setting
A
i, y = fi(x) Reduction y now generated by Eval implementation
SLIDE 98 FDH in the Clipto Setting
A
i, y = fi(x) Reduction y now generated by Eval implementation RO queries can be made during manufacturing
SLIDE 99 FDH in the Clipto Setting
No way to embed TDOWP challenge
A
i, y = fi(x) Reduction y now generated by Eval implementation RO queries can be made during manufacturing
SLIDE 100
Revised FDH
SLIDE 101
- Hash pk together with message
Revised FDH
SLIDE 102
- Hash pk together with message
- RO queries have to be made after pk is generated
which is after implementation is provided
Revised FDH
SLIDE 103
Summary
SLIDE 104
- It is possible to save randomized algorithm from
subversion with minimal trust via specification re-design
Summary
SLIDE 105
- It is possible to save randomized algorithm from
subversion with minimal trust via specification re-design
- Landscape changes when adding one dimension, every
piece of result worth revisiting
Summary
SLIDE 106
- Destroy subliminal channel
- Defend against hidden trigger attack
- Mitigating in the standard model
- Revisit cryptography, and build a robust cliptography theory
- Connection between correctness under subversion to self-correcting
programs
Open Problems
SLIDE 107 Our Recent Progress: Destroying Subliminal Channel
42
General result of destroying subliminal channels and saving PKE to preserve IND-CPA security
SLIDE 108 Our Recent Progress: Signature with Offline Watchdog
43
Self-correcting random oracle and defend against hidden trigger attack for signatures
SLIDE 109 Alexander Russell, Qiang Tang, Moti Yung and Hong-Sheng Zhou http://eprint.iacr.org/2015/695
Cliptography: Clipping The Power Of Kleptographic Attacks