4/ 21/ 99 1
Collaborative Security Collaborative Security
Gene Tsudik USC/ISI 4676 Admiralty Way Marina del Rey, CA 90292 gts@isi.edu http://www.isi.edu/~gts
Collaborative Security Collaborative Security Gene Tsudik USC/ISI - - PowerPoint PPT Presentation
Collaborative Security Collaborative Security Gene Tsudik USC/ISI 4676 Admiralty Way Marina del Rey, CA 90292 gts@isi.edu http://www.isi.edu/~gts 4/ 21/ 99 1 Group Communication One-to- many Single-source
4/ 21/ 99 1
Gene Tsudik USC/ISI 4676 Admiralty Way Marina del Rey, CA 90292 gts@isi.edu http://www.isi.edu/~gts
4/ 21/ 99 2
λ One-to- many
ν Single-source broadcast: cable/ sat. TV, radio,
etc.
λ Few-to- many
ν Multi-source broadcast (2-tiered groups):
televised debates, GPS, time, etc.
λ Any-t o-any
ν Collaborative applications: conferencing, mailing
lists, visualization, instrument control, simulations, replicated servers, etc. Rich communication semantics, tighter control, more emphasis on security security
4/ 21/ 99 3
(DARPA/ITO HCN, 07/97 (DARPA/ITO HCN, 07/97-06/00) 06/00)
Formation Member add Member leave Group merge Group partition
4/ 21/ 99 4
how to obtain security in peer groups with dynamic dynamic membership and decentralized decentralized control?
Complexity > > 2- and 3-party security
4/ 21/ 99 5
Key agreement Key adjustment Data Authenticity Data Privacy Membership Authentication weak Member Authentication weak Membership Authentication strong Member Authentication strong
Within Group
Group pk certification Data Authenticity Data Privacy
With Outsiders
Data Authenticity Data Privacy Member certification
Entire group Member
Member Authentication strong Member Authentication weak Data Authenticity Data Privacy
Entire group Member
4/ 21/ 99 6
ν
Form al Form al proof of security
ν
Decentralized.
ν
No ordering, no synchronization
ν
No topology or network dependencies
ν
Group controller -- floating or fixed (chore!)
ν
Everyone contributes to the key.
ν
Everyone can prove they took part in the generation of the key.
ν
Two message latency for join of 1 member
ν
One message latency for leave of N members.
ν
N+ 1 message latency for join/ merge of N members
ν
Centralized (TTP) schemes untenable Centralized (TTP) schemes untenable
ν
2 2-
,3-
party extensions unscalable unscalable
4/ 21/ 99 7
) (generator base } 1 ,..., 1 { bits) 512 ( prime large
*
− − = ≥ −
g p Z p
p
Alice Bob
p g A
a mod
=
p g B
b mod
=
p B K Z a
a ab p R
mod
*
= ∈
p A K Z b
b ba p R
mod
*
= ∈
Kab= ?
Eve
4/ 21/ 99 8
p g FIND p g B and p g A Given a FIND p g A Given Z in generator g prime, large p
ab b a a p
mod : mod mod : : Problem Hellman Diffie : mod : : Problem Log Discrete
= = − − − − − − − − − − − − − − − − = − − − − − − − − − − − − − − −
number! random a from p a K h Distinguis p a y p a y : Given
b a b a
x x ab x b x a
mod : mod , mod : Problem DH Decision
= = = − − − − − − − − − − − − −
4/ 21/ 99 9
i j i
N N N N N
g i j g
L L
1 1
]}, , 1 [ | {
/
∈
1 g
} , , {
2 1 2 1
N N N N
g g g
]} , 1 [ | {
/
1
n j g
j n N
N N
∈
L
p g
n
N N n
mod
1L
=
Polynomially indistinguishable from random number! Key adjustments/ refresh protocols easily derived and shown secure
4/ 21/ 99 10
i
N N
g
L
1
1
N
1 1
−
n
N N
g
L
1 1
−
n
N N
g
L
i n
N N N
g
/
1 1
−
L Member i Mem ber n
]} , 1 [ | {
/
1
n j g
j n N
N N
∈
L
n
N N n
1L
=
4/ 21/ 99 11
i j i
N N N N N
g i j g
L L
1 1
]}, , 1 [ | {
/
∈
1 g
} , , {
2 1 2 1
N N N N
g g g
)] ( [ ]}, , 1 [ | {
/
1
n N K N N
K f n j g
j n j n
∈
L Key I ndependence Perfect Forward Secrecy KKA Resistance Key Confirm ation Key Authentication Stronger version:
4/ 21/ 99 12
with provable security based on group Diffie-Helman: each member contributes equally to group key
and sub-groups
based on knowledge of key-share
credentials
4/ 21/ 99 13
4/ 21/ 99 14
4/ 21/ 99 15
Diffie-Hellman Key Distribution Extended to Groups 1996 ACM Conference on Computer and Communications Security (CCCS’96)
CLIQUES: A New Approach to Group Key Agreement 1998 IEEE International Conference on Distributed Computing Systems (ICDCS’98)
Authenticated Group Key Agreement and Friends 1998 ACM Conference on Computer and Communications Security (CCCS’98)
Key Agreement in Dynamic Peer Groups IEEE Transaction on Parallel and Distributed Systems (TPDS), submitted.
Authenticated Group Key Agreement and Friends IEEE Journal on Selected Areas in Communication (JSAC), to appear.
4/ 21/ 99 16
Underlying group communication subsystem must provide reliable synchronized event notification for:
merges (partition heals)
hardest
4/ 21/ 99 17
called by a new group member who received a NEW_MEMBER message from the current controller. clq_ join clq_ join (ctx, member_name, group_name, input, output); called by the current controller to hand over group context to a new member (who becomes next controller). clq_ pass_ ctx clq_ pass_ ctx (ctx, member_name, output); called by every member upon reception of a KEY_UPDATE_MESSAGE from the current group controller clq_ update_ ctx clq_ update_ ctx (ctx, input);
4/ 21/ 99 18
called by every group member after member leaves or partition occurs; removes all valid members in member_list from the group_member_list. Only controller gets output token clq_ leave clq_ leave (ctx, member_list[ ] , output); called only by controller when group_secret needs to be updated. clq_ refresh_ key clq_ refresh_ key (ctx, output);
4/ 21/ 99 19
4/ 21/ 99 20
4/ 21/ 99 21
4/ 21/ 99 22
λ
Cornell: Birman et al. (ISIS, Horus, Ensemble)
λ
UCSB: Melliar-Smith et al. (Totem)
λ
HUJ: Dolev et al. (Transis)
λ
JHU: Amir et al. (Spread)
λ
TIS: Balenson et al. (OFT)
λ
UTA: Lam, Gouda
λ
NSA Wallner et al. (LKH)
λ
IBM: Canetti et al.
λ
ETHZ: Carroni, Sun (???)
λ
Ingemarsson, Tang, Wong (ToIT 81)
λ
Burmester/Desmedt 94 (Eurocrypt 94)
λ
Steer/Diffie (Crypto’89)
λ
DeSantis/ Vaccaro/ Yung
4/ 21/ 99 23
CLIQUES web page: http: / / www.isi.edu/ div7/ cliques
API code by request from gts@isi.edu
4/ 21/ 99 24
Integrated Multicast in Ad Hoc Networks (NSF) Secure IP multicast ( Nortel) Survivability Using Controlled Security Services (DARPA) Server-Assisted Digital Signatures (NSA) Access Control in Collaborative Applications ( DoE in subm.) Low Latency Massive Data Transfers ( Skunkworks)