collaborative security collaborative security
play

Collaborative Security Collaborative Security Gene Tsudik USC/ISI - PowerPoint PPT Presentation

Collaborative Security Collaborative Security Gene Tsudik USC/ISI 4676 Admiralty Way Marina del Rey, CA 90292 gts@isi.edu http://www.isi.edu/~gts 4/ 21/ 99 1 Group Communication One-to- many Single-source


  1. Collaborative Security Collaborative Security Gene Tsudik USC/ISI 4676 Admiralty Way Marina del Rey, CA 90292 gts@isi.edu http://www.isi.edu/~gts 4/ 21/ 99 1

  2. Group Communication λ One-to- many ν Single-source broadcast: cable/ sat. TV, radio, etc. λ Few-to- many ν Multi-source broadcast (2-tiered groups): televised debates, GPS, time, etc. λ Any-t o-any ν Collaborative applications: conferencing, mailing lists, visualization, instrument control, simulations, replicated servers, etc. Rich communication semantics, tighter control, more emphasis on security security 4/ 21/ 99 2

  3. CLIQUES: Security in Dynamic Peer Groups CLIQUES: (DARPA/ITO HCN, 07/97 (DARPA/ITO HCN, 07/97-06/00) 06/00) Formation Member add Member leave Group merge Group partition 4/ 21/ 99 3

  4. Background Targeted environment Targeted environment • Relatively small groups • Dynamic membership • No hierarchy • Many-to-Many • Collaborative applications Problem: Problem: how to obtain security in peer groups with dynamic dynamic membership and decentralized decentralized control? Complexity > > 2- and 3-party security 4/ 21/ 99 4

  5. Security Services Key adjustment Key agreement Entire group Data Privacy Data Authenticity Data Privacy Data Authenticity Member Within Group Membership Member Authentication weak Authentication weak Membership Member Authentication strong Authentication strong Group pk certification Member certification Entire group Data Privacy Data Authenticity With Outsiders Member Data Privacy Data Authenticity Member Member Authentication strong Authentication weak 4/ 21/ 99 5

  6. Group Diffie-Hellman Important features: Important features: Form al proof of security Form al ν Decentralized. ν No ordering, no synchronization ν No topology or network dependencies ν Group controller -- floating or fixed (chore!) ν Everyone contributes to the key. ν Everyone can prove they took part in the generation of the key. ν Two message latency for join of 1 member ν One message latency for leave of N members. ν N+ 1 message latency for join/ merge of N members ν Why key agreement? Why key agreement? Centralized (TTP) schemes untenable Centralized (TTP) schemes untenable ν 2 2- -,3 ,3- -party extensions party extensions unscalable unscalable ν 4/ 21/ 99 6

  7. Diffie-Hellman Primer (DH78) − ≥ large prime ( 512 bits) p * = − { 1 ,..., 1 } Z p p − base (generator ) g Bob Alice a mod = A g p * ∈ a Z * ∈ b Z R p b mod R p = B g p b = mod K A p ba a = mod K B p ab Eve Kab= ? 4/ 21/ 99 7

  8. DH Primer (contd) − − p large prime, g generator in Z p Discrete Log Problem : − − − − − − − − − − − − − a = : mod Given A g p : FIND a − Diffie Hellman Problem : − − − − − − − − − − − − − − − a b = = : mod mod Given A g p and B g p ab : mod FIND g p Decision DH Problem : − − − − − − − − − − − − − x x = = mod , mod Given : y a p y a p a b a b x x = : mod Distinguis h K a p a b ab from a random number! 4/ 21/ 99 8

  9. GDH Key Agreement (contd) L / N N n N ∈ { 1 | [ 1 , ]} j g j n 1 g g N { , } N N N N { , , } g g g 1 2 1 2 L / N N N L N N ∈ { | [ 1 , ]}, g 1 i j j i g 1 i 1 L N N = mod g p n n Key adjustments/ refresh protocols Polynomially indistinguishable easily derived and shown secure from random number! 4/ 21/ 99 9

  10. Another GDH Key Agreement Member i Mem ber n L / N N N g − 1 n 1 i L N N N g g − 1 n 1 1 L / N N n N ∈ { 1 | [ 1 , ]} j g j n L L N N N N g − g 1 n 1 1 i 1 L N N = mod K g p n n • 2 exponentiations per member • Impractical! 4/ 21/ 99 10

  11. Authenticated GDH Key Agreement n L / N N K N ∈ { 1 | [ 1 , ]}, [ ( )] g n j j j n f K n 1 g g N { , } N N N N { , , } g g g 1 2 1 2 L / N N N L N N ∈ { | [ 1 , ]}, g 1 i j j i g 1 i Key I ndependence Stronger version: Perfect Forward Secrecy • Mem bership I ntegrity KKA Resistance • Partial entity authentication Key Confirm ation Key Authentication 4/ 21/ 99 11

  12. Security Services Provided • Decentralized authenticated group key agreement with provable security based on group Diffie-Helman: each member contributes equally to group key • Membership changes: single member, many members and sub-groups • Membership authentication and non-repudiation: based on knowledge of key-share • Authenticated join/ leave: requires long-term DH credentials Other pieces of the puzzle Other pieces of the puzzle • Certification infrastructure • Reliable group communication subsystem • Membership Authorization / Access control 4/ 21/ 99 12

  13. Proposed Architecture 4/ 21/ 99 13

  14. STATUS • Initial Key Agreement • Auxiliary Key Agreement (membership changes) • Authenticated Key Agreement • JAVA implementation (rel. 0.0) • C implementation (rel. 0.1) coupled with JHU’s SPREAD • CLQ_API: completed (rel. 1.0) mid-Feb • Testing and integrating with SPREAD • Current performance results: O(n) exponentiations • Integration with TOTEM on-going (LBNL) • Integration with AKENTI: near future 4/ 21/ 99 14

  15. Publications M. Steiner, G. Tsudik and M. Waidner Diffie-Hellman Key Distribution Extended to Groups 1996 ACM Conference on Computer and Communications Security (CCCS’96) M. Steiner, G. Tsudik and M. Waidner CLIQUES: A New Approach to Group Key Agreement 1998 IEEE International Conference on Distributed Computing Systems (ICDCS’98) G. Ateniese, M. Steiner and G. Tsudik Authenticated Group Key Agreement and Friends 1998 ACM Conference on Computer and Communications Security (CCCS’98) M. Steiner, G. Tsudik and M. Waidner Key Agreement in Dynamic Peer Groups IEEE Transaction on Parallel and Distributed Systems (TPDS), submitted. G. Ateniese, M. Steiner and G. Tsudik Authenticated Group Key Agreement and Friends IEEE Journal on Selected Areas in Communication (JSAC), to appear. 4/ 21/ 99 15

  16. CLQ_API prerequisites Underlying group communication subsystem must provide reliable synchronized event notification for: • group joins • group leaves • partitions • node failures or disconnects hardest • merges (partition heals) merges (partition heals) 4/ 21/ 99 16

  17. CLQ_API called by a new group member who received a NEW_MEMBER message from the current controller. clq_ join (ctx, member_name, group_name, input, output); clq_ join called by the current controller to hand over group context to a new member (who becomes next controller). clq_ pass_ ctx (ctx, member_name, output); clq_ pass_ ctx called by every member upon reception of a KEY_UPDATE_MESSAGE from the current group controller clq_ update_ ctx (ctx, input); clq_ update_ ctx 4/ 21/ 99 17

  18. CLQ_API (contd) called by every group member after member leaves or partition occurs; removes all valid members in member_list from the group_member_list. Only controller gets output token clq_ leave (ctx, member_list[ ] , output); clq_ leave called only by controller when group_secret needs to be updated. clq_ refresh_ key (ctx, output); clq_ refresh_ key 4/ 21/ 99 18

  19. Secure Spread SD 4/ 21/ 99 19

  20. Lessons learned • Paper protocols < > real protocols • Incremental formation of groups • Security, group comm not a simple composition • Difficulty of handling many merging sub-groups • Group size limits (100?) • other DH-like keys • elliptic curve duals • Provable security matters! 4/ 21/ 99 20

  21. Challenges and directions • Two-tiered groups (few-to-many) • Group membership policy ( Auth + AC) • How to specify? • Enforce? • Group certification: group key, membership, etc. • Dynamic membership? • Individual vs. opaque certificates? • How to tolerate Byzantine behavior by member(s)? • Cannot prevent key release or denial-of-service... • Member proves correct protocol execution • Group Barter • Group Signatures 4/ 21/ 99 21

  22. Related Work Cornell: Birman et al. (ISIS, Horus, Ensemble) λ UCSB: Melliar-Smith et al. (Totem) λ HUJ: Dolev et al. (Transis) λ JHU: Amir et al. (Spread) λ TIS: Balenson et al. (OFT) λ UTA: Lam, Gouda λ NSA Wallner et al. (LKH) λ IBM: Canetti et al. λ ETHZ: Carroni, Sun (???) λ Ingemarsson, Tang, Wong (ToIT 81) λ Burmester/Desmedt 94 (Eurocrypt 94) λ Steer/Diffie (Crypto’89) λ DeSantis/ Vaccaro/ Yung λ 4/ 21/ 99 22

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend