12/ 9/ 99 1
Collaborative Security
Gene Tsudik
Computer Networks Division, USC/ISI gts@ics.uci.edu http://www.ics.uci.edu/~gts and Information and Computer Science Department, UC Irvine gts@isi.edu http://www.isi.edu/~gts
Collaborative Security Gene Tsudik Computer Networks Division, - - PowerPoint PPT Presentation
Collaborative Security Gene Tsudik Computer Networks Division, USC/ISI gts@ics.uci.edu http://www.ics.uci.edu/~gts and Information and Computer Science Department, UC Irvine gts@isi.edu http://www.isi.edu/~gts 12/ 9/ 99
12/ 9/ 99 1
Computer Networks Division, USC/ISI gts@ics.uci.edu http://www.ics.uci.edu/~gts and Information and Computer Science Department, UC Irvine gts@isi.edu http://www.isi.edu/~gts
12/ 9/ 99 2
G One-to-many
I Single-source broadcast: cable/ sat. TV, radio, etc.
G Few-to-many
I Multi-source broadcast (2-tiered groups): televised
debates, GPS, time, etc.
G Any-to-any
I Collaborative applications: conferencing, mailing
lists, visualization, instrument control, simulations, replicated servers, etc. Rich communication semantics, tighter control, more emphasis on security
12/ 9/ 99 3
(DARPA/ITO HCN, 07/97-06/00)
Formation Member add Member leave Group merge Group partition
12/ 9/ 99 4
how to obtain security in peer groups with dynamic membership and decentralized control?
Complexity > > 2- and 3-party security
12/ 9/ 99 5
Key agreement Key adjustment Data Authenticity Data Privacy Membership Authentication Member Authentication weak
Within Group
Group pk certification Data Authenticity Data Privacy
With Outsiders
Data Authenticity Data Privacy Member certification
Entire group Member
Member Authentication strong Member Authentication Data Authenticity Data Privacy
Entire group Member
Group Access Control
12/ 9/ 99 6
I Form al proof of security I Decentralized. I No ordering, no synchronization (sort of) I No topology or network dependencies I Group controller: floating or fixed (chore, not privilege!) I Everyone contributes to the key. I Everyone can prove they took part in the generation of the key. I Two message latency for join of 1 member I One message latency for leave of N members. I N+ 1 message latency for join/ merge of N members
I Centralized (TTP) approach: single-point, too much load I 2-,3-party extensions unscalable: n* n message exchanges
12/ 9/ 99 7
) (generator base } 1 ,..., 1 { bits) 512 ( prime large
*
− − = ≥ −
g p Z p
p
Alice Bob
p g A
a mod
=
p g B
b mod
=
p B K Z a
a ab p R
mod
*
= ∈
p A K Z b
b ba p R
mod
*
= ∈
Kab= ?
Eve
12/ 9/ 99 8
p g FIND p g B and p g A Given a FIND p g A Given
ab b a a
mod : mod mod : : Problem Hellman Diffie : mod : : Problem Log Discrete
= = − =
number! random a from p g K h Distinguis p g B p g A : Given
ab ab b a
mod : mod , mod : Problem DH Decision
= = =
12/ 9/ 99 9
i j i
N N N N N
g i j g
L L
1 1
]}, , 1 [ | {
/
∈
1 g
N
} , , {
2 1 2 1
N N N N
g g g
]} , 1 [ | {
/
1
n j g
j n N
N N
∈
L
p g
n
N N n
mod
1L
=
Polynomially indistinguishable from random number! Key adjustments/ refresh protocols easily derived and shown secure
12/ 9/ 99 10
i
N N
g
L
1
1
N
1 1
−
n
N N
g
L
1 1
−
n
N N
g
L
i n
N N N
g
/
1 1
−
L
Member i Member n
]} , 1 [ | {
/
1
n j g
j n N
N N
∈
L
n
N N n
1L
=
Stage 1 Stage 2
12/ 9/ 99 11
i j i
N N N N N
g i j g
L L
1 1
]}, , 1 [ | {
/
∈
j S i S ij
=
} , , {
2 1 2 1
N N N N
g g g
)] ( [ ]}, , 1 [ | {
/
1
n N K N N
K f n j g
j n j n
∈
L
Key Independence Perfect Forward Secrecy KKA Resistance Key Confirmation Key Authentication Stronger version:
1 g
N
12/ 9/ 99 12
2 1
12 N N
=
34 12
1234 K K
=
4 3
34 N N
=
d d d d
5 1234
12345 N K
=
Very fast merge Best-fit vs wors-fit insert Need to balance on leave Authentication hard
12/ 9/ 99 13
with provable security based on group Diffie-Helman: each member contributes equally to group key
and sub-groups
based on knowledge of key-share
credentials
12/ 9/ 99 14
12/ 9/ 99 15
Underlying group communication subsystem must provide reliable synchronized event notification for:
Supports primitives for:
Centralized and GDH key agreement (others tba)
hardest
12/ 9/ 99 16
12/ 9/ 99 17
12/ 9/ 99 18
12/ 9/ 99 19
12/ 9/ 99 20
12/ 9/ 99 21
12/ 9/ 99 22
12/ 9/ 99 23
Strong Group Semantics:
G
Cornell: Birman et al. (ISIS, Horus, Ensemble)
G
UCSB: Melliar-Smith et al. (Totem)
G
HUJ: Dolev et al. (Transis)
G
JHU: Amir et al. (Spread) IP Multicast:
G
TIS: Balenson et al. (OFT)
G
UTA: Lam, Gouda
G
NSA Wallner et al. (LKH)
G
IBM: Canetti et al.
G
ETHZ: Carroni, Sun (Versa) Theory:
G
Ingemarsson, Tang, Wong (ToIT 81)
G
Burmester/ Desmedt 94 (Eurocrypt 94)
G
Steer/ Diffie (Crypto’89)
G
DeSantis/ Vaccaro/ Yung
12/ 9/ 99 24
Diffie-Hellman Key Distribution Extended to Groups, ACM CCCS’96
CLIQUES: A New Approach to Group Key Agreement, IEEE ICDCS’98
Authenticated Group Key Agreement and Friends, ACM CCCS’98
Key Agreement in Dynamic Peer Groups, IEEE TPDS, submitted.
Authenticated Group Key Agreement and Friends, IEEE JSAC, April 2000.
The Design of Group Key Agreement API, DARPA DISCEX’00.
12/ 9/ 99 25
CLIQUES web page: http: / / www.isi.edu/ div7/ cliques
API code by request from gts@isi.edu
12/ 9/ 99 26