Communication-efficient Group Key Agreement June 20, 2001 Gene - - PowerPoint PPT Presentation

communication efficient group key agreement
SMART_READER_LITE
LIVE PREVIEW

Communication-efficient Group Key Agreement June 20, 2001 Gene - - PowerPoint PPT Presentation

Communication-efficient Group Key Agreement June 20, 2001 Gene Tsudik, UC Irvine gts@ics.uci.edu Joint work with: Adrian Perrig, CMU/UC Berkeley Yongdae Kim, USC/UC Irvine Outline Definitions/concepts Related work


slide-1
SLIDE 1

Communication-efficient Group Key Agreement

June 20, 2001 Gene Tsudik, UC Irvine gts@ics.uci.edu Joint work with:

Adrian Perrig, CMU/UC Berkeley Yongdae Kim, USC/UC Irvine

slide-2
SLIDE 2

2

Outline

  • Definitions/concepts
  • Related work
  • Background/Motivation
  • Protocols
slide-3
SLIDE 3

3

Group Communication Settings

  • Few-to-Many

Single-source broadcast: Cable/sat. TV Multi-source: Televised debates, GPS In general, Internet-style IP multicast

  • Any-to-Any

Collaborative applications (peer groups) Video/Audio conferencing, collaborative workspaces, interactive

chat, network games, distributed database replication, etc.

Rich communication semantics, tighter control, more emphasis on

synchronization, reliability and security

slide-4
SLIDE 4

4

Dynamic Peer Groups (DPG)

  • Relatively small (<100 members)
  • No hierarchy
  • Frequent membership changes
  • Any member can be sender and receiver

Our focus: key management in DPGs

slide-5
SLIDE 5

5

Key Management is a building block

Encryption, Authentication Key Management Authorization, Access control, Non-repudiation … Secure Applications

slide-6
SLIDE 6

6

Group Key Management

  • Group key: a secret quantity known only to current group

members

  • Group Key Distribution

One party generates a secret key and distributes to others.

  • Group Key Agreement

Secret key is derived jointly by two or more parties. Key is a function of information contributed by each member. No party can pre-determine the result.

slide-7
SLIDE 7

7

Key Distribution in DPG?

  • Centralized key server

Single point of failure Attractive attack target

  • Can key server be sufficiently replicated?

Must be available in all possible partitions Network can have arbitrary faults (eg, ad hoc)

slide-8
SLIDE 8

8

Need for Reliable Group Communication

  • Group key agreement protocols rely on the underlying

group communication systems.

1.

Protocol message transport

2.

Strong membership semantics (notification of a group membership)

  • Not for security reasons
  • Group communication system needs specialized security

mechanisms.

Mutual benefit and interdependency

slide-9
SLIDE 9

9

Membership Operations

Formation ??? Member join Member leave Group merge Group partition

slide-10
SLIDE 10

10

Motivation

  • need group key agreement with:

Strong security Support for dynamic membership Robustness Efficiency in

communication

and

computation

slide-11
SLIDE 11

11

Common DPG setting

?

LAN

slide-12
SLIDE 12

12

Computation overhead

  • Most group key agreement methods involve modular

exponentiation.

  • Contrast with typical LAN roundtrip delay < 2ms
  • On paper, communication overhead is negligible
  • Number of protocol rounds?

8 ms Pentium II 450 20 ms Sun Ultra 250 4 ms Pentium III 800 1024-bit mod exp

slide-13
SLIDE 13

13

Another DPG setting

?

WAN

LAN LAN wireless dial-up

slide-14
SLIDE 14

14

Motivation: minimize rounds and messages

  • Over WAN (and wireless, dial-up, etc.) communication is

more expensive than computation

  • Communication has an upper bound (speed of light)

Computation speed increases much fast than communication

  • Too many messages some might be lost/corrupted

Retransmissions

  • Many rounds cascaded events (protocol interruption)

420 ms UCI ↔ Thailand 670 ms UCI ↔ Mozambique 88 ms / 20(ls) UCI ↔ Columbia U Communication roundtrip (Ping)

slide-15
SLIDE 15

15

Security Requirements

  • Group key secrecy

computationally infeasible for a passive adversary to discover any

group key

  • Backward secrecy

Any subset of group keys cannot be used to discover previous

group keys.

  • Forward secrecy

Any subset of group keys cannot be used to discover subsequent

group keys.

  • Key Independence

Any subset of group keys cannot be used to discover any other

group keys.

Forward + Backward secrecy

slide-16
SLIDE 16

16

Functional Requirements

  • Minimize communication and round complexity
  • Robustness against cascaded failures
  • Maintain strong security, of course…
slide-17
SLIDE 17

17

Related Work

  • Focused mainly on security and/or computation overhead
  • Diffie-Hellman extensions
  • Burmester and Desmedt (BD, 1993): fast comp-n, many broadcasts
  • Steiner et al. (Cliques, 1996): slow join, fast leave
  • Becker and Wille (BW 1998): log n rounds, hi computation
  • verhead
  • Tzeng and Tzeng (1999, 2000): fast but not secure
slide-18
SLIDE 18

18

Related Work (Cont.)

  • TGDH (Tree-based Group Diffie-Hellman)
  • Y. Kim, A. Perrig and G. Tsudik

ACM CCS 2000

  • STR (A Secure Audio Conference System)
  • D. Steer, L. Strawczynski, W. Diffie and M. Wiener

CRYPTO’88

Static groups No security proof

What we do

  • Extend STR to dynamic groups
  • Security
  • Analyze, implement, integrate
slide-19
SLIDE 19

19

Diffie-Hellman

  • Setting

p – large prime (e.g. 512 or 1024 bits) Zp* = {1, 2, … , p – 1} g – base generator

  • A → B : NA = gn1 mod p
  • B → A : NB = gn2 mod p
  • A : NB

n1 = gn1n2 mod p

  • B : NA

n2 = gn1n2 mod p

  • Diffie-Hellman Key : gn1 n2
  • Blinded Key of n1 : NA = gn1 mod p

n1 n2 gn1n2

slide-20
SLIDE 20

20

Diffie-Hellman Problem

  • Computational Diffie-Hellman Assumption (CDH)

Loose Definition: Given ga, gb, computing gab is hard. CDH is not sufficient to prove that Diffie-Hellman Key can be used

as secret key.

Eve may recover part of information with some confidence One cannot simply use bits of gab as a shared key

  • Decision Diffie-Hellman Assumption (DDH)

Loose Definition

Given ga and gb, and a guess gc, check if gc = gab

Stronger than CDH

slide-21
SLIDE 21

21

TGDH

  • Simple: all membership operations in a single function
  • Fault-tolerant: robust against cascaded faults
  • Secure

Contributory Provable security Key independence

  • Efficient

d is the height of key tree (O(log 2 N)), N is the number of users Maximum number of exponentiation = 4(d-1)

slide-22
SLIDE 22

22

Key Tree (General)

n4 n5 gn4n5 n6 n1 n2 n3 gn2n3 gn1gn2n3

ggn1gn2n3 gn6gn4n5

gn6gn4n5

slide-23
SLIDE 23

23

Security

  • Group key secrecy T-DDH

Intuitive Definition

Given all blinded keys of a random key tree, can we distinguish the group key from a random number?

  • Proof goal

If we can solve T-DDH, we can solve 2-party DDH.

  • Key independence.

One member changing its contribution upon every event

slide-24
SLIDE 24

24

Features

  • Efficiency

Avg number of mod exp: 2 log2 n Max number of rounds: log2 n

  • Robustness easy thanks to self-stabilization property
  • Tree structure a bit complex

Goal:

  • Group key agreement scheme with:

small number of rounds small number of messages in return for more computation

slide-25
SLIDE 25

25

STR

  • Communication efficient (not in original form)

Max 2 rounds Max 2 broadcasts

  • Simple: implemented as one function
  • Fault-tolerant: Easier than TGDH
  • Secure

Contributory Provable security Backward and forward secrecy => key independence Provable security

  • Computation cost is higher (for leave/partition)

Max # exponentiations Ζ3(N-1) avg = 3N/2 Low for join/merge

slide-26
SLIDE 26

26

STR Key Tree gn1 gn1n2 gn3gn1n2 gn4 gn3 gn4gn3gn

1n 2

gn2

slide-27
SLIDE 27

27

Join (Merge similar)

gn3 gn1 gn2 gn1n2 gn3gn1n2 gn4 Tree(n4) gn3 gn3' gn4gn3’gn

1n 2

gn3’gn1n2

slide-28
SLIDE 28

28

Leave or Partition

gn3 gn1 gn2 gn1n2 gn3gn1n2 gn4 gn4gn3gn1n2 gn3 gn3 gn4 gn2’ gn1n2’ gn4gn1n2’

slide-29
SLIDE 29

29

Features

  • Security

Same as TGDH

  • Efficiency

mod exp: 2 – join, 1.5n – leave number of rounds: 1 – join, 1 – leave number of messages: 2 – join, 1 – leave

  • Robustness is provided by self-stabilization property
slide-30
SLIDE 30

30

Comparison

Easy 3 2n 2n 2 BD 2k 1 2 3 2 Merge 1.5n 1 1 1

Leave, Partition

Easy 2 1 1 2 1 Join STR log n log n log n log n/2 Partition log n 1 1 1 Leave Easy 2log n 3 3 2 Join, Merge TGDH n+2k 2 n+2k-1 n+2k+1 k+3 Merge n 1 1 1

Leave, Partition

Hard 2n 1 1 2 2 Join Cliques IKA.2 Exp Broad Uni Msgs Rounds Robust Comp Comm

slide-31
SLIDE 31

31

Finally…

Code available, part of Cliques distribution

STR TGDH CKD BD GDH IKA.1 GDH IKA.2

  • http://sconce.ics.uci.edu
  • Standalone or integrated with Spread group communication

toolkit

  • Questions?