Cryptographic Enforcement of Segregation of Duty , - - PowerPoint PPT Presentation

cryptographic enforcement of segregation of duty
SMART_READER_LITE
LIVE PREVIEW

Cryptographic Enforcement of Segregation of Duty , - - PowerPoint PPT Presentation

Cryptographic Enforcement of Segregation of Duty , old russian proverb rely yet verify 17.11.2015 thomas maus DeepSec 2015 Thomas Maus thomas.maus alumni.uni-karlsruhe.de


slide-1
SLIDE 1

17.11.2015 thomas maus

Cryptographic Enforcement of Segregation of Duty

  • “доверяй, но проверяй”

– old russian proverb

“rely yet verify”

  • Thomas Maus

◉ thomas.maus alumni.uni-karlsruhe.de

  • DeepSec 2015
slide-2
SLIDE 2

17.11.2015 thomas maus

Introduction

  • started with IT 1979 – school experiment
  • Computer Science, University of Karlsruhe

◉ study + research ◉ EISS = European Institute of System Security

  • 1993: self-employed IT security consultant
  • some representive talks:

◉ risk analysis + mgmt (DECUS 2003 + others) ◉ eHealth (in)security (21C3+22C3, various others) ◉ crypto-analytic password quality measures (various) ◉ RFID (in)security (various) ◉ Tale Telling Timings (various)

slide-3
SLIDE 3

17.11.2015 thomas maus

Introduction …

  • home-town: Trier

◉ situated between Eifel and Hunsrück ◉ low population density ➜ scarce public transport facilities

  • hitchhiking?

◉ too dangerous …

slide-4
SLIDE 4

17.11.2015 thomas maus

Introduction …

  • IT supported + secured hitchhiking?
  • objectives:

◉ anonymity as far as possible

at least strong pseudonymity

no tracking

◉ crime prevention + prosecution

mutually verifiable registration status

“on-line” transaction registry

tracking of missing persons by police + next of kin

◉ coordination + matching of

travel opportunities and wishes

◉ integration into public transport system

tickets

payment of transport providers

slide-5
SLIDE 5

17.11.2015 thomas maus

Introduction …

  • school administration SW of federal state

◉ developed by participants of school experiment ◉ i.e. mostly by pupils! ◉ chosen by proven computer versatility ◉ e.g. successful hacking of school computer ;-)

  • challenge:

◉ forestall impeachment of pupil programmer's

graduation diploma

◉ build confidence in correctness → reliance

slide-6
SLIDE 6

17.11.2015 thomas maus

Introductory Conclusions

  • multi-lateral security needed
  • multiple security dimensions

◉ “classical”: confidentiality+integrity+availability ◉ correctness ◉ verifiability / auditability ◉ separation of duties ◉ non-repudation / proof of volition vs. error ◉ privacy

transparency + control for subject

non-traceability / data minimization

robustness against inference and extrapolation

◉ …

slide-7
SLIDE 7

17.11.2015 thomas maus

Example for Illustration: Data Retention

  • soft or social Science Fiction

◉ “how a technology could transform a society” ◉ hard science core = cryptography

¼ century around: public-key cryptography

construct of ideas open for debate

◉ soft socio-political outer shell

fictional stances of society and various personas

  • nly for demonstration purposes

suspense of disbelief requested

slide-8
SLIDE 8

17.11.2015 thomas maus

content content-

⚜ ⚜

content-

⚜ ⚜

content⚜

Visualization of Cryptographic Instruments

  • asymmetric keys of cyan persona (Alice)

◉ private key ◉ public key

  • asymmetric keys of red persona (Bob)
  • usage examples

◉ sealed (signed) with red private key ◉ encrypted with cyan public key ◉ first sealed, then encrypted ◉ first encrypted, then sealed ◉ typically implicit and invisible: symmetric keys ◉ decryption possible by Alice or Bob,

with detached seal by Carol

content

⚜ ⚜

slide-9
SLIDE 9

17.11.2015 thomas maus

Our fictitious Society: Dramatis Personae

  • civil society

◉ constitutional democracy ◉ politically participating citizens (citoyen) ◉ civil rights organisations

  • investigative authorities

◉ police detectives ◉ public prosecutor

  • examining magistrate (=Ermittlungsrichter)
  • (federal) privacy commissioner
  • telecommunication service providers
slide-10
SLIDE 10

17.11.2015 thomas maus

Dramatis Personae: Civil Society

  • ultimate democratic sovereign

◉ votes + referenda ◉ political parties ◉ NGOs

  • objectives

◉ active political participation ◉ protect

constitutional democracy

fundamental human + civil rights

◉ vigilant about

panopticon effect

correct exercise of office by representatives + officials

◉ crime prevention + prosecution

Civil Rights

slide-11
SLIDE 11

17.11.2015 thomas maus

Dramatis Personae: Investigative Authorities

  • obligations

◉ crime investigation for prevention + prosecution

  • conflicting interests

◉ fundamental civil rights

privacy of correspondence, posts + telecommunications

privacy of the home

  • intentions

◉ tactical secrecy of investigation ◉ earning + keeping public confidence ◉ auditability ◉ exoneration capabilities

  • public prosecutor's keys
slide-12
SLIDE 12

17.11.2015 thomas maus

Dramatis Personae: Examining Magistrate

  • obligations

◉ individual decisions within legal framework ◉ crime investigation ↔ fundamental rights

  • conflicting interests

◉ enable optimal crime investigation ◉ protect fundamental civil rights

  • intentions

◉ tactical secrecy of investigation ◉ earning + keeping public confidence ◉ auditability ◉ exoneration capabilities

  • examining magistrate's keys
slide-13
SLIDE 13

17.11.2015 thomas maus

Dramatis Personae: Federal Privacy Commissioner

  • obligations

◉ formal control of disclosure requests ◉ official auditing + statistics + reporting ◉ investigation + information in special cases:

e.g. medical doctors, lawyers, priests, …

◉ official investigation of complaints ◉ destruction of own private key in certain cases

  • intentions

◉ protection of fundamental rights within statutes ◉ earning + keeping public confidence

  • federal privacy commissioner's keys

slide-14
SLIDE 14

17.11.2015 thomas maus

Dramatis Personae: Telecommunication Service Providers

  • obligations

◉ provide legally required data structures to

investigation authorities

  • intentions

◉ compliance ◉ minimal involvement ◉ exoneration capabilities ➜ rapid erasure of cleartext connection data

  • telecommunication provider's keys

(pars pro toto)

slide-15
SLIDE 15

17.11.2015 thomas maus

Manifold Imaginable Socio-Political Decisions

  • much flexibility needed within framework!
  • creative leeway + areas of decisions

◉ initial data for investigation services? ◉ keeper of data? ◉ sequence of workflows? ◉ veto powers? ◉ …

slide-16
SLIDE 16

17.11.2015 thomas maus

Initial Data for Investigation Services

  • selection of data to be disclosed
  • general data structure

◉ “handle” → “opaque protected data” ◉ “handle” =

information freely available to investigators

not perceived as impairing fundamental rights

◉ “opaque protected data” =

information pertaining to fundamental rights

accessible only via safeguarded procedure

crypto-enforced

segregation of duty

review + control

auditability

slide-17
SLIDE 17

17.11.2015 thomas maus

Initial Data: The “Handle”

  • subset of communication data as selector
  • example of inappropriate handles

◉ (calling id, precise start time, precise end time) ◉ (called id, precise start time, precise end time) ☢ correlate time stamps → infere speaking parties

  • dilution of precision / obscuration of handles!

◉ protection against inference + extrapolation ◉ balanced with specificity

  • example of diluted handles

◉ (calling id, diluted start time, diluted duration) ◉ (called id, diluted start time, diluted duration) ◉ (diluted location, diluted time period)

slide-18
SLIDE 18

17.11.2015 thomas maus

Initial Data: The “Handle”

  • subset of communication data as selector
  • example of inappropriate handles

◉ (calling id, precise start time, precise end time) ◉ (called id, precise start time, precise end time) ☢ correlate time stamps → infere speaking parties

  • dilution of precision / obscuration of handles!

◉ protection against inference + extrapolation ◉ balanced with specificity

  • example of diluted handles

◉ (calling id, diluted start time, diluted duration) ◉ (called id, diluted start time, diluted duration) ◉ (diluted location, diluted time period)

e.g.

  • per minute
  • ⌊5 minutes⌋
  • ⌊¼ hours⌋
  • depending on time-of-day
slide-19
SLIDE 19

17.11.2015 thomas maus

Initial Data: The “Handle”

  • subset of communication data as selector
  • example of inappropriate handles

◉ (calling id, precise start time, precise end time) ◉ (called id, precise start time, precise end time) ☢ correlate time stamps → infere speaking parties

  • dilution of precision / obscuration of handles!

◉ protection against inference + extrapolation ◉ balanced with specificity

  • example of diluted handles

◉ (calling id, diluted start time, diluted duration) ◉ (called id, diluted start time, diluted duration) ◉ (diluted location, diluted time period)

e.g.

  • per minute
  • {<1, <2, <3, <5, <10, <15, …} minutes
slide-20
SLIDE 20

17.11.2015 thomas maus

Initial Data: The “Handle”

  • subset of communication data as selector
  • example of inappropriate handles

◉ (calling id, precise start time, precise end time) ◉ (called id, precise start time, precise end time) ☢ correlate time stamps → infere speaking parties

  • dilution of precision / obscuration of handles!

◉ protection against inference + extrapolation ◉ balanced with specificity

  • example of diluted handles

◉ (calling id, diluted start time, diluted duration) ◉ (called id, diluted start time, diluted duration) ◉ (diluted location, diluted time period)

e.g.

  • cell base station
  • precinct
  • geo coord ⌊arc minute⌋
  • depending on area
slide-21
SLIDE 21

17.11.2015 thomas maus

Initial Data: “Opaque protected Data”

  • anonymous + unique?

◉ records of identical individual differ always

  • pseudonymous?

◉ indirection

“handle” → “pseudonym”

“pseudonym” → “opaque protected data”

◉ pre-inspection or pseudonymous investigation

pseudonyms in area AND called in time period

which pseudonyms communicated often in time frame

  • a continuum anonymous ↔ pseudonymous!
slide-22
SLIDE 22

17.11.2015 thomas maus

Initial Data: Degrees of Pseudonymity

  • scope of pseudonyms

◉ specific per location (for location requests)

different granularities (≥ location requests)

country, state, district, postal code, base station, …

◉ specific per contact (for contact requests)

pseudonyms only constant within conversation pairs

… within areas – e. g. Vienna ↔ Graz, Vienna ↔ Salzburg

  • durability of pseudonyms

◉ pseudonyms change at intervals ◉ … change event-driven – e.g. after disclosure

  • how? e.g.

◉ key = HMAC(Nonce(Interval,Provider), conversation) ◉ pseudonym = encrypt(key, Nonce(Subscriber))

slide-23
SLIDE 23

17.11.2015 thomas maus

Initial Data: Degrees of Pseudonymity

  • visibility of pseudonyms

◉ investigation services (cleartext)? ◉ examining magistrate – opaque for investigators? ◉ privacy commissioner?

  • different pseudonym-levels per persona

◉ e. g. short-lived per contact for investigators ◉ long-term absolute for examining magistrate

slide-24
SLIDE 24

17.11.2015 thomas maus

Initial Data: “Opaque protected Data”

  • anonymous?

⊕ maximum of non-traceability ⊖ lots of disclosure requests + effort + delay ⊖ many unnecessary disclosures

  • pseudonymous?

⊖ less non-traceability (scalable) ⊕ less more specific+promising disclosure requests ⊕ minimization of disclosures possible ⊕ flexible degrees of pseudonymity ⊕ investigations more unbiased ⊕ high efficiency

  • framework accommodates whole continuum
slide-25
SLIDE 25

17.11.2015 thomas maus

Sketch of Example for Disclosure Procedure

  • for sake of simplicity + demonstration:

1 representative workflow outline

  • fundamental decisions

◉ examining magistrate is gatekeeper of process

sequencing + veto powers

◉ examining magistrate involves in parallel

civil NGOs + federal privacy commissioner

parallelizing + distributed veto powers

◉ civil NGO decision model variations

quorum decisions

soft decisions + graded denial

slide-26
SLIDE 26

17.11.2015 thomas maus

Investigation Phase 1 Investigative Authorities

  • free access to all
  • select relevant records by handle
  • narrow down by pseudonyms
  • build disclosure request

handle → pseudonym, ???

⚜ ⚜

??? ??? ???

investigator's disclosure request

  • urgency
  • reasons for request
  • optional further selection criteria
  • set of records to be disclosed
  • optional tactical secrecy considerations

(what must not or may be disclosed to other parties)

⚜ ⚜

slide-27
SLIDE 27

17.11.2015 thomas maus

Investigation Phase 2.1 Examining Magistrate

  • decrypts + verifies investigators request
  • decrypts every
  • selects data records for disclosure

??? ??? ???

PoV Examing Magistrate

  • decision-relevant infos about caller + callee

(e.g. medical or law office, emergency service, …)

  • more significant pseudonyms (potentially)

??? ???

slide-28
SLIDE 28

17.11.2015 thomas maus

Investigation Phase 2.2 Examining Magistrate

  • prepares “decision audit record”

◉ complete decision grounds (including all facts) ◉ complete investigator's disclosure request

  • prepares “disclosure decision”
  • submits decision …

magistrate's disclosure decision

  • urgency
  • decision grounds (as far as tactical secrecy permits)
  • for all selected records:

⚜ ⚜

??? ??? decision audit record

⚜ ⚜

slide-29
SLIDE 29

17.11.2015 thomas maus

Investigation Phase 3.1 Federal Privacy Commissioner

  • decrypts + verifies disclosure decision
  • decrypts every
  • archives decisions for review + verification

PoV Federal Privacy Commissioner

  • decision-relevant infos about caller + callee

(e.g. medical or law office, emergency service, …)

  • more significant pseudonyms (potentially)
  • (individual random key per record)

⚜ ⚜

???

slide-30
SLIDE 30

17.11.2015 thomas maus

Investigation Phase 3.2 Federal Privacy Commissioner

  • purely formal + automated decisions

◉ pseudonyms (potentially)

narrow selection by investigator's algorithmic criteria

◉ decision-relevant infos

verify statutory periods and subscriber criteria

trigger specific

audit watch-lists

notifications to specific institutions

bumping of subscriber Nonces

  • keys of approved selected records

◉ actually indexed list of either

keys

denials with justifications

  • statistics for periodic reports

⚜ ⚜

slide-31
SLIDE 31

17.11.2015 thomas maus

Investigation Phase 4 Delegates of Civil Society

  • decrypts + verifies disclosure decision
  • decrypts every
  • role of delegates?
  • many creative possibilities!

◉ 1st: as privacy commissioner (but more independent)

purely formal + automated decisions of key disclosure

  • wn criteria of reporting

◉ more later …

PoV Civil Society

  • decision-relevant infos about caller + callee

(e.g. medical or law office, emergency service, …)

  • (individual random key per record)

⚜ ⚜

???

Civil Rights

⚜ ⚜

slide-32
SLIDE 32

17.11.2015 thomas maus

Investigation Phase 5 Examining Magistrate

  • receives + pairs symmetric keys per record

connection / location / subscriber data

⚜ ⚜

⨁ = ??? ???

clearance of innocent bystanders

⚜ ⚜

  • check lock by potential other investigations
  • order bumping subscriber's Nonce
  • rder of re-pseudonymisation

⚜ ⚜

slide-33
SLIDE 33

17.11.2015 thomas maus

Verification Phase 1 Civil Society + Privacy Commissioner

  • verification of disclosure requests/decisions

◉ after investigation is closed or tried ◉ after statutory period ◉ individually or jointly by both bodies ◉ according audit watch-lists + random sampling

  • “decision audit record” copies of bodies

◉ decrypted by

examining magistrate

◉ content verified via detached seal ◉ review of complete procedure ◉ discrepancies published + officials impeached

  • verification/initiation of re-pseudonymisation

Civil Rights

decision audit record

⚜ ⚜

slide-34
SLIDE 34

17.11.2015 thomas maus

Roles Variants of the Delegates of Civil Society

  • more freedom: power of disclosure denial

◉ imagine whatever-gate scandal scenario

disclosure requests for journalist contacts

delegates of civil society may require

concessions of supervising investigation

guarantees that investigation is unrelated (→ verification phase!)

  • e.g. delegates elected for privacy manifestos

◉ voting weight according vote percentages ◉ algorithmic defined manifestos (speed of decision!) ◉ possible individual consideration of circumstances

  • e.g. “examining jurors/assessors”

◉ sworn to secrecy ◉ part + PoV of examining magistrate

Civil Rights

slide-35
SLIDE 35

17.11.2015 thomas maus

Qualified Majority Control of Powers

  • quorum decisions

◉ ≥ t “pros” out of N delegates ◉ secret-sharing / split-key schemes

2/3 quorum: simple approach

perfect secrecy < threshold t

doesn't scale …

Shamir: polynomials, perfect secrecy < threshold

Blakley: hyperplanes, “leaks”= pros reduce search space

  • modeling political + negotiable decisions?

◉ real-life ≠ mathematical “clear+hard” decisions ◉ effectively demonstrating reluctance + renitency? ◉ stimulating intended behavior?

Civil Rights

slide-36
SLIDE 36

17.11.2015 thomas maus

Sketch for “Soft” Decision Making Preparation Phase

  • k random bits (≥key size)
  • key derivation function

◉ with carefully chosen stretching

  • ECC: correct erasures

◉ intended: quorum q ◉ recover < (1-q)·n missing bits

  • split secret to parties

◉ according voting weights ◉ encrypt with respective

public keys

◉ propagate within

  • paque records

KDF

random bits

ECC(q=75%)

ECCed bits part 1 part 2 part m

part 1 part 2 part m

slide-37
SLIDE 37

17.11.2015 thomas maus

Sketch for “Soft” Decision Making Decision Phase

  • each delegates withholds

◉ nothing at all ◉ part of share ◉ complete share

  • extent of denial

◉ < quorum q bits → efficient key recovery ◉ > q bits+some margin → list-decoding (polynominal) ◉ beyond → brute-force = exponential time …

  • fine-tuned effects of graded denial possible

◉ showing raising resistance non-detrimentally ◉ gradually slowing disclosure, forcing priorisation

  • democratic, decentralized mechanism!

part 1 part 2 part m

Civil Rights

part 2 part m

… ✘

slide-38
SLIDE 38

17.11.2015 thomas maus

Thank You for Your Attention!

  • Thomas Maus

◉ thomas.maus alumni.uni-karlsruhe.de

  • Questions?
  • Discussion …