cryptographic enforcement of segregation of duty
play

Cryptographic Enforcement of Segregation of Duty , - PowerPoint PPT Presentation

Cryptographic Enforcement of Segregation of Duty , old russian proverb rely yet verify 17.11.2015 thomas maus DeepSec 2015 Thomas Maus thomas.maus alumni.uni-karlsruhe.de


  1. Cryptographic Enforcement of Segregation of Duty ● “доверяй, но проверяй” – old russian proverb “ rely yet verify ” 17.11.2015 thomas maus ● DeepSec 2015 ● Thomas Maus ◉ thomas.maus alumni.uni-karlsruhe.de

  2. Introduction ● started with IT 1979 – school experiment ● Computer Science, University of Karlsruhe ◉ study + research ◉ EISS = European Institute of System Security ● 1993: self-employed IT security consultant ● some representive talks: ◉ risk analysis + mgmt (DECUS 2003 + others) 17.11.2015 thomas maus ◉ eHealth (in)security (21C3+22C3, various others) ◉ crypto-analytic password quality measures (various) ◉ RFID (in)security (various) ◉ Tale Telling Timings (various)

  3. Introduction … ● home-town: Trier ◉ situated between Eifel and Hunsrück ◉ low population density ➜ scarce public transport facilities ● hitchhiking? ◉ too dangerous … 17.11.2015 thomas maus

  4. Introduction … ● IT supported + secured hitchhiking? ● objectives: ◉ anonymity as far as possible ◎ at least strong pseudonymity ◎ no tracking ◉ crime prevention + prosecution ◎ mutually verifiable registration status ◎ “on-line” transaction registry 17.11.2015 thomas maus ◎ tracking of missing persons by police + next of kin ◉ coordination + matching of travel opportunities and wishes ◉ integration into public transport system ◎ tickets ◎ payment of transport providers

  5. Introduction … ● school administration SW of federal state ◉ developed by participants of school experiment ◉ i.e. mostly by pupils! ◉ chosen by proven computer versatility ◉ e.g. successful hacking of school computer ;-) ● challenge: ◉ forestall impeachment of pupil programmer's 17.11.2015 thomas maus graduation diploma ◉ build confidence in correctness → reliance

  6. Introductory Conclusions ● multi-lateral security needed ● multiple security dimensions ◉ “classical”: confidentiality+integrity+availability ◉ correctness ◉ verifiability / auditability ◉ separation of duties ◉ non-repudation / proof of volition vs. error 17.11.2015 thomas maus ◉ privacy ◎ transparency + control for subject ◎ non-traceability / data minimization ◎ robustness against inference and extrapolation ◉ …

  7. Example for Illustration: Data Retention ● soft or social Science Fiction ◉ “how a technology could transform a society” ◉ hard science core = cryptography ◎ ¼ century around: public-key cryptography ◎ construct of ideas open for debate ◉ soft socio-political outer shell ◎ fictional stances of society and various personas ◎ only for demonstration purposes 17.11.2015 thomas maus ◎ suspense of disbelief requested

  8. Visualization of Cryptographic Instruments ● asymmetric keys of cyan persona (Alice) ◉ private key ◉ public key ● asymmetric keys of red persona (Bob) ● usage examples ◉ sealed (signed) with red private key content- ⚜ ⚜ ◉ encrypted with cyan public key content 17.11.2015 thomas maus ◉ first sealed, then encrypted content- ⚜ ⚜ ◉ first encrypted, then sealed content ⚜ ⚜ ◉ typically implicit and invisible: symmetric keys ◉ decryption possible by Alice or Bob, with detached seal by Carol content ⚜ ⚜

  9. Our fictitious Society: Dramatis Personae ● civil society ◉ constitutional democracy ◉ politically participating citizens (citoyen) ◉ civil rights organisations ● investigative authorities ◉ police detectives ◉ public prosecutor 17.11.2015 thomas maus ● examining magistrate (=Ermittlungsrichter) ● (federal) privacy commissioner ● telecommunication service providers

  10. Civil Rights Dramatis Personae: Civil Society ● ultimate democratic sovereign ◉ votes + referenda ◉ political parties ◉ NGOs ● objectives ◉ active political participation ◉ protect ◎ 17.11.2015 thomas maus constitutional democracy ◎ fundamental human + civil rights ◉ vigilant about ◎ panopticon effect ◎ correct exercise of office by representatives + officials ◉ crime prevention + prosecution

  11. Dramatis Personae: Investigative Authorities ● obligations ◉ crime investigation for prevention + prosecution ● conflicting interests ◉ fundamental civil rights ◎ privacy of correspondence, posts + telecommunications ◎ privacy of the home ◎ … ● intentions 17.11.2015 thomas maus ◉ tactical secrecy of investigation ◉ earning + keeping public confidence ◉ auditability ◉ exoneration capabilities ● public prosecutor's keys

  12. Dramatis Personae: Examining Magistrate ● obligations ◉ individual decisions within legal framework ◉ crime investigation ↔ fundamental rights ● conflicting interests ◉ enable optimal crime investigation ◉ protect fundamental civil rights ● intentions 17.11.2015 thomas maus ◉ tactical secrecy of investigation ◉ earning + keeping public confidence ◉ auditability ◉ exoneration capabilities ● examining magistrate's keys

  13. ☂ Dramatis Personae: Federal Privacy Commissioner ● obligations ◉ formal control of disclosure requests ◉ official auditing + statistics + reporting ◉ investigation + information in special cases: e.g. medical doctors, lawyers, priests, … ◉ official investigation of complaints ◉ destruction of own private key in certain cases ● intentions 17.11.2015 thomas maus ◉ protection of fundamental rights within statutes ◉ earning + keeping public confidence ● federal privacy commissioner's keys

  14. Dramatis Personae: Telecommunication ✆ Service Providers ● obligations ◉ provide legally required data structures to investigation authorities ● intentions ◉ compliance ◉ minimal involvement ◉ exoneration capabilities 17.11.2015 thomas maus ➜ rapid erasure of cleartext connection data ● telecommunication provider's keys (pars pro toto)

  15. Manifold Imaginable Socio-Political Decisions ● much flexibility needed within framework! ● creative leeway + areas of decisions ◉ initial data for investigation services? ◉ keeper of data? ◉ sequence of workflows? ◉ veto powers? ◉ … 17.11.2015 thomas maus

  16. Initial Data for Investigation Services ● selection of data to be disclosed ● general data structure ◉ “handle” → “opaque protected data” ◉ “handle” = ◎ information freely available to investigators ◎ not perceived as impairing fundamental rights ◉ “opaque protected data” = ◎ information pertaining to fundamental rights 17.11.2015 thomas maus ◎ accessible only via safeguarded procedure ○ crypto-enforced ○ segregation of duty ○ review + control ○ auditability

  17. Initial Data: The “Handle” ● subset of communication data as selector ● example of inappropriate handles ◉ (calling id, precise start time, precise end time) ◉ (called id, precise start time, precise end time) ☢ correlate time stamps → infere speaking parties ● dilution of precision / obscuration of handles! ◉ protection against inference + extrapolation 17.11.2015 thomas maus ◉ balanced with specificity ● example of diluted handles ◉ (calling id, diluted start time, diluted duration) ◉ (called id, diluted start time, diluted duration) ◉ (diluted location, diluted time period)

  18. Initial Data: The “Handle” ● subset of communication data as selector ● example of inappropriate handles ◉ (calling id, precise start time, precise end time) ◉ (called id, precise start time, precise end time) e.g. ☢ correlate time stamps → infere speaking parties ● per minute ● ⌊5 minutes⌋ ● dilution of precision / obscuration of handles! ● ⌊¼ hours⌋ ◉ protection against inference + extrapolation ● … 17.11.2015 thomas maus ◉ balanced with specificity ● depending on time-of-day ● example of diluted handles ◉ (calling id, diluted start time, diluted duration) ◉ (called id, diluted start time, diluted duration) ◉ (diluted location, diluted time period)

  19. Initial Data: The “Handle” ● subset of communication data as selector ● example of inappropriate handles ◉ (calling id, precise start time, precise end time) ◉ (called id, precise start time, precise end time) ☢ correlate time stamps → infere speaking parties e.g. ● dilution of precision / obscuration of handles! ● per minute ◉ protection against inference + extrapolation ● {<1, <2, <3, <5, <10, <15, …} minutes 17.11.2015 thomas maus ◉ balanced with specificity ● example of diluted handles ◉ (calling id, diluted start time, diluted duration) ◉ (called id, diluted start time, diluted duration) ◉ (diluted location, diluted time period)

  20. Initial Data: The “Handle” ● subset of communication data as selector ● example of inappropriate handles ◉ (calling id, precise start time, precise end time) ◉ (called id, precise start time, precise end time) ☢ correlate time stamps → infere speaking parties ● dilution of precision / obscuration of handles! e.g. ◉ protection against inference + extrapolation ● cell base station 17.11.2015 thomas maus ● precinct ◉ balanced with specificity ● geo coord ⌊arc minute⌋ ● example of diluted handles ● … ◉ (calling id, diluted start time, diluted duration) ● depending on area ◉ (called id, diluted start time, diluted duration) ◉ (diluted location, diluted time period)

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend