deduction with xor constraints in security api modelling
play

Deduction with XOR Constraints in Security API Modelling Graham - PowerPoint PPT Presentation

Deduction with XOR Constraints in Security API Modelling Graham Steel V I N E U R S E I H T Y T O H F G R E U D B I N 1 Automated Teller Machines ATM Maestro UK Hansabank HSBC Graham Steel XOR and Security APIs


  1. Deduction with XOR Constraints in Security API Modelling Graham Steel V I N E U R S E I H T Y T O H F G R E U D B I N

  2. 1 Automated Teller Machines ATM Maestro UK Hansabank HSBC Graham Steel XOR and Security APIs July 19, 2005

  3. Hardware Security Modules 2 Graham Steel XOR and Security APIs July 19, 2005

  4. �✁ ☎ ✂ ✄ ✁ �✁ ✁ ✂ ✁ ✂ ✄ �✁ ☎ 3 IBM 4758 - Control Vectors Mechanism to support many types of key: ‘role based access’ Keys stored outside box encrypted under master key XOR control vector E.g. data keys d1 km data Encrypt Data: Host HSM : d1 data , message km HSM Host : message d1 Graham Steel XOR and Security APIs July 19, 2005

  5. �✁ ✂ ✄ � ✄ ✂ ✁ ✂ ✁ �✁ ✄ ☎ ✄ ✄ ☎ ✁ �✁ ☎ � ☎ 4 Importing Key Parts ‘Separation of duty’ Typically used to import a ‘key encrypting key’ (kek) Key kek = k1 k2 Host HSM : k1, TYPE HSM Host : k1 km kp TYPE Host HSM : k1 TYPE , k2, TYPE km kp HSM Host : k1 k2 km TYPE Graham Steel XOR and Security APIs July 19, 2005

  6. ✄ ☎ �✁ �✁ ✂ ☎ ✁ ✄ ✄ ✁ ✂ ✂ �✁ �✁ ✂ ✁ � ✄ ✁ 5 Importing Encrypted Keys Exported from another 4758 under KEK TYPE First import KEK, obtaining KEK km imp Host HSM : KEY1 TYPE , TYPE, KEK KEK km imp HSM Host : KEY1 km TYPE Graham Steel XOR and Security APIs July 19, 2005

  7. ☎ ✁ ✁ ☎ ✄ � ✄ � ✄ ✂ ✁ ✂ � �✁ � �✁ ✄ � ✄ ✄ ✁ ✂ �✁ �✁ � ✂ 6 Attack (Bond, 2001) PIN derivation key: pdk kek pin kek k3 kp for known k3 Have key part km imp kek k3 imp , k3 pin data , imp Host HSM : km kp kek pin data HSM Host : km imp Graham Steel XOR and Security APIs July 19, 2005

  8. �✁ ✁ ✂ ✄ ☎ �✁ ✂ ✁ ✄ � ✂ �✁ ☎ ☎ ✄ ✁ ✂ ✁ ✄ � ☎ �✁ �✁ ✂ ✁ 7 Attack (Bond, 2001) (part 2) Key Import Host HSM : pdk pin , data, kek pin data kek km imp HSM Host : pdk km data Encrypt data Host HSM : pdk data , pan km HSM Host : pan pdk (= PIN!) Graham Steel XOR and Security APIs July 19, 2005

  9. ✁ ✁ �✁ � ✁ ☎ ✁ ✁ ✄ ✂ ✁ ✂ �✁ ✂ � ✄ ☎ � � � ✁ � � ✄ ☎ ✁ 8 Formal Modelling HSMs are ‘stateless’ P x if x is ‘public’ - i.e. outside HSM One clause for each command Host HSM : d1 data , message km HSM Host : message d1 P Msg P crypt km data D 1 P crypt D 1 Msg Graham Steel XOR and Security APIs July 19, 2005

  10. � � ✁ � � ✁ ✂ � � � ✁ ☎ 9 The Problem with XOR P x P y P x y Associativity and Commutativity Self-Inverse ( a b a b ) Graham Steel XOR and Security APIs July 19, 2005

  11. � � ✁ � � ☎ ✁ ✁ ✁ ✂ ✄ � ✁ ✄ � � ✄ � � � ☎ � ✁ ✄ � � ✁ ✂ ✁ � � ✄ ✂ ✁ ✁ ✁ ✄ � ✄ ☎ � � � � ✂ ✁ ✁ � ✄ ✄ ✁ ✂ � ✄ ✁ ✁ � ✁ �✁ ✂ ✄ ✄ ✄ ✁ � ✂ ✁ ✁ �✁ ✂ ✂ �✁ � ☎ ☎ � 10 XOR constraints Host HSM : KEY1 TYPE , TYPE, KEK KEK km imp HSM Host : KEY1 km TYPE P crypt X Key P Type P crypt km imp Kek ✁ ✁� P crypt km Type decrypt Kek Type crypt X Key decrypt K crypt K X X P crypt X Key P Type P crypt km imp Kek P crypt km Type Key IF Kek Type xor X Graham Steel XOR and Security APIs July 19, 2005

  12. � � � � � � � ✂ � � � 11 Checking Solubility Permit only inferences which leave soluble constraints Check: If there are any variables at XOR positions, it is soluble Otherwise count up all terms. If there are an even number of each term, it is soluble. If not, insoluble. Store in normal form x 1 x n t 1 t n Graham Steel XOR and Security APIs July 19, 2005

  13. 12 Subsumption Checking If C 1 subsumes C 2 without consideration of XOR constraints, then it is a valid subsumer iff: 1. C 1 has no XOR constraint or 2. C 1 and C 2 have the same XOR constraints after substitutions applied Graham Steel XOR and Security APIs July 19, 2005

  14. 13 Results T Implemented in da ac, [Vigneron, 1994] Bond’s attack shown above Import/Export Attack (also due to Bond) IBM’s own attack Attack on NSPKL variant - Jacquemard et al. model Graham Steel XOR and Security APIs July 19, 2005

  15. 14 4758 Attack 1 Graham Steel XOR and Security APIs July 19, 2005

  16. 15 Related Work Security APIs: Longley & Rigby, 1992 - Key management scheme without XOR Ganapathy et al, 2005 - Model checking for fragment of first attack Bond & Clulow - Work in progress on first-order model Protocols with XOR: Chevalier et al. , Comon-Shmatikov, 2003 - Insecurity shown decidable (bounded runs, NP). Basin, M¨ odersheim, Vigan` o, 2005 - General framework for OFMC (unimplemented) Graham Steel XOR and Security APIs July 19, 2005

  17. 16 Further Work Improve solving of final XOR constraint Look at new APIs for novel attacks Comparison to (special purpose) model checking PIN Block format analysis Graham Steel XOR and Security APIs July 19, 2005

  18. 17 Conclusions XOR constraints considerably improve reasoning capabilities of a FOTP when dealing with bitwise XOR Allow implicit encryption model to be used Allow forward, backward and mixed strategies Reduce explicit construction of terms by XOR http://dream.inf.ed.ac.uk/projects/aascs/ Graham Steel XOR and Security APIs July 19, 2005

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend