Diffusion and a Key-Recovery Attack on a WM Scheme by Li and Yuan - - PowerPoint PPT Presentation

diffusion
SMART_READER_LITE
LIVE PREVIEW

Diffusion and a Key-Recovery Attack on a WM Scheme by Li and Yuan - - PowerPoint PPT Presentation

Diffusion and a Key-Recovery Attack on a WM Scheme by Li and Yuan (Hans) Georg Schaathun Department of Computing University of Surrey 22-23 September 2008 (Hans) Georg Schaathun Diffusion 22-23 September 2008 1 / 23 Do not reuse the key


slide-1
SLIDE 1

Diffusion

and a Key-Recovery Attack on a WM Scheme by Li and Yuan (Hans) Georg Schaathun

Department of Computing University of Surrey

22-23 September 2008

(Hans) Georg Schaathun Diffusion 22-23 September 2008 1 / 23

slide-2
SLIDE 2

Do not reuse the key

Andrew Ker

Keys are reused in cryptography

The one-time pad is not practical

The solution is diffusion

Each key bit is spread widely across output Dependendy between key and output is too complex for analysis

We shall see lack of diffusion later (stay awake)

(Hans) Georg Schaathun Diffusion 22-23 September 2008 2 / 23

slide-3
SLIDE 3

Watermarking is not Cryptography

Ingemar Cox

If we don’t study watermarking as a cryptographic problem, how do you know that cryptanalysis cannot break it? If it can be cast as a cryptographic problem

you have to use cryptology in the design, because your adversary may use it in the attack

Cryptology is a methodology, not just a series of primitives Admittedly, Li-Yuan is better seen as a layered system

We break the cryptological layer We do not touch the watermarking layer (embedding)

i.e. Cox’ view may stand . . . for now

(Hans) Georg Schaathun Diffusion 22-23 September 2008 3 / 23

slide-4
SLIDE 4

Watermarking is not Cryptography

Ingemar Cox

If we don’t study watermarking as a cryptographic problem, how do you know that cryptanalysis cannot break it? If it can be cast as a cryptographic problem

you have to use cryptology in the design, because your adversary may use it in the attack

Cryptology is a methodology, not just a series of primitives Admittedly, Li-Yuan is better seen as a layered system

We break the cryptological layer We do not touch the watermarking layer (embedding)

i.e. Cox’ view may stand . . . for now

(Hans) Georg Schaathun Diffusion 22-23 September 2008 3 / 23

slide-5
SLIDE 5

Watermarking is not Cryptography

Ingemar Cox

If we don’t study watermarking as a cryptographic problem, how do you know that cryptanalysis cannot break it? If it can be cast as a cryptographic problem

you have to use cryptology in the design, because your adversary may use it in the attack

Cryptology is a methodology, not just a series of primitives Admittedly, Li-Yuan is better seen as a layered system

We break the cryptological layer We do not touch the watermarking layer (embedding)

i.e. Cox’ view may stand . . . for now

(Hans) Georg Schaathun Diffusion 22-23 September 2008 3 / 23

slide-6
SLIDE 6

Authentication and Watermarking

Outline

1

Authentication and Watermarking

2

Li-Yuan Authentication WM

3

How to break it

4

How to fix it – maybe

5

Closure

(Hans) Georg Schaathun Diffusion 22-23 September 2008 4 / 23

slide-7
SLIDE 7

Authentication and Watermarking

Digital Watermarking

Embedding Extractor

Message Recovered Host File

Digital Watermarking ‘hides’ a message in another file (the host) The watermarked image can replace the cover

Perceptually Equivalent

In fragile watermarking

The host cannot be modified without destroying the hidden message

In robust watermarking

The hidden message cannot be modified or destroyed without destroying the host

(Hans) Georg Schaathun Diffusion 22-23 September 2008 5 / 23

slide-8
SLIDE 8

Authentication and Watermarking

Digital Watermarking

Embedding Extractor

Message Recovered Host File

Digital Watermarking ‘hides’ a message in another file (the host) The watermarked image can replace the cover

Perceptually Equivalent

In fragile watermarking

The host cannot be modified without destroying the hidden message

In robust watermarking

The hidden message cannot be modified or destroyed without destroying the host

(Hans) Georg Schaathun Diffusion 22-23 September 2008 5 / 23

slide-9
SLIDE 9

Authentication and Watermarking

Digital Watermarking

Embedding Extractor

Message Recovered Host File

Digital Watermarking ‘hides’ a message in another file (the host) The watermarked image can replace the cover

Perceptually Equivalent

In fragile watermarking

The host cannot be modified without destroying the hidden message

In robust watermarking

The hidden message cannot be modified or destroyed without destroying the host

(Hans) Georg Schaathun Diffusion 22-23 September 2008 5 / 23

slide-10
SLIDE 10

Authentication and Watermarking

Digital Watermarking

Embedding Extractor

Message Recovered Key Host File

Digital Watermarking ‘hides’ a message in another file (the host) The watermarked image can replace the cover

Perceptually Equivalent

In fragile watermarking

The host cannot be modified without destroying the hidden message

In robust watermarking

The hidden message cannot be modified or destroyed without destroying the host

(Hans) Georg Schaathun Diffusion 22-23 September 2008 5 / 23

slide-11
SLIDE 11

Authentication and Watermarking

The Authentication Problem

Alice sends a message to Bob Bob wants to assure that it is authentic

(Hans) Georg Schaathun Diffusion 22-23 September 2008 6 / 23

slide-12
SLIDE 12

Authentication and Watermarking

The Authentication Problem

Alice sends a message to Bob Bob wants to assure that it is authentic Eve wants to modify the message and fool Bob

(Hans) Georg Schaathun Diffusion 22-23 September 2008 6 / 23

slide-13
SLIDE 13

Authentication and Watermarking

Authentication Techniques

Cryptograhic solutions

Message Authentication Code (MAC) – Secret Key Digital Signatures – Public Key

Watermarking embeds Authentication Information in the file

no appended signature to handle everything fits into the host file format

Creating and attacking the authentication information

remains a cryptological prolem layered system (here Cox and I agree)

It does not matter if the designer agrees

I, as an attacker, can use cryptology anyway

(Hans) Georg Schaathun Diffusion 22-23 September 2008 7 / 23

slide-14
SLIDE 14

Authentication and Watermarking

Authentication Techniques

Cryptograhic solutions

Message Authentication Code (MAC) – Secret Key Digital Signatures – Public Key

Watermarking embeds Authentication Information in the file

no appended signature to handle everything fits into the host file format

Creating and attacking the authentication information

remains a cryptological prolem layered system (here Cox and I agree)

It does not matter if the designer agrees

I, as an attacker, can use cryptology anyway

(Hans) Georg Schaathun Diffusion 22-23 September 2008 7 / 23

slide-15
SLIDE 15

Authentication and Watermarking

Authentication Techniques

Cryptograhic solutions

Message Authentication Code (MAC) – Secret Key Digital Signatures – Public Key

Watermarking embeds Authentication Information in the file

no appended signature to handle everything fits into the host file format

Creating and attacking the authentication information

remains a cryptological prolem layered system (here Cox and I agree)

It does not matter if the designer agrees

I, as an attacker, can use cryptology anyway

(Hans) Georg Schaathun Diffusion 22-23 September 2008 7 / 23

slide-16
SLIDE 16

Authentication and Watermarking

Cryptography

Authentication Techniques

Cryptograhic solutions

Message Authentication Code (MAC) – Secret Key Digital Signatures – Public Key

Certificate of Authenticity (Signature or MAC)

... appended to the message does not fit into standard file formats

Only Alice can produce a valid certificate

well-studied and trusted technology mathematical security

(Hans) Georg Schaathun Diffusion 22-23 September 2008 8 / 23

slide-17
SLIDE 17

Authentication and Watermarking

Cryptography

Authentication Techniques

Cryptograhic solutions

Message Authentication Code (MAC) – Secret Key Digital Signatures – Public Key

Certificate of Authenticity (Signature or MAC)

... appended to the message does not fit into standard file formats

Only Alice can produce a valid certificate

well-studied and trusted technology mathematical security

(Hans) Georg Schaathun Diffusion 22-23 September 2008 8 / 23

slide-18
SLIDE 18

Authentication and Watermarking

Cryptography

Authentication Techniques

Cryptograhic solutions

Message Authentication Code (MAC) – Secret Key Digital Signatures – Public Key

Certificate of Authenticity (Signature or MAC)

... appended to the message does not fit into standard file formats

Only Alice can produce a valid certificate

well-studied and trusted technology mathematical security

(Hans) Georg Schaathun Diffusion 22-23 September 2008 8 / 23

slide-19
SLIDE 19

Authentication and Watermarking

Cryptography

Authentication Techniques

Cryptograhic solutions

Message Authentication Code (MAC) – Secret Key Digital Signatures – Public Key

Certificate of Authenticity (Signature or MAC)

... appended to the message does not fit into standard file formats

Only Alice can produce a valid certificate

well-studied and trusted technology mathematical security

(Hans) Georg Schaathun Diffusion 22-23 September 2008 8 / 23

slide-20
SLIDE 20

Authentication and Watermarking

Authentication Watermarking

Authentication information is embedded in the file

no appended signature to handle everything fits into the host file format

Some watermarking systems offer extra advantages

localisation of changes/errors further analysis of modification processes

Creating and attacking the authentication information

remains a cryptological prolem layered system (here Cox and I agree)

(Hans) Georg Schaathun Diffusion 22-23 September 2008 9 / 23

slide-21
SLIDE 21

Authentication and Watermarking

Authentication Watermarking

Authentication information is embedded in the file

no appended signature to handle everything fits into the host file format

Some watermarking systems offer extra advantages

localisation of changes/errors further analysis of modification processes

Creating and attacking the authentication information

remains a cryptological prolem layered system (here Cox and I agree)

(Hans) Georg Schaathun Diffusion 22-23 September 2008 9 / 23

slide-22
SLIDE 22

Authentication and Watermarking

Authentication Watermarking

Authentication information is embedded in the file

no appended signature to handle everything fits into the host file format

Some watermarking systems offer extra advantages

localisation of changes/errors further analysis of modification processes

Creating and attacking the authentication information

remains a cryptological prolem layered system (here Cox and I agree)

(Hans) Georg Schaathun Diffusion 22-23 September 2008 9 / 23

slide-23
SLIDE 23

Li-Yuan Authentication WM

Outline

1

Authentication and Watermarking

2

Li-Yuan Authentication WM

3

How to break it

4

How to fix it – maybe

5

Closure

(Hans) Georg Schaathun Diffusion 22-23 September 2008 10 / 23

slide-24
SLIDE 24

Li-Yuan Authentication WM

The Li-Yuan System

Symbols and definitions

M × N 8-bit grayscale image image I(x, y) Security parameter b

Discard the b least significant bits of each pixel → significant image S(x, y)

Secret watermark image w

M × N matrix of b-bits per item (pixel) A shorter key can be expanded using a secure PRNG

Let a(x, y) denote the authentication information

b bits per pixel (to be computed)

The watermarked image will be generated as W(x, y) = 2bS(x, y) + a(x, y),

(Hans) Georg Schaathun Diffusion 22-23 September 2008 11 / 23

slide-25
SLIDE 25

Li-Yuan Authentication WM

The Li-Yuan System

Symbols and definitions

M × N 8-bit grayscale image image I(x, y) Security parameter b

Discard the b least significant bits of each pixel → significant image S(x, y)

Secret watermark image w

M × N matrix of b-bits per item (pixel) A shorter key can be expanded using a secure PRNG

Let a(x, y) denote the authentication information

b bits per pixel (to be computed)

The watermarked image will be generated as W(x, y) = 2bS(x, y) + a(x, y),

(Hans) Georg Schaathun Diffusion 22-23 September 2008 11 / 23

slide-26
SLIDE 26

Li-Yuan Authentication WM

The Li-Yuan System

Symbols and definitions

M × N 8-bit grayscale image image I(x, y) Security parameter b

Discard the b least significant bits of each pixel → significant image S(x, y)

Secret watermark image w

M × N matrix of b-bits per item (pixel) A shorter key can be expanded using a secure PRNG

Let a(x, y) denote the authentication information

b bits per pixel (to be computed)

The watermarked image will be generated as W(x, y) = 2bS(x, y) + a(x, y),

(Hans) Georg Schaathun Diffusion 22-23 September 2008 11 / 23

slide-27
SLIDE 27

Li-Yuan Authentication WM

The Li-Yuan System

Symbols and definitions

M × N 8-bit grayscale image image I(x, y) Security parameter b

Discard the b least significant bits of each pixel → significant image S(x, y)

Secret watermark image w

M × N matrix of b-bits per item (pixel) A shorter key can be expanded using a secure PRNG

Let a(x, y) denote the authentication information

b bits per pixel (to be computed)

The watermarked image will be generated as W(x, y) = 2bS(x, y) + a(x, y),

(Hans) Georg Schaathun Diffusion 22-23 September 2008 11 / 23

slide-28
SLIDE 28

Li-Yuan Authentication WM

The Li-Yuan System

Symbols and definitions

M × N 8-bit grayscale image image I(x, y) Security parameter b

Discard the b least significant bits of each pixel → significant image S(x, y)

Secret watermark image w

M × N matrix of b-bits per item (pixel) A shorter key can be expanded using a secure PRNG

Let a(x, y) denote the authentication information

b bits per pixel (to be computed)

The watermarked image will be generated as W(x, y) = 2bS(x, y) + a(x, y),

(Hans) Georg Schaathun Diffusion 22-23 September 2008 11 / 23

slide-29
SLIDE 29

Li-Yuan Authentication WM

A non-cryptographic hash

Calculating the authentication information

Main challenge: calculating a(x, y)

if Eve can calculate a(x, y) for a false image, ... she has broken the scheme

For each pixel (x, y), Consider a k × k square region Nk(x, y) around it A b-bit hash v(x, y) is calculated from

1

S on Nk(x, y)

2

least significant bits of w on Nk(x, y)

a(x, y) = v(x, y) ⊕ w(x, y) replace b LSB-s

(Hans) Georg Schaathun Diffusion 22-23 September 2008 12 / 23

slide-30
SLIDE 30

Li-Yuan Authentication WM

A non-cryptographic hash

Calculating the authentication information

Main challenge: calculating a(x, y)

if Eve can calculate a(x, y) for a false image, ... she has broken the scheme

For each pixel (x, y), Consider a k × k square region Nk(x, y) around it A b-bit hash v(x, y) is calculated from

1

S on Nk(x, y)

2

least significant bits of w on Nk(x, y)

a(x, y) = v(x, y) ⊕ w(x, y) replace b LSB-s

(Hans) Georg Schaathun Diffusion 22-23 September 2008 12 / 23

slide-31
SLIDE 31

Li-Yuan Authentication WM

A non-cryptographic hash

Calculating the authentication information

Main challenge: calculating a(x, y)

if Eve can calculate a(x, y) for a false image, ... she has broken the scheme

For each pixel (x, y), Consider a k × k square region Nk(x, y) around it A b-bit hash v(x, y) is calculated from

1

S on Nk(x, y)

2

least significant bits of w on Nk(x, y)

a(x, y) = v(x, y) ⊕ w(x, y) replace b LSB-s

(Hans) Georg Schaathun Diffusion 22-23 September 2008 12 / 23

slide-32
SLIDE 32

Li-Yuan Authentication WM

Extraction and Authentication

Extraction

v(x, y) is computed (hash of S) a(x, y) is extracted directly (= I mod 2b) Extracted watermark w′(x, y) = v(x, y) ⊕ a(x, y) Secret watermark w(x, y) is known

w′(x, y) = w(x, y) indicates an error

(Hans) Georg Schaathun Diffusion 22-23 September 2008 13 / 23

slide-33
SLIDE 33

How to break it

Outline

1

Authentication and Watermarking

2

Li-Yuan Authentication WM

3

How to break it

4

How to fix it – maybe

5

Closure

(Hans) Georg Schaathun Diffusion 22-23 September 2008 14 / 23

slide-34
SLIDE 34

How to break it

The problem

Each watermarked pixel (x, y) depend on 26 key bits

This includes 5 × 5 bits of κ := w mod 2 And one extra bit w(x, y) ‘encrypting’ v(x, y)

A key principle of cryptography is diffusion

Each output bit should depend on every key bit

Dependence on 26 bits is insufficient

An exhaustive search is possible work on 25 bits of κ at a time

Proper Diffusion would prevent the attack

(Hans) Georg Schaathun Diffusion 22-23 September 2008 15 / 23

slide-35
SLIDE 35

How to break it

The problem

Each watermarked pixel (x, y) depend on 26 key bits

This includes 5 × 5 bits of κ := w mod 2 And one extra bit w(x, y) ‘encrypting’ v(x, y)

A key principle of cryptography is diffusion

Each output bit should depend on every key bit

Dependence on 26 bits is insufficient

An exhaustive search is possible work on 25 bits of κ at a time

Proper Diffusion would prevent the attack

(Hans) Georg Schaathun Diffusion 22-23 September 2008 15 / 23

slide-36
SLIDE 36

How to break it

The problem

Each watermarked pixel (x, y) depend on 26 key bits

This includes 5 × 5 bits of κ := w mod 2 And one extra bit w(x, y) ‘encrypting’ v(x, y)

A key principle of cryptography is diffusion

Each output bit should depend on every key bit

Dependence on 26 bits is insufficient

An exhaustive search is possible work on 25 bits of κ at a time

Proper Diffusion would prevent the attack

(Hans) Georg Schaathun Diffusion 22-23 September 2008 15 / 23

slide-37
SLIDE 37

How to break it

The problem

Each watermarked pixel (x, y) depend on 26 key bits

This includes 5 × 5 bits of κ := w mod 2 And one extra bit w(x, y) ‘encrypting’ v(x, y)

A key principle of cryptography is diffusion

Each output bit should depend on every key bit

Dependence on 26 bits is insufficient

An exhaustive search is possible work on 25 bits of κ at a time

Proper Diffusion would prevent the attack

(Hans) Georg Schaathun Diffusion 22-23 September 2008 15 / 23

slide-38
SLIDE 38

How to break it

Assumptions

We need two known, watermarked images x1, x2

One image is not sufficient More images give faster decoding

We assume k = 5

We sketch improvements to be feasible for k > 5 ... but the details remain for future work ... the improvements depend on image properties

We assume b = 2

b > 2 makes the attack faster b = 1 makes it slower, but additional images can compensate (Note that Li and Yuan claim that increasing b increases security)

(Hans) Georg Schaathun Diffusion 22-23 September 2008 16 / 23

slide-39
SLIDE 39

How to break it

The idea

The first round

Consider a 5 × 5 block at a time Exhaustive search : 225 possible subkeys κ|N5(x, y) For each tentative subkey ˆ κ

1

Extract watermark w′

i (x, y) (i = 1, 2) from xi

2

Compare w′

1 and tentative key

w′

1(x, y) mod 2 = ˆ

κ(x, y) : reject ˆ κ

3

Compare w′

1 and w′ 2

w′

1(x, y) = w′ 2(x, y) : reject ˆ

κ

Three (3) bit comparisons are made

On average, one key in eight (23) pass the test

(Hans) Georg Schaathun Diffusion 22-23 September 2008 17 / 23

slide-40
SLIDE 40

How to break it

How to proceed

The rest of the idea

Each round considers a new 5 × 5 block

... overlapping with the first

Number of possible keys increase at first Rounds 2-3 add five key pixels each Round 4 add only 1 (6 × 6 = 36 pixels total) Rounds 5 and 7 add five pixels each Rounds 6, 8, and 9 add one pixel each

7 × 7 = 49 pixels covered after Round 9

Thereafter: expected number of tentative keys will decrease

(Hans) Georg Schaathun Diffusion 22-23 September 2008 18 / 23

slide-41
SLIDE 41

How to fix it – maybe

Outline

1

Authentication and Watermarking

2

Li-Yuan Authentication WM

3

How to break it

4

How to fix it – maybe

5

Closure

(Hans) Georg Schaathun Diffusion 22-23 September 2008 19 / 23

slide-42
SLIDE 42

How to fix it – maybe

Strong cryptography

Two problems

Short key : weak ‘cryptography’ at best

... exploited by the basic attack

Insufficient diffusion : non-cryptographic

... exploited by improvements (paper only)

a(x, y) requires the properties of a MAC

Eve knows several watermarked images (with S and a) Eve cannot produce a new image S′ with matching authentication information (a′).

A proper MAC would prevent our attack

There are some works using MAC-s in authentication watermarking ... and some works recognise the importance of cryptography, but use the wrong cryptographic properties.

(Hans) Georg Schaathun Diffusion 22-23 September 2008 20 / 23

slide-43
SLIDE 43

How to fix it – maybe

Strong cryptography

Two problems

Short key : weak ‘cryptography’ at best

... exploited by the basic attack

Insufficient diffusion : non-cryptographic

... exploited by improvements (paper only)

a(x, y) requires the properties of a MAC

Eve knows several watermarked images (with S and a) Eve cannot produce a new image S′ with matching authentication information (a′).

A proper MAC would prevent our attack

There are some works using MAC-s in authentication watermarking ... and some works recognise the importance of cryptography, but use the wrong cryptographic properties.

(Hans) Georg Schaathun Diffusion 22-23 September 2008 20 / 23

slide-44
SLIDE 44

How to fix it – maybe

Strong cryptography

Two problems

Short key : weak ‘cryptography’ at best

... exploited by the basic attack

Insufficient diffusion : non-cryptographic

... exploited by improvements (paper only)

a(x, y) requires the properties of a MAC

Eve knows several watermarked images (with S and a) Eve cannot produce a new image S′ with matching authentication information (a′).

A proper MAC would prevent our attack

There are some works using MAC-s in authentication watermarking ... and some works recognise the importance of cryptography, but use the wrong cryptographic properties.

(Hans) Georg Schaathun Diffusion 22-23 September 2008 20 / 23

slide-45
SLIDE 45

How to fix it – maybe

The Design Parameters

Decreasing b

Fewer keys are excluded in each round But hash collisions become more frequent

Increasing k

More keys to consider per round However, if a monochrome region can be found in the image,

Only k 2 (not 2k2) keys have to be considered By exploiting the simple additive structure of S(x, y) And increasing k will have marginal effect...

(Hans) Georg Schaathun Diffusion 22-23 September 2008 21 / 23

slide-46
SLIDE 46

Closure

Outline

1

Authentication and Watermarking

2

Li-Yuan Authentication WM

3

How to break it

4

How to fix it – maybe

5

Closure

(Hans) Georg Schaathun Diffusion 22-23 September 2008 22 / 23

slide-47
SLIDE 47

Closure

Conclusion

Key-Recovery Attack Algorithm on Li and Yuan’s Scheme Cryptological principles apply

If the designer ignores them, then the attacker can exploit them

Open problem

Implement and test the algorithm How secure are other watermarking systems?

(Hans) Georg Schaathun Diffusion 22-23 September 2008 23 / 23

slide-48
SLIDE 48

Closure

Conclusion

Key-Recovery Attack Algorithm on Li and Yuan’s Scheme Cryptological principles apply

If the designer ignores them, then the attacker can exploit them

Open problem

Implement and test the algorithm How secure are other watermarking systems?

(Hans) Georg Schaathun Diffusion 22-23 September 2008 23 / 23