I MPROVED S TRONGLY D ENIABLE A UTHENTICATED K EY E XCHANGES F OR S - - PowerPoint PPT Presentation

i mproved s trongly d eniable a uthenticated k ey e
SMART_READER_LITE
LIVE PREVIEW

I MPROVED S TRONGLY D ENIABLE A UTHENTICATED K EY E XCHANGES F OR S - - PowerPoint PPT Presentation

I MPROVED S TRONGLY D ENIABLE A UTHENTICATED K EY E XCHANGES F OR S ECURE M ESSAGING Nik Unger and Ian Goldberg Secure Messaging 2 Secure Messaging All-Verifier Deniable Anonymous Authentication End-to Authentication End Zone


slide-1
SLIDE 1

IMPROVED STRONGLY DENIABLE AUTHENTICATED KEY EXCHANGES FOR SECURE MESSAGING

Nik Unger

and

Ian Goldberg

slide-2
SLIDE 2

2

Secure Messaging

slide-3
SLIDE 3

3

Secure Messaging

Confidentiality Authentication Plaintext TLS to Server End-to End Zone “All-Verifier” Authentication Anonymous Deniable Authentication (OTR, Signal)

slide-4
SLIDE 4

4

Why Deniability?

slide-5
SLIDE 5

5

Deniable Messaging

A B

<B> there’s a protest about it tomorrow <B> want to go? <A> Yes! <B> ok, no phones Crypto Magic

slide-6
SLIDE 6

6

Deniable Messaging

<B> there’s a protest about it tomorrow <B> want to go? <A> Yes! <B> ok, no phones

slide-7
SLIDE 7

7

Deniable Messaging…?

A B

slide-8
SLIDE 8

8

Offline vs. Online Deniability

A B

<B> there’s a protest about it tomorrow <B> want to go? <A> Yes! <B> ok, no phones Crypto Magic

A B

Offline Deniability Online Deniability

slide-9
SLIDE 9

9

Deniable Messaging…?

  • See Appendix A

– Attacks on OTRv3 and Signal

  • Also see ia.cr/2018/424:
slide-10
SLIDE 10

10

Deniable Messaging

A B

slide-11
SLIDE 11

11

Deniable Messaging

A B

slide-12
SLIDE 12

12

In This Paper

  • Two new efficient key exchange protocols

Interactive Non-interactive

slide-13
SLIDE 13

13

Security Properties

  • Confidentiality
  • Mutual authentication
  • Forward secrecy
  • Contributiveness
  • Offline and online deniability
slide-14
SLIDE 14

14

Crypto Toolbox

Identity key (long-term asymmetric) Ephemeral key (short-term asymmetric) Diffie-Hellman shared secret Shared session key (symmetric)

slide-15
SLIDE 15

15

Crypto Toolbox

ID key Eph. key Diffie-Hellman shared secret

Signature MAC Ring signature

Create: need private Verify: need public Create: need Verify: need Create: need one private , , or Verify: need all public , , and Sym. key

slide-16
SLIDE 16

16

Crypto Toolbox

Diffie-Hellman shared secret Signature MAC Ring signature ID key Eph. key Sym. key

slide-17
SLIDE 17

17

Deniable Authenticated Key Exchanges

A B

DAKE

Secure messaging protocol

slide-18
SLIDE 18

18

DAKEZ

A B

Shared key ( ):

Diffie-Hellman shared secret Signature MAC Ring signature ID key Eph. key Sym. key

slide-19
SLIDE 19

19

DAKEZ: Authentication

A B

Shared key ( ):

Diffie-Hellman shared secret Signature MAC Ring signature ID key Eph. key Sym. key

Nobody else knows

  • r ,

so they know

slide-20
SLIDE 20

20

B

DAKEZ: Authentication

A

Shared key ( ):

Diffie-Hellman shared secret Signature MAC Ring signature ID key Eph. key Sym. key

Nobody else knows

  • r ,

so they know

slide-21
SLIDE 21

21

DAKEZ: Offline Deniability

F F

Shared key ( ):

Diffie-Hellman shared secret Signature MAC Ring signature ID key Eph. key Sym. key

slide-22
SLIDE 22

22

DAKEZ: Online Deniability

A

Shared key ( ):

Diffie-Hellman shared secret Signature MAC Ring signature ID key Eph. key Sym. key

A

B

slide-23
SLIDE 23

23

Mobile?

slide-24
SLIDE 24

24

Mobile Use

A B

“Prekeys” Recipient ID Message Message

slide-25
SLIDE 25

25

ZDH

A B

Shared key ( ):

Diffie-Hellman shared secret Signature MAC Ring signature ID key Eph. key Sym. key

&

slide-26
SLIDE 26

26

ZDH: Authentication

A B

Shared key ( ):

Diffie-Hellman shared secret Signature MAC Ring signature ID key Eph. key Sym. key

& Nobody else knows so any reader must know

slide-27
SLIDE 27

27

Weak Forward Secrecy

A B

(Ciphertext for & )

Collect (Time passes) (Like Signal, originally)

slide-28
SLIDE 28

28

XZDH

A B

Shared key ( ):

Diffie-Hellman shared secret Signature MAC Ring signature ID key Eph. key Sym. key

& &

slide-29
SLIDE 29

29

Is This Secure?

slide-30
SLIDE 30

30

Is This Secure?

“Yes.”

slide-31
SLIDE 31

31

OTRv4 Adoption

  • External adoption: OTRv4 team
slide-32
SLIDE 32

32

Performance

SIGMA-R (OTRv3) DAKEZ (OTRv4) 3DH ZDH X3DH (Signal) XZDH (OTRv4) Key Gen. (ms) 0.0240 0.0440 0.0228 0.0429 0.0240 0.0444 Key Exch. (ms) 0.3478 1.094 0.4229 0.778 0.5533 0.9217 ID Key (bytes) 32 32 32 32 32 32 Prekey (bytes)

  • 32

32 32 & 96 32 & 96 Key Exch. (bytes) 272 464 80 304 80 304

slide-33
SLIDE 33

33

Extras in the Paper

slide-34
SLIDE 34

34

Extras in the Paper

Quantum- resistant transitional security

A B

Efficient dual-receiver encryption

A “B”

Defeating key-compromise impersonation Implementation details & advice

slide-35
SLIDE 35

35

Summary

  • New key exchanges: DAKEZ, (X)ZDH
  • Secure connection, eponymous, no all-verifier

authentication required? Use these!

  • Code & data: crysp.org/software/dakez_xzdh
  • Come see OTRv4 at HotPETs
  • Coming soon: group messaging

Thank you! njunger@uwaterloo.ca

slide-36
SLIDE 36

36

You’ve Activated My Bonus Slides!!!

slide-37
SLIDE 37

37

Limited Online Deniability

A B

“Prekeys”

Recipient ID , Auth, Msg Auth with , Auth, Msg

slide-38
SLIDE 38

38

RSDAKE and Spawn

  • Standard model

Random oracle model

  • – Obscure assumptions

common assumptions

  • – Seconds

milliseconds

  • – Improved security (contributiveness, forward

secrecy)

  • RSDAKE

DAKEZ

  • Spawn

ZDH

slide-39
SLIDE 39

39

DAKE Comparison

slide-40
SLIDE 40

40

Signal Deniability

IKA IKB EKA EKB 1 2 1 3 IKA IKB EKA SPKB OTKB 1 2 1 3 4

3DH X3DH

slide-41
SLIDE 41

41

Lack of Contributiveness

  • Problems with non-contributory:

– Can coerce a client to use a known secret – Can use a secret known to a third-party, allowing

them to decrypt without their consent

  • Non-problems with non-contributory:

– Contributiveness does not prevent desirable bits – Contributiveness does not defend against weak

PRNGs

slide-42
SLIDE 42

42

ZDH

A B

Shared key ( ):

Diffie-Hellman shared secret Signature MAC Ring signature ID key Eph. key Sym. key

&

slide-43
SLIDE 43

43

ZDH: Authentication

A B

Shared key ( ):

Diffie-Hellman shared secret Signature MAC Ring signature ID key Eph. key Sym. key

& Nobody else knows

  • r ,

so they know . They also know

slide-44
SLIDE 44

44

Mitigating KCI Attacks

A B

Shared key ( ):

Diffie-Hellman shared secret Signature MAC Ring signature ID key Eph. key Sym. key

slide-45
SLIDE 45

45

Online Deniability Attack for Signal

  • (Alice is coerced by Judson)
  • Alice downloads Bob’s prekey: IKB, SPKB,

Sig(IKB, Encode(SPKB))

  • Judson generates key pair with public EKA
  • Alice provably reveals DH(IKA, SPKA)
  • Alice sends EKA to Bob
  • Judson can compute the secret, Alice cannot
slide-46
SLIDE 46

46

Quantum Transitional Security

  • Authenticate quantum KEM, like CECPK1
slide-47
SLIDE 47

47

DAKEZ

slide-48
SLIDE 48

48

ZDH & XZDH