IMPROVED STRONGLY DENIABLE AUTHENTICATED KEY EXCHANGES FOR SECURE MESSAGING
Nik Unger
and
I MPROVED S TRONGLY D ENIABLE A UTHENTICATED K EY E XCHANGES F OR S - - PowerPoint PPT Presentation
I MPROVED S TRONGLY D ENIABLE A UTHENTICATED K EY E XCHANGES F OR S ECURE M ESSAGING Nik Unger and Ian Goldberg Secure Messaging 2 Secure Messaging All-Verifier Deniable Anonymous Authentication End-to Authentication End Zone
and
2
3
Confidentiality Authentication Plaintext TLS to Server End-to End Zone “All-Verifier” Authentication Anonymous Deniable Authentication (OTR, Signal)
4
5
A B
<B> there’s a protest about it tomorrow <B> want to go? <A> Yes! <B> ok, no phones Crypto Magic
6
<B> there’s a protest about it tomorrow <B> want to go? <A> Yes! <B> ok, no phones
7
A B
8
A B
<B> there’s a protest about it tomorrow <B> want to go? <A> Yes! <B> ok, no phones Crypto Magic
A B
9
– Attacks on OTRv3 and Signal
10
A B
11
A B
12
13
14
Identity key (long-term asymmetric) Ephemeral key (short-term asymmetric) Diffie-Hellman shared secret Shared session key (symmetric)
15
ID key Eph. key Diffie-Hellman shared secret
Create: need private Verify: need public Create: need Verify: need Create: need one private , , or Verify: need all public , , and Sym. key
16
Diffie-Hellman shared secret Signature MAC Ring signature ID key Eph. key Sym. key
17
A B
DAKE
18
A B
Shared key ( ):
Diffie-Hellman shared secret Signature MAC Ring signature ID key Eph. key Sym. key
19
A B
Shared key ( ):
Diffie-Hellman shared secret Signature MAC Ring signature ID key Eph. key Sym. key
Nobody else knows
so they know
20
B
A
Shared key ( ):
Diffie-Hellman shared secret Signature MAC Ring signature ID key Eph. key Sym. key
Nobody else knows
so they know
21
F F
Shared key ( ):
Diffie-Hellman shared secret Signature MAC Ring signature ID key Eph. key Sym. key
22
A
Shared key ( ):
Diffie-Hellman shared secret Signature MAC Ring signature ID key Eph. key Sym. key
A
B
23
24
A B
“Prekeys” Recipient ID Message Message
25
A B
Shared key ( ):
Diffie-Hellman shared secret Signature MAC Ring signature ID key Eph. key Sym. key
&
26
A B
Shared key ( ):
Diffie-Hellman shared secret Signature MAC Ring signature ID key Eph. key Sym. key
& Nobody else knows so any reader must know
27
A B
(Ciphertext for & )
Collect (Time passes) (Like Signal, originally)
28
A B
Shared key ( ):
Diffie-Hellman shared secret Signature MAC Ring signature ID key Eph. key Sym. key
& &
29
30
31
32
SIGMA-R (OTRv3) DAKEZ (OTRv4) 3DH ZDH X3DH (Signal) XZDH (OTRv4) Key Gen. (ms) 0.0240 0.0440 0.0228 0.0429 0.0240 0.0444 Key Exch. (ms) 0.3478 1.094 0.4229 0.778 0.5533 0.9217 ID Key (bytes) 32 32 32 32 32 32 Prekey (bytes)
32 32 & 96 32 & 96 Key Exch. (bytes) 272 464 80 304 80 304
33
34
Quantum- resistant transitional security
A B
Efficient dual-receiver encryption
A “B”
Defeating key-compromise impersonation Implementation details & advice
35
36
37
A B
“Prekeys”
Recipient ID , Auth, Msg Auth with , Auth, Msg
38
39
40
41
– Can coerce a client to use a known secret – Can use a secret known to a third-party, allowing
– Contributiveness does not prevent desirable bits – Contributiveness does not defend against weak
42
A B
Shared key ( ):
Diffie-Hellman shared secret Signature MAC Ring signature ID key Eph. key Sym. key
&
43
A B
Shared key ( ):
Diffie-Hellman shared secret Signature MAC Ring signature ID key Eph. key Sym. key
& Nobody else knows
so they know . They also know
44
A B
Shared key ( ):
Diffie-Hellman shared secret Signature MAC Ring signature ID key Eph. key Sym. key
45
46
47
48