Key Regression Fu, Kamara, Kohno Divya Muthukumaran Content - - PowerPoint PPT Presentation

key regression
SMART_READER_LITE
LIVE PREVIEW

Key Regression Fu, Kamara, Kohno Divya Muthukumaran Content - - PowerPoint PPT Presentation

Key Regression Fu, Kamara, Kohno Divya Muthukumaran Content Distribution Content publishers -> Content distribution Outsourcing storage and distribution Content distribution Networks: Akamai SpeedEra MirrorImage..


slide-1
SLIDE 1

Key Regression

Fu, Kamara, Kohno Divya Muthukumaran

slide-2
SLIDE 2

Content Distribution

 Content publishers -> Content

distribution

 Outsourcing storage and distribution

Content distribution Networks:

 Akamai  SpeedEra  MirrorImage..

 Access Control ?

slide-3
SLIDE 3

Storage System Players

 Possible attacks?

Owners Readers Writer s r w Storage Server

slide-4
SLIDE 4

Storage System Players

 Possible attacks?

 On the stored data  On the wire

 Kinds of attacks

 Leak attacks  Change  Destroy

Owners Readers Writers r w Storage Server

slide-5
SLIDE 5

Storage System Players

 Enrypt-on-the-wire

 Trust the server

 Encrypt-on-disk

 Store encrypted  Untrusted Server

Owners Readers Writer s r w Storage Server

slide-6
SLIDE 6

Storage System Players

 Security Primitives

 Authentication  Authorization  Securing data on disk  Securing data on the

wire

 Key distribution  Revocation

Owners Readers Writer s r w Storage Server

slide-7
SLIDE 7

PLUTUS

 Untrusted server  Trusted client  Decentralized key distribution

Client based – customizable

 Encrypt-on-disk  Server verifies writes  Integrity + Prevent readers from Writing

Asymmetric Encryption

slide-8
SLIDE 8

System Overview

Writers Readers File Owners

slide-9
SLIDE 9

System Overview

Lockbox Writers Readers File + File Verify key (e,N) + File Sign Key (d,N) Owners

slide-10
SLIDE 10

System Overview

Writers Readers File Group + File Verify key (e,N) + File Sign Key (d,N) Owners

slide-11
SLIDE 11

Revocation: Get out and Stay out!

 Expensive for Encrypt-on-disk system.

Why?

Re-encryption

all content with new key

Re-Distribute

new keys to all the readers and writers

slide-12
SLIDE 12

Lazy Revocation

 Delay the encryption

Because revoked users could have cached

the data available earlier

 For the clients

Too many keys to be maintained A new key after each revocation

 File Groups:

Multiple keys associated with a single file

group

slide-13
SLIDE 13

13

File Group

slide-14
SLIDE 14

Key Rotation

 Wind and Unwind keys

Only owners can wind keys (Forward) Readers can unwind keys(Backward)

 How?

RSA Owners : Readers:

14

: Kv+1 = Kd

v mod N.

is the file-lockbox key associated then Kw−1 = Ke

w mod N

slide-15
SLIDE 15

Key Rotation

15

Ki Kj Kl Km Kid mod N Kld mod N Kjd mod N Kle mod N Kje mod N Kie mod N

slide-16
SLIDE 16

What is wrong with this?

 Pseudo Randomness!!

Given Kl can you say anything about it? If you are a revoked user , you have Ki

 UnWind Kl

 If you get Ki you have the current key Kl

 Else Ki’ is not Ki. So what you have is not the current

key Kl.

 Pseudo randomness Vs Predictability.

16

slide-17
SLIDE 17

Why is Pseudo-randomness Important?

 How can you attack the system?  Cannot use these keys output by key

rotation to key other crypto constructs like symmetric encryption schemes and MACs

17

slide-18
SLIDE 18

The Fi

 Member states : stmi

 Do not give key directly  Ki derived from stmi

18

No path from Kl to stmi !!

Can distinguish future member states from random.

slide-19
SLIDE 19

Key Rotation Vs Regression

19

Ki Kj Kl Km Kid mod N Kld mod N Kjd mod N

slide-20
SLIDE 20

Construction

 Four algorithms

Setup - Random oracle H,publisher state stp Wind - stp, <stp’, stmi> Unwind - stmi, stmi-1 Key derivation - stmi, Ki

 Constructs

KR-SHA KR-AES KR-RSA

20

slide-21
SLIDE 21

Proving Hardness

 Theorem: Key regression scheme built

with a secure PRG(pseudo-random bit generator) is KR-Secure

 Reduce each of the KR-AES,KR-SHA,

KR-RSA to a KR-PRG

QED

21

slide-22
SLIDE 22

Implementation & Evaluation

 Integrated key regression into a secure file

system

 Key regression significantly reduces the

bandwidth requirements of the publisher while distributing keys

 KR-AES can perform more than four times

as many unwinds/sec than KR-SHA1

22

slide-23
SLIDE 23

Real-World applications

 Efficient Low cost subscription models

Plenty of multimedia content distributed over

p2p

Distributing software

23

slide-24
SLIDE 24

Take Away ?

 Your Idea can be described in 2 lines. But

if you can formally prove it you got yourself a 39 page paper!

24