key regression
play

Key Regression Fu, Kamara, Kohno Divya Muthukumaran Content - PowerPoint PPT Presentation

Key Regression Fu, Kamara, Kohno Divya Muthukumaran Content Distribution Content publishers -> Content distribution Outsourcing storage and distribution Content distribution Networks: Akamai SpeedEra MirrorImage..


  1. Key Regression Fu, Kamara, Kohno Divya Muthukumaran

  2. Content Distribution  Content publishers -> Content distribution  Outsourcing storage and distribution  Content distribution Networks:  Akamai  SpeedEra  MirrorImage..  Access Control ?

  3. Storage System Players  Possible attacks? Owners r w Writer Readers s Storage Server

  4. Storage System Players  Possible attacks? Owners  On the stored data r w  On the wire  Kinds of attacks Readers Writers  Leak attacks  Change  Destroy Storage Server

  5. Storage System Players  Enrypt-on-the-wire Owners  Trust the server r w  Encrypt-on-disk  Store encrypted Writer Readers s  Untrusted Server Storage Server

  6. Storage System Players  Security Primitives Owners  Authentication r w  Authorization  Securing data on disk Writer Readers s  Securing data on the wire  Key distribution  Revocation Storage Server

  7. PLUTUS  Untrusted server  Trusted client  Decentralized key distribution  Client based – customizable  Encrypt-on-disk  Server verifies writes  Integrity + Prevent readers from Writing  Asymmetric Encryption

  8. System Overview File Owners Readers Writers

  9. System Overview File Owners + File Verify + File Sign key (e,N) Key (d,N) Readers Writers Lockbox

  10. System Overview File Group Owners + File Verify + File Sign key (e,N) Key (d,N) Readers Writers

  11. Revocation: Get out and Stay out!  Expensive for Encrypt-on-disk system. Why?  Re-encryption  all content with new key  Re-Distribute  new keys to all the readers and writers

  12. Lazy Revocation  Delay the encryption  Because revoked users could have cached the data available earlier  For the clients  Too many keys to be maintained  A new key after each revocation  File Groups:  Multiple keys associated with a single file group

  13. File Group 13

  14. Key Rotation  Wind and Unwind keys  Only owners can wind keys (Forward)  Readers can unwind keys(Backward)  How?  RSA  Owners : : K v +1 = K d v mod N . is the file-lockbox key associated  Readers: then K w − 1 = K e w mod N 14

  15. Key Rotation K id mod N K jd mod N K ld mod N Ki Kj Kl Km K ie mod N K je mod N K le mod N 15

  16. What is wrong with this?  Pseudo Randomness!!  Given K l can you say anything about it?  If you are a revoked user , you have K i  UnWind K l  If you get Ki you have the current key Kl  Else Ki’ is not Ki. So what you have is not the current key Kl.  Pseudo randomness Vs Predictability. 16

  17. Why is Pseudo-randomness Important?  How can you attack the system?  Cannot use these keys output by key rotation to key other crypto constructs like symmetric encryption schemes and MACs 17

  18. The Fi  Member states : stm i  Do not give key directly  K i derived from stm i No path from K l to stm i !! Can distinguish future member states from random. 18

  19. Key Rotation Vs Regression K id mod N K jd mod N K ld mod N Ki Kj Kl Km 19

  20. Construction  Four algorithms  Setup - Random oracle H ,publisher state stp  Wind - stp, <stp’, stm i >  Unwind - stm i, stm i-1  Key derivation - stm i, K i  Constructs  KR-SHA  KR-AES  KR-RSA 20

  21. Proving Hardness  Theorem: Key regression scheme built with a secure PRG(pseudo-random bit generator) is KR-Secure  Reduce each of the KR-AES,KR-SHA, KR-RSA to a KR-PRG  QED 21

  22. Implementation & Evaluation  Integrated key regression into a secure file system  Key regression significantly reduces the bandwidth requirements of the publisher while distributing keys  KR-AES can perform more than four times as many unwinds/sec than KR-SHA1 22

  23. Real-World applications  Efficient Low cost subscription models  Plenty of multimedia content distributed over p2p  Distributing software 23

  24. Take Away ?  Your Idea can be described in 2 lines. But if you can formally prove it you got yourself a 39 page paper! 24

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend