multi party secure communication
play

Multi Party secure communication C D A B E F N parties want - PowerPoint PPT Presentation

1 Key Establishment Chester Rebeiro IIT Madras 2 Multi Party secure communication C D A B E F N parties want to communicate securely with each other (N=6 in this figure) If U sends a message to V (U V and U,V {a,b,c,d,e,f})


  1. 1 Key Establishment Chester Rebeiro IIT Madras

  2. 2 Multi Party secure communication C D A B E F • N parties want to communicate securely with each other (N=6 in this figure) If U sends a message to V (U ≠V and U,V Ɛ {a,b,c,d,e,f}) • – Only V should be able to read the message – No other parties (even if they cooperate) should be able to read the message 2

  3. 3 Adversary Assumptions C attacker A B Passive Attacker (evesdropper) • Active Attacker • – Aim : fool A and B into accepting an invalid key ( invalid key : expired key, a key chosen by the attacker) fool A / B into believing that they have exchanged a key with the other get partial information about the key exchanged between A and B – Modus-Operandi : • alter messages • save messages and replay later • masquerade 3

  4. 4 Adversary Assumptions 2-party colluding c d attackers a b Attackers can collude to get the secrets • k-party colluding attacks • K attackers collude – 4

  5. 5 Types of Keys Long lived keys • – Generally used for authentication, setting up session keys • Could be either a key corresponding to a symmetric cipher • Or a private key corresponding to a public key cipher Session keys • – Used for a brief period of time such as a single session. • Typically session key corresponds to a symmetric key cipher – and requires to be changed periodically – Derived from LL keys 5

  6. 6 Example (the keys in GSM) Long lived (LL) keys • – SIM contains a individual subscriber authentication key (k i ) It is never transmitted or the network. • – A copy of k i is also stored in databases in the base station – k i is used to authenticate the SIM using an algorithm called A3 Session keys (k c ) • – Created at the time of a call changed periodically during the call – It is created using k i and an algorithm A8 – Voice and Signals are encrypted using the session key ki using a cipher A5 6

  7. 7 Why use Session Keys? Limit the amount of ciphertext an attacker sees. • Limit exposure when device is compromised. • Limits the amount of long term information that needs to be stored on device. • 7

  8. 8 Distributing LL Keys Non-interactively LL keys are stored in the device (such as TPMs) • – Or computed from stored secrets (such as PUFs) TA Interactively Could also be sent to the device by a trusted • authority (TA) – Trusted Authority Verifies identities of users • Issues certificates • A F Has a secure link with each user • Distribution schemes from TA • – Using public key constructs B E User’s store private keys • C D User certificates stored by TA contains the public keys • – Using symmetric key constructs TA has a secure channel to distribute secret keys to pairs of users • 8

  9. 9 Key Predistribution Defining Feature: Key Pre-distribution affects all users slide borrowed from Hossein Hajiabolhassan(SBU) 9

  10. 10 Key Predistribution Scheme Slide borrowed from Hossein Hajiabolhassan(SBU) 10

  11. 11 Solution using symmetric key cryptography (Naïve Scheme) TA C D secure link K AB K AB A B E F • TA generates a key and sends it securely to A and B. Storage in each user : N – 1 • Maximum secure links : N • can we reduce the overheads? N ⎛ ⎞ Network Overheads : transfers • ⎜ ⎟ ⎜ ⎟ 2 ⎝ ⎠ 11

  12. 12 Trading Security for reduced Overheads C D F E K AB K AB A B The naïve scheme protects against N-2 colluding users • What if we reduce this assumption to say k (< N-2) colluding users? • – Security reduces – But overheads may also reduce. 12

  13. 13 Blom’s Key PreDistribution Scheme Aim : each pair of users requires a unique key Unconditionally secure key distribution in a k-party colluding network • (k < N – 2) – At-most k parties can collude (k parties acting together will not be able to determine the key for anyone else) Maximum secure links N (no change here) • Network Transfers : N(k+1) • N (reduced from ) ⎛ ⎞ ⎜ ⎟ ⎜ ⎟ 2 ⎝ ⎠ Storage : Each user stores (k+1) elements • (reduced from N-1 ) 13

  14. 14 Blom’s Key Distribution Scheme (for k=1) Public parameters: • (1) prime p (> N) and (2) for each user a distinct value (public) r u Ɛ Z p Trusted Authority • 1. Choose secret a, b, c Ɛ Z p and forms the polynomial f(x,y) = (a + b(x + y) + cxy) mod p = (a + by) + (b + cy)x mod p 2. For each user u, the TA transmits two elements (2=k+1) to user U over a secure channel a U = (a + br U ) mod p and b U = (b + cr U ) mod p • Usage : if ‘U’ and ‘V’ want to communicate U : has f(x, r U ) , computes K VU = f(r V , r U ) • V : has f(x, r V ) , computes K UV = f(r U , r V ) = f(r V , r U ) = K VU • 14

  15. 15 Blom’s Key Distribution Scheme (for k=1, U, V, W) Public parameters: • (1) p = 17 (2) r u =12; r v = 7; r w = 1 Trusted Authority • 1. Choose secret a=8, b=7, c=2 and forms the polynomial f(x,y) = (a + b(x + y) + cxy) mod p = (a + by) + (b + cy)x mod p 2. a U = (8 + 7*12) mod 17 = 7 and b U = (7 + 2*12) mod 17 = 14 a v = 6 and b v = 4 a v = 15 and b v = 9 • Usage : if ‘U’ and ‘V’ want to communicate K VU = f(r V , r U ) = 7 + 14 * 7 mod 17 = 3 • K Uv = f(r u , r v ) = 6 + 4 * 12 mod 17 = 3 • 15

  16. 16 Blom’s Key Distribution Scheme (for k=1) Public parameters: • (1) prime p (> N) and (2) for each user a distinct value (public) r u Ɛ Z p a,b, c are the only secrets. If an f(x,y) is symmetric. attacker can compute these, Trusted Authority • Interchanging x and y values then the system is broken! will not alter results. 1. Choose secret a, b, c Ɛ Z p and forms the polynomial f(x,y) = (a + b(x + y) + cxy) mod p = (a + by) + (b + cy)x mod p 2. For each user u, the TA computes f(x, r u ) and transmits two elements (k+1) to user U over a secure channel a U = (a + br U ) mod p and b U = (b + cr U ) mod p This is an Affine transformation. • Usage : if ‘U’ and ‘V’ want to communicate There are three unknowns (a, b, c). Therefore requires 3 equations to U : has f(x, r U ) , computes K VU = f(r V , r U ) • solve. However, each user has only a U and b U . V : has f(x, r V ) , computes K UV = f(r U , r V ) = f(r V , r U ) = K VU • Needs more information!! 16

  17. 17 Blom’s scheme is unconditionally secure • What does this means? Any other user W (not U or V) cannot get any information about K UV apriori probability of K UV = aposteriori probability of K UV Given all of Blom’s public parameters and f(x, r W ) =1/|Z p | Two equations; three unknowns (a, b, c) What ‘W’ has? This is an underdetermined system therefore a W = a + br W number of solutions possible is |Zp|. b W = b + cr W Aposteriori probability of K UV = 1/|Z p | 17

  18. 18 2-party Colluding Attackers • If two attackers (say W and X) collude, then 4 equations present and 3 unknowns This will result in a unique solution for a,b,c … system broken!!! 2-party coalition What ‘W’ and ‘X’ have? W X attackers a W = a + br W b W = b + cr W a X = a + br X b X = b + cr X Thus, the scheme is not secure against 2 (or more) party colluding attacks 18

  19. 19 Generalizing Blom’s Scheme • More complex polynomial so that secret coefficients cannot be retrieved • For a k-party colluding network k k = ∑∑ i j f ( x , y ) a x y mod p i , j i 0 j 0 = = where a Z ( 0 i , j k ) and a a for all i , j ∈ ≤ ≤ = i , j p i , j j , i 19

  20. 20 Limits of Blom’s Scheme Pairwise keys cannot be changed i.e. U and V cannot change their keys To change keys, all users need to be reconfigured Thus, it is difficult to implement this scheme for session keys 20

  21. 21 Key Distribution Patterns (This is a secret operation). 21

  22. Key Distribution Patterns 22 (Trivial Example) Suppose – There are n users (n = 4) U U U U 3 1 2 4 1 1 0 0 k ⎡ ⎤ – and v keys (v = 6) 1 ⎢ ⎥ 1 0 1 0 k 2 ⎢ ⎥ U has keys k , k , k 1 0 0 1 k ⎢ ⎥ 1 1 2 3 3 keys M = U has keys k , k , k ⎢ ⎥ 0 1 1 0 2 1 4 5 k ⎢ ⎥ 4 U has keys k , k , k ⎢ 0 1 0 1 ⎥ 3 2 4 6 k 5 ⎢ ⎥ U has keys k , k , k 0 0 1 1 4 3 5 6 ⎢ ⎥ k ⎣ ⎦ 6 users 22

  23. 23 Group Keys • Consider that a subset of users P (|P| ≥ 2) want to communicate together Define, • keys ( U ) { k , k , k } = 1 1 2 3 keys ( P ) keys ( U ) keys ( U ) k = ∩ = 1 2 1 keys ( U ) { k , k , k } = 2 1 4 5 In this case, k P = keys(P) = k 1 can be used as the key Each user in P can compute keys(P) independently because M is public • If | keys ( P ) | 2 , then define k k mod K ∑ > = P i i keys ( P ) ∈ 23

  24. 24 Security of Group Keys • Consider another subset of users F, who want to collaborate to determine the group key k P 1 If F P , then there exists some U F who can compute k ∩ ≠ φ ∈ j P 2 Assume F P ∩ = φ ⎛ ⎞ ∪ ⎜ ⎟ If keys ( P ) keys ( U ) ⊆ j ⎜ ⎟ U F ⎝ ⎠ ∈ j then there exists a subset in F who can cooperate to compute k P If such a subset does not exist, then the system in unconditionally secure 24

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend