multicast security towards a standardized solution
play

Multicast Security: Towards a Standardized Solution Ran Canetti - PowerPoint PPT Presentation

Multicast Security: Towards a Standardized Solution Ran Canetti IBM Research In this talk: A taxonomy of multicast security issues Some outstanding algorithmic problems Work at the SMuG (IRTF): Some design principles


  1. Multicast Security: Towards a Standardized Solution Ran Canetti IBM Research

  2. In this talk: • A taxonomy of multicast security issues • Some outstanding algorithmic problems • Work at the SMuG (IRTF): – Some design principles – Overall architecture – IPSec-based host architecture (draft proposal)

  3. Multicast communication: Whenever there are multiple recipients • Typical applications: – File and software updates – News-feeds – Video/audio broadcasts – Virtual conferences, town-hall meetings – Multiparty video games

  4. Multicast group characteristics • Number of sources, receivers • Membership dynamics • Bandwidth and latency requirements • Duration • Physical separation (network topology and political separation)

  5. Security requirements • Limiting access to group communication: – Long-term secrecy – Ephemeral access restriction • Authentication: – Group – Source • Anonymity • Availability ( against denial of service attacks)

  6. Trust issues • Trust in centralized group manager – To generate keys properly – To distribute keys properly Ways to reduce trust requirements: • Distribute center’s tasks • Use hierarchic control structure • Trust in group members – To not impersonate other group members – To not re-distribute keys

  7. Performance parameters of security solutions • Time to verify and decrypt data • Time to authenticate and encrypt data • Communication bandwidth overhead • Key set-up and refreshment overhead • Group set-up and member enrollment time

  8. An outstanding problem: Source authentication • MACing with shared key is not enough • Signing every data packet is unrealistic • Possible solutions: – Sign every n th packet (and hash in between) [GR, R, WL, …] – MAC with multiple keys (Receivers have different subsets of keys) [CGIMNP]

  9. An outstanding problem: Membership revocation • To hide future communication from a leaving member, need to change group key. • How to send new group key to everyone except the leaving member ? – Can use a data structure that gives O (log n ) communication (and O ( n ) memory for center) [WHA, WGL]. – Is it possible to do better? (some improvements & bounds in [CGIMNP,CMN])

  10. Wallner’s tree k k 0 k 00 k 001

  11. Work done at Secure Multicast Group (SMuG) • of the Internet Research Task Force (IRTF) http://ipmulticast.com/community/smug

  12. A first-cut scenario: • One-to-many communication • Medium to large groups (10-100K) • Centralized group management • No trust in group members • Need source authentication, ephemeral encryption • Dynamic membership

  13. A basic design principle: • Divorce security from the routing method. This implies: – Data packets are routed without change (e.g., using any IP multicast, reliable multicast, or even TCP) – All crypto is done at endpoints (No re-encryption of data en-route!) – Possible exceptions: Firewalls, political barriers

  14. More design guidelines • Separate key management from data handling • Use existing components when possible (SSL, IPSec) • Minimize changes to OS kernel • Maintain ability to plug-in different crypto algorithms

  15. Global architecture (I): Control communication Data communication

  16. Global architecture (II): Control communication Data communication

  17. IPSec-based host architecture (proposal developed at IBM Research) Control API Data API Multicast Internet Source Authentication Key Exchange Module Multicast Secu- App. space rity Association OS kernel AH/ESP (IPSEC) Line Line (group controller) (group members)

  18. Control API Data API Multicast Internet Source Authentication Key Exchange Module Multicast Secu- App. space rity Association OS kernel AH/ESP (IPSEC) Line Line IPSEC transforms (AH/ESP): -Data encryption with group key -Group authentication with group key -Operates on individual packets (No state across packets)

  19. Control API Data API Multicast Internet Source Authentication Key Exchange Module Multicast Secu- App. space rity Association OS kernel AH/ESP (IPSEC) Line Line SAM Signing data efficiently requires: -Signing data in large chunks -Keeping state across packets Therefore, SAM is in transport layer (UDP), operates on UDP frames.

  20. Control API Data API Multicast Internet Source Authentication Key Exchange Module Multicast Secu- App. space rity Association OS kernel AH/ESP (IPSEC) Line Line MSA is a database that holds: - IPSEC SA for AH/ESP (group key, algorithms, group address, etc.) - Information for SAM (Signing/verification keys, algorithms, etc.) -MSA is periodically updated by MIKE.

  21. Control API Data API Multicast Internet Source Authentication Key Exchange Module Multicast Secu- App. space rity Association OS kernel AH/ESP (IPSEC) Line Line MIKE: - Invoked by API to join/leave multicast group. Join/leave interaction done via standard point-to-point secure connection (such as IPSec, SSL) with the center. - Receives key updates from controller and updates MSA -Key updates assume a “reliable multicast shim” (Can be implemented by any RM protocol /TCP)

  22. Conclusion • Security is a central concern in almost any multicast application on the Internet. • Have made initial steps towards designing a standardized solution. • Much more work to be done...

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend