Multicast Security: Towards a Standardized Solution Ran Canetti - - PowerPoint PPT Presentation

multicast security towards a standardized solution
SMART_READER_LITE
LIVE PREVIEW

Multicast Security: Towards a Standardized Solution Ran Canetti - - PowerPoint PPT Presentation

Multicast Security: Towards a Standardized Solution Ran Canetti IBM Research In this talk: A taxonomy of multicast security issues Some outstanding algorithmic problems Work at the SMuG (IRTF): Some design principles


slide-1
SLIDE 1

Multicast Security: Towards a Standardized Solution

Ran Canetti IBM Research

slide-2
SLIDE 2

In this talk:

  • A taxonomy of multicast security issues
  • Some outstanding algorithmic problems
  • Work at the SMuG (IRTF):

– Some design principles – Overall architecture – IPSec-based host architecture

(draft proposal)

slide-3
SLIDE 3

Multicast communication:

Whenever there are multiple recipients

  • Typical applications:

– File and software updates – News-feeds – Video/audio broadcasts – Virtual conferences, town-hall meetings – Multiparty video games

slide-4
SLIDE 4

Multicast group characteristics

  • Number of sources, receivers
  • Membership dynamics
  • Bandwidth and latency requirements
  • Duration
  • Physical separation

(network topology and political separation)

slide-5
SLIDE 5

Security requirements

  • Limiting access to group communication:

– Long-term secrecy – Ephemeral access restriction

  • Authentication:

– Group – Source

  • Anonymity
  • Availability (against denial of service attacks)
slide-6
SLIDE 6

Trust issues

  • Trust in centralized group manager

– To generate keys properly – To distribute keys properly Ways to reduce trust requirements:

  • Distribute center’s tasks
  • Use hierarchic control structure
  • Trust in group members

– To not impersonate other group members – To not re-distribute keys

slide-7
SLIDE 7

Performance parameters of security solutions

  • Time to verify and decrypt data
  • Time to authenticate and encrypt data
  • Communication bandwidth overhead
  • Key set-up and refreshment overhead
  • Group set-up and member enrollment time
slide-8
SLIDE 8

An outstanding problem: Source authentication

  • MACing with shared key is not enough
  • Signing every data packet is unrealistic
  • Possible solutions:

– Sign every nth packet (and hash in between) [GR, R, WL, …] – MAC with multiple keys (Receivers have different subsets of keys) [CGIMNP]

slide-9
SLIDE 9

An outstanding problem: Membership revocation

  • To hide future communication from a

leaving member, need to change group key.

  • How to send new group key to everyone

except the leaving member?

– Can use a data structure that gives O(log n) communication (and O(n) memory for center) [WHA, WGL]. – Is it possible to do better?

(some improvements & bounds in [CGIMNP,CMN])

slide-10
SLIDE 10

Wallner’s tree

k k0 k00 k001

slide-11
SLIDE 11

Work done at Secure Multicast Group (SMuG)

  • f the

Internet Research Task Force (IRTF)

http://ipmulticast.com/community/smug

slide-12
SLIDE 12

A first-cut scenario:

  • One-to-many communication
  • Medium to large groups (10-100K)
  • Centralized group management
  • No trust in group members
  • Need source authentication,

ephemeral encryption

  • Dynamic membership
slide-13
SLIDE 13

A basic design principle:

  • Divorce security from the routing method.

This implies:

– Data packets are routed without change (e.g., using any IP multicast, reliable multicast,

  • r even TCP)

– All crypto is done at endpoints (No re-encryption of data en-route!) – Possible exceptions: Firewalls, political barriers

slide-14
SLIDE 14

More design guidelines

  • Separate key management from data

handling

  • Use existing components when possible

(SSL, IPSec)

  • Minimize changes to OS kernel
  • Maintain ability to plug-in different crypto

algorithms

slide-15
SLIDE 15

Global architecture (I):

Control communication Data communication

slide-16
SLIDE 16

Global architecture (II):

Control communication Data communication

slide-17
SLIDE 17

IPSec-based host architecture

(proposal developed at IBM Research)

Control API Data API Multicast Internet Key Exchange Source Authentication Module AH/ESP (IPSEC) Multicast Secu- rity Association Line

(group controller)

Line

(group members) OS kernel

  • App. space
slide-18
SLIDE 18

Control API Data API Multicast Internet Key Exchange Source Authentication Module AH/ESP (IPSEC) Multicast Secu- rity Association Line Line

OS kernel

  • App. space

IPSEC transforms (AH/ESP):

  • Data encryption with group key
  • Group authentication with group key
  • Operates on individual packets (No state across packets)
slide-19
SLIDE 19

Control API Data API Multicast Internet Key Exchange Source Authentication Module AH/ESP (IPSEC) Multicast Secu- rity Association Line Line

OS kernel

  • App. space

SAM Signing data efficiently requires:

  • Signing data in large chunks
  • Keeping state across packets

Therefore, SAM is in transport layer (UDP),

  • perates on UDP frames.
slide-20
SLIDE 20

Control API Data API Multicast Internet Key Exchange Source Authentication Module AH/ESP (IPSEC) Multicast Secu- rity Association Line Line

OS kernel

  • App. space

MSA is a database that holds:

  • IPSEC SA for AH/ESP (group key, algorithms, group address, etc.)
  • Information for SAM (Signing/verification keys, algorithms, etc.)
  • MSA is periodically updated by MIKE.
slide-21
SLIDE 21

Control API Data API Multicast Internet Key Exchange Source Authentication Module AH/ESP (IPSEC) Multicast Secu- rity Association Line Line

OS kernel

  • App. space

MIKE:

  • Invoked by API to join/leave multicast group.

Join/leave interaction done via standard point-to-point secure connection (such as IPSec, SSL) with the center.

  • Receives key updates from controller and updates MSA
  • Key updates assume a “reliable multicast shim”

(Can be implemented by any RM protocol /TCP)

slide-22
SLIDE 22

Conclusion

  • Security is a central concern in almost any

multicast application on the Internet.

  • Have made initial steps towards designing a

standardized solution.

  • Much more work to be done...
slide-23
SLIDE 23