pervasive devices
play

Pervasive Devices Pervasive Devices: Low memory, few gates Low - PowerPoint PPT Presentation

Authenticating Pervasive Devices with Human Protocols Ari Juels Stephen A. Weis RSA Laboratories MIT CSAIL Pervasive Devices Pervasive Devices: Low memory, few gates Low power, no clock, little state Low computational power


  1. Authenticating Pervasive Devices with Human Protocols Ari Juels Stephen A. Weis RSA Laboratories MIT CSAIL

  2. Pervasive Devices • Pervasive Devices: ‣ Low memory, few gates ‣ Low power, no clock, little state ‣ Low computational power • Billions of pervasive devices are deployed. • Billions on the way. Can such feeble devices authenticate themselves?

  3. Example Technologies

  4. “Billions and Billions...” • Supply chain management, inventory control • Payment systems, building access • Prescription drug shipments • Retail checkout • Luxury goods • Currency Authenticating devices is a growing concern.

  5. Attacks • Skimming : Reading legitimate tag data to produce fraudulent clones. • Swapping : Steal RFID-tagged products then replace with counterfeit-tagged decoys. • Denial of Service : Seeding a system with fake, but authentic acting tags.

  6. Related Work • Low-Cost Access Control: [SWE02], [WSRE03], [OSK04] • Pervasive Privacy: [JP03], [JRS03], [Avoine04], [MW04] • Human Authentication: [HB01]

  7. Our Contribution • A new authentication protocol that handles active malicious attacks. • Extremely hardware-efficient • Secure under same assumption as [HB01]

  8. Hopper-Blum Authentication Computer( x ) Bob( x , η ) a ∈ {0,1} k Challenge z=( a ⋅ x ) ⊕ ν ν ∈ R {0,1} z=( a ⋅ x )? Response Repeat for q rounds. Authenticate Bob if he passes > (1- η ) q rounds .

  9. Security Against Bad Bob Computer( x ) Adversary a ∈ {0,1} k Challenge z=( a ⋅ ? ) Guess Response

  10. Security Against Passive Eavesdroppers Computer( x ) Bob( x , η ) ν ∈ R {0,1} Eavesdropper ( a 0 ,z 0 ), ( a 1 ,z 1 ), ..., ( a q ,z q ) Find an x’ that allows you to answer a (1- η ) fraction of a challenges

  11. Learning Parity with Noise (LPN) • Crypto and learning problems: [BFKL93] k lg k ) • LPN algorithm: [BKW03] O (2 • Shortest Vector Problem reduction: [Regev05]

  12. Concrete Security Key Size (k) Best Attack 2 35 64 128 2 56 192 2 72 224 2 80 256 2 88 288 2 96 Obligatory grain of salt →□

  13. Active Attack against HB Adversary Bob( x , η ) a’ = 000...001 z 0 =( a’ ⋅ x ) ⊕ ν 0 ... a’ z n =( a’ ⋅ x ) ⊕ ν n Adversary takes majority of z i values to get noise-free parity bit

  14. Our New Protocol: HB+ Reader( x , y ) Tag( x , y , η ) b ∈ {0,1} k Blinding Factor a ∈ {0,1} k Challenge ν ∈ R {0,1} z=( a ⋅ x ) ⊕ ( b ⋅ y ) ⊕ ν Response z=( a ⋅ x ) ⊕ ( b ⋅ y )?

  15. Security Against Bad Bob Reader( x , y ) Adversary b’ Malicious Blinding Factor a Challenge z=( a ⋅ ? ) ⊕ ( b’ ⋅ ? ) Guess Response

  16. Security against Active Attacks Adversary Tag( x , y , η ) b Blinding Factor a’ Malicious Challenge ν ∈ {0,1} z=( a’ ⋅ x ) ⊕ ( b ⋅ y ) ⊕ ν Response

  17. Skewing Randomness Adversary Tag What if the adversary can skew a tag’s random number generator? All bets are off!

  18. Future Work • Two-round or parallel HB+ (Rump Session) • Random Number Generation • Underlying hardness of LPN • Adapting other HumanAuth protocols

  19. Questions? Ari Juels ajuels@rsasecurity.com www.ari-juels.com Stephen Weis sweis@mit.edu crypto.csail.mit.edu/~sweis

  20. Detection Security Model Reader Adversary Alert! Failed Authentications Assume valid readers will detect suspicious failures: No Reader oracles.

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend