privacy preserving protocols
play

Privacy Preserving Protocols Workshop on Cryptography for the - PowerPoint PPT Presentation

Privacy Preserving Protocols Privacy Preserving Protocols Workshop on Cryptography for the Internet of Things Jens Hermans KU Leuven - COSIC 20 November 2012 Privacy Preserving Protocols Introduction Cryptography in Daily Life RFID Privacy


  1. Privacy Preserving Protocols Privacy Preserving Protocols Workshop on Cryptography for the Internet of Things Jens Hermans KU Leuven - COSIC 20 November 2012

  2. Privacy Preserving Protocols Introduction Cryptography in Daily Life RFID

  3. Privacy Preserving Protocols Introduction Cryptography in Daily Life Car Keys

  4. Privacy Preserving Protocols Introduction Cryptography in Daily Life Access Control

  5. Privacy Preserving Protocols Introduction Cryptography in Daily Life Product Tracking

  6. Privacy Preserving Protocols RFID Privacy 1 RFID Privacy Requirements 2 Privacy Models Protocol Analysis Provable Security (Privacy) Privacy Model Insider Attacks Requirements 3 Lightweight Cryptography 4 Existing Protocols 5 Protocol Design Design Performance 6 Conclusions and Future Perspectives

  7. Privacy Preserving Protocols RFID Privacy Why? Industrial espionage

  8. Privacy Preserving Protocols RFID Privacy Why? User privacy

  9. Privacy Preserving Protocols RFID Privacy Why? Das Kapital Insulin pump Underwear Membership implant User privacy

  10. Privacy Preserving Protocols RFID Privacy Why? Wireless Gun

  11. Privacy Preserving Protocols RFID Privacy RFID Privacy: goals ... ID = u0012345, S = ... { (ID=u0012345, ID = ? P=...) , ...}

  12. Privacy Preserving Protocols RFID Privacy RFID Privacy: goals ID = u0012345, S = ... Link? #T ags? ID = u7654321, S = ...

  13. Privacy Preserving Protocols RFID Privacy Corrupting Tags

  14. Privacy Preserving Protocols RFID Privacy Requirements Different Privacy Solutions Protocol Level Privacy Kill Command Destroy Tag Shielding (Read Range Reduction) ...

  15. Privacy Preserving Protocols RFID Privacy Requirements Threat Analysis / Requirements Privacy Low High Low Security Supply Chain Public Transport Payments Car Keys Access Control High Passports

  16. Privacy Preserving Protocols Privacy Models 1 RFID Privacy Requirements 2 Privacy Models Protocol Analysis Provable Security (Privacy) Privacy Model Insider Attacks Requirements 3 Lightweight Cryptography 4 Existing Protocols 5 Protocol Design Design Performance 6 Conclusions and Future Perspectives

  17. Privacy Preserving Protocols Privacy Models Protocol Analysis Protocol Analysis ... ID = u0012345, S = ... { (ID=u0012345, ID = ? P=...) , ...} Properties: Security Privacy: untraceability Allow corruption

  18. Privacy Preserving Protocols Privacy Models Protocol Analysis Protocol Analysis ... ID = u0012345, S = ... { (ID=u0012345, ID = ? P=...) , ...} Results Many published protocols broken: ⇒ Lack of formal proofs!

  19. Privacy Preserving Protocols Privacy Models Provable Security (Privacy) Provable Security (Privacy)

  20. Privacy Preserving Protocols Privacy Models Provable Security (Privacy) Provable Security (Privacy) System Adversary Adversary wins if ...

  21. Privacy Preserving Protocols Privacy Models Privacy Model Juels-Weis model (2005) System Adversary A B A or B Adversary wins if output is correct tag.

  22. Privacy Preserving Protocols Privacy Models Privacy Model Vaudenay model (2007) System Adversary (Blinded) B Adversary wins if output is true and not trivial

  23. Privacy Preserving Protocols Privacy Models Privacy Model Privacy Model Hermans et al. (2011) Design goals: Strong adversary: can always corrupt Solve issues with wide strong privacy Model ‘reality’ Easy to use

  24. Privacy Preserving Protocols Privacy Models Privacy Model Privacy Model Hermans et al. (2011) System Adversary A B A C

  25. Privacy Preserving Protocols Privacy Models Privacy Model Privacy Model Hermans et al. (2011) System Adversary A B A C Adversary wins if random bit is guessed correctly.

  26. Privacy Preserving Protocols Privacy Models Privacy Model Privacy Model Hermans et al. (2011) New Features: Features (reused): corruption → on real tag Virtual tag handles wide strong privacy Indistinguishability based Single random bit for entire system

  27. Privacy Preserving Protocols Privacy Models Privacy Model Indistinguishability Encryption: Privacy-models: abc xyz RO Juels-Weis IND-CPA Vaudenay IND-CCA Hermans et al. IND-CCA2 ... #!$

  28. Privacy Preserving Protocols Privacy Models Privacy Model Indistinguishability Encryption: Privacy-models: A B RO Juels-Weis IND-CPA Vaudenay IND-CCA Hermans et al. IND-CCA2 ...

  29. Privacy Preserving Protocols Privacy Models Privacy Model Privacy Levels Strong Forward Weak Wide at end Narrow at end

  30. Privacy Preserving Protocols Privacy Models Privacy Model Privacy Requirements Privacy Level Application Narrow Weak Supply Chain Narrow Forward Smart Products Wide Weak Car Keys Payments Access Tokens Wide Forward Passports Public Transport

  31. Privacy Preserving Protocols Privacy Models Insider Attacks Insider Attacks System Adversary Insider T ag

  32. Privacy Preserving Protocols Privacy Models Requirements Privacy Requirements Privacy Level Application Narrow Weak Supply Chain Narrow Forward Smart Products Wide Weak Car Keys Payments Wide Forward + Insider Access Tokens Passports Public Transport

  33. Privacy Preserving Protocols Privacy Models Requirements Privacy Requirements Privacy Level Application Narrow Weak Supply Chain Narrow Forward Smart Products Wide Weak Car Keys Payments Wide Forward + Insider Access Tokens Currently: Wide Strong Passports Public Transport

  34. Privacy Preserving Protocols Lightweight Cryptography 1 RFID Privacy Requirements 2 Privacy Models Protocol Analysis Provable Security (Privacy) Privacy Model Insider Attacks Requirements 3 Lightweight Cryptography 4 Existing Protocols 5 Protocol Design Design Performance 6 Conclusions and Future Perspectives

  35. Privacy Preserving Protocols Lightweight Cryptography Lightweight Devices ↔

  36. Privacy Preserving Protocols Lightweight Cryptography Lightweight Cryptography? Limits: Area ( ➾➾➾ ) Time Power Energy

  37. Privacy Preserving Protocols Lightweight Cryptography Typical Ingredients for Protocols Primitive Status RNG OK? Key Update ??? Block Cipher OK Hash Function OK ECC OK � ???

  38. Privacy Preserving Protocols Lightweight Cryptography Lightweight Elliptic Curve Cryptography y Implementation [LBSV10]: Area (14.5 kGE) Q Time (85 ms) Power (13 . 8 ➭ W) x Energy (1 . 18 ➭ J) P R

  39. Privacy Preserving Protocols Existing Protocols 1 RFID Privacy Requirements 2 Privacy Models Protocol Analysis Provable Security (Privacy) Privacy Model Insider Attacks Requirements 3 Lightweight Cryptography 4 Existing Protocols 5 Protocol Design Design Performance 6 Conclusions and Future Perspectives

  40. Privacy Preserving Protocols Existing Protocols PRF (Block cipher) based [ISO/IEC 9798-2] State: x j Secrets: DB = { x j } Tag T Reader c ∈ R { 0, 1 } n c p ∈ R { 0, 1 } m r = F x ( c || p ) r , p Search x j ∈ DB s.t. F x j ( c || p ) = r Privacy Wide-Weak

  41. Privacy Preserving Protocols Existing Protocols Symmetric Key and Efficiency Damg˚ ard-Pedersen ’08: Independent keys: inefficient O ( n ) Correlated keys: efficient O (log( n )) privacy loss

  42. Privacy Preserving Protocols Existing Protocols Symmetric Key and Efficiency Damg˚ ard-Pedersen ’08: Independent keys: inefficient O ( n ) Correlated keys: efficient O (log( n )) privacy loss Key Updating Higher Privacy Level (narrow forward) Desynchronization Attacks / Efficiency Problems Implementation cost?

  43. Privacy Preserving Protocols Existing Protocols EC Schnorr Protocol State: x j , Y Secrets: y , DB = { X j } Tag T Reader r ∈ R Z ℓ R = rP R � = O ? e e � = 0? s = x + er s ˙ X = sP − eR ∈ DB ? Privacy None

  44. Privacy Preserving Protocols Existing Protocols Randomized Schnorr [BCI08] State: x j , Y Secrets: y , DB = { X j } Tag T Reader r 1 , r 2 ∈ R Z ℓ R 1 = r 1 P , R 2 = r 2 Y R 1 , R 2 � = O ? e s = ex + r 1 + r 2 s ˙ X = e − 1 ( sP − R 1 − y − 1 R 2 ) ∈ DB Privacy Narrow Strong

  45. Privacy Preserving Protocols Existing Protocols Randomized Hash GPS [BCI09] State: x j , Y Secrets: y , DB = { X j } Tag T Reader r 1 , r 2 ∈ R Z ℓ R 1 = r 1 P , R 2 = r 2 Y z = H ( R 1 , R 2 ) R 1 , R 2 � = O ? e s = ex + r 1 + r 2 s , R 1 , R 2 Verify z ˙ X = e − 1 ( sP − R 1 − y − 1 R 2 ) ∈ DB Privacy Narrow Strong and Wide Forward

  46. Privacy Preserving Protocols Existing Protocols IND-CCA2 Encryption [Vau07] State: s j , ID PK: K P . Secrets: DB = { s j } Tag T Reader c ∈ R { 0, 1 } n c r = Enc K P ( ID || s j || c ) r ID || s j || c ← Dec K S ( r ) Search s j ∈ DB Privacy Wide Strong

  47. Privacy Preserving Protocols Existing Protocols Performance Protocol Privacy Ins. Ext. Snd. Operations Schnorr no no yes 1 EC mult Randomized Schnorr narrow-strong no yes 2 EC mult Rand. Hashed GPS narrow-strong no yes 2 EC mult wide-forward 1 hash

  48. Privacy Preserving Protocols Existing Protocols Performance Protocol Privacy Ins. Ext. Snd. Operations Schnorr no no yes 1 EC mult Randomized Schnorr narrow-strong no yes 2 EC mult Rand. Hashed GPS narrow-strong no yes 2 EC mult wide-forward 1 hash Vaudenay wide-strong yes no 2 EC mult + DHIES 1 hash 1 MAC 1 symm enc Hash ElGamal wide-strong yes no 2 EC mult 1 hash 1 MAC

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend