s ecurity p rivacy in 3g 4g 5g networks t he aka p rotocol
play

S ECURITY & P RIVACY IN 3G/4G/ 5G NETWORKS : T HE AKA P ROTOCOL W - PowerPoint PPT Presentation

S ECURITY & P RIVACY IN 3G/4G/ 5G NETWORKS : T HE AKA P ROTOCOL W ITH S.A LT , P.-A. F OUQUE , G. M ACARIO -R AT , B. R ICHARD M E , MYSELF , AND EMSEC BSc. & MSc. Mathematics, TU Eindhoven Master thesis on multiparty


  1. S ECURITY & P RIVACY IN 3G/4G/ 5G NETWORKS : T HE AKA P ROTOCOL W ITH S.A LT , P.-A. F OUQUE , G. M ACARIO -R AT , B. R ICHARD

  2. M E , MYSELF , AND EMSEC Ø BSc. & MSc. Mathematics, TU Eindhoven § Master thesis on multiparty pairing-based key exchange (supervisors: Tanja Lange, Bernhard Esslinger) Ø Ph.D. at CASED (Darmstadt) § Thesis: “Security aspects of Distance-Bounding Protocols” (supervisor: Marc Fischlin) Ø Post-doc at IRISA (Rennes) § ’13-’14: Privacy & Distance Bounding (CIDRE) § ‘14-’15: Privacy in geolocation (CIDRE/CAPPRIS) § ’15-’16: TLS/SSL (EMSEC)

  3. EMSEC Ø IRISA research team § Founded 2014 § Led by: Pierre-Alain Fouque (UR1) & Gildas Avoine (INSA) § As of Sept. 2015: 5 permanents: 2 UR1, 2 INSA, 1 CNRS Ø Topics: Embedded Security and Cryptography Design & Models & Attacks Proofs Building blocks Attacks on Cryptanalysis Implementation Real-World ES s

  4. W HAT I D O Ø Distance-Bounding Protocols § Security framework [DFKO11, FO12, FO13b], § Protocol assessment/comparison [FO13a, MOV14] § Privacy-preserving DB [HPO13,GOR14, MOV14] § Protocol with Secret Sharing [GKL+14] § Implementations [GLO15] Ø Authenticated Key-Exchange § OPACITY [DFG+13] § TLS 1.3 [KMO+15], TLS 1.2&1.3 – ePrint version § AKA [AFM+15, FMO+15] (submissions)

  5. W HAT I D O (II) Ø Other primitives § Signatures of knowledge [FO11] § Redactable signatures for tree data [BBD+10] § Anonymous PKE [KMO+13] § Private asymmetric fingerprinting [FGLO14] Ø Projects § ANR LYRICS [finished mid ‘14] § CAPPRIS (Inria) [ongoing]

  6. T HIS T ALK Ø Authenticated Key Exchange Elegant § Unilateral/Mutual Authentication § Desired Properties § Privacy in Authentication Ø The AKA Protocol § Description § Security (intuition) Ø AKA and Privacy Ugly § The case of the Hopeless Task

  7. P ART II A UTHENTICATED K EY E XCHANGE

  8. A UTHENTICATED K EY -E XCHANGE Ø Allows two parties to communicate securely § Peer-to-Peer or Server-Client § Examples: TLS/SSL (https://) Ø Two steps: § Compute session-specific keys (handshake) § Use keys for secure communication (symmetric AE)

  9. AKE WITH U NILATERAL A UTHENTICATION Ø Usually the case for Server-Client AKE § “Anybody” can talk to the server § Most common TLS mode Secure channel server/client or adv/server

  10. AKE WITH M UTUAL A UTHENTICATION Ø Sometimes server-client, mostly peer-to-peer § Can also be achieved by unilateral authentication + password-based authentication in secure channel [KMO +15] Client and server confirm partner’s identities

  11. AKE S ECURITY P ROPERTIES (U NILATERAL ) Ø Key Secrecy [BR93], [BPR00], [CK01]…: § Adversary’s goal : distinguishing the keys of an honest, fresh session from random keys of same length § Rules of game : adaptive party corruptions, key- reveal, concurrent sessions and interactions Symmetric Key Restriction: no terminal corruptions! Ø Client-impersonation resistance § Adversary’s goal : impersonate client in fresh authentication session § Rules of game : adaptive party corruptions, key- reveal, concurrent sessions and interactions, no relays!

  12. T ERMINAL I MPERSONATION Ø Terminal-impersonation resistance § Adversary’s goal : impersonate terminal in fresh authentication session § Rules of game : adaptive party corruptions, key- reveal, concurrent sessions and interactions, no relays! Ø The eternal debate: first or second § Should terminal authenticate first or second? § VANET, MANET, RFID authentication: terminal first § When optional, usually terminal second

  13. P RIVACY IN A UTHENTICATION DrawClient ¡ Corrupt ¡ Ø Key Secrecy [JW00], [Vau07], [HPV+12]…: § Adversary’s goal : find input bit to DrawProver § Rules of game : DrawClient always takes same input bit, can corrupt*, interact, etc.

  14. P RIVACY N OTIONS DrawClient ¡ Corrupt ¡ Ø Weak : no corruptions Ø Forward : once A corrupts, only corruptions (find past LoR connection) Ø Strong : no restrictions Ø Narrow/wide: know result of honest sessions

  15. I MPOSSIBILITY R ESULTS [Vau07]: Strong Privacy requires Key- Agreement [PV08]: Wide-Forward privacy with symmetric keys is impossible if all state is revealed*

  16. P ART III T HE AKA P ROTOCOL

  17. P ART III. 1 I DENTIFIERS & S ECRETS

  18. E LEGANT S YMMETRIC (A)KE [BR93] Ø Usual case for AKE: 2 parties, e.g. client/server Ø Share symmetric secret key 𝑡𝑙 Ø Sometimes public identifier 𝑉𝐽𝐸 Ø Elegant KE: use PRF keyed with 𝑡𝑙 AKE? No problem, use another PRF and switch! ​𝑜↓𝑇 𝑉𝐽𝐸 , ¡ ​𝑜↓𝐷 𝑉𝐽𝐸 𝑉𝐽𝐸 𝐿𝑓𝑧𝑡 ¡ ¡≔ ​𝑄𝑆𝐺↓𝑡𝑙 ( ​𝑜↓𝐷 , ¡ ​ 𝑜↓𝑇 )

  19. T HE CASE OF 3G/4G/5G Ø Usual case for AKE: 2 parties, e.g. client/server Ø In 3G/4G/5G networks, 3 parties: § Client: registering with (only one) operator client key and operator key stored* in SIM § Operator: has list of clients, whose data he knows § Local terminal: not always operator (think of roaming) can authenticate/communicate with client must not know keys

  20. T HE CASE OF 3G/4G/5G ( CONTD .) Ø Some more restrictions: § Connection Terminal – Operator is expensive! Assumed to take place on secure channel § Whenever PKI is used, in practice this means storing PKs and certificates in the phone No PKI for Terminals (too many of them)

  21. 1001 I DENTIFIERS Ø Client associated with secret keys: ​𝑡𝑙↓𝐷 , ¡ ​𝑡𝑙↓𝑃𝑄 , ¡ ​ 𝑡𝑢↓𝐷 § All clients of the same operator share same ​𝑡𝑙↓𝑃𝑄 Ø Other identifiers: § Operator associates ¡ 𝐷 with unique 𝑉𝐽𝐸 (permanent) § Each terminal ​𝑈↓𝑗 associates 𝐷 with 4B 𝑈𝐽𝐸 (temporary), unique per terminal, updated per session ​𝑡𝑙↓𝐷 𝑈𝐽𝐸 𝑉𝐽𝐸 ​ 𝐵𝐿𝐵 𝑡𝑙↓𝑃 𝑄 𝑜𝑈𝐽𝐸 𝑉𝐽𝐸 𝑈𝐽𝐸 𝑉𝐽𝐸 𝑈𝐽𝐸 𝑜𝑈𝐽𝐸

  22. 1001 I DENTIFIERS ( CONTD .) Ø Each terminal has non- colliding list of 𝑈𝐽𝐸 s § Inter-terminal collisions possible § No “centralized” DB of all 𝑈𝐽𝐸 s Ø Each terminal is associa-ted with unique 𝑀𝐵𝐽 § Like ZIP code § ( 𝑈𝐽𝐸 , 𝑀𝐵𝐽 ) unique

  23. 1001 I DENTIFIERS ( SUMMARY ) Ø Multiple clients of same Operator 𝑀𝐵𝐽 𝑉𝐽𝐸 𝑉𝐽𝐸 ​ 𝑉𝐽𝐸↑ ∗ ​ 𝑉𝐽𝐸↑ ∗

  24. 1001 I DENTIFIERS ( SUMMARY ) Ø Multiple clients of same Operator 𝑀𝐵𝐽 𝑉𝐽𝐸 𝑉𝐽𝐸 ​ ​𝑀𝐵𝐽↑ ∗ 𝑉𝐽𝐸↑ ∗ ​ 𝑉𝐽𝐸↑ ∗

  25. 1001 I DENTIFIERS ( SUMMARY ) Ø 𝑈𝐽𝐸 and 𝑉𝐽𝐸 in protocol run, same 𝑀𝐵𝐽 𝑀𝐵𝐽 𝑈𝐽𝐸 , 𝑀𝐵𝐽 𝑉𝐽𝐸 𝑉𝐽𝐸 Find 𝑉𝐽𝐸 𝑈𝐽𝐸 , 𝑀𝐵𝐽 𝑈𝐽𝐸 ↔ 𝑉𝐽𝐸 ​𝐵𝐿𝐵↓𝑉𝐽𝐸 𝐵𝐿𝐵 𝑜𝑈𝐽𝐸 , 𝑀𝐵𝐽 𝑜𝑈𝐽𝐸 ≠ 𝑈𝐽𝐸

  26. 1001 I DENTIFIERS ( SUMMARY ) Ø 𝑈𝐽𝐸 and 𝑉𝐽𝐸 in protocol run, different 𝑀𝐵𝐽 𝑈𝐽𝐸 , ​𝑀𝐵𝐽↑ ∗ ​𝑀𝐵𝐽↑ ∗ 𝑈𝐽𝐸 𝑉𝐽𝐸 𝑀𝐵𝐽 𝑈𝐽𝐸 , ​ 𝑀𝐵𝐽↑ ∗ 𝑉𝐽𝐸 𝑉𝐽𝐸 𝑉𝐽𝐸 𝑈𝐽𝐸 , ​𝑀𝐵𝐽↑ ∗ ​𝐵𝐿𝐵↓𝑉𝐽𝐸 𝐵𝐿𝐵 𝑜𝑈𝐽𝐸 , 𝑀𝐵𝐽 𝑜𝑈𝐽𝐸 Possible (not likely) 𝑼𝑱𝑬 𝒐𝑼 𝒐𝑼𝑱𝑬 = 𝑼𝑱𝑬

  27. S ECRET K EYS , S ECRET S TATE Ø Client associated with secret keys: ​𝑡𝑙↓𝐷 , ¡ ​𝑡𝑙↓𝑃𝑄 , ¡ ​ 𝑡𝑢↓𝐷 § All clients of the same operator share same ​𝑡𝑙↓𝑃𝑄 Ø State ¡ ​𝑡𝑢↓𝐷 is a sequence number § Terminal also has a state ​𝑡𝑢↓𝑃𝑄↑𝐷 w.r.t. that client § Used as “shared” randomness for authentication § Initially randomly chosen for each client § Then updated by update function (3 possibilities) § Unlike ​𝑡𝑙↓𝑃𝑄 , ¡ ​𝑡𝑙↓𝐷 , Terminals may know ​𝑡𝑢↓𝐷

  28. P ART III. 2 U NDERLYING C RYPTOGRAPHY

  29. C RYPTOGRAPHIC F UNCTIONS Ø The seven dwarfs: ​𝐺↓ 1 : used by terminal, for terminal authentication input ( ​𝑡𝑙↓𝐷 , ¡ ​𝑡𝑙↓𝑃𝑄 , ¡ 𝑆 , ¡ ​𝑇𝑟𝑜↓𝑃𝑄↑𝐷 , ¡ 𝐵𝑁𝐺 ) ​𝐺↓ 1 ↑ ∗ : used by client in special procedure input ( ​𝑡𝑙↓𝐷 , ¡ ​𝑡𝑙↓𝑃𝑄 , ¡ 𝑆 , ¡ ​𝑇𝑟𝑜↓𝑃𝑄↑𝐷 , ¡ 𝐵𝑁𝐺 ) ​𝐺↓ 2 : used by client, for client authentication input ( ​𝑡𝑙↓𝐷 , ¡ ​𝑡𝑙↓𝑃𝑄 , ¡ 𝑆 ) ​𝐺↓ 3 , ¡ ​𝐺↓ 4 : used by both for session-key generation input ( ​𝑡𝑙↓𝐷 , ¡ ​𝑡𝑙↓𝑃𝑄 , ¡ 𝑆 ) ​𝐺↓ 5 : used by terminal for “blinding” key input ( ​𝑡𝑙↓𝐷 , ¡ ​𝑡𝑙↓𝑃𝑄 , ¡ 𝑆 ) ​𝐺↓ 5 ↑ ∗ : used by client for “blinding” key, special procedure input ( ​𝑡𝑙↓𝐷 , ¡ ​𝑡𝑙↓𝑃𝑄 , ¡ 𝑆 )

  30. M ILENAGE ​𝐺↓ 1 ¡ ¡ ¡ ​ ​𝐺↓ 3 ​𝐺↓ 4 ​𝐺↓ 5 ¡ ¡ ¡ ​ ​ 𝐺↓ 1 ↑ 𝐺↓ 2 𝐺↓ 5 ↑ ∗ ∗

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend