Sequential Process Calculus and Machine Models for Simulation-based - - PowerPoint PPT Presentation

sequential process calculus and machine models for
SMART_READER_LITE
LIVE PREVIEW

Sequential Process Calculus and Machine Models for Simulation-based - - PowerPoint PPT Presentation

Sequential Process Calculus and Machine Models for Simulation-based Security Ralf K usters University of Kiel Joint work with Anupam Datta, John Mitchell, and Ajith Ramanathan University of Kiel Ralf K usters Simulation-based Security


slide-1
SLIDE 1

Sequential Process Calculus and Machine Models for Simulation-based Security

Ralf K¨ usters

University of Kiel Joint work with Anupam Datta, John Mitchell, and Ajith Ramanathan

slide-2
SLIDE 2

University of Kiel Ralf K¨ usters

Simulation-based Security

Basic idea:

  • 1. Describe security requirement in terms of an ideal

protocol/functionality F.

  • 2. A real protocol P is secure w.r.t. F (realizes F) if everything that can

happen to P can also happen to F.

  • 3. Goal: Security preserved under composition

(composition theorem).

DIMACS Workshop June 8th, 2004

slide-3
SLIDE 3

University of Kiel Ralf K¨ usters

Simulation-based Security

Basic idea:

  • 1. Describe security requirement in terms of an ideal

protocol/functionality F.

  • 2. A real protocol P is secure w.r.t. F (realizes F) if everything that can

happen to P can also happen to F.

  • 3. Goal: Security preserved under composition

(composition theorem). But... Many different computational settings and security notions.

DIMACS Workshop June 8th, 2004

slide-4
SLIDE 4

University of Kiel Ralf K¨ usters

Canetti 2001 (PITM)

Computational model:

  • 1. Computational entities:

Probabilistic polynomial-time interacting turing machines (PITMs)

  • 2. Communication model:

In a real, ideal, and hybrid model specific ways of communication via tapes between an environment, a (real/ideal) adversary, and the (real/ideal) protocol are defined.

DIMACS Workshop June 8th, 2004

slide-5
SLIDE 5

University of Kiel Ralf K¨ usters

Canetti 2001 (PITM)

Computational model:

  • 1. Computational entities:

Probabilistic polynomial-time interacting turing machines (PITMs)

  • 2. Communication model:

In a real, ideal, and hybrid model specific ways of communication via tapes between an environment, a (real/ideal) adversary, and the (real/ideal) protocol are defined. Security notion: Universal composability (UC). P and F are UC if ∀ A ∃ I ∀ E: E F E A P ≡ I

DIMACS Workshop June 8th, 2004

slide-6
SLIDE 6

University of Kiel Ralf K¨ usters

Pfitzmann and Waidner 2001 (PIOA)

Computational model:

  • 1. Computational entities:

Probabilistic IO automata (PIOAs)

  • 2. Communication model:

General communication model where PIOAs communicate through buffers that need to be triggered to deliver a message. (No need to distinguish between real, ideal, and hybrid communication.)

DIMACS Workshop June 8th, 2004

slide-7
SLIDE 7

University of Kiel Ralf K¨ usters

Pfitzmann and Waidner 2001 (PIOA)

Computational model:

  • 1. Computational entities:

Probabilistic IO automata (PIOAs)

  • 2. Communication model:

General communication model where PIOAs communicate through buffers that need to be triggered to deliver a message. (No need to distinguish between real, ideal, and hybrid communication.) Security notions: UC + (strong) Black-box Simulatability (SBB). P and F are SBB if ∃ S ∀ A ∀ E: E E A P ≡ A′ F S

DIMACS Workshop June 8th, 2004

slide-8
SLIDE 8

University of Kiel Ralf K¨ usters

Weak Black-box Simulatability (WBB)

P and F are WBB if ∀ A ∃ S ∀ E: E E A P ≡ A′ F S Used in the literature to show UC (obviously: WBB implies UC).

DIMACS Workshop June 8th, 2004

slide-9
SLIDE 9

University of Kiel Ralf K¨ usters

Lincoln, Mitchell2, Scedrov 1998 (PPC)

Computational model:

  • 1. Computational entities:

Probabilistic Polynomial-time Processes

  • 2. Communication model:

Probabilistic Process Calculus (PPC).

DIMACS Workshop June 8th, 2004

slide-10
SLIDE 10

University of Kiel Ralf K¨ usters

Lincoln, Mitchell2, Scedrov 1998 (PPC)

Computational model:

  • 1. Computational entities:

Probabilistic Polynomial-time Processes

  • 2. Communication model:

Probabilistic Process Calculus (PPC). Security notions: Process Congruence/Strong Simulatability (SS) P and F are SS if ∃ S ∀ E: E E P ≡ F S

DIMACS Workshop June 8th, 2004

slide-11
SLIDE 11

University of Kiel Ralf K¨ usters

Even More Variety

Different variants of UC, BB, and SS have been considered!

DIMACS Workshop June 8th, 2004

slide-12
SLIDE 12

University of Kiel Ralf K¨ usters

UC

P and F are UC if ∀ A ∃ I ∀ E: E F E A P ≡ I Distinguish between different tasks the processes perform:

DIMACS Workshop June 8th, 2004

slide-13
SLIDE 13

University of Kiel Ralf K¨ usters

UC

P and F are UC if ∀ A ∃ I ∀ E: E F E A P ≡ I Distinguish between different tasks the processes perform: Decision (distinguisher) process (D): May output a decision 1 or 0 depending on who the process believes to interact with. (environment)

DIMACS Workshop June 8th, 2004

slide-14
SLIDE 14

University of Kiel Ralf K¨ usters

UC

P and F are UC if ∀ A ∃ I ∀ E: E F E A P ≡ I Distinguish between different tasks the processes perform: Decision (distinguisher) process (D): May output a decision 1 or 0 depending on who the process believes to interact with. (environment) Master process (M): Is triggered if no other process can go.

DIMACS Workshop June 8th, 2004

slide-15
SLIDE 15

University of Kiel Ralf K¨ usters

UC

P and F are UC if ∀ A ∃ I ∀ E: E F E A P ≡ I Distinguish between different tasks the processes perform: Decision (distinguisher) process (D): May output a decision 1 or 0 depending on who the process believes to interact with. (environment) Master process (M): Is triggered if no other process can go. Master decision process (MD): Is both master and decision process.

DIMACS Workshop June 8th, 2004

slide-16
SLIDE 16

University of Kiel Ralf K¨ usters

UC

P and F are UC if ∀ A ∃ I ∀ E: E F E A P ≡ I Distinguish between different tasks the processes perform: Decision (distinguisher) process (D): May output a decision 1 or 0 depending on who the process believes to interact with. (environment) Master process (M): Is triggered if no other process can go. Master decision process (MD): Is both master and decision process. Regular process (R): Is neither a master nor a decision process. (e.g., real and ideal protocol)

DIMACS Workshop June 8th, 2004

slide-17
SLIDE 17

University of Kiel Ralf K¨ usters

UC

P and F are UC if ∀ A ∃ I ∀ E: E F E A P ≡ I Distinguish between different tasks the processes perform: Decision (distinguisher) process (D): May output a decision 1 or 0 depending on who the process believes to interact with. (environment) Master process (M): Is triggered if no other process can go. Master decision process (MD): Is both master and decision process. Regular process (R): Is neither a master nor a decision process. (e.g., real and ideal protocol) Who should be the master process?

DIMACS Workshop June 8th, 2004

slide-18
SLIDE 18

University of Kiel Ralf K¨ usters

UC

P and F are UC if ∀ A ∃ I ∀ E: E F E A P ≡ I Literature provides different answers: UC( A: R, I: R, E: MD ) Canetti 2001

DIMACS Workshop June 8th, 2004

slide-19
SLIDE 19

University of Kiel Ralf K¨ usters

UC

P and F are UC if ∀ A ∃ I ∀ E: E F E A P ≡ I Literature provides different answers: UC( A: R, I: R, E: MD ) Canetti 2001 UC( A: M, I: M, E: D ) Pfitzmann, Waidner 2001

DIMACS Workshop June 8th, 2004

slide-20
SLIDE 20

University of Kiel Ralf K¨ usters

UC

P and F are UC if ∀ A ∃ I ∀ E: E F E A P ≡ I Literature provides different answers: UC( A: R, I: R, E: MD ) Canetti 2001 UC( A: M, I: M, E: D ) Pfitzmann, Waidner 2001 UC( A: M, I: M, E: MD ) Backes, Pfitzmann, Waidner 2004

DIMACS Workshop June 8th, 2004

slide-21
SLIDE 21

University of Kiel Ralf K¨ usters

SBB

P and F are SBB if ∃ S ∀ A ∀ E: E E A P ≡ A′ F S Variants: SBB( A: M, S: M, E: D ) Pfitzmann, Waidner 2001 SBB( A: M, S: M, E: MD ) Backes, Pfitzmann, Waidner 2004 SBB( A: M, S: R, E: MD ) SBB( A: R, S: M, E: MD ) SBB( A: R, S: R, E: MD ) SBB( A: M, S: R, E: D )

DIMACS Workshop June 8th, 2004

slide-22
SLIDE 22

University of Kiel Ralf K¨ usters

Weak Black-box Simulatability (WBB)

P and F are WBB if ∀ A ∃ S ∀ E: E E A P ≡ A′ F S Variants: WBB( A: M, S: M, E: MD ) WBB( A: M, S: R, E: MD ) WBB( A: R, S: M, E: MD ) WBB( A: R, S: R, E: MD ) WBB( A: M, S: M, E: D ) WBB( A: M, S: R, E: D )

DIMACS Workshop June 8th, 2004

slide-23
SLIDE 23

University of Kiel Ralf K¨ usters

SS

P and F are SS if ∃ S ∀ E: E E P ≡ F S Variants: SS( S: R, E: MD ) SS( S: M, E: MD )

DIMACS Workshop June 8th, 2004

slide-24
SLIDE 24

University of Kiel Ralf K¨ usters

Relationship Between the Security Notions Across Models?

DIMACS Workshop June 8th, 2004

slide-25
SLIDE 25

University of Kiel Ralf K¨ usters

Relationship Between the Security Notions Across Models?

First, need general computational model that “subsumes” all other models.

DIMACS Workshop June 8th, 2004

slide-26
SLIDE 26

University of Kiel Ralf K¨ usters

Relationship Between the Security Notions Across Models?

First, need general computational model that “subsumes” all other models. We introduce Sequential Probabilistic Process Calculus (SPPC).

DIMACS Workshop June 8th, 2004

slide-27
SLIDE 27

University of Kiel Ralf K¨ usters

Sequential Probabilistic Process Calculus (SPPC)

Syntactic and semantic restriction and extension of PPC. Example process (simplified) corresponding to an IO automaton/ITM: Q = !q(n) in(cs, xs).

  • c∈Cin

in(c, x).

  • ut(cns, Tns(c, x, xs)) ||
  • c′∈Cout

in(cns, x′

s, c′, y).

  • ut(cs, x′

s) || out(c′, y)

  • Parallel composition of processes:

E || A || P Polynomial composition of processes (used in composition theorem): E || A || !q(n) P

DIMACS Workshop June 8th, 2004

slide-28
SLIDE 28

University of Kiel Ralf K¨ usters

Important Feature of SPPC

Sequentiality (unlike PPC): Consider for instance E || A || P.

  • 1. At most one of the three processes is active.
  • 2. The active process may send at most one message on an external

channel directly to another process, and by reading the message, this

  • ther process is activated.

DIMACS Workshop June 8th, 2004

slide-29
SLIDE 29

University of Kiel Ralf K¨ usters

Important Feature of SPPC

Sequentiality (unlike PPC): Consider for instance E || A || P.

  • 1. At most one of the three processes is active.
  • 2. The active process may send at most one message on an external

channel directly to another process, and by reading the message, this

  • ther process is activated.

In comparison: PITM and PIOA are also sequential, but PITM: Activation scheme is “hard-wired” into real, ideal, hybrid model. PIOA: IO automaton may send many messages into different buffers (asynchronous network) and by triggering one buffer one message is delivered.

DIMACS Workshop June 8th, 2004

slide-30
SLIDE 30

University of Kiel Ralf K¨ usters

Advantage of SPPC

Simplicity: Details of network communication (buffers, specific triggering mechanisms, tapes) are not made explicit in SPPC, but Flexibility: Are part of the protocol specification. For instance, all of the following can be modeled:

  • 1. Insecure, authenticated, secure channels (with your favorite buffers,

tapes,...)

  • 2. Synchronous communication.
  • 3. Broadcasting, etc.

DIMACS Workshop June 8th, 2004

slide-31
SLIDE 31

University of Kiel Ralf K¨ usters

Advantage of SPPC

Simplicity: Details of network communication (buffers, specific triggering mechanisms, tapes) are not made explicit in SPPC, but Flexibility: Are part of the protocol specification. For instance, all of the following can be modeled:

  • 1. Insecure, authenticated, secure channels (with your favorite buffers,

tapes,...)

  • 2. Synchronous communication.
  • 3. Broadcasting, etc.

= ⇒ SPPC allows to embed other models.

DIMACS Workshop June 8th, 2004

slide-32
SLIDE 32

University of Kiel Ralf K¨ usters

Our Results

Relationships between the security notions in SPPC:

DIMACS Workshop June 8th, 2004

slide-33
SLIDE 33

University of Kiel Ralf K¨ usters

Our Results

Relationships between the security notions in SPPC: “Making the environment the master process unifies all notions.”

DIMACS Workshop June 8th, 2004

slide-34
SLIDE 34

University of Kiel Ralf K¨ usters

Our Results

Relationships between the security notions in SPPC: “Making the environment the master process unifies all notions.” More specifically, the following notions are equivalent:

  • 1. UC(A: R, I: R, E: MD).
  • 2. UC(A: M, I: M, E: MD).
  • 3. WBB(A: R/M, S: R/M, E: MD).
  • 4. All variants of SS and SBB (independent of whether E is D or MD).

DIMACS Workshop June 8th, 2004

slide-35
SLIDE 35

University of Kiel Ralf K¨ usters

Our Results

Relationships between the security notions in SPPC: “Making the environment the master process unifies all notions.” More specifically, the following notions are equivalent:

  • 1. UC(A: R, I: R, E: MD).
  • 2. UC(A: M, I: M, E: MD).
  • 3. WBB(A: R/M, S: R/M, E: MD).
  • 4. All variants of SS and SBB (independent of whether E is D or MD).

Assuming the real protocol P is network predictable, i.e., it is possible to predict on what network channels P accepts messages depending on the traffic on the network channels. Without this assumption, SS and SBB are stronger than the other two notions.

DIMACS Workshop June 8th, 2004

slide-36
SLIDE 36

University of Kiel Ralf K¨ usters

Our Results

Relationships between the security notions in SPPC: UC(A: R, I: R, E: MD) UC(A: M, I: M, E: MD) WBB(A: R/M, S: R/M, E: MD) and all variants of SS and SBB

= ⇒

=

UC(A: M, I: M, E: D) WBB(A: M, S: M, E: D) = ⇒ ⇐ = ? = ⇒

= WBB(A: M, S: R, E: D)

DIMACS Workshop June 8th, 2004

slide-37
SLIDE 37

University of Kiel Ralf K¨ usters

Consequences for other models

PITM (Canetti 2001): UC(A: R, I: R, E: MD) ⇐ ⇒ WBB(A: R, S: R, E: MD) ≈ UC’(A: R, I: R, E: MD)

DIMACS Workshop June 8th, 2004

slide-38
SLIDE 38

University of Kiel Ralf K¨ usters

Consequences for other models

PIOA: Pfitzmann, Waidner 2001: UC(A: M, I: M, E: D) ⇐ = SBB(A: M, S: M, E: D)

  • =

DIMACS Workshop June 8th, 2004

slide-39
SLIDE 39

University of Kiel Ralf K¨ usters

Consequences for other models

PIOA: Pfitzmann, Waidner 2001: UC(A: M, I: M, E: D) ⇐ = SBB(A: M, S: M, E: D)

  • =

⇒ Backes, Pfitzmann, Waidner 2004: UC(A: M, I: M, E: MD) ⇐ = SBB(A: M, S: M, E: MD)

  • =

⇒ even if P is network predictable Problem: Buffers and trigger mechanism used in PIOA. Solution: Drop buffers and let IO automata talk to each other directly (similar to SPPC). Results provide counterexamples for a theorem proved in Backes et al. 2004.

DIMACS Workshop June 8th, 2004

slide-40
SLIDE 40

University of Kiel Ralf K¨ usters

Correspondence Between PITM and PIOA Results

Embedding PITM into SPPC: UCP IT M(P,F) iff UCSP P C(SPPC(P),SPPC(F)) Embedding PIOA∗ (PIOA without buffers) into SPPC: SBBP IOA∗(P,F) iff SBBSP P C(SPPC(P),SPPC(F))

DIMACS Workshop June 8th, 2004

slide-41
SLIDE 41

University of Kiel Ralf K¨ usters

Correspondence Between PITM and PIOA Results

Embedding PITM into SPPC: UCP IT M(P,F) iff UCSP P C(SPPC(P),SPPC(F)) Embedding PIOA∗ (PIOA without buffers) into SPPC: SBBP IOA∗(P,F) iff SBBSP P C(SPPC(P),SPPC(F)) Equivalence: PP IT M (PITM) is equivalent to PP IOA∗ (PIOA∗) iff SPPC(PP IT M)∼ = SPPC(PP IOA∗), i.e., E || SPPC(PP IT M) ≡ E || SPPC(PP IOA∗) ∀ E.

DIMACS Workshop June 8th, 2004

slide-42
SLIDE 42

University of Kiel Ralf K¨ usters

Correspondence Between PITM and PIOA Results

Embedding PITM into SPPC: UCP IT M(P,F) iff UCSP P C(SPPC(P),SPPC(F)) Embedding PIOA∗ (PIOA without buffers) into SPPC: SBBP IOA∗(P,F) iff SBBSP P C(SPPC(P),SPPC(F)) Equivalence: PP IT M (PITM) is equivalent to PP IOA∗ (PIOA∗) iff SPPC(PP IT M)∼ = SPPC(PP IOA∗), i.e., E || SPPC(PP IT M) ≡ E || SPPC(PP IOA∗) ∀ E. Consequence of our results: Given PP IT M ∼ = PP IOA∗ and FP IT M ∼ = FP IOA∗, we have: UCP IT M(PP IT M,FP IT M) iff SBBP IOA∗(PP IOA∗,FP IOA∗)

DIMACS Workshop June 8th, 2004

slide-43
SLIDE 43

University of Kiel Ralf K¨ usters

Conclusion

  • Introduced SPPC as a general computational model for

simulation-based security notions that allows to embed other models. = ⇒ Theorems proved in this model are valid for a broad class

  • f other more specific models.
  • Clarified the relationships between different security notions (UC, SBB,

WBB, SS) and their variants as considered in the literature. Our proofs are based on a few equational principles. = ⇒ “Making the environment the master process unifies all security notions.” = ⇒ With appropriate modifications (drop buffers in PIOA), results for SBB/UC proved in PIOA carry over to UC in PITM, and vice versa.

  • Proved composition theorem for SPPC.
  • Future work: Are there realistic attacks in a concurrent

(non-sequential) framework (such as concurrent PPC) not captured by a sequential framework (such as SPPC, PIOA, PITM)?

DIMACS Workshop June 8th, 2004