Sesame: A Secure and Convenient Mobile Solution for Passwords Dr. - - PowerPoint PPT Presentation

sesame a secure and convenient mobile solution for
SMART_READER_LITE
LIVE PREVIEW

Sesame: A Secure and Convenient Mobile Solution for Passwords Dr. - - PowerPoint PPT Presentation

Sesame: A Secure and Convenient Mobile Solution for Passwords Dr. Mehrdad Aliasgari , Nick Sabol, and Ashutosh Sharma California State University, Long Beach MobiSecServ Feb. 2015 Passwords CSU Long Beach 2 Most Popular Passwords of 2014*


slide-1
SLIDE 1

Sesame: A Secure and Convenient Mobile Solution for Passwords

  • Dr. Mehrdad Aliasgari,

Nick Sabol, and Ashutosh Sharma California State University, Long Beach MobiSecServ Feb. 2015

slide-2
SLIDE 2

Passwords

2 CSU Long Beach

slide-3
SLIDE 3

Most Popular Passwords of 2014*

  • 123456
  • password
  • 12345
  • 12345678
  • qwerty
  • 123456789
  • 1234
  • baseball
  • dragon
  • ……

* Compiled by SplashData

3 CSU Long Beach

slide-4
SLIDE 4

Password Managers Cont.

  • Three types

– Desktop: No mobility – Mobile : Trust third party – Device based: Have to carry them

  • Have to set a master password

– All passwords are encrypted using one single key phrase.

  • If master password is compromised….

4 CSU Long Beach

slide-5
SLIDE 5

Our Work

  • Biometric and Phone-based, online password

manager

  • Data distributed in parts. All parts need to

come together to read data

  • Our choice of biometric: Voice (Speech and

Speaker recognition)

5 CSU Long Beach

slide-6
SLIDE 6

Sesame

  • Idea:

– Encrypt each password with a fresh key – Backup the encrypted passwords in the cloud – Encrypt the fresh keys and store them on Sesame server – If the user passes authentication then release the encrypted key

  • Neither the cloud nor Sesame knows anything

about your passwords

6 CSU Long Beach

slide-7
SLIDE 7

Sesame (Cont.)

  • User Authentication:

– Voice (Speaker recognition) – Speech recognition to extract the requested entry

  • Master passwords are used as an alternative

but users don’t have to type them every time.

  • If master password is compromised user is still

safe (better change it soon)

7 CSU Long Beach

slide-8
SLIDE 8

System Overview

  • Pi : Password
  • Ki : Encrypting key

Phone Cloud storage Sesame server

Enc(Ki , Pi)

Enc(Ke, Ki) and RSA(Ki) uid Enc(K2 , Ke) Enc(K2 , RSA-Public) Enc(K3 , RSA-Private)

8 CSU Long Beach

slide-9
SLIDE 9

Adding a New Password Entry

  • Si: Service name
  • Ui: Username
  • Pi : Password
  • Ki : Encrypting key (fresh)
  • mi: Si|| Ui ||Pi

Phone Cloud storage Sesame server

Enc(Ki , mi)

Si , Enc(Ke, Ki) and RSA(Ki)

9 CSU Long Beach

slide-10
SLIDE 10

Retrieving a Password Entry

  • Si: Service name
  • Ui: Username
  • Pi : Password
  • Ki : Encrypting key
  • mi: Si|| Ui ||Pi

Phone Cloud storage Sesame server

Enc(Ki , mi)

Si and Enc(Ke, Ki)

  • r RSA(Ki)

Voice or Si

10 CSU Long Beach

slide-11
SLIDE 11

Cryptographic Tools

  • Master password is used to generate K1, K2

and K3 using KDF (Key Derivation Function)

– 4096 iterations – uid is used as a salt

  • Symmetric Encryption: AES 256 bits with CBC

mode

  • Asymmetric: RSA-OAEP 2048 bits

11 CSU Long Beach

slide-12
SLIDE 12

Symmetric vs Asymmetric

  • Why we have both Enc() and RSA()?
  • It depends on what method of authentication

the users chooses

  • When speaker recognition is used

– Enc(Ke, Ki)

  • When master password is used

– RSA(Ki)

12 CSU Long Beach

slide-13
SLIDE 13

Encryption and Distribution

  • All passwords are encrypted with a new key
  • Encrypted passwords are backed up
  • The keys encrypted and stored in Sesame

server

  • To recover a password you need:

– The backed up data in the cloud – The encrypted keys – The key to decrypt keys

13 CSU Long Beach

slide-14
SLIDE 14

Security Analysis

  • No one party has all necessary pieces
  • Collusion attack:

– Sesame serve and the cloud collide

  • Best they can do is to brute-force masterpassword
  • Exponential
  • No offline dictionary attack due to use of salt (uid)

14 CSU Long Beach

slide-15
SLIDE 15

Other Capabilities

  • You can use the application on multiple

devices

– at the installation on second device:

  • Connect with your cloud
  • Enter the master password
  • Respond to the prompted speaker recognition

challenge

  • Users can change their master password

15 CSU Long Beach

slide-16
SLIDE 16

Android App

16 CSU Long Beach

slide-17
SLIDE 17

17 CSU Long Beach

slide-18
SLIDE 18

18 CSU Long Beach

slide-19
SLIDE 19

19 CSU Long Beach

slide-20
SLIDE 20

Conclusion

  • Secure method of distributing sensitive data
  • Can be applied to secure cloud storage of any

type of data

  • Other biometric modalities can be used

– Handwriting

20 CSU Long Beach