traffic analysis or encryption is not enough
play

TRAFFIC ANALYSIS: or... encryption is not enough Carmela Troncoso* - PowerPoint PPT Presentation

H2020-ICT-15 GA 688722 TRAFFIC ANALYSIS: or... encryption is not enough Carmela Troncoso* IMDEA Software Institute Summer school on real-world crypto and privacy 9 th June 2016 *Thanks to George Danezis for sharing slides Privacy in


  1. H2020-ICT-15 GA 688722 TRAFFIC ANALYSIS: or... encryption is not enough Carmela Troncoso* IMDEA Software Institute Summer school on real-world crypto and privacy 9 th June 2016 *Thanks to George Danezis for sharing slides

  2. Privacy in electronic communications Dear Dr. Bob, Can we change my chemo appointment? A. Alice Bob A Network

  3. Privacy in electronic communications Intelligence agencies Your Parents Dear Dr. Bob, SysAdmins Can we change my chemo appointment? The Boss Anybody A. curious ISPs Alice Bob A Network

  4. But we can encrypt! What is the problem? Dear Dr. Bob, Can we change my chemo appointment? A. Alice Bob A Network

  5. But we can encrypt! What is the problem? %Q}!$#!{}{¨@%%:@} @$@@¨}{}{@@}{}@{@ {@}@#$¨}{%@$%@@# @${P%@@}}}~ <>}@!@ Alice Bob A Network

  6. But we can encrypt! What is the problem? %Q}!$#!{}{¨@%%:@} @$@@¨}{}{@@}{}@{@ {@}@#$¨}{%@$%@@# @${P%@@}}}~ <>}@!@ Alice Bob A Network Ethernet (IEEE 802.3, 1997)

  7. But we can encrypt! What is the problem? %Q}!$#!{}{¨@%%:@} @$@@¨}{}{@@}{}@{@ {@}@#$¨}{%@$%@@# @${P%@@}}}~ <>}@!@ Alice Bob A Network 0 1 2 3 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 Same +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ |Version| IHL |Type of Service| Total Length | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ for TCP, | Identification |Flags| Fragment Offset | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ SMTP, | Time to Live | Protocol | Header Checksum | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | Source Address | IRC, +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | Destination Address | HTTP, ... +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ Ethernet | Options | Padding | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ (IEEE 802.3, 1997) IPv4 Header Weak identifier (RFC 791, 1981)

  8. But we can encrypt! What is the problem? %Q}!$#!{}{¨@%%:@} @$@@¨}{}{@@}{}@{@ {@}@#$¨}{%@$%@@# @${P%@@}}}~ <>}@!@ Destination IP web Dr. Bob Oncologyst Alice Bob A Network 0 1 2 3 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 Same +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ |Version| IHL |Type of Service| Total Length | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ for TCP, | Identification |Flags| Fragment Offset | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ SMTP, | Time to Live | Protocol | Header Checksum | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | Source Address | IRC, +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | Destination Address | HTTP, ... +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ Ethernet | Options | Padding | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ (IEEE 802.3, 1997) IPv4 Header Weak identifier (RFC 791, 1981)

  9. OMG!! The problem is Traffic Analy lysis!! %Q}!$#!{}{¨@%%:@} @$@@¨}{}{@@}{}@{@ {@}@#$¨}{%@$%@@# @${P%@@}}}~ <>}@!@ Destination IP web Dr. Bob Oncologyst Alice Bob A Network 0 1 2 3 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 Same +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ |Version| IHL |Type of Service| Total Length | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ for TCP, | Identification |Flags| Fragment Offset | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ SMTP, | Time to Live | Protocol | Header Checksum | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | Source Address | IRC, +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | Destination Address | HTTP, ... +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ Ethernet | Options | Padding | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ (IEEE 802.3, 1997) IPv4 Header Weak identifier (RFC 791, 1981)

  10. Traffic WHAT? Wikipedia : traffjc analysis is the process of intercepting and examining messages in order to deduce information from patterns in communication Making use of “just” traffic data of a communication (aka metadata) to extract information (as opposed to analyzing content or perform cryptanalysis) Identities of Timing, frequency, Location Volume Device communicating parties duration Nowadays ys Military Roots - Diffje&Landau: ”Traffjc analysis, not - M. Herman: “These non-textual techniques cryptanalysis, is the backbone of can establish targets' locations , order-of- communications intelligence” battle and movement . Even when messages - Stewart Baker (NSA): “metadata absolutely are not being deciphered, traffjc analysis of the tells you everything about somebody’s target's Command, Control, Communications life . If you have enough metadata, you don’t and intelligence system and its patterns of behavior provides indications of his intentions really need content.” and states of mind ” - Tempora, MUSCULAR → XkeyScore, PRISM - WWI : British troops fjnding German boats. - Also “good” uses: recommendations, location- based services, - WWII : assessing size of German Air Force, fjngerprinting of transmitters or operators (localization of troops). Herman, Michael. Intelligence power in peace and war. Cambridge University Press, 1996. Diffje, Whitfjeld, and Susan Landau. Privacy on the line: The politics of wiretapping and encryption. MIT press, 2010. http://www.theguardian.com/world/interactive/2013/nov/01/snowden-nsa-fjles-surveillance-revelations-decoded

  11. We need to protect the communication layer! Anonymous communications General applications ➢ Freedom of speech ➢ Profjling / price discrimination ➢ Spam avoidance ➢ Investigation / market research ➢ Censorship resistance ➢ Specialized applications ➢ Electronic voting ➢ Auctions / bidding / stock market ➢ Incident reporting ➢ Witness protection / whistle blowing ➢ Showing anonymous credentials! ➢ https://www.eff.org/deeplinks/2013/10/online-anonymity-not-only-trolls-and-political-dissidents http://geekfeminism.wikia.com/wiki/Who_is_harmed_by_a_%22Real_Names%22_policy%3F

  12. Anonymous communications: abstract model IDs Timing Volume Length ... Receivers Senders Anonymous communication system Bitwise unlinkability ➢ Crypto to make inputs and outputs bit patterns different ➢ (re)packetizing + (re)schedule ➢ Destroy patterns (traffjc analysis resistance) ➢

  13. Anonymous communications: abstract model IDs Timing Volume Length ... Receivers Senders Bitwise unlinkability ➢ Crypto to make inputs and outputs bit patterns different ➢ (re)packetizing + (re)schedule + (re)routing, ➢ Destroy patterns (traffjc analysis resistance) ➢ Load balancing ➢ Distribute trust ➢

  14. In theory should work, but in practice... IDs Timing Volume Length ... Receivers Senders Bitwise unlinkability ➢ Crypto to make inputs and outputs bit patterns different ➢ (re)packetizing + (re)schedule + (re)routing, ➢ Bandwidth Destroy patterns (traffjc analysis resistance) ➢ Delay Load balancing ➢ Churn Distribute trust ➢ Intrinsic network differences Trust?

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend