Download presentation

Presentation is loading. Please wait.

Published byShayla Maye Modified over 2 years ago

1
The Dining Cryptographer Problem Security Presentation Nitesh Patel 2005h425

2
INDEX Proposal Introduction Approach to Problem An Example Proof of Security Drawbacks Solution Techniques Conclusion

3
Proposal Keeping confidential who sends which messages, in the world where any physical transmission can be traced to its origin, seems impossible.

4
Introduction Three cryptographers are sitting down to dinner at restaurant. The arrangements have been made for the bill to be paid anonymously. One of the cryptographers might be paying for the dinner, or it might have been NSA (Other than those three). The three cryptographers respect each other's right to make an anonymous payment, but they wonder if NSA is paying. They resolve their uncertainty fairly by carrying out the following protocol

5
How the sender is Untraceable Each cryptographer flips an unbiased coin behind his menu, between him and the cryptographer on his right, so that only the two of them can see the outcome. Each cryptographer then states aloud whether the two coins he can see--the one he flipped and the one his left-hand neighbor flipped--fell on the same side or on different sides.

6
If one of the cryptographers is the payer, he states the opposite of what he sees. An odd number of differences uttered at the table indicates that a cryptographer is paying; an even number indicates that NSA is paying (assuming only one can pay). If a cryptographer is paying, neither of the other two learns anything from the utterances about which cryptographer it is.

7
Hierarchy of Common Properties

8
Why the protocol is unconditionally secure Consider the cryptographer who is not the payer and wishes to find out which cryptographer is paying(when NSA is not paying). There can be two cases.

9
Case 1 The two coins he sees are the same, one of the other cryptographers said "different," and the other one said "same." If the hidden outcome was the same as the two outcomes he sees, the cryptographer who said "different" is the payer; if the outcome was different, the one who said "same" is the payer. But since the hidden coin is fair, both possibilities are equally likely.

10
Case 2 The coins he sees are different; if both other cryptographers said "different," then the payer is closest to the coin that is the same as the hidden coin; if both said "same," then the payer is closest to the coin that differs from the hidden coin.

11
Thus, in each subcase, a nonpaying cryptographer learns nothing about which of the other two is paying

12
The Approach to Protocol Each participant has a secret key bit in common with, say, every other participant.

13
Each participant outputs the sum, modulo two, of all the key bits he shares, and if he wishes to transmit, he inverts his output. If no participant transmits, the modulo two sum of the outputs must be zero, since every key bit enters exactly twice; if one participant transmits, the sum must be one.

14
For j rounds, each participant could have a j-bit key in common with every other participant, and the ith bit of each such key would be used only in the ith round. Detected collision of messages leads to attempted retransmission

15
Model The Key Each participant is assumed to have two kinds of secret: [1] The keys shared with other participants for each round; and [2] The inversion used in each round (i.e., a 1 if the participant inverts in that round and a 0 if not).

16
Establishing Keys One way to do this is for one member of each pair to toss many coins in advance, or - in other words - to generate a sufficient number of bits by a RNG (random number generator). A second way is to establish a short key and expand it as needed. A third way is to use a Diffie-Helman key exchange.

17
Collusion of Participants Some participants may cooperate by pooling their keys in efforts to trace the messages of others; such cooperation will be called collusion. Detected collision of messages leads to attempted retransmission

18
Proof of Security Consider, a single round in which some full collusion knows some set of keys. Remove the edges known to the collusion from the key-sharing graph and consider any particular connected component C of the remaining graph. The vertices of C thus form an anonymity set seen by the pooled keys.

19
The only thing the collusion learns about the members of C is the parity sum of their inversions. This is intuitively apparent, since the inversions of the members of C are each in effect hidden from the collusion by one or more unknown key bits, and only the parity of the sum of these key bits is known (to be zero). Thus the inversions are hidden by a one-time pad, and only their parity is revealed, because only the parity of the pad is known.

20
Establishing Keys One way to provide the keys needed for longer messages is for one member of each pair to toss many coins in advance. Two identical copies of the resulting bits are made, say each on a separate optical disk. Supplying one such disk (which today can hold on the order of 10^10 bits) to a partner provides enough key bits to allow people to type messages at full speed for years.

21
Contin……. If participants are not transmitting all the time, the keys can be made to last even longer by using a substantially slower rate when no message is being sent; the full rate would be invoked automatically only when a 1 bit indicated the beginning of a message.

22
Contin….. Another possibility is for a pair to establish a short key and use a cryptographic pseudorandom-sequence generator to expand it as needed. Of course this system might be broken if the generator were broken. Cryptanalysis may be made more difficult, however, by lack of access to the output of individual generators. Even when the cryptographers do not exchange keys at dinner, they can safely do so later using a public-key distribution system

23
Drawbacks 1. Although malicious participants cannot break the anonymity (unless there is a big-enough collusion), they can block others from transmitting by DoS (denial of service) attacks. In addition, all participants are required to form a transmission. 2. For every bit of information sent, three bits of messages have to be passed all the way around the circle. 3. The last participant to transmit can “read” a message and pass a different message on.

24
Solution to Dining Cryptographer Problem Two seminal techniques: 1. Dining-cryptographers" nets, also known as DC-nets. 2. Mixnets

25
DC nets In DC-nets, each participant can send messages to all others and none can tell from whom this message is. If a participant wishes to send a message to a speciphic recipient (only), he can encrypt it in a way that only the intended recipient can decrypt. A DC network allows both the sender and the recipient to remain anonymous

26
Anonymizer Anonymizer is an entity that intermediates between senders and receivers, and provides anonymous Web browsing. It removes identifying headers and fields. For example, the Anonymizer will “strip out all references to your e-mail address, computer type, and previous page visited before forwarding your request”

27
Anonymizer can be implemented by a proxy or a router. If a group of users trust each other, they can choose one of them to be the anonimizer in turns. Anonymizer’s main disadvantage is that it has access to the sensitive information. If an adversary takes control over the Anonymizer, he breaks the anonymity, and further more, he can control the data transmission.

28
Chaum Mixes Definition A Mix is a computer that mediates between senders and recipients. It enables anonymous communication by means of cryptography, scrambling the messages, and unifying them (padding to constant size, fixing a constant sending rate by sending dummy messages, etc.). Chaum Mixes support sender anonymity, and protects from traffic analysis.

29
Drawbacks 1. Chaum Mixes requires public-key cryptography, which is computationally expensive and slow for synchronous communication. 2. It is vulnerable to collaboration by first and last Mixes in the chain (timing attacks). 3. There is no sender anonymity from the first Mix or system administrator.

30
Comparison between Mix- net and DC-net “If optimal protection against collusion is to be provided and the crypto- security of Mix-nets is acceptable a choice between Mix-nets and DC-nets may depend on the nature of the traffic.

31
With a mail-like system that requires only periodic deliveries, and where the average number of messages per interval is relatively large, Mix-nets may be suitable. When messages must be delivered continually and there is no time for batching large numbers of them, DC-nets appear preferable.”

32
Conclusion We have proposed two new DC-net constructions. Unlike previous DC-net proposals, our constructions allow for e±cient detection and identication of cheating players with high probability. When cheating is detected, a single additional broadcast round enables full fault recovery. Our DC-net protocols are thus resilient to the jamming attacks that negated the simplicity and non-interactivityof earlier DC-net proposals.

Similar presentations

OK

CMSC 414 Computer and Network Security Lecture 20 Jonathan Katz.

CMSC 414 Computer and Network Security Lecture 20 Jonathan Katz.

© 2017 SlidePlayer.com Inc.

All rights reserved.

Ads by Google

Ppt on fibonacci sequence Save ppt on ipad mini Ppt on south africa culture and customs Ppt on solar power air conditioning Download ppt on coordinate geometry for class 9th model Ppt on bank lending 2016 Ppt on views in dbms examples Ppt on 4g wireless technology Ppt on solid dielectrics in electric fields Download ppt on sexual reproduction in flowering plants