DC-Networks – The Protocol. 2 DC-Networks - The Protocol toc Introduction Time Excluding bad clients Key Exchange Demonstration Some Attacks On-demand.

Slides:



Advertisements
Similar presentations
Key Management. Shared Key Exchange Problem How do Alice and Bob exchange a shared secret? Offline – Doesnt scale Using public key cryptography (possible)
Advertisements

Off-the-Record Communication, or, Why Not To Use PGP
Scalable Anonymous Group Communication in the Anytrust Model David Wolinsky 1, Henry Corrigan-Gibbs 1, Bryan Ford 1, and Aaron Johnson 2 1 Yale University,
Introduction to Modern Cryptography, Lecture 13 Money Related Issues ($$$) and Odds and Ends.
Explorations in Anonymous Communication Andrew Bortz with Luis von Ahn Nick Hopper Aladdin Center, Carnegie Mellon University, 8/19/2003.
CMSC 414 Computer and Network Security Lecture 22 Jonathan Katz.
K-Anonymous Message Transmission Luis von Ahn Andrew Bortz Nick Hopper The Aladdin Center Carnegie Mellon University.
Homework #5 Solutions Brian A. LaMacchia Portions © , Brian A. LaMacchia. This material is provided without.
Public Key Model 8. Cryptography part 2.
Strong Password Protocols
1 Lecture 18: Security issues specific to security key management services –privacy –integrity/authentication –nonrepudiation/plausible deniability.
Page 1 Secure Communication Paul Krzyzanowski Distributed Systems Except as otherwise noted, the content of this presentation.
Lecture 19 Page 1 CS 111 Online Symmetric Cryptosystems C = E(K,P) P = D(K,C) E() and D() are not necessarily the same operations.
SSL and https for Secure Web Communication CSCI 5857: Encoding and Encryption.
Untraceable Electronic Mail, Return Addresses, and Digital Pseudonyms David Chaum CACM Vol. 24 No. 2 February 1981 Presented by: Adam Lee 1/24/2006 David.
Public Key Encryption CS432 – Security in Computing Copyright © 2005, 2008 by Scott Orr and the Trustees of Indiana University.
15-499Page :Algorithms and Applications Cryptography I – Introduction – Terminology – Some primitives – Some protocols.
A A E E D D C C B B # Symmetric Keys = n*(n-1)/2 F F
Lecture 5 Page 1 CS 236 Online Public Key Encryption Systems The encrypter and decrypter have different keys C = E(K E,P) P = D(K D,C) Often, works the.
Public Key Encryption ● Diffie and Hellman – 1976 Famous Paper: New Directions In Cryptography New Directions In Cryptography ● First revolutionary.
Basics of Cryptography
Security Outline Encryption Algorithms Authentication Protocols
Asymmetric-Key Cryptography
Key Management Session and Interchange Key Key Exchange
Key Exchange References: Applied Cryptography, Bruce Schneier
DTTF/NB479: Dszquphsbqiz Day 26
Privacy & Security.
Secure Sockets Layer (SSL)
Public Key Encryption Systems
Anonymous Communication
Public Key Encryption and Digital Signatures
Chapter 7 Network Security
Malicious Participants
Required Features Anonym (in der Praxis komplexitätstheoretisch, aber informationstheoretisch sichere Verwendung nicht verbauen) Synchronized login phases.
Basic Network Encryption
Cryptography.
Topic 14: Random Oracle Model, Hashing Applications
The University of Adelaide, School of Computer Science
Untraceable Electronic Mail, Return addresses, and Digital Pseudonyms
An Introduction to Privacy and Anonymous Communication
Homework #5 Solutions Brian A. LaMacchia
Public Key Cryptography Diffie-Hellman, Discrete Log, RSA
Celia Li Computer Science and Engineering York University
Assignment #4 – Solutions
IT IS 6200/8200.
NET 311 Information Security
Anonymous Communication
The Secure Sockets Layer (SSL) Protocol
Key Management Network Systems Security
DTTF/NB479: Dszquphsbqiz Day 27
NET 311 Information Security
Key Establishment Protocols ~
Consensus Algorithms.
Chapter 3 - Public-Key Cryptography & Authentication
Blockchains and Auditing
Basic Network Encryption
Diffie/Hellman Key Exchange
Basic of Modern Cryptography
PUBLIC-KEY CRYPTOGRAPHY AND RSA – Chapter 9
Public Key Encryption Systems
刘振 上海交通大学 计算机科学与工程系 电信群楼3-509
Public Key Encryption Systems
Cryptography Lecture 27.
Anonymous Communication
ITIS 6200/8200 Chap 5 Dr. Weichao Wang.
AIT 682: Network and Systems Security
Lecture 6.2: Protocols - Authentication and Key Exchange II
Presentation transcript:

DC-Networks – The Protocol

2 DC-Networks - The Protocol toc Introduction Time Excluding bad clients Key Exchange Demonstration Some Attacks On-demand disclosure

3 DC-Networks - The Protocol Introduction

4 DC-Networks - The Protocol Is the meal paid by one of the cryptographers? Bob Alice Charlie key exchange Introduction

5 DC-Networks - The Protocol Is the meal paid by one of the cryptographers? Bob Alice Charlie key exchange Introduction Bob: Alice: Charlie: Everybody:

6 DC-Networks - The Protocol Remember the one-time-pad If an attacker knows and if k is random, he does not learn anything about m In other words: Key k “hides” the cleartext m Introduction

7 DC-Networks - The Protocol Bob does not learn anything Bob Alice Charlie key exchange Introduction Bob: Alice: Charlie: Bob can learn:

8 DC-Networks - The Protocol Summary Everybody exchanges keys with everybody Sender Anonymity Everybody gets every message Receiver Anonymity Introduction

9 DC-Networks - The Protocol Time

10 DC-Networks - The Protocol Rounds, separated by ticks In each round, each client needs to: Get the list of all participants (may have changed) Prepare and send the new message Get the final message Know, that all others got the (same) message Time

11 DC-Networks - The Protocol The protocol Time Tick Round Client get participants send receive message add all keys confirmation that others got message Server

12 DC-Networks - The Protocol DC+ “Know, that all others got the same message” Attacker could modify messages to specific clients Solutions Good: Byzantine Agreement, TTP, Group Signatures, Anonymous Signatures... Better: Mangle last message into current Easy, Fast Time

13 DC-Networks - The Protocol Excluding bad clients

14 DC-Networks - The Protocol Broken and malicious clients Broken clients Server logs out any client that did not send Ban lists, reputation systems etc... Malicious clients Anonymous reservation scheme and trap messages Google “DSuKrypt.pdf”, page , Excluding bad clients

15 DC-Networks - The Protocol Anonymous reservation scheme Excluding bad clients Tick X collision counter length #1 #2#3 #4...#23... # a 32 ef f1 f0 0a aa b #1 length chunk server

16 DC-Networks - The Protocol Anonymous reservation scheme Round messages = Reservation slots Client chooses slot at random If collision counter = 1 then reservation succeeded Real message data published via “chunk server” Bonus: Variable block length in reservation slot Excluding bad clients

17 DC-Networks - The Protocol Trap Messages Prevent attacker disturbing messages: Trap messages every now and then Request disclosure of own traps (if caught something) Bonus: Variable block length in reservation slot Excluding bad clients

18 DC-Networks - The Protocol Key Exchange

19 DC-Networks - The Protocol Remember: Diffie & Hellman Key Exchange Server p,q AliceBob publish

20 DC-Networks - The Protocol Diffie & Hellman No direct client to client communication needed Complete key graph Easy distribution Exchange seeds for random number generator Unfortunately, keys become “provable” But: Clients can always exchange real one-time-pads (they even do not have to tell the server) Key Exchange

21 DC-Networks - The Protocol Demonstration

22 DC-Networks - The Protocol Some Attacks

23 DC-Networks - The Protocol Timing attack Attacker knows who sends at which time A client answering too fast did not send the answer Alic e "Everything understandable?""No, the lecturer sucks!!1!" Alic e other participants too short for human reaction other participants Some Attacks

24 DC-Networks - The Protocol Timing attack Solution: Server return message after client sends All clients receive messages delayed at least one round Nice side effects: Only client → server communication (“firewall-proof”) Some Attacks

25 DC-Networks - The Protocol Political attacks Centralized Server? Data Retention Forced to store communication data btw: Does not make sense anyway Warning lawyer threats Crypto bans Some Attacks

26 DC-Networks - The Protocol Political attacks Why do we need a server at all? Participants publish their rounds on MySpace, Wikipedia, phpBB, newspaper etc. Login / Logout: Someone send participants DH-key and publishing URL within the DC-Network Auto-Logout by “not publishing once” Some Attacks

27 DC-Networks - The Protocol On-demand disclosure

28 DC-Networks - The Protocol Original scheme by David Chaum Participants sign round keys Alice and Bob exchange their signatures In case of “disclosure”, all participants publish their keys Alice verifies Bob's key and vice versa On-demand disclosure

29 DC-Networks - The Protocol "Watchmen" scheme n predefined watchmen may work together to disclose sender Client splits round key into n parts Send one part to each watchman In case of “disclosure”, all watchmen post their parts to reconstruct the round key On-demand disclosure

30 DC-Networks - The Protocol How to split a key On-demand disclosure To join parts together, add them

31 DC-Networks - The Protocol Split keys to Dickens and Elisa Bob AliceCharlie On-demand disclosure DickensElisa

32 DC-Networks - The Protocol Split keys to Dickens and Elisa Bob AliceCharlie On-demand disclosure DickensElisa Dickens says: Elisa says: Everyone:

33 DC-Networks - The Protocol Why do the watchmen learn nothing? The first watchmen receive random numbers. Obviously, they learn nothing about k The published values only consist of random numbers On-demand disclosure

34 DC-Networks - The Protocol Problem: Conspiration Alice and Bob exchange an additional key They add to their round message, but not to the key sent to Dickens and Elisa Sum of Dickens and Elisa is still 0 On “disclosure”, both round keys from Alice and Bob mismatch (by resp. ) Of course, both could be considered “bad guys” On-demand disclosure

35 DC-Networks - The Protocol Threshold secret sharing scheme Reduce number of watchmen necessary for disclosure, e.g. “5 out of 10” Google “DSuKrypt.pdf”, page Using Adi Shamirs polynomial interpolation, some restrictions occur All participants must use same set of watchmen (may be necessary anyway) Each watchman must get the same x-coordinates from every participant On-demand disclosure

36 DC-Networks - The Protocol Comparison Comparing the disclosure scheme by David Chaum: Both schemes are insecure against conspirations Using watchmen, a conspiration can not be formed after the message is published Using watchmen, no communication to the participants needed after message is published The disclosure can be kept secret On-demand disclosure

37 DC-Networks - The Protocol Thanks Interesting stuff: D.Chaum, “The Dining Cryptographers Problem: Unconditional Sender and Recipient Untraceability” (Journal of Cryptology, vol. 1 no. 1, 1988, pp or A.Pfitzmann, “Datensicherheit und Kryptographie” ( pp and German language) Literature