draft-harkins-emu-eap-pwd-01

Slides:



Advertisements
Similar presentations
Key Management Nick Feamster CS 6262 Spring 2009.
Advertisements

Doc.: IEEE /1012r0 Submission September 2009 Dan Harkins, Aruba NetworksSlide 1 Suite-B Compliance for a Mesh Network Date: Authors:
Secure Pre-Shared Key Authentication for IKE
Key distribution and certification In the case of public key encryption model the authenticity of the public key of each partner in the communication must.
Cryptanalysis of a Communication-Efficient Three-Party Password Authenticated Key Exchange Protocol Source: Information Sciences in review Presenter: Tsuei-Hung.
ECE454/CS594 Computer and Network Security Dr. Jinyuan (Stella) Sun Dept. of Electrical Engineering and Computer Science University of Tennessee Fall 2011.
CS470, A.SelcukCryptographic Authentication1 Cryptographic Authentication Protocols CS 470 Introduction to Applied Cryptography Instructor: Ali Aydin Selcuk.
Key Exchange Using Passwords and Long Keys Vladimir Kolesnikov Charles Rackoff Comp. Sci. University of Toronto.
Authentication attacks, causes and solutions Analyzing man in the middle and dictionary attacks against SSL/TLS and password based authentication systems.
Kerberos Jean-Anne Fitzpatrick Jennifer English. What is Kerberos? Network authentication protocol Developed at MIT in the mid 1980s Available as open.
November 1, 2006Sarah Wahl / Graduate Student UCCS1 Public Key Infrastructure By Sarah Wahl.
Cryptography1 CPSC 3730 Cryptography Chapter 10 Key Management.
CMSC 414 Computer and Network Security Lecture 5 Jonathan Katz.
CMSC 414 Computer and Network Security Lecture 14 Jonathan Katz.
CMSC 414 Computer and Network Security Lecture 22 Jonathan Katz.
Dr. Lo’ai Tawalbeh Fall 2005 Chapter 10 – Key Management; Other Public Key Cryptosystems Dr. Lo’ai Tawalbeh Computer Engineering Department Jordan University.
CMSC 414 Computer and Network Security Lecture 6 Jonathan Katz.
Authentication System
Cryptography and Network Security Chapter 10. Chapter 10 – Key Management; Other Public Key Cryptosystems No Singhalese, whether man or woman, would venture.
Password Authentication J. Mitchell CS 259. Password fileUser exrygbzyf kgnosfix ggjoklbsz … kiwifruit hash function.
CMSC 414 Computer and Network Security Lecture 13 Jonathan Katz.
Alexander Potapov.  Authentication definition  Protocol architectures  Cryptographic properties  Freshness  Types of attack on protocols  Two-way.
Strong Password Protocols
(Multimedia University) Ji-Jian Chin Swee-Huay Heng Bok-Min Goi
Solutions for Secure and Trustworthy Authentication Ramesh Kesanupalli
Lecture 11: Strong Passwords
Cryptography and Network Security (CS435) Part Eight (Key Management)
Maryland Information Systems Security Lab D EPARTMENT OF C OMPUTER S CIENCE EAP Password Authenticated eXchange (PAX) T. Charles Clancy William A. Arbaugh.
Chapter 3 (B) – Key Management; Other Public Key Cryptosystems.
Cryptography and Network Security Key Management and Other Public Key Cryptosystems.
1 Lecture 9: Cryptographic Authentication objectives and classification one-way –secret key –public key mutual –secret key –public key establishing session.
Doc.: IEEE /0056r0 Submission January 2010 Dan Harkins, Aruba NetworksSlide 1 Security Review of WAI Date: Authors:
Kerberos Guilin Wang School of Computer Science 03 Dec
Doc.: IEEE /0123r0 Submission January 2009 Dan Harkins, Aruba NetworksSlide 1 Secure Authentication Using Only A Password Date:
1 Chapter 10: Key Management in Public key cryptosystems Fourth Edition by William Stallings Lecture slides by Lawrie Brown (Modified by Prof. M. Singhal,
Key Management Network Systems Security Mort Anvari.
1 Authentication Protocols Rocky K. C. Chang 9 March 2007.
1 Diffie-Hellman (Key Exchange) Protocol Rocky K. C. Chang 9 February 2007.
December 14, 2000Securely Available Credentails (SACRED) - Framework Draft 1 Securely Available Credentials (SACRED) Protocol Framework, Draft Specification.
CSCE 715: Network Systems Security Chin-Tser Huang University of South Carolina.
Lecture 9 Overview. Digital Signature Properties CS 450/650 Lecture 9: Digital Signatures 2 Unforgeable: Only the signer can produce his/her signature.
Cryptography and Network Security Chapter 10 Fourth Edition by William Stallings Lecture slides by Lawrie Brown.
Threshold password authentication against guessing attacks in Ad hoc networks ► Chai, Zhenchuan; Cao, Zhenfu; Lu, Rongxing ► Ad Hoc Networks Volume: 5,
Doc.: IEEE /0899r2 Submission July2010 Dan Harkins, Aruba NetworksSlide 1 Secure PSK Authentication Date: Authors:
Maryknoll Wireless Network Access Steps for Windows 7 As of Aug 20, 2012.
Key Management public-key encryption helps address key distribution problems have two aspects of this: – distribution of public keys – use of public-key.
Zero Knowledge r Two parties:  All powerful prover P  Polynomially bounded verifier V r P wants to prove a statement to V with the following properties:
Outline The basic authentication problem
Reviews Rocky K. C. Chang 20 April 2007.
Enhanced Security Date: Authors: May 2009 May 2009
Secure PSK Authentication
Enhanced Security Features for
Information Security message M one-way hash fingerprint f = H(M)
Enhanced Security Features for
The Tunneled Extensible Authentication Method (TEAM)
Information Security message M one-way hash fingerprint f = H(M)
Secure PSK Authentication
Strong Password Protocols
Password Authenticated Key Exchange
Information Security message M one-way hash fingerprint f = H(M)
Strong Password Protocols
Key Management Network Systems Security
Security Properties Straw Polls
Password Authenticated Key Exchange
Password Authenticated Key Exchange
Password-based authenticated key exchange
Chapter 3 - Public-Key Cryptography & Authentication
Password Authenticated Key Exchange
Cryptology Design Fundamentals
Presentation transcript:

draft-harkins-emu-eap-pwd-01 Dan Harkins and Glen Zorn

What Problem Does It Solve? People use secrets to gain network access must be possible to for a human to remember the secret. secret be repeatedly entered with a high probability of correctness. The secret is therefore drawn from a set of secrets that is, most likely, limited and the secret is, quite possibly, cryptographically weak. This opens up the possibility of a dictionary attack. This protocol is resistant to dictionary attack and allows for a (possibly weak) secret to be used.

A Few Words About Dictionary Attack The attacker is presumed to have access to the set, D, of from which the secret is drawn and can enumerate each element of D. Attacks are made against honest participants and can be active or passive. If |D| = s, then after n attacks the probability of success is not significantly greater than 1/(s-n). Canonical definition: The advantage the attacker gains is due to interaction and not computation.

A Few Words About Dictionary Attack RFC3748 says: “the method does not allow an offline attack that has a work factor based on the number of passwords in an attacker's dictionary.” Therefore, merely increasing the size of the set from which the secret is drawn does not make a protocol resistant to dictionary attack. e.g. “the secret used is a random number between one and 264 therefore the protocol is resistant to dictionary attack.” – wrong!

How Does It Work? There are 3 exchanges in EAP-pwd Identity exchange-- because the one in EAP is not suitable. Commit exchange in which each side is cryptographically bound to a password guess Confirm exchange in which each side uses the other party’s commitment to prove knowledge of the shared secret. Finite Cyclic group from IKE’s IANA registry– can be either a prime modulus group or an elliptic curve group– is used. A “random oracle” (as defined in the Bellare and Rogaway paper on the subject) is defined using SHA-256.

Identity Exchange The EAP server announces its identity and the group to use. The EAP client announces its identity After the exchange a “password element”, PWE, in the agreed-upon group is fixed. with prime modulus groups this is done with a hash and exponentiation with elliptic curve groups this is done in a hunt-and-peck fashion to find a random point on the curve.

Commit Exchange Choose p_rand at random sp = (p_rand * G).x EAP client EAP server Choose p_rand at random sp = (p_rand * G).x elem_p = -(sp * PWE) scalar_p = (sp+p_rand) mod order Choose s_rand at random ss = (s_rand * G).x elem_s = -(ss * PWE) scalar_s = (ss+s_rand) mod order elem_s, scalar_s elem_p, scalar_p

Confirm Exchange kp = (p_rand * (scalar_s * PWE + element_s)).x EAP client EAP server kp = (p_rand * (scalar_s * PWE + element_s)).x confirm_p = H(kp | element_p | scalar_p | element_s | scalar_s) ks = (s_rand * (scalar_p * PWE + element_p)).x confirm_s = H(ks | element_s | scalar_s | element_p | scalar_p) confirm_s confirm_p kp = (p_rand * s_rand * PWE).x = ks MK = H(k | (element_s + element_p).x | (scalar_s + scalar_p) mod order)

An EMU Work Item? This sort of work is in the charter (or was at 8am this morning!) This method is useful and not YAPBEM password/secret-based authentication which is resistant to dictionary attack and does not require a CA or certificate robust security: it’s still secure when the “verify server cert” checkbox is unchecked when used with a tunneled method useful for methods whose security is predicated on secure provisioning of an initial credential. Instead of leaps of faith, use EAP-pwd