Background Study :802.11i Encryption. MK (Master Key) PMK (Pair-wise Master Key) PTK (Pair-wise Transient Key) GMK (Group Master Key) GTK (Group Transient.

Slides:



Advertisements
Similar presentations
Key Management Nick Feamster CS 6262 Spring 2009.
Advertisements

An Introduction to Pairing Based Cryptography Dustin Moody October 31, 2008.
SSL CS772 Fall Secure Socket layer Design Goals: SSLv2) SSL should work well with the main web protocols such as HTTP. Confidentiality is the top.
Efficient Public Key Infrastructure Implementation in Wireless Sensor Networks Wireless Communication and Sensor Computing, ICWCSC International.
Encryption Public-Key, Identity-Based, Attribute-Based.
1 Digital Signatures & Authentication Protocols. 2 Digital Signatures have looked at message authentication –but does not address issues of lack of trust.
An Introduction to Identity-based Cryptography
November 1, 2006Sarah Wahl / Graduate Student UCCS1 Public Key Infrastructure By Sarah Wahl.
Identity-based authenticated key agreement protocol based on Weil pairing N.P.Smart ELECTRONICS LETTERS 20 th June 2002 vol.38 No13 p Present by.
IEEE Wireless Local Area Networks (WLAN’s).
Information Security of Embedded Systems : Algorithms and Measures Prof. Dr. Holger Schlingloff Institut für Informatik und Fraunhofer FIRST.
CMSC 414 Computer and Network Security Lecture 6 Jonathan Katz.
Cryptography April 20, 2010 MIS 4600 – MBA © Abdou Illia.
Fall 2010/Lecture 311 CS 426 (Fall 2010) Public Key Encryption and Digital Signatures.
Network Security – Part 2 V.T. Raja, Ph.D., Oregon State University.
Computer Science Public Key Management Lecture 5.
Introduction to Public Key Cryptography
Secure Systems Research Group - FAU Patterns for Digital Signature using hashing Presented by Keiko Hashizume.
Secure Sockets Layer 1 / 99  SSL is perhaps the widest used security protocol on the Internet today.  Together with DC enables secure communication.
Cryptography 101 Frank Hecker
By Jyh-haw Yeh Boise State University ICIKM 2013.
.Net Security and Performance -has security slowed down the application By Krishnan Ganesh Madras.
Elliptic Curve Cryptography
Secure r How do you do it? m Need to worry about sniffing, modifying, end- user masquerading, replaying. m If sender and receiver have shared secret.
Wireless security & privacy Authors: M. Borsc and H. Shinde Source: IEEE International Conference on Personal Wireless Communications 2005 (ICPWC 2005),
An Efficient Identity-based Cryptosystem for
Wireless and Security CSCI 5857: Encoding and Encryption.
Lecture 19 Page 1 CS 111 Online Symmetric Cryptosystems C = E(K,P) P = D(K,C) E() and D() are not necessarily the same operations.
Unwanted Link Layer Traffic in Large IEEE Wireless Network By Naga V K Akkineni.
Guomin Yang et al. IEEE Transactions on Wireless Communication Vol. 6 No. 9 September
1 Optimal Mail Certificates in Mail Payment Applications Leon Pintsov Pitney Bowes 2nd CACR Information Security Workshop 31 March 1999.
Cyrtographic Security Identity-based Encryption 1Dennis Kafura – CS5204 – Operating Systems.
The Cryptographic Sensor FTO Libor Dostálek, Václav Novák.
James Higdon, Sameer Sherwani
Computer Science CSC 774 Advanced Network Security Topic 2.6 ID Based Cryptography #2 Slides by An Liu.
An ID-Based Mutual Authentication and Key Exchange Protocol for Low- Power Mobile Devices Authors: Tsu-Yang Wu and Yuh-Min Tseng Source: The Computer Journal.
23-1 Last time □ P2P □ Security ♦ Intro ♦ Principles of cryptography.
Network Security7-1 CIS3360: Chapter 8: Cryptography Application of Public Cryptography Cliff Zou Spring 2012 TexPoint fonts used in EMF. Read the TexPoint.
Wireless LAN Security. Security Basics Three basic tools – Hash function. SHA-1, SHA-2, MD5… – Block Cipher. AES, RC4,… – Public key / Private key. RSA.
Chapter 8 – Network Security Two main topics Cryptographic algorithms and mechanisms Firewalls Chapter may be hard to understand if you don’t have some.
Authentication of Signaling in VoIP Applications Authors: Srinivasan et al. (MIT Campus of Anna University, India) Source: IJNS review paper Reporter:
Linkability of Some Blind Signature Schemes Swee-Huay Heng 1, Wun-She Yap 1 Khoongming Khoo 2 1 Multimedia University, 2 DSO National Laboratories.
Doc.: IEEE /551r0 Submission September 2002 Moore, Roshan, Cam-WingetSlide 1 TGi Frame Exchanges Tim Moore Microsoft Pejman Roshan Nancy Cam-Winget.
Secure Communication between Set-top Box and Smart Card in DTV Broadcasting Authors: T. Jiang, Y. Hou and S. Zheng Source: IEEE Transactions on Consumer.
Fall, Privacy&Security - Virginia Tech – Computer Science Click to edit Master title style Cryptographic Security Identity-Based Encryption.
Csci388 Wireless and Mobile Security – Key Hierarchies for WPA and RSN
Doc.: IEEE /008r0 Submission January 2003 N. Cam-Winget, D. Smith, K. AmannSlide 1 Proposed new AKM for Fast Roaming Nancy Cam-Winget, Cisco Systems.
Authentication has three means of authentication Verifies user has permission to access network 1.Open authentication : Each WLAN client can be.
Wireless Network Security CSIS 5857: Encoding and Encryption.
Implementing Secure IRC App with Elgamal By Hyungki Choi ID : Date :
SPEAKER: HONG-JI WEI DATE: Efficient and Secure Anonymous Authentication Scheme with Roaming Used in Mobile Networks.
Doc.: IEEE /657r0 Submission August 2003 N. Cam-WingetSlide 1 TGi Draft 5.0 Comments Nancy Cam-Winget, Cisco Systems Inc.
Identity-Based Signatures for MANET Routing Protocols draft-dearlove-manet-ibs-00 Christopher Dearlove Presented by Ulrich Herberg.
Mar 28, 2003Mårten Trolin1 This lecture Certificates and key management Non-interactive protocols –PGP SSL/TLS –Introduction –Phases –Commands.
ID-base Signature from Pairings on Elliptic Curve Kenneth G. Paterson From IACR Server 2002/004 Reference :Identity-Based Encryption from the Weil Pairing.
1 Self-Certified Group Key-Generation for Ad Hoc Clusters in Wireless Sensor Networks Ortal Arazi, Hairong Qi Dept. Electrical & Computer Engineering The.
Key Generation Protocol in IBC Author : Dhruti Sharma and Devesh Jinwala 論文報告 2015/12/24 董晏彰 1.
多媒體網路安全實驗室 An ID-based client authentication with key agreement protocol for mobile client–server environment on ECC with provable security Date:2012/02/16.
Security By Meenal Mandalia. What is ? stands for Electronic Mail. much the same as a letter, only that it is exchanged in a different.
Cryptography CSS 329 Lecture 13:SSL.
INFSO-RI Enabling Grids for E-sciencE Sofia, 17 March 2009 Security, Authentication and Authorisation Mike Mineter Training, Outreach.
P2P encryption by an identity-based one-way group key agreement protocol By Jyh-haw Yeh Boise State University Proceedings of IEEE ICPADS 2014.
Authentication and handoff protocols for wireless mesh networks
Identity Based Encryption
Boneh-Franklin Identity Based Encryption Scheme
Fuzzy Identity Based Encryption
Authors: Yuh-Min TSENG, Tsu-Yang WU, Jui-DiWU
Tim Moore Microsoft Pejman Roshan Nancy Cam-Winget Cisco Systems, Inc
Digital Signature Standard (DSS)
Presentation transcript:

Background Study :802.11i Encryption

MK (Master Key) PMK (Pair-wise Master Key) PTK (Pair-wise Transient Key) GMK (Group Master Key) GTK (Group Transient Key)

Background Study : ECC (Elliptic Curve Cryptography)[Neil Koblitz, Victor Miller, 1985] General Form 質數體 二元體

質數體加法規則 O: Point at infinity P+O=O+P=P

乘法規則 nP=O n 稱為 order Given G, Q=dG, d is randomly selected. It is nearly impossible to derive d ( 橢圓曲線離散對數 問題 ). G is called generator. Q is called public key. d is called private key.

ECCDH Given E, a generator point P. A selects a private key da. A derives public key Qa= da ∙ P B selects a private key db. B derives public key Qb=db ∙ P A and B exchange their public Key A derives share key Sab=da ∙ Qb B derives share key Sab=db ∙ Qa

Bilinear pairing Establishment of a session key requires only one message for exchange Two cyclic group bilinear mapping G1: cyclic addition group, G2 cyclic multiply group

Introduction Roaming delay is composed by –Channel scanning and probing Mobile client must disconnect from the current AP and join a new AP and it takes 20ms~380ms –Authentication at the new AP The overall roaming delay should be kept under 50ms, ideally the authentication should not take more than 20ms to allow 30ms for channel scanning and probing.

802.11i –Authentication is done by 802.1x, or by a pre- shared key. –PMK, 4-way handshake for PTK, 2-way handshake for GTK. –Full authentication takes 750~1200ms –Roaming authentication takes 200ms, or 50ms for the best case.

Proactive key distribution method –Distributes a new PMK to neighbor APs –Roaming authentication time reduce to 21ms on the average. –Heavy burden on AS –AP must track the movement of clients Pre-authentication –A client connects to multiple APs first. –0 delay –Impose heavy burden on AS and may not extend beyond the first access router

Predictive authentication –All the neighboring APs can receive the authentication response. –Drawbacks are similar to pre-distribution r –Authentication time of best case is 10ms –Pre-distribution of the keys to all the AP within the subnet –Drawbacks still remain

Reducing 4-way handshake is important. Best case analysis of 4-way handshake is 20ms. Inter-domain roaming

Background IDC (Identity-based Cryptography) –Known identity information is used in ID-based cryptography to derive a public key thus no public key exchange is necessary. –Identity value may be alphanumeric character string or MAC address. PKG (Private Key Generator) –Given private key to the ID owner through a secure channel

Bilinear map Multiply integers with points on elliptic curves –Given P and sP, it is nearly impossible to compute s

Public/private key generation –PKG uses a master key s and a fixed point P on a elliptic curve. –Public key Oid PKG hashes user ’ s ID to a point Qid on the curve. –Private key s ∙Qid P, s∙P, cryptographic function H1 can be made available in public

Proposed scheme SFRIC To use a WLAN, a user logs into the network through i process. For static client SFRIC is not necessary SFRIC has 2 phases. In phase 1 a client accesses the PKG to get a private key. When the client decides to roam it first finds and joins a new APs by probing and scanning, and follows the phase 2 procedure to exchange authentication messages.

Phase 1 preparation APs and client both contact to PKG with their MAC and receive a private key via secure channel Private key of client –{MAC||expiration date||expiration hour||Nounce} Private key of AP –{MAC||current date||current hour} Both are periodically refreshed in every hour

Phase 2 roaming

Comment Figure 3 says message 1 is encrypted in Ka, but figure 4 says it is K1 to be used for encrypted instead.

Comment: The above equation can prove anything. Comment:(rK a, sP)=(K c -1, rP)? Serious error in equation. Can not prove security key of a equals to security key of c sK a = K c -1 ??

{MACc} is called the proof of ID. If the MAC address of ID matches the MAC address in the packet header, the sender is proven to posses the MAC address and the right private key. Comment: Verification of MAC is smart but weak.

Comment: If MACc is encrypt by c ’ s private key, there is no way to decrypt it in a.

Performance Analysis

The most time consuming is the pairing operations E2, D1, and D2, while the cost of the rest is almost negligible. Comment: I am not convincible why E1 pairing operation can be negligible. Comment: Authors is too optimistic to neglect the network operation, especially in worst cases.

Comment: Inconsistent typos

The authors claim there will be only 2 pairing operations require, which take 17ms (cited by [23] that one pairing operation is 8.7ms for best case), one can be done in advance. Comment: there is no simulation for the computation. Nothing but site by other work. Conviction is weak.

Thank You

Review Suggestion Rate the importance of the topic addressed in the paper and its timeliness within its area of research Excellent Above average Average Below average None Rate the technical contribution of the paper, its soundness and scientific rigour Excellent Solid work Valid work Marginal work Questionable Rate the novelty and originality of the work presented in the paper Pioneering Novel Some Novel Minor variation It has been said many times before

Rate the paper organization, the clearness of text and figures, the completeness and accuracy of references. Excellent Well written Readable Substantial revision work is needed Unacceptable Strengths: Weakness: Recommended changes: