Fuzzy extractor based on universal hashes

Slides:



Advertisements
Similar presentations
Many personal devices have rich set of capabilities: sensors, communication, computing power and data storage, and they are personal. Potentially they.
Advertisements

Detection of Algebraic Manipulation with Applications to Robust Secret Sharing and Fuzzy Extractors Ronald Cramer, Yevgeniy Dodis, Serge Fehr, Carles Padro,
Foundations of Cryptography Lecture 10 Lecturer: Moni Naor.
CS470, A.SelcukStream Ciphers1 CS 470 Introduction to Applied Cryptography Instructor: Ali Aydin Selcuk.
Strong Key Derivation from Biometrics
Ensuring Operating System Kernel Integrity with OSck By Owen S. Hofmann Alan M. Dunn Sangman Kim Indrajit Roy Emmett Witchel Kent State University College.
Security with Noisy Data Boris Škorić TU Eindhoven Ei/Ψ anniversary, 24 April
Physical Unclonable Functions and Applications
1 U NIVERSITY OF M ICHIGAN Reliable and Efficient PUF- Based Key Generation Using Pattern Matching Srini Devadas and Zdenek Paral (MIT), HOST 2011 Thomas.
White-Box Cryptography
Sri Lanka Institute of Information Technology
Fuzzy Stuff Lecture 24, Outline Motivation: Biometric Architectures Motivation: Biometric Architectures New Tool (for us): Error Correcting.
Digital Signatures and Hash Functions. Digital Signatures.
1 Introduction CSE 5351: Introduction to cryptography Reading assignment: Chapter 1 of Katz & Lindell.
Sheng Xiao, Weibo Gong and Don Towsley,2010 Infocom.
NON-MALLEABLE EXTRACTORS AND SYMMETRIC KEY CRYPTOGRAPHY FROM WEAK SECRETS Yevgeniy Dodis and Daniel Wichs (NYU) STOC 2009.
Slender PUF Protocol Authentication by Substring Matching M. Majzoobi, M. Rostami, F. Koushanfar, D. Wallach, and S. Devadas* International Workshop on.
Anonymous Biometrics: Privacy Protection of Biometric Templates Pim Tuyls, E. Verbitskiy, D. Denteneer, J.P. Linnartz, J. Goseling, T. Ignatenko
 Secure Authentication Using Biometric Data Karen Cui.
CMSC 414 Computer (and Network) Security Lecture 2 Jonathan Katz.
CMSC 414 Computer and Network Security Lecture 7 Jonathan Katz.
CMSC 414 Computer and Network Security Lecture 9 Jonathan Katz.
Overview of Cryptography Anupam Datta CMU Fall A: Foundations of Security and Privacy.
Cryptography1 CPSC 3730 Cryptography Chapter 11, 12 Message Authentication and Hash Functions.
Leakage-Resilient Storage Francesco Davì Stefan Dziembowski Daniele Venturi SCN /09/2010 Sapienza University of Rome.
1 Message Authentication and Hash Functions Authentication Requirements Authentication Functions Message Authentication Codes Hash Functions Security of.
Cryptography and Network Security Chapter 11 Fifth Edition by William Stallings Lecture slides by Lawrie Brown.
Acknowledgements: William Stallings.William Stallings All rights Reserved Session 4 Public Key Cryptography (Part 2) Network Security Essentials Application.
KAIS T A lightweight secure protocol for wireless sensor networks 윤주범 ELSEVIER Mar
A Secure Protocol for Computing Dot-products in Clustered and Distributed Environments Ioannis Ioannidis, Ananth Grama and Mikhail Atallah Purdue University.
Message Authentication  message authentication is concerned with: protecting the integrity of a message protecting the integrity of a message validating.
Information Security Principles Assistant Professor Dr. Sana’a Wafa Al-Sayegh 1 st Semester ITGD 2202 University of Palestine.
1 Chapter 11: Message Authentication and Hash Functions Fourth Edition by William Stallings Lecture slides by Lawrie Brown (modified by Prof. M. Singhal,
Doc.: r0 Submission September 17, 2012 René Struik (Intrinsic-Id)Slide 1 Secure Key Storage and True Random Number Generation Date:
Secure storage of cryptographic keys within random volumetric materials Roarke Horstmeyer 1, Benjamin Judkewitz 1, Ivo Vellekoop 2 and Changhuei Yang 1.
1 UCR Hardware Security Primitives with focus on PUFs Slide credit: Srini Devedas and others.
Fall 2002CS 395: Computer Security1 Chapter 11: Message Authentication and Hash Functions.
Chapter 21 Public-Key Cryptography and Message Authentication.
Physically Unclonable Function– Based Security and Privacy in RFID Systems Leonid Bolotnyy and Gabriel Robins Dept. of Computer Science University of Virginia.
11.1 Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Chapter 11 Message Integrity and Message Authentication.
Merkle trees Introduced by Ralph Merkle, 1979 An authentication scheme
Chapter 11 Message Authentication and Hash Functions.
Authentication. Goal: Bob wants Alice to “prove” her identity to him Protocol ap1.0: Alice says “I am Alice” Failure scenario?? “I am Alice”
Strong Key Derivation from Noisy Sources Benjamin Fuller December 12, 2014 Based on three works: Computational Fuzzy Extractors [FullerMengReyzin13] When.
Cryptography and Network Security (CS435) Part Nine (Message Authentication)
Randomness Extraction Beyond the Classical World Kai-Min Chung Academia Sinica, Taiwan 1 Based on joint works with Xin Li, Yaoyun Shi, and Xiaodi Wu.
1 Leonid Reyzin Boston University Adam Smith Weizmann  IPAM  Penn State Robust Fuzzy Extractors & Authenticated Key Agreement from Close Secrets Yevgeniy.
Tamper Resistant Software: An Implementation By David Aucsmith, IAL In Information Hiding Workshop, RJ Anderson (ed), LNCS, 1174, pp , “Integrity.
TRUSTED FLOW: Why, How and Where??? Moti Yung Columbia University.
Physically Restricted Authentication with Trusted Hardware Michael Kirkpatrick, Elisa Bertino Department of Computer Science 4 th Annual Workshop on Scalable.
Hashes Lesson Introduction ●The birthday paradox and length of hash ●Secure hash function ●HMAC.
When is Key Derivation from Noisy Sources Possible?
Does Privacy Require True Randomness? Yevgeniy Dodis New York University Joint work with Carl Bosley.
IT 221: Introduction to Information Security Principles Lecture 5: Message Authentications, Hash Functions and Hash/Mac Algorithms For Educational Purposes.
 Encryption provides confidentiality  Information is unreadable to anyone without knowledge of the key  Hashing provides integrity  Verify the integrity.
@Yuan Xue 285: Network Security CS 285 Network Security Message Authentication Code Data integrity + Source authentication.
Cryptographic Hash Function. A hash function H accepts a variable-length block of data as input and produces a fixed-size hash value h = H(M). The principal.
Reusable Fuzzy Extractors for Low-Entropy Distributions
Computational Fuzzy Extractors
Cryptographic Hash Functions
Cryptographic Hash Function
Cryptographic Hash Functions
Cryptographic Hash Functions Part I
When are Fuzzy Extractors Possible?
When are Fuzzy Extractors Possible?
Cryptographic Hash Functions Part I
Physical Unclonable Functions and Applications
Hashing Hash are the auxiliary values that are used in cryptography.
Hash Function Requirements
Presentation transcript:

Fuzzy extractor based on universal hashes Part 1: Fuzzy extractor based on universal hashes Part 2: Simplification of Controlled PUF primitives Dagstuhl, July 6-8, 2009

Part 1: Fuzzy extractor based on universal hashes BŠ and Pim Tuyls

Fuzzy Extractor / Helper Data scheme Dodis et al. 2003 Juels+Wattenberg 1999 Linnartz+Tuyls 2003 noisy Properties Secrecy and uniformity: Δ(WS; WU) ≤ ε. "S given W is almost uniform" Error correction: If X' sufficiently close to X, then S'=S. Robustness [Boyen et al. 2005]: Detection of active attack against W Applications privacy preserving biometrics anti-counterfeiting ("object biometrics") PUF-based key storage

Fuzzy Extractor: Efficiency noisy What's so special? Redundancy data (in W) must not leak info about secret S. Make near-uniform S from non-uniform X. How to authenticate W when there is no PKI? "Efficiency" Extract as many reproducible bits from X as possible. Low storage requirements. Small computational load.

x x' Limited noise Common class of noise Example Common class of noise Considerable prob. that x' ≠ x. Small number of likely x'. x x' Problematic for error correcting codes Most codes work best with low error rate Cannot exploit non-uniform error patterns (low entropy of errors) Entropy loss.

Def: δ-almost universal hash functions Fr. For fixed x and x': Fr with random r L bits Def: δ-almost universal hash functions Fr. For fixed x and x': Not a cryptographic hash Main purpose: uniformity Light-weight implementation in hardware and software. Information-theoretic properties. Does not rely on unproven security assumptions

Fuzzy Extractor based on universal hash functions p q r Publicly stored enrolment data: p,q,r,w, m:=MAC(v; pqrw) attack p', q', r', w', m' redundancy for error correction MAC key secret key Key reconstruction procedure Measure x'. Read p', q', r', w', m'. Make list L of likely candidates. Must be manageable! Find x in L such that Ψp'(x)=w'. Sort of Slepian-Wolf Compute v'=Γq'(x). Check if MAC(v'; p'q'r'w')=m'. If okay, reconstruct secret s=Φr'(x).

Robustness: KMS-MAC Theorem: If then Δ(PQRWM S; PQRWM U) ≤ ε . Robustness Ordinary MAC insufficient MAC with Key Manipulation Security? [Cramer et al, Eurocrypt 2008] Assumes strong attacker. Key Linearity: ΔK = known function of w and modified w'. We do not have the linearity property! (Also the case for other types of helper data.) Effect of modifying helper data unknown to attacker. KMS-MAC is overkill.

Simplification of Controlled PUF primitives Part 2: Simplification of Controlled PUF primitives BŠ and Marc X. Makkes Eindhoven University of Technology

CPUF protocols Controlled PUFs (CPUFs) PUF shielded from the outside world by control layer control layer restricts PUF input & output more secure than "bare" PUF Protocols exploiting large number of Challenge-Response Pairs Gassend et al 2002, 2007, 2008 Each user has shared secret (CRP) with CPUF Symmetric crypto Certified Execution, Proof of Execution, key renewal, ... Presented as API code Self-referential 'hash blocks'

Self-referential use of program hashes E-Proof generation: computes a hash over the hash block

Simplification Avoid hashes of control layer code Flowchart notation Basically the same protocols; minor modifications Helper data explicitly visible

Some wise concluding remarks Boris: None of this is rocket science, and the results are far from spectacular ... so I will not complain if you don't put any of this in the schedule. Ahmad: (...) And we do not need rocket science. By the way, rocket science is very easy, this is a fairy-tale that rocket science is difficult. You buy some explosive powder and some metal container and you put them together.