CMSC 414 Computer and Network Security Lecture 19 Jonathan Katz.

Slides:



Advertisements
Similar presentations
Spring 2000CS 4611 Security Outline Encryption Algorithms Authentication Protocols Message Integrity Protocols Key Distribution Firewalls.
Advertisements

Efficient Zero-Knowledge Proof Systems Jens Groth University College London.
Grid Computing, B. Wilkinson, 20045a.1 Security Continued.
1 Network Security Outline Encryption Algorithms Authentication Protocols Message Integrity Protocols Key Distribution Firewalls.
CSCE 715: Network Systems Security Chin-Tser Huang University of South Carolina.
Payment Systems 1. Electronic Payment Schemes Schemes for electronic payment are multi-party protocols Payment instrument modeled by electronic coin that.
Authentication Cristian Solano. Cryptography is the science of using mathematics to encrypt and decrypt data. Public Key Cryptography –Problems with key.
Zero-Knowledge Proofs J.W. Pope M.S. – Mathematics May 2004.
Public Key Infrastructure (PKI) Providing secure communications and authentication over an open network.
15-1 Last time Internet Application Security and Privacy Public-key encryption Integrity.
CMSC 414 Computer (and Network) Security Lecture 17 Jonathan Katz.
Public-key based. Public-key Techniques based Protocols –may use either weak or strong passwords –high computation complexity (Slow) –high deployment.
 Authorization via symmetric crypto  Key exchange o Using asymmetric crypto o Using symmetric crypto with KDC  KDC shares a key with every participant.
EEC 693/793 Special Topics in Electrical Engineering Secure and Dependable Computing Lecture 6 Wenbing Zhao Department of Electrical and Computer Engineering.
CMSC 414 Computer and Network Security Lecture 21 Jonathan Katz.
CMSC 414 Computer and Network Security Lecture 6 Jonathan Katz.
CMSC 414 Computer (and Network) Security Lecture 21 Jonathan Katz.
CMSC 414 Computer (and Network) Security Lecture 2 Jonathan Katz.
CMSC 414 Computer and Network Security Lecture 7 Jonathan Katz.
Public Key Management Brent Waters. Page 2 Last Time  Saw multiple one-way function candidates for sigs. OWP (AES) Discrete Log Trapdoor Permutation.
Spring 2002CS 4611 Security Outline Encryption Algorithms Authentication Protocols Message Integrity Protocols Key Distribution Firewalls.
CMSC 414 Computer and Network Security Lecture 21 Jonathan Katz.
Cryptography1 CPSC 3730 Cryptography Chapter 10 Key Management.
Mar 4, 2003Mårten Trolin1 This lecture Diffie-Hellman key agreement Authentication Certificates Certificate Authorities.
8-1 What is network security? Confidentiality: only sender, intended receiver should “understand” message contents m sender encrypts message m receiver.
CMSC 414 Computer and Network Security Lecture 9 Jonathan Katz.
CMSC 414 Computer and Network Security Lecture 2 Jonathan Katz.
CMSC 414 Computer and Network Security Lecture 16 Jonathan Katz.
EEC 693/793 Special Topics in Electrical Engineering Secure and Dependable Computing Lecture 7 Wenbing Zhao Department of Electrical and Computer Engineering.
CMSC 414 Computer and Network Security Lecture 22 Jonathan Katz.
Electronic Voting Schemes and Other stuff. Requirements Only eligible voters can vote (once only) No one can tell how voter voted Publish who voted (?)
CN1276 Server Kemtis Kunanuraksapong MSIS with Distinction MCTS, MCDST, MCP, A+
CMSC 414 Computer and Network Security Lecture 24 Jonathan Katz.
EEC 688/788 Secure and Dependable Computing Lecture 7 Wenbing Zhao Department of Electrical and Computer Engineering Cleveland State University
How cryptography is used to secure web services Josh Benaloh Cryptographer Microsoft Research.
Spring 2003CS 4611 Security Outline Encryption Algorithms Authentication Protocols Message Integrity Protocols Key Distribution Firewalls.
CMSC 414 Computer and Network Security Lecture 6 Jonathan Katz.
03 December 2003 Public Key Infrastructure and Authentication Mark Norman DCOCE Oxford University Computing Services.
Computer Science Public Key Management Lecture 5.
Quadratic Residuosity and Two Distinct Prime Factor ZK Protocols By Stephen Hall.
CMSC 414 Computer and Network Security Lecture 14 Jonathan Katz.
Part Two Network Security Applications Chapter 4 Key Distribution and User Authentication.
_______________________________________________________________________________________________________________ E-Commerce: Fundamentals and Applications1.
Fall 2004/Lecture 201 Cryptography CS 555 Lecture 20-b Zero-Knowledge Proof.
CERTIFICATES. What is a Digital Certificate? Electronic counterpart to a drive licenses or a passport. Enable individuals and organizations to secure.
Cryptography and Network Security (CS435) Part Eight (Key Management)
23-1 Last time □ P2P □ Security ♦ Intro ♦ Principles of cryptography.
CMSC 414 Computer and Network Security Lecture 16 Jonathan Katz.
Presented by: Suparita Parakarn Kinzang Wangdi Research Report Presentation Computer Network Security.
Fall 2010/Lecture 321 CS 426 (Fall 2010) Key Distribution & Agreement.
Chapter 3 (B) – Key Management; Other Public Key Cryptosystems.
Merkle trees Introduced by Ralph Merkle, 1979 An authentication scheme
Security fundamentals Topic 5 Using a Public Key Infrastructure.
Key Management Network Systems Security Mort Anvari.
CMSC 414 Computer and Network Security Lecture 20 Jonathan Katz.
Lecture 9 Overview. Digital Signature Properties CS 450/650 Lecture 9: Digital Signatures 2 Unforgeable: Only the signer can produce his/her signature.
Fall 2006CS 395: Computer Security1 Key Management.
CMSC 414 Computer and Network Security Lecture 18 Jonathan Katz.
Authorized But Anonymous: Taking Charge of Your Personal Data Anna Lysyanskaya Brown University.
Prof. Reuven Aviv, Nov 2013 Public Key Infrastructure1 Prof. Reuven Aviv Tel Hai Academic College Department of Computer Science Public Key Infrastructure.
CMSC 414 Computer and Network Security Lecture 2 Jonathan Katz.
What is in a name? Identity-based cryptography. How public-key crypto works When you use public key cryptography, you can publish a value (public key)
Security Outline Encryption Algorithms Authentication Protocols
Information Security message M one-way hash fingerprint f = H(M)
Information Security message M one-way hash fingerprint f = H(M)
Information Security message M one-way hash fingerprint f = H(M)
Information Security message M one-way hash fingerprint f = H(M)
刘振 上海交通大学 计算机科学与工程系 电信群楼3-509
刘振 上海交通大学 计算机科学与工程系 电信群楼3-509
Presentation transcript:

CMSC 414 Computer and Network Security Lecture 19 Jonathan Katz

Administrative  Exam April 22 –Based on material through April 15  If you submit code for part 2 of HW2, please name it “HW3” to prevent collisions  Include name of whose implementation you attacked  HW3 out

PKI in practice: web of trust  PGP “web of trust” model  Key distribution  PGP keyserver

Revocation  Revocation is a key component of a PKI –Secret keys stolen/compromised, user leaves organization, etc.  This is in addition to expiration dates included in certificates –Certificate might need to be revoked before expiration date –Expiration dates improve efficiency –Revocation may not be implemented

Cert. revocation lists (CRLs)  CA issues signed list of (un-expired) revoked keys –Must be updated and released periodically –Must include timestamp –Verifier must obtain most recent CRL before verifying a certificate  Using “delta CRLs” improves efficiency

OLRS  “On-line revocation server”  Verifier queries an OLRS to find out if a certificate is still valid –OLRS somewhat mitigates advantages of public-key model –But OLRS is not as security sensitive as a KDC/CA, and certs can be used even if OLRS is unavailable  If OLRS has its own key, it can certify for the target that its certificate is valid at a certain time

“Good lists”  The previous approaches basically use lists of “bad” certificates  Also possible to use a list containing only “good” certificates –Likely to be less efficient

Self revocation  Sign a message revoking your own public key; propagate throughout the network  This is essentially how revocation is done in the web of trust model –Deposit revocation into keyserver

Beyond secrecy: deniability, anonymity, and privacy

Secrecy is not everything  Deniability –No irrefutable evidence that you communicated with someone, even if that party is malicious  Anonymity/pseudonymity/privacy –No indication (to an external adversary) that you communicated with someone –No linkability, even to party with whom you are communicating –No information leakage beyond what is necessary

Standard crypto tools do not suffice!  Example: unidirectional authentication  Authenticated Diffie-Hellman leaves a trace that you communicated with a particular server –This trace is not something that could be fabricated! –It could be used as evidence in a court of law

Standard crypto tools do not suffice!  Example: signatures  A signed message from A to B leaves irrefutable evidence of the fact that you signed the message –Also leaves evidence of the fact that you signed something

Standard crypto tools do not suffice!  Example: encryption  What if A encrypts a message to B (using public- key crypto) and then a court order requires B to reveal its secret key?

Standard crypto tools do not suffice!  Example: credentials  I obtain a digital certificate from the MVA that proves I am over 21 –E.g., a signature on an appropriate statement  When I show this credential to someone else, it also reveals my name and address  Can this be avoided?

Standard crypto tools do not suffice!  Example: e-cash  How can I spend electronic cash securely yet anonymously? –On the one hand, need signatures for security –On the other hand, I don’t want the signature to be traced back to me

Standard crypto tools do not suffice!  Example: receipt freeness/coercibility (voting)  A can encrypt its vote to the central server, but what if A saves its randomness (or uses 0s for its randomness) and uses this as proof of its vote?

Standard crypto tools do not suffice!  Example: traffic analysis  Even if A encrypts its communication to B, an adversary monitoring the network can see that A and B are communicating  May be problematic when –Communication with B is not allowed –Communication reveals location of B (e.g., military) –A does not want to reveal its identity to B (e.g., voting)

Deniability  We need a protocol that A and B can execute such that, after running the protocol: –B is convinced it is talking to A… –…but B could have generated the transcript on its own!  Is this possible?  An analogy…“Ali Baba’s cave”

Background  Let N denote a product of two (large) primes p, q  A quadratic residue in Z N * is a square –I.e., y is a quadratic residue if y = x 2 mod N for some x  Every quadratic residue has 4 square roots  It can be proved that computing square roots of random quadratic residues modulo N is as hard as factoring –(This is in contrast to RSA)

A public-key auth. protocol  A user’s public key is (N, y), where y is a random quadratic residue  User’s secret key is x, where y = x 2 mod N  The protocol: –User sends a = r 2 mod N for random r –Server sends a bit b –User responds with c = r x b mod N –Server checks that c 2 = a y b mod N –Repeat many times (in parallel, say)

Why is this secure?  Look at any one iteration  If an adversary can answer both possible challenges, then it “must know” a square root of y –But computing square roots of y is hard

Why is this deniable?  We can generate honest-looking transcripts as follows: –Choose random bit b and random c in Z N * –Set a = c 2 /y b mod N  An execution (with an honest server) does not leave any evidence that could not be fabricated by the server itself!

Extensions…  The argument for deniability assumes an honest server  Can develop protocols that are deniable even against dishonest servers  Can also look at extensions of this idea to other settings…

Zero-knowledge protocols  (Informally:) Can prove something (e.g., that a given statement is true, that you “know” some value, etc.) to a verifier without revealing anything else!  E.g., proving knowledge of a square root of y  More generally, for any NP language L, can prove that x  L without revealing anything about the witness! –E.g., by reducing to 3-colorability