ID-Based Design Patterns for M2M Secure Channels Francisco Corella Karen Lewison 10/29/2014 Presentation to M2MSec’14.

Slides:



Advertisements
Similar presentations
Experiences with Massive PKI Deployment and Usage Daniel Kouřil, Michal Procházka Masaryk University & CESNET Security and Protection of Information 2009.
Advertisements

Chapter 14 – Authentication Applications
Authentication Applications. will consider authentication functions will consider authentication functions developed to support application-level authentication.
Public Key Infrastructure A Quick Look Inside PKI Technology Investigation Center 3/27/2002.
Cryptography and Network Security Third Edition by William Stallings Lecture slides by Lawrie Brown.
It’s Time to Replace SSL/TLS Karen P. Lewison, MD – CEO Francisco Corella, PhD – CTO 5/29/ Updated 5/31.
Grid Computing, B. Wilkinson, 20045a.1 Security Continued.
1 Lecture 17: SSL/TLS history, architecture basic handshake session initiation/resumption key computation negotiating cipher suites application: SET.
CS470, A.SelcukSSL/TLS & SET1 CS 470 Introduction to Applied Cryptography Instructor: Ali Aydin Selcuk.
TLS Introduction 14.2 TLS Record Protocol 14.3 TLS Handshake Protocol 14.4 Summary.
Cryptography and Network Security
7-1 Chapter 7 – Web Security Use your mentality Wake up to reality —From the song, "I've Got You under My Skin“ by Cole Porter.
9/11/2012Pomcor 1 Techniques for Implementing Derived Credentials Francisco Corella Karen Lewison Pomcor (
Certificates Last Updated: Aug 29, A certificate was originally created to bind a subject to the subject’s public key Intended to solve the key.
CSCE 715: Network Systems Security Chin-Tser Huang University of South Carolina.
Chapter 14 From Cryptography and Network Security Fourth Edition written by William Stallings, and Lecture slides by Lawrie Brown, the Australian Defence.
RIKE Using Revocable Identities to Support Key Escrow in PKIs Nan Zhang, Jingqiang Lin, Jiwu Jing, Neng Gao State Key Laboratory of Information Security,
Authentication Cristian Solano. Cryptography is the science of using mathematics to encrypt and decrypt data. Public Key Cryptography –Problems with key.
Identity-Based Cryptography for Grid Security Hoon Wei Lim Information Security Group Royal Holloway, University of London (Joint work with Kenny Paterson)
CMSC 414 Computer (and Network) Security Lecture 26 Jonathan Katz.
Lesson 12 Cryptography for E-Commerce. Approaches to Network Security Separate Security Protocol--SSL Application-Specific Security--SHTTP Security with.
10/20/2011Pomcor 1 Deployment and Usability of Cryptographic Credentials Francisco Corella Karen Lewison Pomcor.
Mar 12, 2002Mårten Trolin1 This lecture Diffie-Hellman key agreement Authentication Certificates Certificate Authorities SSL/TLS.
 Authorization via symmetric crypto  Key exchange o Using asymmetric crypto o Using symmetric crypto with KDC  KDC shares a key with every participant.
 Key exchange o Kerberos o Digital certificates  Certificate authority structure o PGP, hierarchical model  Recovery from exposed keys o Revocation.
Cryptography and Network Security Chapter 17
K. Salah 1 Chapter 31 Security in the Internet. K. Salah 2 Figure 31.5 Position of TLS Transport Layer Security (TLS) was designed to provide security.
BY MUKTADIUR RAHMAN MAY 06, 2010 INTERODUCTION TO CRYPTOGRAPHY.
CN1276 Server Kemtis Kunanuraksapong MSIS with Distinction MCTS, MCDST, MCP, A+
SSL By: Anthony Harris & Adam Shkoler. What is SSL? SSL stands for Secure Sockets Layer SSL is a cryptographic protocol which provides secure communications.
Key Distribution CS 470 Introduction to Applied Cryptography
Chapter 8 Web Security.
SIP-SAML assisted Diffie-Hellman MIKEY IETF 65 MSEC Mar 21, 2006 Robert Moskowitz.
Christopher Chapman | MCT Content PM, Microsoft Learning, PDG Planning, Microsoft.
Key Management in Cryptography
C HAPTER 13 Asymmetric Key Cryptography Slides adapted from "Foundations of Security: What Every Programmer Needs To Know" by Neil Daswani, Christoph Kern,
Computer Science Public Key Management Lecture 5.
ECE454/599 Computer and Network Security Dr. Jinyuan (Stella) Sun Dept. of Electrical Engineering and Computer Science University of Tennessee Fall 2012.
Secure Socket Layer (SSL)
SSL / TLS in ITDS Arun Vishwanathan 23 rd Dec 2003.
Cyrtographic Security Identity-based Encryption 1Dennis Kafura – CS5204 – Operating Systems.
The Cryptographic Sensor FTO Libor Dostálek, Václav Novák.
Chapter 9: Using and Managing Keys Security+ Guide to Network Security Fundamentals Second Edition.
Configuring Directory Certificate Services Lesson 13.
Security Through Publicity Eric Osterweil Dan Massey Batsukh Tsendjav Beichuan Zhang Lixia Zhang.
Cryptography and Network Security (CS435) Part Fourteen (Web Security)
Web Security : Secure Socket Layer Secure Electronic Transaction.
06 APPLYING CRYPTOGRAPHY
Encryption / Security Victor Norman IS333 / CS332 Spring 2014.
Security fundamentals Topic 5 Using a Public Key Infrastructure.
Fall, Privacy&Security - Virginia Tech – Computer Science Click to edit Master title style Cryptographic Security Identity-Based Encryption.
IPSec and TLS Lesson Introduction ●IPSec and the Internet key exchange protocol ●Transport layer security protocol.
Key Management. Authentication Using Public-Key Cryptography  K A +, K B + : public keys Alice Bob K B + (A, R A ) 1 2 K A + (R A, R B,K A,B ) 3 K A,B.
Mar 28, 2003Mårten Trolin1 This lecture Certificates and key management Non-interactive protocols –PGP SSL/TLS –Introduction –Phases –Commands.
05/03/2011Pomcor 1 Meeting the Privacy Goals of NSTIC in the Short Term Presentation at the 2011 Internet Identity Workshop Francisco Corella and Karen.
IP Security (IPSec) Matt Hermanson. What is IPSec? It is an extension to the Internet Protocol (IP) suite that creates an encrypted and secure conversation.
 Attacks and threats  Security challenge & Solution  Communication Infrastructure  The CA hierarchy  Vehicular Public Key  Certificates.
@Yuan Xue CS 285 Network Security Secure Socket Layer Yuan Xue Fall 2013.
Prof. Reuven Aviv, Nov 2013 Public Key Infrastructure1 Prof. Reuven Aviv Tel Hai Academic College Department of Computer Science Public Key Infrastructure.
1 Authentication Celia Li Computer Science and Engineering York University.
Key management issues in PGP
Cryptography and Network Security
CS480 Cryptography and Information Security
SAML assisted Diffie-Hellman MIKEY
Cryptography and Network Security
Install AD Certificate Services
Kai Bu 05 Secure Connection The topic to be covered this week is secure connection. Apparently, the.
Advanced Computer Networks
Cryptography and Network Security
Presentation transcript:

ID-Based Design Patterns for M2M Secure Channels Francisco Corella Karen Lewison 10/29/2014 Presentation to M2MSec’14 1

Motivation The IoT is extremely diverse and gives rise to a broad range of requirements for secure channel protocols Requirements are often not met by traditional protocols such as TLS, IPsec or SSH Security is often sacrificed to meet constraints – BLE, ZigBee, Z-Wave are not secure There is a need for a broad variety of protocols to meet diverse requirements 10/29/20142

Protocol design patterns Here we propose protocol design patterns rather than particular protocols Goal: reduce latency and bandwidth consumption by – Eliminating the roundtrips that most secure channel protocols require for key exchange – Eliminating certificate transmission Energy may be saved as a side effect of reduced bandwidth consumption, but that is not an explicit goal of these particular patterns 10/29/20143

Previous work on reducing roundtrips and bandwidth consumption Caching parameters from initial connection can save roundtrips and transmission of certificates in subsequent connections, as in: – Abbreviated TLS handshake – TLS Fast-track – TLS False Start – TLS Snap Start – QUIC Proposed patterns: – Require no caching – Can eliminate roundtrips and certificate transmission for all connections 10/29/20144

Pattern ingredients Identity-based encryption – A special case of identity-based cryptography, used for key transport Replay tolerance for first flow – So that initiator can send application data right away Optional forward secrecy from second flow onward For global deployments: – Hierarchical identity-based encryption with multiple roots – Reliance on DNS or DNSSEC to store ID chains 10/29/20145

ID-based cryptography Trusted party called “private key generator (PKG)” analogous to certificate authority (CA) Public key of entity is computed from ID of entity and public key of PKG Private key of entity is computed from ID of entity and private key of PKG – Must be computed by the PKG and given to the entity 10/29/20146

Expiration and revocation of ID-based credentials Key pair can be made to expire by adding an expiration date or time to the identity, e.g. – Base ID: “pomcor.com” – ID with expiration date: “pomcor.com ” Key pair can be revoked by adding a revocation counter – ID with revocation counter: “pomcor.com-4” – Latest ID must be retrieved from trusted repository Short term expiration + emergency revocation counter – pomcor.com /29/20147

Pattern #1 Responder-only authentication No forward secrecy 10/29/20148

init-nonce under resp-pubkey data1 under keys1-i2r Compute resp-pubkey Generate init-nonce Derive keys1-i2r from init-nonce Decrypt init-nonce Derive keys1-i2r from init-nonce Decrypt data1 Generate resp-nonce Derive keys2 from both nonces and responder's identity 10/29/20149

resp-nonce under keys2-i2r data3 under keys2-i2r Derive keys2 from both nonces and responder's identity Decrypt and check init-nonce Decrypt data2 Decrypt and check resp-nonce Decrypt data3 resp-nonce init-nonce under keys2-r2i data2 under keys2-r2i 10/29/201410

Pattern #2 Mutual authentication No forward secrecy 10/29/201411

init-nonce under resp-pubkey data1 under keys1-i2r Compute resp-pubkey Generate init-nonce Derive keys1-i2r from init-nonce Decrypt init-nonce Derive keys1-i2r from init-nonce Decrypt data1 Generate resp-nonce Derive keys2 from both nonces and responder's identity Compute init-pubkey 10/29/201412

resp-nonce under keys2-i2r data3 under keys2-i2r Decrypt resp-nonce Derive keys2 from both nonces and responder's identity Decrypt and check init-nonce Decrypt data2 Decrypt and check resp-nonce Decrypt data3 resp-nonce under init-pubkey init-nonce under keys2-r2i data2 under keys2-r2i 10/29/201413

Pattern #3 Mutual authentication Forward secrecy from the second flow onward 10/29/201414

init-nonce under resp-pubkey init-edh-pubkey data1 under keys1-i2r Compute resp-pubkey Generate init-nonce Derive keys1-i2r from init-nonce Generate init-edh-keypair Decrypt init-nonce Derive keys1-i2r from init-nonce Decrypt data1 Generate resp-nonce Generate resp-edh-keypair Compute edh-secret Derive keys2 from edh-secret Compute init-pubkey 10/29/201415

resp-nonce under keys2-i2r data3 under keys2-i2r Decrypt resp-nonce Compute edh-secret Derive keys2 from edh-secret Decrypt and check init-nonce Decrypt data2 Decrypt and check resp-nonce Decrypt data3 resp-nonce under init-pubkey resp-edh-pubkey init-nonce under keys2-r2i data2 under keys2-r2i 10/29/201416

Other ID-based patterns Responder-only authentication with forward secrecy Patterns with initiator-only authentication… 10/29/201417

For global deployments… A single PKG is not enough A hierarchy of PKGs may be needed – Analogous to a CA hierarchy A global PKG hierarchy may need to have multiple roots – Just like a global CA hierarchy The identity of a party is a chain of IDs of PKGs (the “ID chain”) The ID of a root PKG is a reference to cryptographic parameters built into the relying party – Analogous to a built-in root CA public key 10/29/201418

DNS/DNSSEC support for global deployments The relying party needs to know what PKG chain is used by the authenticating party The ID chain of the responder could be retrieved from DNS/DNSSEC without an additional roundtrip – By contrast, a certificate chain is too large to be reliably retrieved from the DNS The revocation counter can also be retrieved from the DNS/DNSSEC Retrieving the ID chain from DNSSEC solves the “rogue PKG problem” – Just like DANE solves the “rogue CA problem” 10/29/201419

Follow-up work Proofs of security for patterns Low-energy patterns? Design of protocols that use the patterns Proofs of security of protocols, relying on proofs of security of patterns as lemmas 10/29/201420

Thank you for your attention! 10/29/2014 For more information: Web site: pomcor.com Blog: pomcor.com/blog Francisco Corella Karen Lewison 21 Any questions?