SafeSlinger Easy-to-Use and Secure Public-Key Exchange Michael Farb (CMU), Yue-Hsun Lin (CMU), Tiffany Hyun-Jin Kim (CMU), Jonathan McCune (Google), Adrian.

Slides:



Advertisements
Similar presentations
1 Security for Ad Hoc Network Routing. 2 Ad Hoc Networks Properties Mobile Wireless communication Medium to high bandwidth High variability of connection.
Advertisements

ECE454/CS594 Computer and Network Security Dr. Jinyuan (Stella) Sun Dept. of Electrical Engineering and Computer Science University of Tennessee Fall 2011.
Spring 2000CS 4611 Security Outline Encryption Algorithms Authentication Protocols Message Integrity Protocols Key Distribution Firewalls.
Internet and Intranet Protocols and Applications Lecture 9a: Secure Sockets Layer (SSL) March, 2004 Arthur Goldberg Computer Science Department New York.
Efficient Public Key Infrastructure Implementation in Wireless Sensor Networks Wireless Communication and Sensor Computing, ICWCSC International.
1 Network Security Outline Encryption Algorithms Authentication Protocols Message Integrity Protocols Key Distribution Firewalls.
15-1 Last time Internet Application Security and Privacy Public-key encryption Integrity.
Computer Security Key Management. Introduction We distinguish between a session key and a interchange key ( long term key ). The session key is associated.
Computer Security Key Management
Mar 12, 2002Mårten Trolin1 This lecture Diffie-Hellman key agreement Authentication Certificates Certificate Authorities SSL/TLS.
Public-key based. Public-key Techniques based Protocols –may use either weak or strong passwords –high computation complexity (Slow) –high deployment.
CSCI283 Fall 2005 GWU All slides from Bishop’s slide set Public Key Infrastructure (PKI)
 Authorization via symmetric crypto  Key exchange o Using asymmetric crypto o Using symmetric crypto with KDC  KDC shares a key with every participant.
Spring 2002CS 4611 Security Outline Encryption Algorithms Authentication Protocols Message Integrity Protocols Key Distribution Firewalls.
Multiprotocol Attacks and the Public Key Infrastructure* Jim Alves-Foss Center for Secure and Dependable Software University of Idaho
Cryptography1 CPSC 3730 Cryptography Chapter 10 Key Management.
Apr 22, 2003Mårten Trolin1 Agenda Course high-lights – Symmetric and asymmetric cryptography – Digital signatures and MACs – Certificates – Protocols Interactive.
Mar 4, 2003Mårten Trolin1 This lecture Diffie-Hellman key agreement Authentication Certificates Certificate Authorities.
Key Management public-key encryption helps address key distribution problems have two aspects of this: –distribution of public keys –use of public-key.
8-1 What is network security? Confidentiality: only sender, intended receiver should “understand” message contents m sender encrypts message m receiver.
Mar 5, 2002Mårten Trolin1 Previous lecture More on hash functions Digital signatures Message Authentication Codes Padding.
Spring 2003CS 4611 Security Outline Encryption Algorithms Authentication Protocols Message Integrity Protocols Key Distribution Firewalls.
CMSC 414 Computer and Network Security Lecture 6 Jonathan Katz.
Topic 11: Key Distribution and Agreement 1 Information Security CS 526 Topic 11: Key Distribution & Agreement, Secure Communication.
Cryptography and Network Security Chapter 10. Chapter 10 – Key Management; Other Public Key Cryptosystems No Singhalese, whether man or woman, would venture.
Security Management.
1 CS 194: Distributed Systems Security Scott Shenker and Ion Stoica Computer Science Division Department of Electrical Engineering and Computer Sciences.
Alexander Potapov.  Authentication definition  Protocol architectures  Cryptographic properties  Freshness  Types of attack on protocols  Two-way.
Computer Science Public Key Management Lecture 5.
Seeing-Is-Believing: Using Camera Phones for Human- Verifiable Authentication Jonathan M. McCune Adrian Perrig Michael K. Reiter Carnegie Mellon University.
Part Two Network Security Applications Chapter 4 Key Distribution and User Authentication.
Key Management and Diffie- Hellman Dr. Monther Aldwairi New York Institute of Technology- Amman Campus 12/3/2009 INCS 741: Cryptography 12/3/20091Dr. Monther.
8-1Network Security Chapter 8 roadmap 8.1 What is network security? 8.2 Principles of cryptography 8.3 Message integrity, authentication.
Cyrtographic Security Identity-based Encryption 1Dennis Kafura – CS5204 – Operating Systems.
Overview of Key Establishment Techniques: Key Distribution, Key Agreement and PKI Wade Trappe.
10. Key Management. Contents Key Management  Public-key distribution  Secret-key distribution via public-key cryptography.
Chapter 21 Public-Key Cryptography and Message Authentication.
Cryptography and Network Security (CS435) Part Eight (Key Management)
23-1 Last time □ P2P □ Security ♦ Intro ♦ Principles of cryptography.
Fall 2010/Lecture 321 CS 426 (Fall 2010) Key Distribution & Agreement.
Tanenbaum & Van Steen, Distributed Systems: Principles and Paradigms, 2e, (c) 2007 Prentice-Hall, Inc. All rights reserved DISTRIBUTED.
Chapter 3 (B) – Key Management; Other Public Key Cryptosystems.
Upper OSI Layers Natawut Nupairoj, Ph.D. Department of Computer Engineering Chulalongkorn University.
Security Many secure IT systems are like a house with a locked front door but with a side window open -somebody.
Topic 14: Secure Communication1 Information Security CS 526 Topic 14: Key Distribution & Agreement, Secure Communication.
1 Chapter 10: Key Management in Public key cryptosystems Fourth Edition by William Stallings Lecture slides by Lawrie Brown (Modified by Prof. M. Singhal,
Network Security Continued. Digital Signature You want to sign a document. Three conditions. – 1. The receiver can verify the identity of the sender.
Seeing-Is-Believing: Using Camera Phones for Human-Verifiable Authentication McCune, J.M., Perrig, A., Reiter, M.K IEEE Symposium on Security and.
Protocol Analysis. CSCE Farkas 2 Cryptographic Protocols Two or more parties Communication over insecure network Cryptography used to achieve goal.
Private key
Key Management Network Systems Security Mort Anvari.
Lecture 11 Overview. Digital Signature Properties CS 450/650 Lecture 11: Digital Signatures 2 Unforgeable: Only the signer can produce his/her signature.
1 Authenticated Key Exchange Rocky K. C. Chang 20 March 2007.
1 Diffie-Hellman (Key Exchange) Protocol Rocky K. C. Chang 9 February 2007.
Lecture 9 Overview. Digital Signature Properties CS 450/650 Lecture 9: Digital Signatures 2 Unforgeable: Only the signer can produce his/her signature.
Cryptography and Network Security Chapter 10 Fourth Edition by William Stallings Lecture slides by Lawrie Brown.
1 Secure Key Exchange: Diffie-Hellman Exchange Dr. Rocky K. C. Chang 19 February, 2002.
Security Review Q&A Session May 1. Outline  Class 1 Security Overview  Class 2 Security Introduction  Class 3 Advanced Security Constructions  Class.
Fall 2006CS 395: Computer Security1 Key Management.
1 Chapter 3-3 Key Distribution. 2 Key Management public-key encryption helps address key distribution problems have two aspects of this: –distribution.
Lesson Introduction ●Authentication protocols ●Key exchange protocols ●Kerberos Security Protocols.
@Yuan Xue CS 285 Network Security Key Distribution and Management Yuan Xue Fall 2012.
SECURITY. Security Threats, Policies, and Mechanisms There are four types of security threats to consider 1. Interception 2 Interruption 3. Modification.
Prof. Reuven Aviv, Nov 2013 Public Key Infrastructure1 Prof. Reuven Aviv Tel Hai Academic College Department of Computer Science Public Key Infrastructure.
Computer Communication & Networks
Public Key Infrastructure
Protocol ap1.0: Alice says “I am Alice”
Chapter 8 roadmap 8.1 What is network security?
Presentation transcript:

SafeSlinger Easy-to-Use and Secure Public-Key Exchange Michael Farb (CMU), Yue-Hsun Lin (CMU), Tiffany Hyun-Jin Kim (CMU), Jonathan McCune (Google), Adrian Perrig (CMU/ETH)

Setting: Key Distribution in Groups  Exchange information to secure communications Cryptographic Keys  People meet & want to communicate securely later Researchers at a conference Business people at a lunch  Challenge: No commonly trusted infrastructure

Prior Solutions  PKI (Public-Key Infrastructure) Assumptions: TTP (Trust Third Party)  Certification Authority (CA) Still vulnerable to Man-in-The-Middle attacks Disconnect between physical & digital world  Attacker can likely acquire a certificate for any name  PGP (Pretty Good Privacy) Sequential broadcast of key and announcement of hash is cumbersome  Difficult for people to detect attack A distribution list is cumbersome and insecure  Need to count # of people  Need to compare lists

Diffie-Hellman Exchange Protocol A B m g a mod p Goal: Establish shared secret between two parties for further use  Public values: large prime p, generator g  Secret values: Alice (A) has secret a, Bob (B) has secret b  Share Secret g ab (mod p) g b mod p (g b ) a mod p (g a ) b mod p

Problem: Man-in-the-Middle Attack BM g a mod p Problem: Malicious M impersonates Alice to Bob and Bob to Alice  Wireless is invisible  Neighbors can easily launch MitM g m mod p g m’ mod p g b mod p g bm mod p g am’ mod p A Check integrity of shared secret to detect MitM

Out-of-band Channel to defend MitM In-band channel Active Attacker Out-of-band channel (e.g., cable, NFC, human visual channel + action)

Issues of Out-of-band Channels  Inconvenient in group settings Scalability: N members must perform O(N 2 ) interactions  Most OOBs are designed for pairwise associations  For a group of 10, we need 45 interactions – i.e., combinations of 2 from 10 Efficiency: Most of OOBs are slow

Group-in-the-Middle Attack (GitM)  Settings All members share secret All members know number of members present  Problem: Attacker can separate the intended group to multiple groups Intended Result

SafeSlinger Goals  Goal: Exchange authentic information between group members Scalability: Avoid N 2 interactions in a group Authenticity: Each user should obtain the correct contact information associated with each other member Secrecy: Only intended entities receive the information Usability: Easy to use Portability: support heterogeneous platforms  Provide subsequent mechanisms based on authentic public keys

SafeSlinger Communication  Devices connect via Internet to SafeSlinger server  Sidesteps Bluetooth / WiFi communication problems 10 Internet SafeSlinger server

Simple User Interactions Bob Carol Alice … … … … … … Easy to use! Each user requires 1 number comparison, 1 word phrase comparison

Challenge 1: Private Information Leak  Server learns contact information of all users  Approach STR protocol 1 used to create a shared secret key under which all information is encrypted Only if all verifications succeed, decryption key is disclosed to intended individuals Y. Kim, A. Perrig, and G. Tsudik. Group key agreement efficient in communication, IEEE Transactions on Computers, 53(7):905–921, July 2004.

Challenge 2: Prevent Dialog Failure  Users simply click “Next” without checking phrases  Approach: Make users pay attention! 13 User has to pay attention and select matching phrase!

Challenge 3: No Information Revealed on Protocol Failure  When protocol fails, no user information is revealed to anyone else All-or-nothing property  Approach: Commitment tree with several commitment stages 14

Commitment Tree  “  ” indicates Cryptographic Hash Function (SHA3)  “{x} K ” represents encryption with key K 15 Nonce M Nonce E HN’ M HN E {Data} NonceM Hash D Commitment Creation Usage {Nonce M } DH Key _ DH Key + HN M

Challenge 4: GitM Attack  Malicious group member performs Group-in-the- Middle (GitM) attack  Approach Users enter number of participants All users compare word list with other users (word list simplifies comparison) Commitment tree makes GitM attack a daring attack (success probability = ) 16

Evaluation  Goal: measure efficiency of contact exchange  User study settings Baseline comparison with Bump Recruited 24 users Separate into groups: 2 (small), 4 (middle) and 8 (large) Each group runs either Bump or SafeSlinger in random order to exchange contact information Repeat exchanges multiple times

Performance Results

Summary  Maintains user privacy Only group members learn exchanged information Server does not learn information  Simple to use and resilient to user errors  Supports Rich Applications Secure text and file messaging Secure Introduction  Webpage:  Apps are available on Apple Store/Google Play  Future work: Open source to spur adoption for developers Develop plugins for and messenger clients

Backup: Group-Diffie-Hellman Key Agreement (STR) 20  Notation for each node: (private key, public key) *mod p is omitted to simplify description

Related Work: SPATE [Lin et al. 2009] Small-group PKI-less Authenticated Trust Establishment PearlAmber RedJadeViolet Indigo  Efficient Member performs 3 actions  Select data  Count group size  Compare  Simple comparison Only 1 user needs to pay attention

Verification  Count the number of people present  Compare the various checksums (T-Flag)

Issues in SPATE  T-Flag comparisons makes protocol secure if and only if users are diligent All “Match” signatures: save data “Error” or no signature: discard data  Dialog failure: Users click “OK” to continue  What if the slow user found a problem?  Execute locally (physically presented)

Backup: SafeSlinger Protocol

SafeSlinger Protocol (con’t)

SafeSlinger Protocol

Probability Analysis for MitM  Phrases comparison converts the safe attack to the daring attack  Analyze MitM attack success probability based on user behavior All users are lazy: randomly pick one phrase to continue  (1/3) n when the group has n members  Unlikely to happen because decoy phrases makes the protocol aborts in high probability Some users turns to be “partial diligent”

Partial Diligent Cases (1/2)  At least one word match (upper bound)  The first word exactly matches

Partial Diligent Cases (2/2)  The first and second words match P 3 ≤P((A 1 =B 1 )&(A 2 =B 2 ))=P 2 *(1/256)= e-5  Whole phrase matches (diligent user) P 4 ≤P((A 1 =B 1 )&(A 2 =B 2 ) &(A 3 =B 3 ))=P 3 *(1/255) = e-8

Comparison: SafeSlinger v.s. Bump SafeSlingerBump Scalability (# users)2-102 Exchange MethodLocal/RemotePhysical PrivacyOnly IP addressIP Address, Location, Accelerometer information SecurityHighLow Device Requirement InternetInternet, Accelerometer Additional featureBuilt-in secure messaging Fun to use