1 The HIP Diet Exchange HIP DEX Robert Moskowitz ICSA labs an Independent Division of Verizon Business July 26, 2010

Slides:



Advertisements
Similar presentations
Internet Protocol Security (IP Sec)
Advertisements

Doc.: IEEE wng0 Submission June 2010 Robert Moskowitz (ICSAlabs/VzB)Slide 1 Project: IEEE P Working Group for Wireless Personal.
1 Lecture 12 SSL/TLS (Secure Sockets Layer / Transport Layer Security) CIS CIS 5357 Network Security.
SSL CS772 Fall Secure Socket layer Design Goals: SSLv2) SSL should work well with the main web protocols such as HTTP. Confidentiality is the top.
Efficient Public Key Infrastructure Implementation in Wireless Sensor Networks Wireless Communication and Sensor Computing, ICWCSC International.
Security at the Network Layer: IPSec
Information System Security AABFS-Jordan Summer 2006 IP Security Supervisor :Dr. Lo'ai Ali Tawalbeh Done by: Wa’el Musa Hadi.
Cryptography and Network Security Chapter 16 Fourth Edition by William Stallings Lecture slides by Lawrie Brown.
Chapter 13 IPsec. IPsec (IP Security)  A collection of protocols used to create VPNs  A network layer security protocol providing cryptographic security.
IPsec: Internet Protocol Security Chong, Luon, Prins, Trotter.
Submission hip Slide 1 Project: IEEE P Working Group for Wireless Personal Area Networks (WPANs) Submission Title: [Bootstrapping.
October 22, 2002Serguei A. Mokhov, 1 Intro to Internet-services from Security Standpoint, Part II SOEN321-Information-Systems Security.
CMSC 414 Computer and Network Security Lecture 16 Jonathan Katz.
CMSC 414 Computer and Network Security Lecture 22 Jonathan Katz.
1 Authentication Protocols Celia Li Computer Science and Engineering York University.
Alexander Potapov.  Authentication definition  Protocol architectures  Cryptographic properties  Freshness  Types of attack on protocols  Two-way.
What is in Presentation What is IPsec Why is IPsec Important IPsec Protocols IPsec Architecture How to Implement IPsec in linux.
Security Considerations for Wireless Sensor Networks Prabal Dutta (614) Security Considerations for Wireless Sensor Networks.
Radio Frequency Identification By Bhagyesh Lodha Vinit Mahedia Vishnu Saran Mitesh Bhawsar.
Doc.: IEEE /1066r2 Submission July 2011 Robert Moskowitz, VerizonSlide 1 Link Setup Flow Date: Authors: NameCompanyAddressPhone .
IPsec: IKE, Internet Key Exchange IPsec does not use Public Key Infrastructure and exchanging keys before an IPsec connection is established is a problem.
Wireless and Security CSCI 5857: Encoding and Encryption.
1 Lecture 14: Real-Time Communication Security real-time communication – two parties interact in real time (as opposed to delayed communication like )
ECE 454/CS 594 Computer and Network Security Dr. Jinyuan (Stella) Sun Dept. of Electrical Engineering and Computer Science University of Tennessee Fall.
The Cryptographic Sensor FTO Libor Dostálek, Václav Novák.
Doc.: IEEE Submission March 2012 Jani Pellikka, Andrei Gurtov (University of Oulu)Slide 1 Project: IEEE P Working Group.
1 Section 10.9 Internet Security Association and Key Management Protocol ISAKMP.
Shambhu Upadhyaya Security –Upper Layer Authentication Shambhu Upadhyaya Wireless Network Security CSE 566 (Lecture 10)
Lecture 14 ISAKMP / IKE Internet Security Association and Key Management Protocol / Internet Key Exchange CIS CIS 5357 Network Security.
ECE 454/CS 594 Computer and Network Security Dr. Jinyuan (Stella) Sun Dept. of Electrical Engineering and Computer Science University of Tennessee Fall.
1 Security Protocols in the Internet Source: Chapter 31 Data Communications & Networking Forouzan Third Edition.
IPsec IPsec (IP security) Security for transmission over IP networks –The Internet –Internal corporate IP networks –IP packets sent over public switched.
Rushing Attacks and Defense in Wireless Ad Hoc Network Routing Protocols ► Acts as denial of service by disrupting the flow of data between a source and.
SSL/TLS How to send your credit card number securely over the internet.
1 Lecture 9: Cryptographic Authentication objectives and classification one-way –secret key –public key mutual –secret key –public key establishing session.
Doc.: IEEE Submission November 2009 Robert Moskowitz (ICSAlabs/VzB)Slide 1 Project: IEEE P Working Group for Wireless Personal.
Doc.: IEEE HIP-over-TG9 Submission May 2012 Robert Moskowitz, Verizon Slide 1 Project: IEEE P Working Group for Wireless Personal.
Doc.: IEEE /200 Submission September 2000 Ron Brockmann, Intersil Plug-n-Play Security in the Home & Small Business Ron Brockmann Intersil.
Doc.: IEEE /0980r0 Submission August 2010 Marc Emmelmann, Fraunhofer FOKUSSlide 1 Summary & Comments FIA Security Analysis Bob Moskowitz Date:
EAP Keying Framework Draft-aboba-pppext-key-problem-06.txt EAP WG IETF 56 San Francisco, CA Bernard Aboba.
ICOS BOF EAP Applicability Bernard Aboba IETF 62, Minneapolis, MN.
IPSec and TLS Lesson Introduction ●IPSec and the Internet key exchange protocol ●Transport layer security protocol.
Azam Supervisor : Prof. Raj Jain
Moving HIP to Standards Track Robert Moskowitz ICSAlabs an Independent Div of Verizon Business Systems March 25, 2010
Csci388 Wireless and Mobile Security – Key Hierarchies for WPA and RSN
1 The HIP Diet Exchange HIP DEX Robert Moskowitz Verizon Telcom and Business Innovation Group March 29, 2011
V IRTUAL P RIVATE N ETWORKS K ARTHIK M OHANASUNDARAM W RIGHT S TATE U NIVERSITY.
Cryptography and Network Security (CS435) Part Thirteen (IP Security)
Wireless Network Security CSIS 5857: Encoding and Encryption.
Moving HIP to Standards Track Robert Moskowitz ICSAlabs an Independent Div of Verizon Business Systems July 30, 2009 Slides presented.
1 Secure Key Exchange: Diffie-Hellman Exchange Dr. Rocky K. C. Chang 19 February, 2002.
November 2011 Jin-Meng Ho and David Davenport. doc.: IEEE Slide 1Submission Project: IEEE P Working Group for Wireless Personal.
K. Salah1 Security Protocols in the Internet IPSec.
 Attacks and threats  Security challenge & Solution  Communication Infrastructure  The CA hierarchy  Vehicular Public Key  Certificates.
Security of the Internet of Things: perspectives and challenges
@Yuan Xue CS 285 Network Security Secure Socket Layer Yuan Xue Fall 2013.
Cryptography CSS 329 Lecture 13:SSL.
Whatsapp Security Ahmad Hijazi Systèmes de Télécommunications & Réseaux Informatiques (STRI) 20 April 2016.
SHIP: Performance Reference: “SHIP mobility management hybrid SIP-HIP scheme” So, J.Y.H.; Jidong Wang; Jones, D.; Sixth International Conference on
September 2009 doc.: IEEE June 2010
Secure Sockets Layer (SSL)
September 2009 doc.: IEEE June 2010
September 2009 doc.: IEEE June 2010
September 2009 doc.: IEEE November 2009
Robert Moskowitz, Verizon
September 2009 doc.: IEEE June 2010
Robert Moskowitz, Verizon
Robert Moskowitz, Verizon
Lecture 36.
Lecture 36.
Presentation transcript:

1 The HIP Diet Exchange HIP DEX Robert Moskowitz ICSA labs an Independent Division of Verizon Business July 26, 2010

2 Purpose of this presentation Present work on a new HIP Exchange specifically architected for resource limited devices by – Explain why HIP BEX is not suited for these devices – Explain the new HIP Diet Exchange (HIP DEX) And using it to key MACsec – Possible directions for HIP – Next steps

3 Why not HIP BEX? Characteristics of (Low Rate Wireless Personal Area Networks) – Over-the-air data rates of 250 kb/s, 100kb/s, 40 kb/s, and 20 kb/s – Low power consumption Small Processors with minimum memory Typically battery operated

4 Putting HIP on a Diet Basic premise The HIP Diet Exchange – HIP DEX Use static ECDH as Host Identities With ECDH derived key only used for session key protection – Master Key in terminology – Randomly generated a key and encrypted with DH derived key CMAC function now defined for Diffie-Hellman key as the the Master Key Key derivation from random key can use CMAC We do not need a hash function! We can 'manage' without Digital Signatures

5 HIP Diet Exchange (DEX) Parties are – I ::= Initiator – R ::= Responder – MR ::= Malicious Responder – MI ::= Malicious Initiator Functions are – ECR ::= AES encrypt – MAC ::= CMAC – | ::= concatenation – EX ::= Key expansion

6 HIP Diet Exchange (DEX) Values are – PK ::= Public key of e.g. Pki is Public key of I – DHk ::= Derived Diffie-Hellman key compressed via CMAC with nonce as key – DHlist ::= List of ECDH key sizes supported – n ::= nonce – Pn ::= Puzzle based on and containing nonce n – Sn ::= Puzzle solution based on nonce n – x,y ::= random secrets

7 HIP Diet Exchange (DEX) The HIP DEX, rather than a BEX, exchange is identified by a DEX HIT – I & R HITs included in exchange headers I or MI R or MR I1 ::= (DHlist) > R1 ::= <--- Pn, Pkr, DHlist I2 ::= Sn, PKi, ECR(DHk,x|n), MAC(DHk,(Sn, PKi, ECR(DHk,x|n))) > I or MI R R2 ::= <--- DHlist, ECR(DHk,y|n), MAC(DHk, (DHlist, ECR(DHk,y|n))) I R Note be end of exchange, parties can ONLY be R and I.

8 Putting HIP on a Diet Summary of Crypto Components A 'Dietetic' HIP exchange CAN be achieved with – AES-CBC (and CMAC) AES-CCM used by ESP or MACsec – Static ECDH I2 and R2 MACs prove private key ownership Can be installed by manufacturer – ECDH key derivation typically only occurs for initial join

9 HIP Diet Exchange (DEX) Dealing with a lossful network HIP BEX can be slow with packet loss – DEX MUST deal with high packet loss Implement a repeated send until ACK – Alternative to immediate ACK Which is not effective on multihop or off PAN – I aggressively sends I1 and continues send it until it receives R1 – R sends R1 for every I1 received – I aggressively sends I2 and continues send it until it receives R2, then it transitions to connected state – R sends R2 for every I2 received, it transitions to connected state when it starts receiving datagrams

10 HIP Diet Exchange (DEX) Adding Password Authentication Password Augmented Authentication – Provides bootstrap mechanism to add a node to a controller – Supports emergency adHoc access EMT access to a Pacemaker Utility field technician to a substation controller Controller implicitly invites password Auth – R1 ALWAYS contains a challenge The Puzzle values – Initiator MACs challenge with password and encrypts that in the DH derived key

11 HIP Diet Exchange (DEX) Adding Password Authentication Challenge Encryption – Use password as CMAC key MAC nonce from R1 puzzle – RFC 4615 (AES-CMAC-PRF-128) is starting point Encrypting a challenge from R1 prevents replay attacks – R1 cannot be reused if password response is accepted – 'Rogue' Responder attack Initiator cannot tell if R1 came from Responder or attacker unless PKr from another source – Need zero knowledge alternative As in IEEE s SAE And draft-harkins-ipsecme-spsk-auth

12 Using HIP DEX for MACsec Use 6lowpan for HIP directly over MAC layer – Sec 5 for fragmentation Develop pair-wise and broadcast/multicast key distribution – HIP DEX has implicit concept of Master and Pair-wise keys – Use Group key model Or 802.1AE? ICMP error messages – Remove IP header and run directly over 6lowpan

13 HIP DEX exchanges DEX provides Master and Pair-wise Keys – On initial joining of PAN and whenever new MK needed (e.g. lost of state) – Accelerated Group key setup within exchange Only if Responder is owner of key

14 HIP DEX exchanges Pair-wise Key Updates – Via HIP UPDATE exchange – Frequency determined by local policy Lost state or key exhausted – Only AES-CBC and CMAC functions needed Group Key – Via HIP UPDATE exchange – Sent by key owner – Frequency determined by local policy Lost state, membership change, key exhausted – Only AES-CBC and CMAC functions needed

15 The Evolution of HIP First there was the Base Exchange – This already implied there would something not 'Base' – Well constructed for P2P applications Then HIP for RFID – VERY lightweight exchange for Active 'tags' Now HIP DEX – Designed for constrained sensors

16 The Evolution of HIP Host Identity Namespace and HITs will be available for any Object on the Internet We need attention to implementation commonality for systems that will support 2 or all three exchanges We need to think out how best to leverage this development

17 Next Steps HIP DEX will be worked on in – IETF and IEEE HIP Interest Group Refine processes – HIP DEX – MACsec key hierarchies management Present progress at IEEE Interim in September November IEEE 802 and IETF same week – I will be attending IEEE 802

18 Questions?