Identity-Based Signatures for MANET Routing Protocols draft-dearlove-manet-ibs-00 Christopher Dearlove Presented by Ulrich Herberg.

Slides:



Advertisements
Similar presentations
SeND Hash Threat Analysis CSI WG Ana Kukec, Suresh Krishnan, Sheng Jiang.
Advertisements

Authentication Applications. will consider authentication functions will consider authentication functions developed to support application-level authentication.
Network Security: Lab#2 J. H. Wang Apr. 28, 2011.
1 Network Security Outline Encryption Algorithms Authentication Protocols Message Integrity Protocols Key Distribution Firewalls.
A Survey of Secure Wireless Ad Hoc Routing
Resource Certificate Profile Geoff Huston, George Michaelson, Rob Loomans APNIC IETF 67.
Packet Leashes: Defense Against Wormhole Attacks Authors: Yih-Chun Hu (CMU), Adrian Perrig (CMU), David Johnson (Rice)
Crypto – chapter 16 - noack Introduction to network stcurity Chapter 16 - Stallings.
Secure Routing and Intrusion Detection For Mobile Ad Hoc Networks Secure Routing and Intrusion Detection For Mobile Ad Hoc Networks Anand Patwardhan Jim.
HASH ALGORITHMS - Chapter 12
Dr Alejandra Flores-Mosri Message Authentication Internet Management & Security 06 Learning outcomes At the end of this session, you should be able to:
Spring 2002CS 4611 Security Outline Encryption Algorithms Authentication Protocols Message Integrity Protocols Key Distribution Firewalls.
November 1, 2006Sarah Wahl / Graduate Student UCCS1 Public Key Infrastructure By Sarah Wahl.
Cryptography and Network Security (CS435) Part Ten (Hash and MAC algorithms)
Encapsulation Security Payload Protocol Lan Vu. OUTLINE 1.Introduction and terms 2.ESP Overview 3.ESP Packet Format 4.ESP Fields 5.ESP Modes 6.ESP packet.
Security & Efficiency in Ad- Hoc Routing Protocol with emphasis on Distance Vector and Link State. Ayo Fakolujo Wichita State University.
Cryptography and Network Security Chapter 12 Fourth Edition by William Stallings Lecture slides by Lawrie Brown.
1 29 September 2010 NATO IST-092 Symposium New Capabilities in Security and QoS Using the Updated MANET Routing Protocol OLSRv2 Christopher Dearlove
Lecture 2: Message Authentication Anish Arora CSE5473 Introduction to Network Security.
Digital Signature Xiaoyan Guo/ Xiaohang Luo/
Secure Systems Research Group - FAU Patterns for Digital Signature using hashing Presented by Keiko Hashizume.
Csci5233 Computer Security1 GS: Chapter 6 Using Java Cryptography for Authentication.
Security Considerations for Wireless Sensor Networks Prabal Dutta (614) Security Considerations for Wireless Sensor Networks.
Overview of Security Research in Ad Hoc Networks Melanie Agnew John Folkerts Cory Virok.
8-1Network Security Chapter 8 roadmap 8.1 What is network security? 8.2 Principles of cryptography 8.3 Message integrity, authentication.
Hash and MAC Algorithms Dr. Monther Aldwairi New York Institute of Technology- Amman Campus 12/3/2009 INCS 741: Cryptography 12/3/20091Dr. Monther Aldwairi.
©The McGraw-Hill Companies, Inc., 2000© Adapted for use at JMU by Mohamed Aboutabl, 2003Mohamed Aboutabl1 1 Chapter 29 Internet Security.
Message Authentication Code July Message Authentication Problem  Message Authentication is concerned with:  protecting the integrity of a message.
Chapter 21 Public-Key Cryptography and Message Authentication.
IEEE MEDIA INDEPENDENT HANDOVER DCN: MuGM Title: TGd Message Signing Proposal Date Submitted: Presented at IEEE d session.
23-1 Last time □ P2P □ Security ♦ Intro ♦ Principles of cryptography.
Cryptography and Network Security Chapter 13 Fifth Edition by William Stallings Lecture slides by Lawrie Brown.
1 © 2005 Cisco Systems, Inc. All rights reserved. 111 © 2004, Cisco Systems, Inc. All rights reserved. CNIT 221 Security 2 Module 3 City College of San.
Hash and MAC Functions CS427 – Computer Security
IPsec IPsec (IP security) Security for transmission over IP networks –The Internet –Internal corporate IP networks –IP packets sent over public switched.
Cryptography and Network Security Chapter 13 Fourth Edition by William Stallings.
1 Authentication Algorithm Document Discussions CCSDS Security Working Group Fall 2007 Meeting 3-5 October 2007 ESA/ESOC, Darmstadt Germany (Hotel am Bruchsee,
IP Security.  In CERTs 2001 annual report it listed 52,000 security incidents  the most serious involving:  IP spoofing intruders creating packets.
1 Virtual Private Networks (VPNs) and IP Security (IPSec) G53ACC Chris Greenhalgh.
Authentication. Goal: Bob wants Alice to “prove” her identity to him Protocol ap1.0: Alice says “I am Alice” Failure scenario?? “I am Alice”
Pertemuan #9 Security in Practice Kuliah Pengaman Jaringan.
Pairing Based Cryptography Standards Terence Spies VP Engineering Voltage Security
1 CMPT 471 Networking II Authentication and Encryption © Janice Regan,
Potential vulnerabilities of IPsec-based VPN
Virtual Private Network. ATHENA Main Function of VPN  Privacy  Authenticating  Data Integrity  Antireplay.
IPSec and TLS Lesson Introduction ●IPSec and the Internet key exchange protocol ●Transport layer security protocol.
SRI International 1 Topology Dissemination Based on Reverse-Path Forwarding (TBRPF) Richard Ogier September 21, 2002.
11 Authentication Algorithms Discussions CCSDS Security WG Winter 2007 Colorado Springs, Colorado USA Howard Weiss NASA/JPL/SPARTA
Cryptography and Network Security (CS435) Part Thirteen (IP Security)
Requirements and Selection Process for RADIUS Crypto-Agility December 5, 2007 David B. Nelson IETF 70 Vancouver, BC.
Hashes Lesson Introduction ●The birthday paradox and length of hash ●Secure hash function ●HMAC.
Network Security Celia Li Computer Science and Engineering York University.
RPSEC WG Issues with Routing Protocols security mechanisms Vishwas Manral, SiNett Russ White, Cisco Sue Hares, Next Hop IETF 63, Paris, France.
K. Salah1 Security Protocols in the Internet IPSec.
ENGR 101 Compression and Encryption. Todays Lecture  Encryption  Symmetric Ciphers  Public Key Cryptography  Hashing.
Pertemuan #8 Key Management Kuliah Pengaman Jaringan.
UNIT 7- IP Security 1.IP SEC 2.IP Security Architecture
Transmission of IPv6 Packets over IEEE OCB Networks
RPSEC WG Issues with Routing Protocols security mechanisms
Packet Leashes: Defense Against Wormhole Attacks
Discussions on New Work Item of Distributed Authentication
Donald E. Eastlake 3rd TSIG SHA etc. Donald E. Eastlake 3rd March.
Re(AC)t Reputation and Anonymous Credentials for Access Control (t=2)
draft-ietf-dtn-bpsec-06
HMAC and its Design Objectives
Chapter 8 roadmap 8.1 What is network security?
Extended BFD draft-mirmin-bfd-extended
The devil is in the details
Presentation transcript:

Identity-Based Signatures for MANET Routing Protocols draft-dearlove-manet-ibs-00 Christopher Dearlove Presented by Ulrich Herberg

Status Personal draft, intended for WG adoption, Standards Track. Updates RFC 7182 that: Defined an ICV TLV for RFC 5444 packets/messages. Included crypto function and hash function codepoints. Used shared secret key in most specified cases. Is partially mandated for implementation using OLSRv2/NHDP (by RFC 7183). Draft defines two related new crypto function codepoints.

Identity-based signature Defines an identity-based signature (IBS). All routers individually keyed. o Potentially less harm when router compromised. o Possible revocation, information in identity (beyond scope). Routers independently keyed by trusted authority (KMS). o No need to know any other router’s identity in advance. o Additional routers can be added in future, no changes needed. Trusted authority not needed during network operation. o Authority can be kept “out of harm’s way”. Good fit to characteristics of many ad hoc networks.

Drawbacks Trusted authority has to be completely trusted: It can sign anything as anybody. o Possible to destroy it if no new keys will be needed. Implementations based on elliptic curve mathematics: Need suitable mathematical library. Signatures computationally relatively expensive. Signatures larger at same strength than shared key. More that one possible implementation, tradeoff.

Selection RFC 6507: Elliptic Curve-Based Certificateless Signatures for Identity-Based Encryption (ECCSI) Accepted informational RFC. Draft repeats RFC 6507 elliptic curve recommendation. o Also needs hash function, SHA-256 recommended. Does not use “pairings” (bilinear function from elliptic curve to another group) unlike some other IBS cases. o Pairings are expensive, this is faster than cases using them. Larger signature than some IBS cases. o With recommended elliptic curve, signature length is 129 octets (to be compatible with RFC 6507, allows code reuse). o Cannot truncate, need whole signature to verify. o Security level 128 bits (similar to HMAC-SHA-256, 32 octets).

Identity Identity can be anything tied to router. Natural choice is IP address. o Originator address for messages, IP source address for packets. o These may not be suitable (originator address may not be present, source address may not be unique on router). o Also need an option not based on address. Also may want to add to address, e.g. added validity. Can use from RFC Two options: just, address +. o These are the two crypto functions: ECCSI and ECCSI-ADDR. o Like HMAC, these define how to use hash, not just composed. o Verify function, rather than re-sign (impossible) and compare.