Presentation is loading. Please wait.

Presentation is loading. Please wait.

多媒體網路安全實驗室 Robust authentication and key agreement scheme preserving Date:2011/11/05 報告人:向峻霈 出處 : Ren-Chiun Wang Wen-Shenq Juang Chin-Laung Lei Computer.

Similar presentations


Presentation on theme: "多媒體網路安全實驗室 Robust authentication and key agreement scheme preserving Date:2011/11/05 報告人:向峻霈 出處 : Ren-Chiun Wang Wen-Shenq Juang Chin-Laung Lei Computer."— Presentation transcript:

1 多媒體網路安全實驗室 Robust authentication and key agreement scheme preserving Date:2011/11/05 報告人:向峻霈 出處 : Ren-Chiun Wang Wen-Shenq Juang Chin-Laung Lei Computer Communications pp. 274-280,2011

2 多媒體網路安全實驗室 Outline Introduction 1 Proposed scheme 2 Security analysis 33 Functionality comparison 44 Conclusion 35 2

3 多媒體網路安全實驗室 Introduction 3 server file verification user password maintain  In ubiquitous computing environments thin devices low computation and communication verification table password guessing attack is still a key issue

4 多媒體網路安全實驗室 Related work  Wang et al.’s scheme  prevent the smart card loss problem  prevent users from inputting incorrect passwords 4

5 多媒體網路安全實驗室 Registration phase 5 ClientServer h(b ⊕ pw i ),id i writes ( R, V, h(), h P () ) b p=h(id i ⊕ x) R =p ⊕ h(b ⊕ pw i ) V = h p (h(b ⊕ pw i )) secure channel smart card (R,V,h(),h P (),b) h(b ⊕ pw i ) issues the smart card to the client i

6 多媒體網路安全實驗室 Login phase 6 Server Id i,c 1,c 2,T u records a timestamp T s Check id i or T u ==T s Verifie if(T u -T s ) p =h(id i ⊕ x) Verifie h p (c’ 1 ⊕ T u ) ==c 2 c’ 1 =p ⊕ c 1 =h(r ⊕ b) c 3 =h p (c’ 1 ⊕ T s ) smart card p=R ⊕ h(b ⊕ pw i ) verifies V == h p ( h(b ⊕ pw i )) c 1 = p ⊕ h(r ⊕ b)=h(id i ⊕ x) ⊕ h(r ⊕ b) c 2 = h p (h(r ⊕ b) ⊕ T u ) c 3,T s Verifie T s is invalid or T s =T u c’ 3 =h p (h(r ⊕ b) ⊕ T s ) Check c’ 3 ==c 3 session key c’ 1 =h(r ⊕ b) Session key c’ 1 =h(r ⊕ b)

7 多媒體網路安全實驗室 Smart card loss problem 7 Server Id i,c 1,c 2,T u records a timestamp T s Check id i or T u ==T s Verifie if(T u -T s ) p =h(id i ⊕ x) Verifie h p (c’ 1 ⊕ T u ) ==c 2 c’ 1 =p ⊕ c 1 =h(r ⊕ b) c 3 =h p (c’ 1 ⊕ T s ) smart card p=R ⊕ h(b ⊕ pw’ i ) verifies V == h p ( h(b ⊕ pw’ i )) c 1 = p ⊕ h(r ⊕ b)=h(id i ⊕ x) ⊕ h(r ⊕ b) c 2 = h p (h(r ⊕ b) ⊕ T u ) c 3,T s Verifie T s is invalid or T s =T u c’ 3 =h p (h(r ⊕ b) ⊕ T s ) Check c’ 3 ==c 3 session key c’ 1 =h(r ⊕ b) Session key c’ 1 =h(r ⊕ b)

8 多媒體網路安全實驗室 Proposed scheme  Registration phase  The precomputation phase  Authentication and key agreement phase  Password changing phase  Revoking smart card phase  User eviction phase  User anonymity phase 8

9 多媒體網路安全實驗室 Registration phase  server sets up the system parameters  Chooses a large prime number p(p>2 160 )  Ep :y 2 = x 3 +ax+b mod p a,b ∈ p  4a 3 +27b 2 mod p ≠ 0,  G is a generator point of a large order n(n>2 160 ) 9

10 多媒體網路安全實驗室 Registration phase 10 ClientServer id i writes ( id i,B i,G,E P ) pw i id i cid i B i =h(x || id i || cid i ) * G secure channel smart card B i ‘= B i ⊕ h(pw i ) ( id i,B i ’,G,E P ) Precomputation Phase T 1 = R * G //as a point over E p

11 多媒體網路安全實驗室 Authentication and key agreement phase 11 Server T 1,T 2 (id i, T 1, T 2 )-> validity client’s identity h(x || id i || cid i ) T 2 ‘= T1* h(x || id i || cid i ) =R* h(x || id i || cid i )*G K = h(W * T 1 ) V 1 =h(T 2 ’ || K) Send (T 3 = W * G,V 1 ) smart card T 1 = R * G B i = B i ’ ⊕ h(pw i ) = h(x || id i || cid i )*G T 2 = h(R * B i ) = h(R* h(x || id i || cid i )*G) V 1,T 3 K’ = h(R * T 3 ) V 1 ’ = h(R * B i || K’) check V 1 ’=V 1 Relay V 2 = h(R * B i || K’+1) V2V2 Check h(T 2 ’ || K+1) session key K

12 多媒體網路安全實驗室 User eviction phase  Server  Delete table id i  Delete table cid i 12

13 多媒體網路安全實驗室 Password changing phase 13 ClientServer idi writes ( id i,B i,G,E P ) pw i id i cid i B i =h(x || id i || cid i ) * G secure channel smart card B i ‘’= B i ⊕ h(new pwi ) ( id i,B i ’’,G,E P ) Precomputation Phase T 1 = R * G

14 多媒體網路安全實驗室 User anonymity phase(1/2) 14 ClientServer registered information writes (IND i,B i,G,E P ) pw i IND i cid i B i =h(x || IND i || cid i ) * G secure channel smart card B i ‘= B i ⊕ h(pw i ) ( id i,B i ’,G,E P ) Precomputation Phase T 1 = R * G //as a point over E p

15 多媒體網路安全實驗室 User anonymity phase(2/2) 15 Server IND i,T 1,T 2 (IND i, T 1, T 2 )-> validity client’s identity h(x || IND i || cid i ) T 2 ‘= T 1 * h(x || IND i || cid i ) =R* h(x || IND i || cid i )*G K 1 = h(W * T 1 ) V 1 =E K1 (h(T 2 ’ + 1)|| IND inew || B inew ) Send (T 3 = W * G,V 1 ) smart card T 1 = R * G B i = B i ’ ⊕ h(pw i ) = h(x || IND i || cid i )*G T 2 = h(R * B i ) = h(R* h(x || IND i || cid i )*G) V 1,T 3 K 1 ’ = h(R * T 3 ) V 1 ’ = h(R * B i || K’) check V 1 ’=V 1 Relay V 2 = h(R * B i +2) V2V2 Check V’ 2 B inew =h(x || IND inew || cid i ) * G In stored in the registration table session key K

16 多媒體網路安全實驗室 Security considerations  Adversary want simulation valid user  Adversary can generate two valid messages  (T 3,V 1,h 1,h 2 ) and (T 3,V’ 1,h’ 1,h’ 2 )  h’ 1 =T’ 1 *h(x||id i ||cid i )||h’ 2  h’ 2 =W*T’ 1 =W*R*G  Solve  x and ECCDHP 16

17 多媒體網路安全實驗室 Security considerations  Adversary want simulation valid user  (T 1,T 3,) and (T 1,B i )  Probability  hashquery / 2 l-1 17 Send Reveal Hash Test

18 多媒體網路安全實驗室 Security considerations  Against the forgery attack by an active Adversary  T 1 =R*G  h(x||id i ||cid i )  h’ 1 =R*G*h(x||id i ||cid i )  Probability  hashquery / 2 18 Hash

19 多媒體網路安全實驗室 Security considerations  when only the server’s master key x is known.  Session key k = h(W*T 1 )  Adversary can’t work out (W old *T old )or (R old *T 3 )  Probability 19 Solve ECCDHP Problem

20 多媒體網路安全實驗室 Security considerations  If ECCDHP is hard,k is known  Adversary learn k new  Must select R new,T 1new,find R new *G*h(x||id i ||cid i )  Adversary can’t work out (W old *T old )or (R old *T 3 )  Probability 20 V2V2

21 多媒體網路安全實驗室 Security considerations  If session key is known in card  Adversary must hold (id,Bi,G,E p )  (B i *R) ->T 2  Off-line attack from q se  the password guessing attack is 21

22 多媒體網路安全實驗室 Equivalent key sizes in bits 22 Symmetric ECCRSA Years to attack in MIPS Security lifetime 8016010241012 Until 2010 11222420481024 Until 2030 12825630721028 Beyond 2031 The length of the identity is 64 bits Length of a random number is 128 bits length of the master key in the server side is 256 bits

23 多媒體網路安全實驗室 Computation comparison 23 The performance of a client in our scheme and the related schemes.

24 多媒體網路安全實驗室 Computation comparison 24 The performance of an application server in our scheme and the related schemes

25 多媒體網路安全實驗室 Computation cost Our protocol 160 *2 + 224*2 + 64 = 832 bits Fan et al.’s scheme 64 + 2048 + 160 = 2272 bits Liao et al.’s scheme 64 *2 + 160 + 32 = 320 bits Wang et al.’s scheme 64 + 160*2 + 32 = 416 bits 25

26 多媒體網路安全實驗室 Functionality comparison  C1 : server does not need to maintain a security-sensitive verification table  C2 : clients can choose and change their passwords freely  C3 : passwords of the clients cannot be derived by the privileged administrator of the server  C4 : no one can impersonate a valid client to access the resources of the server  C5 : is not prone to the problems of clock synchronization and time-delay  C6 : can withstand  replay, password guessing  stolen-verifier  known-key attacks  if one of the previous session key  communicated messages is known by an adversary, the adversary still cannot impersonate this victim client 26

27 多媒體網路安全實驗室 Functionality comparison  C7 : the client and the server can securely establish a common session key to protect their future communications  C8 : the scheme is practical and efficient. The scheme can easily be implemented and the computation and communication cost is low  C9 : the client can revoke the smart card without changing the identity  C10 : the scheme is secure against the smart card loss problem  C11: an evicted client cannot use the overdue smart card to access the resource of the server 27

28 多媒體網路安全實驗室 Functionality comparison Our protocol Fan et al.’s scheme Liao et al.’s scheme Wang et al.’s scheme C1Yes C2No YesNo C3YesNo Yes C4Yes No C5Yes No C6YesNot supportedNo C7YesNot supportedYesNo C8YesPartially a Yes C9Yes Not supported C10YesNo b No c No C11Yes Not supported 28 a.The computation cost of the server is high in the scheme, b.Rhee et al. have shown that the scheme is insecure against the smart card loss problem. c.Xiang et al. and Yang et al. have shown that the scheme is insecure against the smart card loss problem and is vulnerable to the impersonation, the password guessing, the re-play, and the denial of service attacks

29 多媒體網路安全實驗室 29

30 多媒體網路安全實驗室 Conclusion  extended the scheme to provide the privacy of the client  solves several hard security threats that are difficult to be solved in the previous scholarship 30

31 多媒體網路安全實驗室

32 32 Computation cost MD5 王小云 2 2005 王小云 2 月 2 39 SHA-0 2004 8 月王小云 可在 2 40 的計算複雜度內就找到碰撞 SHA-1 2005 2 月王小云 只需少於 2 69 計算複雜度 ( 生日攻擊法 2 80 ) 2005 8 月王小云 2 63


Download ppt "多媒體網路安全實驗室 Robust authentication and key agreement scheme preserving Date:2011/11/05 報告人:向峻霈 出處 : Ren-Chiun Wang Wen-Shenq Juang Chin-Laung Lei Computer."

Similar presentations


Ads by Google