SlideShare una empresa de Scribd logo
1 de 33
Descargar para leer sin conexión
Challenges for information security theory

                      R. Ramanujam

      The Institute of Mathematical Sciences, Chennai, India

                       jam@imsc.res.in
Your email account




         ◮   Do you have an account on some public email facility ?
         ◮   How do you login to such an account ?
         ◮   You give user name and password. Why ?




ICAC’09 Cauvery College, Tiruchi – August 8, 2009
Sending secrets


         ◮   How does A send a secret x to B on a public channel ?
         ◮   A locks x in a box, sends the box across to B.
         ◮   Assume that locks are unbreakable, and that for every
             lock, there exists a unique key that opens it.
         ◮   The secret reaches B securely.
         ◮   But the key is with A; by assumption, B cannot open it.
         ◮   Should A send the key in another locked box !?




ICAC’09 Cauvery College, Tiruchi – August 8, 2009
One-way functions



         ◮   Given x, finding f (x) is easy to compute.
         ◮   Given y , finding f −1 (y ) is hard.
         ◮   Easy / hard in what sense ?
         ◮   The idea of trapdoor: helps to find the inverse.




ICAC’09 Cauvery College, Tiruchi – August 8, 2009
Secrets without cryptography


         ◮   Seven cards numbered 1 to 7 are distributed among three
             people, say A, B, C.
         ◮   A gets three cards, B gets three and C gets the last.
         ◮   They have to talk in public, tell the truth, exchange any
             messages.
         ◮   At the end, A should know all of B’s cards and vice versa,
             but for each of the six cards, C should be uncertain
             whether A has it or B.
         ◮   Is such a protocol possible at all ?




ICAC’09 Cauvery College, Tiruchi – August 8, 2009
Zero knowledge proofs



         ◮   Children A and B are looking at a ”Spot Arjun” puzzle.
         ◮   A has seen it, would like to convince that she has, but
             without revealing to B the location of Arjun.
         ◮   Is this possible ?
         ◮   These are called zero knowledge proofs.




ICAC’09 Cauvery College, Tiruchi – August 8, 2009
Key establishment


         ◮   A and B wish to generate a session key to be used
             subsequently. The need a protocol to establish a new key
             KAB .
         ◮   Assume that a reliable, trustworthy key server S exists.
         ◮   At the end of the protocol, KAB should be known to both
             A and B but to nobody else, except perhaps S.
         ◮   Both A and B should know that KAB is newly generated.




ICAC’09 Cauvery College, Tiruchi – August 8, 2009
First attempt


         ◮   Here is a protocol:
             1. A → S : A, B
             2. S → A : KAB
             3. A → B : KAB , A
         ◮   Remarks about notation:
                  ◮   No internal actions are specified.
                  ◮   Only the communications in successful runs are specified.
                  ◮   It is assumed that A and B understand that these are
                      protocol messages.




ICAC’09 Cauvery College, Tiruchi – August 8, 2009
Insecurity in it



         ◮   Confidentiality is compromised.
         ◮   Security Assumption: The adversary can eavesdrop on all
             messages sent on public channels.
         ◮   Pragmatic assumption: Assume that the server has an
             initial shared key with every principal in the system.




ICAC’09 Cauvery College, Tiruchi – August 8, 2009
Second attempt


         ◮   1. A → S : A, B
             2. S → A : {KAB }KAS , {KAB }KBS
             3. A → B : {KAB }KBS , A
         ◮   The notation {x}k denotes a message x encrypted with
             key k.
         ◮   It does not matter which encryption algorithm is used.
         ◮   We make the perfect encryption assumption.




ICAC’09 Cauvery College, Tiruchi – August 8, 2009
An attack

         ◮   Security Assumption: The adversary can also capture
             messages, alter them at will, reroute them (but cannot
             break encryption).
         ◮   Here is the attack:
             1. A → S : A, B
             2. S → A : {KAB }KAS , {KAB }KBS
             3. A → B(I ) : {KAB }KBS , A
             3’. (I )C → B : {KAB }KBS , C
         ◮   Now B believes that he is sharing a key with C, whereas
             he is actually sharing it with A.
         ◮   Some secrets meant only for A can be leaked to C.


ICAC’09 Cauvery College, Tiruchi – August 8, 2009
Another attack


         ◮   In the attack we saw, I does not get hold of KAB . Here is
             one where he does.
         ◮   1. A → S(I ) : A, B
             1’. I → S : A, I
             2. S → I : {KAI }KAS , {KAI }KIS
             2’. (I )S → A : {KAI }KAS , {KAI }KIS
             3. A → B(I ) : {KAI }KIS , A
         ◮   A believes that the protocol is completed with B, and
             hence I can masquerade as B.




ICAC’09 Cauvery College, Tiruchi – August 8, 2009
Insiders


         ◮   In the attack we saw, I could have been a legitimate user
             known to S.
         ◮   Security Assumption: The adversary may be a legitimate
             participant in the protocol (insider), or an external party,
             or a combination of both.
         ◮   In fact, security threats from insiders are more of a
             problem than from outsiders, in many systems.
         ◮   Typically referred to as the “person in the middle” attack.
         ◮   Solution ?




ICAC’09 Cauvery College, Tiruchi – August 8, 2009
Another attempt



         ◮   Bind keys to agent names.
         ◮   1. A → S : A, B
             2. S → A : {KAB , B}KAS , {KAB , A}KBS
             3. A → B : {KAB , A}KBS
         ◮   It can be checked that neither of the attacks considered
             earlier are possible any longer.




ICAC’09 Cauvery College, Tiruchi – August 8, 2009
Replay
         ◮   The generated key is supposed to be new !
         ◮   Security Assumption: The adversary may be able to
             obtain the value of the session key KAB used in any
                                                    ′

             sufficiently old earlier run of the protocol.
         ◮   A replay attack:
             1. A → S(I ) : A, B
             2. (I )S → A : {KAB , B}KAS , {KAB , A}KBS
                               ′              ′

             3. A → B : {KAB , A}KBS
                             ′

         ◮   Note that I need not actually have the value of KAB but
                                                               ′

             simply replay the earlier message, forcing A and B to
             accept an old, dated key.
         ◮   Now I can replay an earlier (legitimate) message, which
             can be, say: “Deposit Rs 1 lakh into I’s account” !

ICAC’09 Cauvery College, Tiruchi – August 8, 2009
Nonces


         ◮   How do we ensure that old keys are not replayed ?
         ◮   A generates a new random value NA called nonce.
         ◮   A starts the protocol by sending a nonce NA . If by the
             end of the protocol, the same value returns, she knows
             that the key has not been replayed.
         ◮   What about B ? He generates his own nonce as well.
         ◮   This is typically called a challenge - response technique.




ICAC’09 Cauvery College, Tiruchi – August 8, 2009
Needham - Schroeder


         ◮   We now have the following version of the protocol:
             1. A → S : A, B, NA
             2. S → A : {KAB , B, NA , {KAB , A}KBS }KAS
             3. A → B : {KAB , A}KBS
             4. B → A : {NB }KAB
             5. A → B : {NB + 1}KAB
         ◮   This is the famous Needham - Schroeder protocol, 1978.
         ◮   Denning and Sacco found an attack in 1986.




ICAC’09 Cauvery College, Tiruchi – August 8, 2009
The attack and its fix


         ◮   A replay attack:
             3’. (I )A → B : {KAB , A}KBS
                                ′

             4. B → A(I ) : {NB }KAB
                                   ′

             5. (I )A → B : {NB + 1}KAB′

         ◮   The fix is quite simple:
             1. B → A : B, NB
             2. A → S : A, B, NA , NB
             3. S → A : {KAB , B, NA }KAS , {KAB , A, NB }KBS
             4. A → B : {KAB , A, NB }KBS




ICAC’09 Cauvery College, Tiruchi – August 8, 2009
Are we done?



         ◮   Is this protocol secure ? Can we prove it secure ?
         ◮   Yes, but this takes a great deal of effort and machinery.
         ◮   Note that it still achieves less. At the end of the run,
             neither A nor B can actually deduce that the other has
             actually received KAB !




ICAC’09 Cauvery College, Tiruchi – August 8, 2009
Infrastructure


     The architecture of a security protocol crucially depends on:
         ◮   Existing cryptographic keys (shared, public)
         ◮   Key generation mechanisms
         ◮   Nonce generation mechanisms
         ◮   Number of users
         ◮   Number of multisessions concurrently active




ICAC’09 Cauvery College, Tiruchi – August 8, 2009
Security properties


         ◮   Confidentiality: Data is available only to those authorized
             to obtain it.
         ◮   Integrity: Data has not been altered by unauthorised
             entities.
         ◮   Authentication: Data has indeed originated from the
             purported sender.
         ◮   Non-repudiation: Entities cannot deny sending data they
             have committed to.
         ◮   Freshness: Nonces are unguessable, and never re-used.




ICAC’09 Cauvery College, Tiruchi – August 8, 2009
Attacks


         ◮   Eavesdropping
         ◮   Modification
         ◮   Replay
         ◮   Preplay
         ◮   Denial of service
         ◮   Type flaws
         ◮   Cryptanalysis




ICAC’09 Cauvery College, Tiruchi – August 8, 2009
Contract signing



         ◮   Two parties agree on the contract text
         ◮   Each will sign if the other will.
         ◮   Physical solution is easy: sit at a table.
         ◮   Over a network ?




ICAC’09 Cauvery College, Tiruchi – August 8, 2009
Why is this difficult ?



         ◮   Cannot trust communication channels. (Intruder may
             block or insert messages.)
         ◮   Cannot trust the other party in the protocol !
             Public key certificate does not certify honesty.
         ◮   Even if a trustworthy judge exists, she may become a
             communication bottleneck.




ICAC’09 Cauvery College, Tiruchi – August 8, 2009
Optimistic contract signing



         ◮   A    tells B: “I am going to sign the contract”
         ◮   B    tells A: “I am going to sign the contract”
         ◮   A    sends her signature to B
         ◮   B    sends his signature to A
     A judge may declare contract binding if given first two
     messages.




ICAC’09 Cauvery College, Tiruchi – August 8, 2009
Requirements

         ◮   Fairness: If A cannot obtain a contract, B should not be
             able to obtain a contract either, and vice versa.
             If A cannot get a deed for the house, B should not be
             able to collect A’s money.
         ◮   No advantage: No party may solely determine the
             outcome of the protocol.
             At no stage should A be able to decide by herself whether
             the house is sold or not.
         ◮   No provable advantage: No party may prove that it can
             solely determine the outcome of the protocol.
             B should not be able to show A’s offer to C and convince
             C to pay more.


ICAC’09 Cauvery College, Tiruchi – August 8, 2009
Negative result


         ◮   Dishonest party has advantage in any fixed-round
             optimistic fair exchange protocol.
                  ◮   Dishonest party always has a strategy to reach a state
                      where it can unilaterally force an outcome.
                  ◮   Similar to impossibility result for distributed consensus.
                  ◮   Cryptography cannot help.
         ◮   Need a trusted party for every transaction: bad news for
             e-commerce (or maybe good news !?).




ICAC’09 Cauvery College, Tiruchi – August 8, 2009
Electronic voting

         ◮   Secrecy: Every voter’s choice should be private, and
             others should not be able to figure out how she voted.
         ◮   Individual verifiability: Each voter should be able to check
             whether her vote has been counted properly.
         ◮   Universal verifiability: It should be possible to check
             whether every voter’s vote has been counted properly.
         ◮   Fairness: Voters do not have any knowledge of the
             distribution of votes until the tallies are finally announced.
         ◮   Receipt-freeness: No voter has any means of proving to
             another that he has voted in a particular manner.



ICAC’09 Cauvery College, Tiruchi – August 8, 2009
Receipt-freeness

         ◮   A problem characteristic of elections, and an important
             one.
         ◮   Lack of receipt-freeness (that is, the presence of a
             receipt) allows vote buying and coercion which has the
             potential to drastically affect the election process.
         ◮   When a receipt exists, it could be constructed in any
             manner that convinces the sceptical second party.
         ◮   Demonstrating that no such way exists is highly
             demanding, and is seen as a significant challenge to
             formal models.



ICAC’09 Cauvery College, Tiruchi – August 8, 2009
Protocol structure


         ◮   Three kinds of agents: voters are one kind.
         ◮   Administrators know the voters’ identity, but cannot see
             the votes, and their job is to check voters’ eligibility to
             vote.
         ◮   Talliers see the votes, but not the voters’ identities, and
             their job is to count votes for each candidate and
             announce the result.




ICAC’09 Cauvery College, Tiruchi – August 8, 2009
Homomorphic encryption



         ◮   Based on Adi Shamir’s secret sharing technique.
         ◮   Voters split their votes into several shares which they
             send to different administrators.
         ◮   Unless many administrators collude, it is difficult to
             reconstruct the vote.




ICAC’09 Cauvery College, Tiruchi – August 8, 2009
Blind signature

         ◮   Voter sends an encrypted vote {t}k to the administrator.
         ◮   The administrator A cannot decrypt the vote, but checks
             the voter’s eligibility, “blindly” signs the message and
             returns {tA }k to the voter.
         ◮   The voter, who generated k, can strip it off from {tA }k
             obtaining tA , which is the vote t duly attested by A.
         ◮   Now the voter sends tA anonymously to the tallier.
         ◮   The tallier verifies the attestation, and gets the vote t
             (while not knowing the origin).




ICAC’09 Cauvery College, Tiruchi – August 8, 2009
Summary


         ◮   Security protocols are difficult to design and analyse, bugs
             hard to attack.
         ◮   We need a development methodology which would always
             generate provably correct protocols.
         ◮   We need automaated tools for discovering attacks.
         ◮   Our main contribution: we identify subclasses of security
             protocols for which it is possible to automatically verify
             many security properties.




ICAC’09 Cauvery College, Tiruchi – August 8, 2009

Más contenido relacionado

Último

Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherRemote DBA Services
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfhans926745
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024The Digital Insurer
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProduct Anonymous
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdflior mazor
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 

Último (20)

Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdf
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 

Destacado

2024 State of Marketing Report – by Hubspot
2024 State of Marketing Report – by Hubspot2024 State of Marketing Report – by Hubspot
2024 State of Marketing Report – by HubspotMarius Sescu
 
Everything You Need To Know About ChatGPT
Everything You Need To Know About ChatGPTEverything You Need To Know About ChatGPT
Everything You Need To Know About ChatGPTExpeed Software
 
Product Design Trends in 2024 | Teenage Engineerings
Product Design Trends in 2024 | Teenage EngineeringsProduct Design Trends in 2024 | Teenage Engineerings
Product Design Trends in 2024 | Teenage EngineeringsPixeldarts
 
How Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental HealthHow Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental HealthThinkNow
 
AI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdfAI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdfmarketingartwork
 
PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024Neil Kimberley
 
Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)contently
 
How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024Albert Qian
 
Social Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsSocial Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsKurio // The Social Media Age(ncy)
 
Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Search Engine Journal
 
5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summarySpeakerHub
 
ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd Clark Boyd
 
Getting into the tech field. what next
Getting into the tech field. what next Getting into the tech field. what next
Getting into the tech field. what next Tessa Mero
 
Google's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentGoogle's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentLily Ray
 
Time Management & Productivity - Best Practices
Time Management & Productivity -  Best PracticesTime Management & Productivity -  Best Practices
Time Management & Productivity - Best PracticesVit Horky
 
The six step guide to practical project management
The six step guide to practical project managementThe six step guide to practical project management
The six step guide to practical project managementMindGenius
 
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...RachelPearson36
 

Destacado (20)

2024 State of Marketing Report – by Hubspot
2024 State of Marketing Report – by Hubspot2024 State of Marketing Report – by Hubspot
2024 State of Marketing Report – by Hubspot
 
Everything You Need To Know About ChatGPT
Everything You Need To Know About ChatGPTEverything You Need To Know About ChatGPT
Everything You Need To Know About ChatGPT
 
Product Design Trends in 2024 | Teenage Engineerings
Product Design Trends in 2024 | Teenage EngineeringsProduct Design Trends in 2024 | Teenage Engineerings
Product Design Trends in 2024 | Teenage Engineerings
 
How Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental HealthHow Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental Health
 
AI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdfAI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdf
 
Skeleton Culture Code
Skeleton Culture CodeSkeleton Culture Code
Skeleton Culture Code
 
PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024
 
Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)
 
How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024
 
Social Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsSocial Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie Insights
 
Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024
 
5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary
 
ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd
 
Getting into the tech field. what next
Getting into the tech field. what next Getting into the tech field. what next
Getting into the tech field. what next
 
Google's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentGoogle's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search Intent
 
How to have difficult conversations
How to have difficult conversations How to have difficult conversations
How to have difficult conversations
 
Introduction to Data Science
Introduction to Data ScienceIntroduction to Data Science
Introduction to Data Science
 
Time Management & Productivity - Best Practices
Time Management & Productivity -  Best PracticesTime Management & Productivity -  Best Practices
Time Management & Productivity - Best Practices
 
The six step guide to practical project management
The six step guide to practical project managementThe six step guide to practical project management
The six step guide to practical project management
 
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
 

Challenges for Information Security Theory

  • 1. Challenges for information security theory R. Ramanujam The Institute of Mathematical Sciences, Chennai, India jam@imsc.res.in
  • 2. Your email account ◮ Do you have an account on some public email facility ? ◮ How do you login to such an account ? ◮ You give user name and password. Why ? ICAC’09 Cauvery College, Tiruchi – August 8, 2009
  • 3. Sending secrets ◮ How does A send a secret x to B on a public channel ? ◮ A locks x in a box, sends the box across to B. ◮ Assume that locks are unbreakable, and that for every lock, there exists a unique key that opens it. ◮ The secret reaches B securely. ◮ But the key is with A; by assumption, B cannot open it. ◮ Should A send the key in another locked box !? ICAC’09 Cauvery College, Tiruchi – August 8, 2009
  • 4. One-way functions ◮ Given x, finding f (x) is easy to compute. ◮ Given y , finding f −1 (y ) is hard. ◮ Easy / hard in what sense ? ◮ The idea of trapdoor: helps to find the inverse. ICAC’09 Cauvery College, Tiruchi – August 8, 2009
  • 5. Secrets without cryptography ◮ Seven cards numbered 1 to 7 are distributed among three people, say A, B, C. ◮ A gets three cards, B gets three and C gets the last. ◮ They have to talk in public, tell the truth, exchange any messages. ◮ At the end, A should know all of B’s cards and vice versa, but for each of the six cards, C should be uncertain whether A has it or B. ◮ Is such a protocol possible at all ? ICAC’09 Cauvery College, Tiruchi – August 8, 2009
  • 6. Zero knowledge proofs ◮ Children A and B are looking at a ”Spot Arjun” puzzle. ◮ A has seen it, would like to convince that she has, but without revealing to B the location of Arjun. ◮ Is this possible ? ◮ These are called zero knowledge proofs. ICAC’09 Cauvery College, Tiruchi – August 8, 2009
  • 7. Key establishment ◮ A and B wish to generate a session key to be used subsequently. The need a protocol to establish a new key KAB . ◮ Assume that a reliable, trustworthy key server S exists. ◮ At the end of the protocol, KAB should be known to both A and B but to nobody else, except perhaps S. ◮ Both A and B should know that KAB is newly generated. ICAC’09 Cauvery College, Tiruchi – August 8, 2009
  • 8. First attempt ◮ Here is a protocol: 1. A → S : A, B 2. S → A : KAB 3. A → B : KAB , A ◮ Remarks about notation: ◮ No internal actions are specified. ◮ Only the communications in successful runs are specified. ◮ It is assumed that A and B understand that these are protocol messages. ICAC’09 Cauvery College, Tiruchi – August 8, 2009
  • 9. Insecurity in it ◮ Confidentiality is compromised. ◮ Security Assumption: The adversary can eavesdrop on all messages sent on public channels. ◮ Pragmatic assumption: Assume that the server has an initial shared key with every principal in the system. ICAC’09 Cauvery College, Tiruchi – August 8, 2009
  • 10. Second attempt ◮ 1. A → S : A, B 2. S → A : {KAB }KAS , {KAB }KBS 3. A → B : {KAB }KBS , A ◮ The notation {x}k denotes a message x encrypted with key k. ◮ It does not matter which encryption algorithm is used. ◮ We make the perfect encryption assumption. ICAC’09 Cauvery College, Tiruchi – August 8, 2009
  • 11. An attack ◮ Security Assumption: The adversary can also capture messages, alter them at will, reroute them (but cannot break encryption). ◮ Here is the attack: 1. A → S : A, B 2. S → A : {KAB }KAS , {KAB }KBS 3. A → B(I ) : {KAB }KBS , A 3’. (I )C → B : {KAB }KBS , C ◮ Now B believes that he is sharing a key with C, whereas he is actually sharing it with A. ◮ Some secrets meant only for A can be leaked to C. ICAC’09 Cauvery College, Tiruchi – August 8, 2009
  • 12. Another attack ◮ In the attack we saw, I does not get hold of KAB . Here is one where he does. ◮ 1. A → S(I ) : A, B 1’. I → S : A, I 2. S → I : {KAI }KAS , {KAI }KIS 2’. (I )S → A : {KAI }KAS , {KAI }KIS 3. A → B(I ) : {KAI }KIS , A ◮ A believes that the protocol is completed with B, and hence I can masquerade as B. ICAC’09 Cauvery College, Tiruchi – August 8, 2009
  • 13. Insiders ◮ In the attack we saw, I could have been a legitimate user known to S. ◮ Security Assumption: The adversary may be a legitimate participant in the protocol (insider), or an external party, or a combination of both. ◮ In fact, security threats from insiders are more of a problem than from outsiders, in many systems. ◮ Typically referred to as the “person in the middle” attack. ◮ Solution ? ICAC’09 Cauvery College, Tiruchi – August 8, 2009
  • 14. Another attempt ◮ Bind keys to agent names. ◮ 1. A → S : A, B 2. S → A : {KAB , B}KAS , {KAB , A}KBS 3. A → B : {KAB , A}KBS ◮ It can be checked that neither of the attacks considered earlier are possible any longer. ICAC’09 Cauvery College, Tiruchi – August 8, 2009
  • 15. Replay ◮ The generated key is supposed to be new ! ◮ Security Assumption: The adversary may be able to obtain the value of the session key KAB used in any ′ sufficiently old earlier run of the protocol. ◮ A replay attack: 1. A → S(I ) : A, B 2. (I )S → A : {KAB , B}KAS , {KAB , A}KBS ′ ′ 3. A → B : {KAB , A}KBS ′ ◮ Note that I need not actually have the value of KAB but ′ simply replay the earlier message, forcing A and B to accept an old, dated key. ◮ Now I can replay an earlier (legitimate) message, which can be, say: “Deposit Rs 1 lakh into I’s account” ! ICAC’09 Cauvery College, Tiruchi – August 8, 2009
  • 16. Nonces ◮ How do we ensure that old keys are not replayed ? ◮ A generates a new random value NA called nonce. ◮ A starts the protocol by sending a nonce NA . If by the end of the protocol, the same value returns, she knows that the key has not been replayed. ◮ What about B ? He generates his own nonce as well. ◮ This is typically called a challenge - response technique. ICAC’09 Cauvery College, Tiruchi – August 8, 2009
  • 17. Needham - Schroeder ◮ We now have the following version of the protocol: 1. A → S : A, B, NA 2. S → A : {KAB , B, NA , {KAB , A}KBS }KAS 3. A → B : {KAB , A}KBS 4. B → A : {NB }KAB 5. A → B : {NB + 1}KAB ◮ This is the famous Needham - Schroeder protocol, 1978. ◮ Denning and Sacco found an attack in 1986. ICAC’09 Cauvery College, Tiruchi – August 8, 2009
  • 18. The attack and its fix ◮ A replay attack: 3’. (I )A → B : {KAB , A}KBS ′ 4. B → A(I ) : {NB }KAB ′ 5. (I )A → B : {NB + 1}KAB′ ◮ The fix is quite simple: 1. B → A : B, NB 2. A → S : A, B, NA , NB 3. S → A : {KAB , B, NA }KAS , {KAB , A, NB }KBS 4. A → B : {KAB , A, NB }KBS ICAC’09 Cauvery College, Tiruchi – August 8, 2009
  • 19. Are we done? ◮ Is this protocol secure ? Can we prove it secure ? ◮ Yes, but this takes a great deal of effort and machinery. ◮ Note that it still achieves less. At the end of the run, neither A nor B can actually deduce that the other has actually received KAB ! ICAC’09 Cauvery College, Tiruchi – August 8, 2009
  • 20. Infrastructure The architecture of a security protocol crucially depends on: ◮ Existing cryptographic keys (shared, public) ◮ Key generation mechanisms ◮ Nonce generation mechanisms ◮ Number of users ◮ Number of multisessions concurrently active ICAC’09 Cauvery College, Tiruchi – August 8, 2009
  • 21. Security properties ◮ Confidentiality: Data is available only to those authorized to obtain it. ◮ Integrity: Data has not been altered by unauthorised entities. ◮ Authentication: Data has indeed originated from the purported sender. ◮ Non-repudiation: Entities cannot deny sending data they have committed to. ◮ Freshness: Nonces are unguessable, and never re-used. ICAC’09 Cauvery College, Tiruchi – August 8, 2009
  • 22. Attacks ◮ Eavesdropping ◮ Modification ◮ Replay ◮ Preplay ◮ Denial of service ◮ Type flaws ◮ Cryptanalysis ICAC’09 Cauvery College, Tiruchi – August 8, 2009
  • 23. Contract signing ◮ Two parties agree on the contract text ◮ Each will sign if the other will. ◮ Physical solution is easy: sit at a table. ◮ Over a network ? ICAC’09 Cauvery College, Tiruchi – August 8, 2009
  • 24. Why is this difficult ? ◮ Cannot trust communication channels. (Intruder may block or insert messages.) ◮ Cannot trust the other party in the protocol ! Public key certificate does not certify honesty. ◮ Even if a trustworthy judge exists, she may become a communication bottleneck. ICAC’09 Cauvery College, Tiruchi – August 8, 2009
  • 25. Optimistic contract signing ◮ A tells B: “I am going to sign the contract” ◮ B tells A: “I am going to sign the contract” ◮ A sends her signature to B ◮ B sends his signature to A A judge may declare contract binding if given first two messages. ICAC’09 Cauvery College, Tiruchi – August 8, 2009
  • 26. Requirements ◮ Fairness: If A cannot obtain a contract, B should not be able to obtain a contract either, and vice versa. If A cannot get a deed for the house, B should not be able to collect A’s money. ◮ No advantage: No party may solely determine the outcome of the protocol. At no stage should A be able to decide by herself whether the house is sold or not. ◮ No provable advantage: No party may prove that it can solely determine the outcome of the protocol. B should not be able to show A’s offer to C and convince C to pay more. ICAC’09 Cauvery College, Tiruchi – August 8, 2009
  • 27. Negative result ◮ Dishonest party has advantage in any fixed-round optimistic fair exchange protocol. ◮ Dishonest party always has a strategy to reach a state where it can unilaterally force an outcome. ◮ Similar to impossibility result for distributed consensus. ◮ Cryptography cannot help. ◮ Need a trusted party for every transaction: bad news for e-commerce (or maybe good news !?). ICAC’09 Cauvery College, Tiruchi – August 8, 2009
  • 28. Electronic voting ◮ Secrecy: Every voter’s choice should be private, and others should not be able to figure out how she voted. ◮ Individual verifiability: Each voter should be able to check whether her vote has been counted properly. ◮ Universal verifiability: It should be possible to check whether every voter’s vote has been counted properly. ◮ Fairness: Voters do not have any knowledge of the distribution of votes until the tallies are finally announced. ◮ Receipt-freeness: No voter has any means of proving to another that he has voted in a particular manner. ICAC’09 Cauvery College, Tiruchi – August 8, 2009
  • 29. Receipt-freeness ◮ A problem characteristic of elections, and an important one. ◮ Lack of receipt-freeness (that is, the presence of a receipt) allows vote buying and coercion which has the potential to drastically affect the election process. ◮ When a receipt exists, it could be constructed in any manner that convinces the sceptical second party. ◮ Demonstrating that no such way exists is highly demanding, and is seen as a significant challenge to formal models. ICAC’09 Cauvery College, Tiruchi – August 8, 2009
  • 30. Protocol structure ◮ Three kinds of agents: voters are one kind. ◮ Administrators know the voters’ identity, but cannot see the votes, and their job is to check voters’ eligibility to vote. ◮ Talliers see the votes, but not the voters’ identities, and their job is to count votes for each candidate and announce the result. ICAC’09 Cauvery College, Tiruchi – August 8, 2009
  • 31. Homomorphic encryption ◮ Based on Adi Shamir’s secret sharing technique. ◮ Voters split their votes into several shares which they send to different administrators. ◮ Unless many administrators collude, it is difficult to reconstruct the vote. ICAC’09 Cauvery College, Tiruchi – August 8, 2009
  • 32. Blind signature ◮ Voter sends an encrypted vote {t}k to the administrator. ◮ The administrator A cannot decrypt the vote, but checks the voter’s eligibility, “blindly” signs the message and returns {tA }k to the voter. ◮ The voter, who generated k, can strip it off from {tA }k obtaining tA , which is the vote t duly attested by A. ◮ Now the voter sends tA anonymously to the tallier. ◮ The tallier verifies the attestation, and gets the vote t (while not knowing the origin). ICAC’09 Cauvery College, Tiruchi – August 8, 2009
  • 33. Summary ◮ Security protocols are difficult to design and analyse, bugs hard to attack. ◮ We need a development methodology which would always generate provably correct protocols. ◮ We need automaated tools for discovering attacks. ◮ Our main contribution: we identify subclasses of security protocols for which it is possible to automatically verify many security properties. ICAC’09 Cauvery College, Tiruchi – August 8, 2009