Key Establishment Protocols: Maithili Narasimha
Key Establishment Protocols: Maithili Narasimha
Key Establishment Protocols: Maithili Narasimha
Maithili Narasimha
April 30, 2012
Contents
Classification and framework Key transport based on symmetric encryption Key agreement based on symmetric techniques Key transport based on public-key encryption Key agreement based on asymmetric techniques Secret sharing Conference keying Analysis of key establishment protocols
Key establishment: a shared secret becomes available to two or more parties, for subsequent cryptographic use.
trusted third party, trusted server, authentication server, key distribution center (KDC), key translation center (KTC) and certification authority (CA).
each party in a key establishment protocol be able to determine the true identity of the other(s) which could possibly gain access to the resulting key, implying preclusion of any unauthorized additional parties from deducing the same key secrecy of key and identification of those parties with access to it
Authentication
authentication entity authentication data origin authentication (implicit) key authentication key confirmation explicit key authentication depends on context of usage identity of a party, and aliveness at a given instant
one party is assured that no other party aside from a specifically identified second party may gain access to a particular secret key independent of the actual possession of such key by the second party, or knowledge of such actual possession by the first party
Key confirmation
one party is assured that a second (possibly unidentified) party actually has possession of a particular secret key
both (implicit) key authentication and key confirmation hold
Session key
Motivation
to limit available cipher-text to limit exposure in the event of (session) key compromise to avoid long-term storage of a large number of distinct secret
nature of the authentication reciprocity of authentication: unilateral vs. mutual key freshness key control: key distribution vs. key agreement efficiency
number of message exchanges bandwidth complexity of computations pre-computation? on-line (real-time), off-line, or no third party degree of trust required in a third party
Attacks
passive attack: adversary simply records data and analyzes active attack: adversary modifies or injects messages
deduce a session key using information gained by eavesdropping; participate covertly in protocol initiated by one party, and influence it by altering messages so as to be able to deduce the key initiate one or more protocol executions, and combine messages from one with another, so as to carry out one of the above attacks without being able to deduce the session key, deceive a legitimate party regarding the identity of the party with which it shares a key In entity authentication, adversarys objective is to arrange that one party receives messages which satisfy that party that the protocol has been run successfully with a party other than the adversary.
Compromise of long-term key does not compromise past session keys PFS ensures that previous traffic is locked securely in the past
known-key attack
compromise of past session keys allows either a passive adversary to compromise future session keys, or impersonation by an active adversary in the future
10
Contents
Classification and framework Key transport based on symmetric encryption Key agreement based on symmetric techniques Key transport based on public-key encryption Key agreement based on asymmetric techniques Secret sharing Conference keying Analysis of key establishment protocols
11
Long term symmetric key K shared between A and B A B: EK(rA) {rA is the session key} Implicit key authentication Additional fields timestamp, sequence number: freshness target identifier: prevent undetectable message replay Hence A B: EK(rA, tA, B) Mutual authentication: B A: EK(rB, tB, A): K = f(rA, rB)
B A: nB : for freshness A B: EK(rA, nA, nB, B) B A: EK(rB, nB, nA, A) Does not provide PFS
12
AKEP1
B A: (B, A, rA, rB, (r, W hK(r)), hK(B, A, rA, rB, (r, W hK(r)) Optimization: r = rB
13
Protocol
KA mod p (KA)B mod p (KAB) A mod p
-1
Properties
Provides key transport No a priori information is required Protection from passive adversaries Does not provide authentication
14
Kerberos
Basic setup
A, B, a trusted server share long-term pairwise secret keys a priori Server either plays the role of KDC and itself supplies the session key, or serves as a key translation center (KTC) A and B share no secret, while T shares a secret with each Goal: for B to verify As identity, establishment of a shared key A requests from T credentials to allow it to authenticate itself to B T plays the role of a KDC, returning to A a session key encrypted for A and a ticket encrypted for B The ticket contains the session key and As identity authentication of A to B when accompanied by appropriate message
created by A containing a timestamp encrypted under that session key
Description
15
Kerberos
Protocol
A T: A, B, NA NA: freshness T A: EKBT(k, A, L), EKAT(k, NA, L, B): L: lifetime A B: EKBT(k, A, L), Ek(A, TA, Asubkey) B A: Ek(TA, Bsubkey) Optional mutual authentication Since timestamps are used, the hosts on which this protocol runs must provide both secure and synchronized clocks If initial shared keys are password-derived, protocol is no more secure than secrecy of such password or their resistance to password-guessing attack Asubkey and Bsubkey allow transfer of a key from A to B Lifetime is intended to allow A to re-use the ticket A creates new authenticator with new timestamp and same session key k
Properties
16
Needham-Schroeder
Properties
The protocol provides A and B with a shared key k with key authentication (4) and (5) provide entity authentication of A to B. B to A can be obtained using redundancy check on NB upon decrypting message (4). If acceptable for A to re-use key k with B, A may securely cache (3) with k To prevent replay of (4), Ek(NA) should be appended to message (3), and (4)
should be replaced by Ek(NA1, NB) allowing A to verify Bs knowledge of k
17
Kerberos lifetime parameter is not present in N-S In N-S, (2) (which corresponds to Kerberos ticket) is doubleencrypted authentication here employs nonce rather than timestamp since B has no way of knowing if k is fresh, should k ever be compromised, any party knowing it may both resend message (3) and compute a correct message (5) to impersonate A to B
This situation is ameliorated in Kerberos by the lifetime parameter which limits exposure to a fixed time interval.
18
Otway-Rees protocol
Protocol
A B: M, A, B, EKAT(M, A, B, NA) M: Another nonce B T: M, A, B, EKAT(M, A, B, NA), EKBT(M, A, B, NB) T B: EKAT(k, NA), EKBT(k, NB) B A: EKAT(k, NA) Only 4 rounds Does not require timestamps Provides key authentication and key freshness but not entity authentication and key confirmation NA could be eliminated in (1), (2), and replaced by M in (3), (4) Could provide key confirmation and entity authentication (5 round) B A: EKAT(k, NA), Ek(NA, NB) A B: Ek(NB)
19
Properties
to recap
Server point-to-point key update Shamirs no-key protocol Kerberos Needham-Schroeder shared-key Otway-Rees none none KDC KDC KDC timestamp optional no yes no no messages 1-3 3 4 5 4
20
Contents
Classification and framework Key transport based on symmetric encryption Key agreement based on symmetric techniques Key transport based on public-key encryption Key agreement based on asymmetric techniques Secret sharing Conference keying Analysis of key establishment protocols
21
KDS is said to be j-secure if coalition of j or fewer users can do no better at computing the key shared by two than a party which guesses key without any pieces whatsoever Blom KDS bound: In any j-secure KDS(m-bit session key), secret data by each user must be at least m(j + 1) bits Bloms scheme
engineered to provide unconditional security against coalitions of a specified maximum size initial keying material assigned to each user allows computation of larger number of derived keys one per each other user derived keys of different user pairs are not statistically independent
22
Contents
Classification and framework Key transport based on symmetric encryption Key agreement based on symmetric techniques Key transport based on public-key encryption Key agreement based on asymmetric techniques Secret sharing Conference keying Analysis of key establishment protocols
23
Needham-Schroeder
PB(k1, A) PA(k1, k2) PB(k2)
Modified NS
PB(k1, A, r1)
24
A B: PB(k, tA, SA(B, k, tA)) Problem: Data for encryption is too large
A B: tA, PB(A, k), SA(B, tA, PB(A, k)) Can provide mutual authentication with two messages(timestamps) or three messages(challenge-response)
25
identity of A, and that the token received by B was constructed by A the token received by B was specifically intended for B; the token received by B has freshness the secrecy of the transferred key.
DA=(tA, rA, B, data1, PB(k1)), DB=(tB, rB, A, rA, data2, PA(k2)), A B: certA, DA, SA(DA) B A: certB, DB, SB(DB)
Since the protocol does not specify inclusion of an identifier within the scope of the encryption PB within DA, one cannot guarantee that the signing party actually knows (or was the source of) plaintext key
26
Comments
Beller-Yacobi (4 pass)
Properties mutual authentication, explicit key authentication for applications where there is an imbalance in processing power between the
two parties identity of the weaker party remains concealed from eavesdroppers
Algorithm B A : certB = (IB, nB, GB) : certificate generated with RSA A B : PB(K) =K3 mod nB B A : EK(m, {0}t) : symmetric key encryption A B : EK((v, w), certA) : DSA signature with precomputation Comment To achieve mutual authentication, each party carry out at least one private-key
operation, and one or two public-key operations careful selection of two separate public-key schemes RSA public operation and ElGamal private-key operation are cheap
27
Beller-Yacobi (2 pass)
Algorithm
Properties: slightly weaker authentication assurances B obtains entity authentication of A and obtains a key K that A alone knows,
while A has key authentication with respect to B For A to obtain explicit key authentication of B, a third message may be added whereby B exhibits knowledge through use of K on a challenge or standard message (e.g., {0}t )
A precompute x, v = gx mod nS verify certB via PT(GB) compute (v, w) =SA(m, IB) send PB(v), Ev(certA, w) certA = (IA, uA, GA)
B select random challenge m send m, certB certB = (IB, nB, GB) recover v, set K = v verify certA, signature (v, w)
28
no
no yes yes yes yes yes yes yes
no
mutual data origin only data origin only data origin only mutual mutual mutual unilateral
1
3 1 1 1 2 3 4 2
29
Contents
Classification and framework Key transport based on symmetric encryption Key agreement based on symmetric techniques Key transport based on public-key encryption Key agreement based on asymmetric techniques Secret sharing Conference keying Analysis of key establishment protocols
30
Diffie-Hellman
gy mod p
gyx mod p
fixed exponent: zero-pass key agreement with special certificates Signature is required!
b is Bs secret key A B : gx mod p Shared key gxb Unilateral key authentication no entity authentication or key confirmation
31
MTI/A0
Protocol
Properties
Message independent Secure against passive attacks only Provides mutual (implicit) key authentication but neither key confirmation nor entity authentication
32
STS
Algorithm
gx mod p
Properties
33
Algorithm
Summary: TTP creates an implicitly-certified, publicly-recoverable DH PK for A, and transfers to A the corresponding private key.
1. TTP selects p and g of Zp*, a random integer t, gcd(t, p 1) = 1 as its private key, and publishes its public key u = gt mod p 2. TTP assigns to each A DN IA and a random integer kA with gcd(kA, p1) = 1, then computes PA = gkA mod p
PA is As reconstruction public data, allowing other parties to compute PAa below.
4. T securely transmits to A the pair (r, s) = (PA, a) (ElGamal signature on IA) 5. Any other party can then reconstruct As public key PAa(=gkA a ) by computing PAa = gh(IA) uPA mod p
34
Algorithm
A B : IA, PA B A : IB, PB, (PA)y mod p A B : (PB)x mod p Shared key K = PAya PBxb
35
MTI/A0
Gunther STS
mutual-implicit
mutual-implicit mutual-implicit
none
none mutual
2
2 3
36
Contents
Classification and framework Key transport based on symmetric encryption Key agreement based on symmetric techniques Key transport based on public-key encryption Key agreement based on asymmetric techniques Secret sharing Conference keying Analysis of key establishment protocols
37
Secret Sharing
Motivation
To safeguard cryptographic keys from loss, desirable to create backups The greater the number of copies made, the greater the risk of security exposure; the smaller the number, the greater the risk that all are lost enhanced reliability without increased risk facilitate distributed trust or shared control for critical activities by gating the critical action on cooperation by t of n users. to start with a secret, and divide it into pieces called shares which are distributed amongst users such that the pooled shares of specific subsets of users allow reconstruction of the original secret may be viewed as a key pre-distribution technique, facilitating one-time key establishment, wherein the recovered key is pre-determined
Basic idea
38
Secret Sharing
Threshold schemes
A (t, n) threshold scheme (t n) is a method by which a trusted party computes secret shares Si, 1 i n from an initial secret S and
securely distributes Si to user Pi such that the following is true: any t or more users who pool their shares may easily recover S but any group knowing only t 1 or fewer shares may not
39
Secret Sharing
based on polynomial interpolation, and that a uni-variate polynomial y = f(x) of degree t 1 is uniquely defined by t points (xi, yi) Algorithm Setup: T begins with a secret integer S it wishes to distribute among n users.
T chooses a prime p, defines a0 = S, selects t1 random coefficients a1, , at1 defining the polynomial over Zp, f(x) = t1j=0 ajxj T computes Si = f(i) mod p for all i (1<=i<=n), and securely transfers the share Si to Pi
40
Secret Sharing
Properties
perfect: Given knowledge of any t 1 or fewer shares, the shared secret remain equally probable ideal: The size of one share is the size of the secret extendable for new users: New shares (for new users) may be computed and distributed without affecting shares of existing users. varying levels of control possible: Providing a single user with multiple shares bestows more control upon that individual no unproven assumptions
41
Contents
Classification and framework Key transport based on symmetric encryption Key agreement based on symmetric techniques Key transport based on public-key encryption Key agreement based on asymmetric techniques Secret sharing Conference keying Analysis of key establishment protocols
42
Conferencing Keying
A conference keying protocol is a generalization of two-party key establishment to provide three or more parties with a shared secret key Cliques, BD, TGDH, STR
43
Contents
Classification and framework Key transport based on symmetric encryption Key agreement based on symmetric techniques Key transport based on public-key encryption Key agreement based on asymmetric techniques Secret sharing Conference keying Analysis of key establishment protocols
44
Intruder-in-the-middle
Reflection attack
Attack
1. 2. 3. 4. 5. A E : rA E A : rA : Starting a new session A E : Ek(rA, rA) : Reply of (2) E A : Ek(rA, rA) : Reply of (1) A E : rA
45
Interleaving attacks
Flawed protocol
1. A B : rA 2. B A : rB, SB(rB, rA, A) 3. A B : rA, SA(rA, rB, B)
Attack
1. 2. 3. 4. 5. E B : rA B E : rB, SB(rB, rA, A) E A : rB A E : rA, SA(rA, rB, B) E B : rA, SA(rA, rB, B)
46
Analysis methods
convincing arguments that any successful attack requires resource level greater than the resources of the perceived adversary May uncover protocol flaws establishing that a protocol is bad Subtle flaws in protocols typically escape ad hoc analysis
proving that any successful protocol attack leads directly to the ability to solve a well-studied reference problem provably secure protocol A challenge is to establish that all possible attacks have been taken into account, and can be equated to solving the identified reference problems
47
Analysis methods
complexity-theoretic analysis
Model of computation is defined, and adversaries are modeled as having polynomial power. Security proof relative to the model is then constructed The existence of underlying cryptographic primitives with specified properties is typically assumed. An objective is to design cryptographic protocols which require the fewest cryptographic primitives, or the weakest assumptions. Polynomial attacks which are feasible under such a model may in practice be computationally infeasible Despite these issues, complexity-theoretic analysis is invaluable for formulating fundamental principles and confirming intuition.
48
Analysis methods
information-theoretic analysis
mathematical proofs involving entropy relationships to prove protocols are unconditionally secure Adversaries are modeled to have unbounded computing resources not applicable to most practical schemes for several reasons many schemes can at best be computationally secure typically involve keys of impractically large size, or can only be used once
formal methods
logics of authentication (BAN), term re-writing systems, expert systems, and other methods combining algebraic and state-transition techniques help in finding flaws and redundancies in protocols the proofs provided are proofs within the specified formal system, and cannot be interpreted as absolute proofs of security Absence of discovered flaws does not imply the absence of flaws
49
Thank You!
50