210 likes | 344 Views
Key-Exchange Protocol Using Pre-Agreed Session-ID. Kenji Imamoto Kyushu University, JAPAN. Abstract. Any message through Internet or radio communication can be easily eavesdropped on Privacy should be considered (especially, this paper considers identity concealment)
E N D
Key-Exchange Protocol Using Pre-Agreed Session-ID Kenji Imamoto Kyushu University, JAPAN
Abstract • Any message through Internet or radio communication can be easily eavesdropped on • Privacy should be considered (especially, this paper considers identity concealment) • Introduce Pre-Agreed Session ID (PAS) • Identification which is a disposable unique value used for every session to specify each session and party • Formalize security model for key-exchange protocol • Propose a secure key-exchange protocol using PAS • Argue about the problems which arise when PAS is used
Contents • Introduction • Security Model • PAS Protocol • Proof of PAS Protocol • Variants and Discussions • Conclusion
Introduction • Main focus of our study is … • Key-Exchange Protocol using Pre-shared Key Long-term shared secret Long-term shared secret Short-term secret Protocol Most existing schemes can not prevent • Leakage of Users’ Identities
Threat: Leakage of user’s identity Bob Responder Bob EKB(M) Public Network KB: secret key M: message KB: secret key • We need another identifiable information • Legitimate user can specify his partner • No attacker can specify who is communicating Bob Responder EKB(Bob,M) ? Public Network KB: secret key M: message KB: secret key
Our Solution • Session ID [CK01, CK02] • Purpose: uniquely name sessions • Assumption: unique among all the session ID • Pre-Agreed Session ID (PAS) • Unique session ID agreed between each peer before activation of the session • Uniquely name a session and parties who participate in the session [CK01] R. Canetti and H. Krawczyk, “Analysis of Key-Exchange Protocols and Their Use for Building Secure Channels”, EUROCRYPT’2001. [CK02] R. Canetti and H. Krawczyk, “Security Analysis of IKE’s Signature-Based Key-Exchange Protocol”, CRYPTO’2002.
Security Model • Existing Model [CK01] (SK-Security) • Consider the security of session key • Our Model (SK-ID-Security) • Consider the security of not only session key but also users’ identities Extend
Communication Channel • The channel is Broadcast-type • All messages can be sent to a pool of messages • There is no assumption on the logical connection between the address where a message is delivered and the identity behind that address. • Attacker is a (probabilistic) polynomial-time machine with full control of the communication lines between parties • Free to intercept, delay, drop, inject, or change all messages sent over these lines
Attacker’s Access to Secret Information (session expose) • Session state reveal • Session state for an incomplete session (which does not include long-term secret) • Session-key query • Session-key of a completed session • Party corruption • All information in the memory of the party (including session states, session-key, long-term secrets) • Identity reveal • Parties’ identities that activate a session
Basic Idea of SK-ID-Security (1) • Indistinguishability style [CK01] • The success of an attack is measured via its ability to distinguish the real values from independent random values • Freely choose a complete session as test session • Coin toss • Guess the result of coin toss • Query • Response • (real or random) • If head, response is real • If tail, response is random Attacker Oracle
Basic Idea of SK-ID-Security (2) • The attacker succeeds in its attack if • The test session is not exposed • The probability of his correct guess of coin toss is significantly larger than 1/2 • Two games against Test session: • Distinction of session-key (real session key or random value) [CK01] • Distinction of pairs (real party or randomly chosen party) Definition (SK-ID-security) A key-exchange protocol is called SK-ID-secure if for all attackers with the explained capabilities, success probability (in its test-session distinguishing attacks) is not more than 1/2 plus a negligible fraction
Game: Distinction of pairs • Freely choose a complete session as test session • Coin toss • Guess the result of coin toss • Query • Response • (real or random) • If head, response is real • If tail, response is random Attacker Oracle A-C A-D A-E B-C B-D B-E • A, B, C, D, E • A shares PSK with B • C shares PSK with D and E A-B C-E C-D D-E Random Real Random choice from all possible pairs that do not include either of the real parties’ ID
k0=PRFgxy(0) % Session key k1=PRFgxy(1) % k2=PRFPSKij(2) PAS Protocol MAC: Message Authentication Code PRF: Pseudo Random Function • Start message • Response message • Finish message
Proof of PAS Protocol • Main Theorem • Assuming DDH and the security of the underlying cryptographic functions (i.e., MAC and PRF), PAS protocol is SK-ID-secure • Strategy for Proof of Main Theorem • Show that a DDH distinguisher can be built from an attacker that succeeds in distinguishing between a real and a random response to the test-session query
Variants and Discussions (DoS-resilient) User Requests Responder Responder cannot respond. (Even for legitimate users !) Adversary Point Responder needs to distinguish legitimate requests from waste one at low costs
Protection from DoS attack Adversary Responder Requests PASBR, Request • Request needs a valid PAS • Attacker can guess no valid PAS • Protection from DoS attack The cost of checking validity of received PAS is equal to only searching in responder’s PAS list. Bob
Conclusion • Introduce Pre-Agreed Session ID (PAS) • Identification which is a disposable unique value used for every session to specify each session and party • Formalize security model for key-exchange protocol • Propose a secure key-exchange protocol using PAS • Argue about the problems which arise when PAS is used • Synchronization of PAS, DoS attack, PFS
Security problems on RFID tags(short introduction) Sakurai Lab., Kyushu Univ. Junichiro SAITO saito@itslab.csce.kyushu-u.ac.jp
What is a Radio Frequency Identification(RFID) tag? • A small and inexpensive microchip that emits an ID in response to query from a reader • Used as a substitute for a bar code • management of goods and its circulation, theft detection • Little computational power • Easily readable by a reader • Be monitored communication between a RFID tag and a reader →Infringement of privacy
Privacy problems • ID leakage • An adversary can eavesdrop ID information • She can read by using a reader • leakage of information about belongings • ID tracing • If ID information on an RFID tag is fixed, an adversary can trace tag owner's activity • Infringement on location privacy price of the suit ○○ yen in wallet shoe size
Our research themes • Location privacy • We can use re-encryption scheme to change ID information • Yoking proof and grouping proof • We showed a replay attack against Juels's yoking proof • Owner changing • After changing owner, new owner doesn't want that old owner can read the RFID tag We proposed Re-encryption scheme with a check We proposed secure yoking proof by using a time stamp We proposed a key change scheme for changing owner