320 likes | 437 Views
An Introduction to Cryptography for Homeland Security. Jay Ligatti University of South Florida. Outline. Communication problems Cryptographic solutions Cryptography and homeland security Limitations of cryptography Research challenges. A Common Scenario.
E N D
An Introduction to Cryptography for Homeland Security Jay Ligatti University of South Florida
Outline • Communication problems • Cryptographic solutions • Cryptography and homeland security • Limitations of cryptography • Research challenges
A Common Scenario • Members of a team need to communicate Hello Bob
A Common Scenario • Messages need to be secure Hello Bob Hello Alice, operation X begins in 36 hours
A Common Scenario • However, communication needs to go through a medium accessible by an adversary (a non-privileged entity) • Easy to think of transmission medium as the Internet, but could be, e.g., • copper phone lines • radio waves • courier on the ground Hello Bob Hello Alice, operation X begins in 36 hours
Problems • Adversary may discover secrets by passivelymonitoring the communication • E.g., operation X begins in 36 hours • E.g., Alice and Bob are communicating, so some operation is likely to begin soon (this is called traffic analysis) • Adversary may prevent communication by destroyinginformation en route • E.g., convince Internet routers not to forward packets • E.g., destroy courier on the ground • Adversary may disrupt knowledge by activelytampering with or forging information en route • E.g., overwrite 36 with 72 to desynchronize Alice from Bob • E.g., send a message to Alice impersonating Bob: “Hello again Alice, cancel operation X”
Problems • These are difficult problems! • We don’t have perfect solutions to any of them! • We do have some very convincing solutions, especially for: • Preventing passive discovery of secrets • E.g., operation X begins in 36 hours • Detecting active tampering with/forging information • E.g., overwrite 36 with 72 to desynchronize Alice from Bob • E.g., send a message to Alice impersonating Bob: “Hello again Alice, cancel operation X”
Outline • Communication problems • Cryptographic solutions • Cryptography and homeland security • Limitations of cryptography • Research challenges
Cryptography • Cryptography is used to prevent passive discovery of, and to detect active tampering with, information en route • Definition: Cryptography is the study of hiding information • Cryptanalysis is the study of finding hidden information • Cryptology = cryptography + cryptanalysis • Basic cryptographic tool is a cipher • Cipher is an algorithm (think recipe) for hiding information in a new message M and retrieving hidden information from M • Here’s how it works...
key vD)w’45#... Ciphering Step 1: Key Establishment • Communicating parties need to share a secret key(think of it as a password with about 40 keyboard characters) • How do Alice and Bob obtain a shared, secret key? • No completely satisfactory answer! • Alice (or Bob) could create the key and then travel (or send a trusted courier) to Bob (or Alice) to share the key • More practically, but generally less securely, Alice and Bob could use a special key-exchange protocol (see Wikipedia entry on Diffie-Hellman) key vD)w’45#...
ciphertext >W<$%YoPjS s-5eoy5... Ciphering Step 2: Encryption • Cipher begins with plaintext (original message) and the key • Cipher shuffles around the encodings of the plaintext and key in very complicated ways to produce a ciphertext (message with hidden information) • This is called encrypting the plaintext plaintext Operation X begins in 36 hours cipher key vD)w’45#...
Ciphering Step 2: Encryption here is no “magic” in the encryption procedure • T • Mostly, complicated repetitions of substituting some characters for other characters in the plaintext and then rearranging (permuting) the characters • Both the substitutions and the rearrangements are guided by the secret key • For low-level details of one cipher, Google “DES” Fixed sequence of steps, precisely defined
ciphertext >W<$%YoPjS s-5eoy5... key key vD)w’45#... vD)w’45#... Ciphering Step 3: Message Transmission • One party sends ciphertext to another • Even if ciphertext is intercepted, it would take adversary a very long time to figure out the plaintext (as far as we know) • Best publicly known techniques for modern ciphers require trying every possible key until one “unlocks” the ciphertext • Typically, there are about as many possible keys as there are elementary particles in the observable universe... >W<$%YoPjS s-5eoy5... ?????
ciphertext >W<$%YoPjS s-5eoy5... plaintext Operation X begins in 36 hours Ciphering Step 4: Decryption • The key-holding receiver can re-shuffle around the encodings of the ciphertext and key to obtain the original plaintext • This is called decrypting the ciphertext • Low-level details very similar to encryption (substitutions and rearrangements of characters) • Efficient decryption because key is known cipher key vD)w’45#...
ciphertext Hello again Alice, cancel operation X plaintext {P#I% TO\s-... key vD)w’45#... Tampering/Forgery Detection • If adversary without the shared key attempts to tamper with or forge a ciphertext, she’ll almost certainly send a ciphertext that decrypts to nonsense cipher ????? This must not be from Bob!
Key Properties of Ciphers • Inverse relation between encryption and decryption D(E(p,k),k) = p • Confusion • Relationship between key and ciphertext should be very complex • Makes it difficult to obtain key from ciphertext • Diffusion • Even the most minor changes to the plaintext should cause changes throughout the entire ciphertext • Makes it difficult to infer any part of plaintext from ciphertext alone(even if adversary already knows how other plaintexts get encrypted) • For example...
Example of Diffusion in the Popular AES (Advanced Encryption Standard) Cipher • Every ciphertext character depends on every plaintext character • Diffusion prevents adversary from easily inferring parts of the plaintext from the ciphertext(because every plaintext change may alter the entire ciphertext) Key 0000000000000000000000000000000000000000000000000000000000000000 Plaintext 1 Ciphertext 1 00000000000000000000000000000000 dc95c078a2408989ad48a21492842087 AES cipher Plaintext 2 Ciphertext 2 00000000000000000000000000000001 530f8afbc74536b9a963b4f1c4cb738b
Outline • Communication problems • Cryptographic solutions • Cryptography and homeland security • Limitations of cryptography • Research challenges
The Dual Role of Defense • Members of defense and response teams may need to communicate securely in the presence of adversaries • E.g., groups may want to discuss targets of investigations without adversaries learning of (and tipping off) those targets • E.g., rescue teams controlling remote robots may not want adversaries tampering with the human-robot communications
The Dual Role of Defense • To monitor threats, defense teams will also generally want to take on adversarial roles in suspicious, potentially encrypted communications • Hot topic of debate: When, and to what extent, should this occur? • Cryptography can both help and hinder homeland security • Another big debate: Is cryptography a net benefit or net hindrance for homeland security (now and in the future)?
Outline • Communication problems • Cryptographic solutions • Cryptography and homeland security • Limitations of cryptography • Research challenges
Limitation 1 • Adversaries can circumvent cryptography by monitoring plaintext inputs and outputs of communication channels Intercept Alice’s and/or Bob’s plaintext plaintext plaintext decrypt encrypt ciphertext ciphertext
Limitation 1 • Example: Adversary installs a keystroke logger (keylogger) on Alice/Bob’s computer • Keyloggers capture and transmit all keyboard activity before what’s being typed gets encrypted • Adversary can install a keylogging program on Alice/Bob’s machine by: • CD/disk/download (with direct access to target machine) • Remotely connecting to and exploiting a flaw on target machine (to install keylogger without Alice/Bob’s knowledge) • Packaging keylogger program as something benign and convincing target to execute it • E.g., send keylogger as email attachment and entice target to open it
Limitation 1 • Alternatively, adversary can quietly install keylogging hardware on Alice/Bob’s machine • E.g., small device inserted between a computer’s keyboard port and the keyboard cable [photo source: www.alibaba.com]
Limitation 1 • Alternatively, adversary can acoustically record Alice/Bob’s typing! • Each keyboard key has slightly different acoustic signature • Adversary records typing and analyzes recording • Or adversary can videotape Alice/Bob’s screen ! • Or adversary can videotape and analyze the reflections of the screen images on Alice/Bob’s face! • Or adversary can analyze the radiation emanating from Alice/Bob’s monitor to determine what it is showing! • ... • Point: A powerful adversary has many avenues for monitoring communications of specific targets, even in the presence of strong cryptography
Limitation 2 • Installing and using cryptography software takes some effort and knowledge • Easier not to worry about it • Sensitive unencrypted data does get stolen • In May 2006, the Department of Veterans Affairs lost a laptop containing plaintext personal data on more than 26 million U.S. military members • Led to a major overhaul in VA security procedures, including encrypting data on laptops[http://www.usa.gov/veteransinfo.shtml]
Limitation 3 • Cryptography is a communications technology, with applications in computer security • Cryptography does not “solve” computer security • Most computer-security problems arise from unrelated issues • Programs are shipped with insecure default settings • Programs contain errors that attackers can exploit • Users execute malicious software because it seems benign
Outline • Communication problems • Cryptographic solutions • Cryptography and homeland security • Limitations of cryptography • Research challenges
Challenge 1 • Cryptography is a large research field • Just to mention a few topics of interest... • Formal analysis of cryptographic protocols • Adversaries can sometimes gain a surprising amount of information by monitoring and disrupting communications • Can we formally prove that an entire communication session will be secure? • Application: Voting protocols • Team members may vote on best of several alternatives • How to design system to guarantee accurate vote counting with privacy?
Challenges 2-4 • Tractability of cryptanalysis • Can we prove the difficulty of obtaining keys from ciphertexts? • What is the simplest cipher that makes cryptanalysis impractical? • Key exchange • Is there a secure way to exchange secret keys in the presence of powerful adversaries? What’s the best we can do? • Multiparty communications • In what ways do standard (two-party) cryptographic solutions apply to communications between more than two parties?
Summary • Cryptography’s goal: make it very difficult for adversaries to access and modify information en route • Exactly how difficult is an open question • In any case, powerful adversaries can sometimes use sophisticated surveillance and computer-attack techniques to circumvent cryptography
End Thanks / Questions? Acknowledgment: This educational work was supported by NSF CAREER award CNS-0742736. Any opinions expressed are those of the author and do not necessarily reflect the views of the NSF.