computer science csc 774 adv. net. securitydr. peng ning1 csc 774 advanced network security topic 4....

23
CSC 774 Adv. Net. S ecurity Dr. Peng Ning 1 Computer Science CSC 774 Advanced Network Security Topic 4. Broadcast Authentication

Upload: robyn-ross

Post on 23-Dec-2015

215 views

Category:

Documents


0 download

TRANSCRIPT

CSC 774 Adv. Net. Security Dr. Peng Ning 1

Computer Science

CSC 774 Advanced Network Security

Topic 4. Broadcast Authentication

CSC 774 Adv. Net. Security Dr. Peng Ning 2Computer Science

What Is Broadcast Authentication?

• One sender; multiple receivers– All receivers need to authenticate messages from

the sender.

CSC 774 Adv. Net. Security Dr. Peng Ning 3Computer Science

Challenges in Broadcast Authentication

• Can we use symmetric cryptography in the same way as in point-to-point authentication?

• How about public key cryptography?– Effectiveness?– Cost?

• Research in broadcast authentication– Reduce the number of public key cryptographic

operations

CSC 774 Adv. Net. Security Dr. Peng Ning 4

Computer Science

CSC 774 Advanced Network Security

Topic 4.1 TESLA and EMSS

CSC 774 Adv. Net. Security Dr. Peng Ning 5Computer Science

Outline

• Two Schemes– TESLA

• Sender Authentication• Strong loss robustness• High Scalability• Minimal overhead

– EMSS• Non-Repudiation• High loss robustness• Low overhead

CSC 774 Adv. Net. Security Dr. Peng Ning 6Computer Science

TESLA - Properties

• Low computational overhead

• Low per packet communication overhead

• Arbitrary packet loss tolerated

• Unidirectional data flow

• No sender side buffering

• High guarantee of authentication

• Freshness of data

CSC 774 Adv. Net. Security Dr. Peng Ning 7Computer Science

TESLA – Overview

• Timed Efficient Stream Loss–tolerant Authentication• Based on timed and delayed release of keys by the

sender• Sender commits to a random key K and transmits it to

the receivers without revealing it

• Sender attaches a MAC to the next packet Pi with K as the MAC key

• Sender releases the key in packet Pi+1 and receiver uses this key K to verify Pi

• Need a security assurance

CSC 774 Adv. Net. Security Dr. Peng Ning 8Computer Science

TESLA – Scheme I

• Each packet Pi+1 authenticates Pi

• Problems?– Security? Robustness?

Ki’=F’(Ki)

CSC 774 Adv. Net. Security Dr. Peng Ning 9Computer Science

TESLA – Scheme I (Cont’d )

• If attacker gets Pi+1 before receiver gets Pi, it can forge Pi

• Security Condition– ArrTi + t < Ti+1

– Sender’s clock is no more than t seconds ahead of that of the receivers

– One simple way: constant data rate

• Packet loss not tolerated

CSC 774 Adv. Net. Security Dr. Peng Ning 10Computer Science

TESLA – Scheme II

• Generate a sequence of keys { Ki } with one-way function F

• Fv(x) = Fv-1( F(x) )

• Ko = Fn (Kn)

• Ki = Fn-i(Kn)

• Attacker cannot invert F or compute any Kj given Ki,

where j>i

• Receiver can compute all Kj from Ki, where j < i

– Kj = Fi-j (Ki); K’i = F’ (Ki)

CSC 774 Adv. Net. Security Dr. Peng Ning 11Computer Science

TESLA – Scheme II (Cont’d)

CSC 774 Adv. Net. Security Dr. Peng Ning 12Computer Science

TESLA – Scheme III

• Remaining problems with Scheme II– Inefficient for fast packet rates

– Sender cannot send Pi+1 until all receivers receive Pi

• Scheme III– Does not require that sender wait for receiver to get

Pi before it sends Pi+1

– Basic idea: Disclose Ki in Pi+d instead of Pi+1

CSC 774 Adv. Net. Security Dr. Peng Ning 13Computer Science

TESLA – Scheme III (Cont’d)

• Disclosure delay d = (tMax + dNMax)r tMax: maximum clock discrepancy

– dNMax: maximum network delay

– r: packet rate

• Security Condition: – ArrTi + t < Ti+d

• Question:– Does choosing a large d affect the security?

CSC 774 Adv. Net. Security Dr. Peng Ning 14Computer Science

TESLA – Scheme IV

• Deals with dynamic transmission rates

• Divide time into intervals

• Use the same Ki to compute the MAC of all packets in the same interval i

• All packets in the same interval disclose the key Ki-d

• Achieve key disclosure based on intervals rather than on packet indexes

CSC 774 Adv. Net. Security Dr. Peng Ning 15Computer Science

TESLA – Scheme IV (Cont’d)

CSC 774 Adv. Net. Security Dr. Peng Ning 16Computer Science

TESLA – Scheme IV (Cont’d)

• Interval index: i = (t – To)/T

• Ki’ = F’(Ki) for each packet in interval i

• Pj = < Mj, i, Ki-d, MAC(Ki’, Mj) >

• Security condition:– i + d > i’

– i’ = (tj+ t-To)/T

• i’ is the farthest interval the sender can be in

CSC 774 Adv. Net. Security Dr. Peng Ning 17Computer Science

TESLA – Scheme V

• In Scheme IV:– A small d will force remote users to drop packets– A large d will cause unacceptable delay for fast

receivers

• Scheme V– Use multiple authentication chains with different

values of d

• Receiver verifies one security condition for each chain Ci, and drops the packet is none is satisfied

CSC 774 Adv. Net. Security Dr. Peng Ning 18Computer Science

TESLA--Immediate Authentication

• Mj+vd can be immediately authenticated once packet j is authenticated

• Not to be confused with packet j+vd being authenticated

CSC 774 Adv. Net. Security Dr. Peng Ning 19Computer Science

TESLA – Initial Time Synchronization

• RS: Nonce

• S R: {Sender Time tS, Nonce, …}Ks-1

R only cares the maximum time value at S.

Max clock discrepancy: T = tS-tR

CSC 774 Adv. Net. Security Dr. Peng Ning 20Computer Science

EMSS

• Efficient Multichained Streamed Signature

• Useful where– Non Repudiation required– Time synchronization may be a problem

• Based on signing a small number of special packets in the stream

• Each packet linked to a signed packet via multiple hash chains

CSC 774 Adv. Net. Security Dr. Peng Ning 21Computer Science

EMSS – Basic Signature Scheme

CSC 774 Adv. Net. Security Dr. Peng Ning 22Computer Science

EMSS – Basic Signature Scheme (Cont’d)

• Sender sends periodic signature packets

• Pi is verifiable if there exists a path from Pi to any signature packet Sj

CSC 774 Adv. Net. Security Dr. Peng Ning 23Computer Science

EMSS – Extended Scheme

• Basic scheme has too much redundancy

• Split hash into k chunks, where any k’ chunks are sufficient to allow the receivers to validate the information– Rabin’s Information Dispersal Algorithm– Some upper few bits of hash

• Requires any k’ out of k packets to arrive

• More robust