development of anonymous networks based on cryptography

41
Development of Anonymous Networks Based on Symmetric Key Encryptions Presented By : MD. Hasibur Rashid // MSc. In CSE, KUET, Bangladesh Roll: 1407553

Upload: md-hasibur-rashid

Post on 16-Aug-2015

88 views

Category:

Technology


0 download

TRANSCRIPT

Page 1: Development of anonymous networks based on cryptography

Development of Anonymous Networks Based on

Symmetric Key Encryptions

Presented By : MD. Hasibur Rashid // MSc. In CSE, KUET, Bangladesh Roll: 1407553

Page 2: Development of anonymous networks based on cryptography

Introduction • Anonymous networks enable entities to send

messages without disclosing their identities. Many anonymous networks had been proposed already, such as Mixnet, DC-net, Crowds, etc., however, they still have serious drawbacks. Namely, they require tremendous computation overheads to transmit messages over networks. That is because asymmetric key encryption algorithms are used.

Page 3: Development of anonymous networks based on cryptography

Why need anonymous communication?• For example, a company may acquire highly

confidential information about its rival companies from identities of theircustomers and suppliers. Therefore, the importance of anonymous communication is increasing as more people are being involved in network based communication.

• Anonymous networks are ones that enable message senders to send their messages without disclosing their identities, and various anonymous networks had been proposed already, Mix net, DC-net , Crowds, etc., to protect secrets of entities that communicate through networks.

Page 4: Development of anonymous networks based on cryptography

Why Do We Want Anonymity?

• To protect privacy• Avoid tracking by advertising companies• Viewing sensitive content• Information on medical conditions• Advice on bankruptcy

• Protection from prosecution• Not every country guarantees free speech• Downloading copyrighted material

• To prevent chilling-effects• It’s easier to voice unpopular or controversial opinions if you

are anonymous

Page 5: Development of anonymous networks based on cryptography

Who Uses Anonymity Systems?• “If you’re not doing anything wrong, you shouldn’t

have anything to hide.”• Implies that anonymous communication is for criminals

• The truth: who uses ?• Journalists• Law enforcement• Human rights activists• Normal people

Business executives Military/intelligence

personnel Abuse victims

Page 6: Development of anonymous networks based on cryptography

REQUIREMENTS FOR ANONYMOUS NETWORKS1. no one except senders of messages can know

identities of the senders2. message senders can confirm their message

arrivals at their receivers without disclosing their identities

3. receivers can send reply messages back to the senders without knowing the senders’ identities

4. anonymous networks must be able to protect themselves from accesses from unauthorized entities

5. anonymous networks must maintain their performances as same as usual ones.

Page 7: Development of anonymous networks based on cryptography

7

Crypto Algorithms

• Symmetric algorithms• Conventional algorithms• Encryption and decryption keys are the same• Examples: DES, 3DES, AES, Blowfish

• Asymmetric algorithms• Commonly known as Public Key algorithms• Encryption key and decryption key are different• Examples: Diffie-Hellman, RSA, Elliptic curve

Page 8: Development of anonymous networks based on cryptography

8

Symmetric Key Crypto• Let’s say we have a plaintext message M• … a symmetric encryption algorithm E• … and a key K

M E(K, M) = C E(K, C) = M

• Advantages:• Fast and easy to use

• Disadvantages• How to securely communicate the key?

Cyphertext C

Symmetric encryption is

reversible

Page 9: Development of anonymous networks based on cryptography

Mix Networks• A different approach to anonymity than Crowds• Originally designed for anonymous email• David Chaum, 1981• Concept has since been generalized for TCP traffic

• Hugely influential ideas• Onion routing• Traffic mixing• Dummy traffic (a.k.a. cover traffic)Drawbacks• RSA or ElGamal, and does not work efficiently in large scale

systems where number of senders send large volume of messages. • A lot of computation overheads are needed to encrypt and

decrypt messages.

Page 10: Development of anonymous networks based on cryptography

10

Mix Proxies and Onion Routing

• Mixes form a cascade of anonymous proxies• All traffic is protected with layers of encryption

Mix

<KP, KS>

<KP, KS>

<KP, KS>

<KP, KS>

<KP, KS>

<KP, KS>

<KP, KS>

<KP, KS>

[KP , KP , KP]

Encrypted Tunnels

Non-encrypted

data

E(KP , E(KP , E(KP , M))) = C

Page 11: Development of anonymous networks based on cryptography

11

Another View of Encrypted Paths

<KP, KS>

<KP, KS>

<KP, KS>

Page 12: Development of anonymous networks based on cryptography

12

Crowds

• Links between users use public key crypto

• Users may appear on the path multiple times Final Destination

Page 13: Development of anonymous networks based on cryptography

Anonymity in Crowds

• No source anonymity• Target receives m incoming messages (m may = 0)• Target sends m + 1 outgoing messages• Thus, the target is sending something

• Destination anonymity is maintained• If the source isn’t sending directly to the receiver

Page 14: Development of anonymous networks based on cryptography

Anonymity in Crowds

• Source and destination are anonymous• Source and destination are jondo proxies• Destination is hidden by encryption

Page 15: Development of anonymous networks based on cryptography

15

Summary of Crowds• The good:• Crowds has excellent scalability• Each user helps forward messages and handle load• More users = better anonymity for everyone

• Strong source anonymity guarantees

• The bad:• Very weak destination anonymity• Evil jondos can always see the destination

• Weak unlink ability guarantees

Page 16: Development of anonymous networks based on cryptography

Tor: Onion Router• Basic design: a mix network with improvements• Perfect forward secrecy• Introduces guards to improve source anonymity• Takes bandwidth into account when selecting relays:

Mixes in Tor are called relays• Introduces hidden services: Servers that are only

accessible via the Tor overlay

Page 17: Development of anonymous networks based on cryptography

17

Deployment and Statistics• Largest, most well deployed anonymity preserving

service on the Internet• Publicly available since 2002• Continues to be developed and improved

• Currently, ~5000 Tor relays around the world• All relays are run by volunteers• It is suspected that some are controlled by intelligence

agencies

• 500K – 900K daily users• Numbers are likely larger now, thanks to Snowden

Page 18: Development of anonymous networks based on cryptography

Attacks Against Tor Circuits

• Drawbacksit is vulnerable to timing attacksSame drawbacks with mixnet

Entry/Guard

Middle Exit

Source: knownDest: unknown

Source: unknown

Dest: unknown

Source: unknown

Dest: known

Source: knownDest: known

Page 19: Development of anonymous networks based on cryptography

Proposed solution

• ESEBM (Enhanced Symmetric Key Encryption based Mix net) is proposed that removes drawbacks of existing anonymous networks by using symmetric key encryption functions.

• ESEBM consists of two parts, they are the CP generator (offline) and the anonymous channel (online) each of which is configured as a sequence of servers

• senders obtain secret keys of individual servers in the anonymous channel for encrypting their messages from the CP generator as off-line processes.

Page 20: Development of anonymous networks based on cryptography

ESEBM Configuration

• ESEBM can be considered as a kind of decryption type Mixnet, in which asymmetric key encryption functions are replaced by symmetric ones

• ESEBM consists of 2 parts, i.e. the anonymous channel and the concealing pattern generator(CP generator).

• The anonymous channel is configured as a sequence of N servers as same as Mixnet, and the CP generator consists of Z-groups, where the g-th group is configured by Ng servers,

Page 21: Development of anonymous networks based on cryptography

ESEBM Configuration

S= sender,Ms = Long message (Is divided into multiple frame),Lm = Fame message length, server Tj that had generated xj(h) = CP constructorQj (h)= Tag constructor

CP, X(h) = x1(h)⊕x2(h)---⊕xN(h)encrypting it to MS⊕X(h)tags vector Q(h) = {Q1(h), Q2(h), ---, QN(h)}

Page 22: Development of anonymous networks based on cryptography

How its work • each server Tj in the CP generator generates its h-th CP constructor

xj(h), and the h-th concealing pattern X(h) is constructed as XOR of them, i.e. X(h) = x1(h)⊕x2(h)---⊕xN(h). Then, S sends MS to the first server T1 in the anonymous channel while encrypting it to MS⊕X(h).

• each server in the anonymous channel stores its receiving messages until it receives the predefined number of messages, and decrypts, shuffles and forwards them to its neighboring server untie reach final destination.

• usual Mixnet where all senders encrypt their messages by using the same single public encryption key of each mixserver, in ESEBM, senders encrypt different messages by using different CPs

• Therefore to enable Tj to identify its CP constructor xj(h) that constitutes X(h) for encrypting MS, The message part maintains encrypted message MS, i.e. MS ⊕ X(h), and the tag part maintains a sequence of tags vector Q(h) = {Q1(h), Q2(h), ---, QN(h)}

• CP generator generates 2 kinds of secret encryption keys shared between senders and individual servers, the one is CPs and the other is tag vectors (TVs). The CP generator is a set of server groups, each of which consists of at least 3 servers that generate their secret CP constructors and TV constructors

Page 23: Development of anonymous networks based on cryptography

Behavior of the CP Generator

CP generator generates 2 kinds of secret encryption keys shared between senders and individual servers, the one is CPs and the other is tag vectors (TVs). The CP generator is a set of server groups, each of which consists of at least 3 servers that generate their secret CP constructors and TV constructors independently of others to construct CPs and TVs jointly with other servers.

Page 24: Development of anonymous networks based on cryptography

Be

havio

r of th

e C

P G

en

era

tor

Page 25: Development of anonymous networks based on cryptography

• firstly, sender S sends a set of its secret private vectors (PVs) {P1(h), P2(h), ---, PN1(h)} as a request for a CP to servers T1*, T2*, ---, TN1*, respectively, as shown in Fig. 3 (a). Here, each Pj(h) is vector {pj0(h), pj1(h), ---pjN(h)} and except pj0(h), pjk(h) is a bit pattern of the same length as element qjk(h) in TV constructor qj(h). Bit pattern pj0(h) has the same length as CP constructor xj(h).

• Then, X(1, h) and Q(1, h), the h-th CP and TV that the 1st group generates, are constructed by 1st server T1*asX(1, h) = p10(h) ⊕ x1*(h) Q(1, h) = {p11(h), p12(h), ---,p11*(h) ⊕ ID1*(x1*(h), q1*(h)), p1(1*+1)(h) ⊕ q1*(1*+1)(h),p1(1*+2)(h) ⊕ q1*(1*+2)(h), ---, p1N(h) ⊕ q1*N(h)}

• X(1, h) and Q(1, h) are then forwarded to T2*. However, to protect them from eavesdropping, they are encrypted by the secret key k1* that is shared between T1* and T2*

Page 26: Development of anonymous networks based on cryptography
Page 27: Development of anonymous networks based on cryptography

Be

havio

r of th

e C

P G

en

era

tor

Page 28: Development of anonymous networks based on cryptography

• TNr# in the r-th group generates group blinding vector B(h) = {B1(h), B2(h), ---, BNr(h)}

Page 29: Development of anonymous networks based on cryptography

• Then, T1(N1) sends X(h) and Q(h) = {Q1(h), Q2(h), ---,QN(h)} to sender S, and S removes private vectors PVsfrom X(h) and Q(h) by XORing them by PVs. As the result, finally CP and TV values become as (12) and (13).

Page 30: Development of anonymous networks based on cryptography

Behavior of the Anonymous Channel

Page 31: Development of anonymous networks based on cryptography

• S also attaches tag vector Q(h) = {Q1(h), Q2(h),---, QN(h)} corresponding to X(h), to the message, and sends{MS = x1(h)x2(h) ⊕ --- ⊕ xN(h) ⊕ MS, Q1(h), Q2(h),---, QN(h)}to the 1st server T1 in the anonymous channel. Here, Q1(h) has the form ID1(x1(h), q1(h)).

• MS and Qj(h) become MS =x1(h) ⊕(x1(h) ⊕ x2(h) ⊕ --- ⊕ xN(h) ⊕ MS) = x2(h) ⊕ x3(h) ⊕ --- ⊕ xN(h) ⊕ MS

• Qj(h) =q1j(h) ⊕(q1j(h) ⊕ q2j(h) ⊕ --- ⊕ q(j-1)j(h) ⊕ IDj(xj(h), qj(h))) = q2j(h) ⊕ q3j(h) ⊕ --- ⊕ q(j-1)j(h) ⊕ IDj(xj(h), qj(h)).

• After that, T1 removes Q1(h) from the tag part, waits for the predefined number of message arrivals, and shuffles them to forward each result to server T2.

Page 32: Development of anonymous networks based on cryptography

REPLIES TO ANONYMOUS SENDERS

1. Sender S can receive reply messages as follows. Firstly, S obtains 2 CP and TV pairs {X(h1), Q(h1)}, {X(h2), Q(h2)}, and constructs its message while attaching tag vector Q(h2) and its encrypted address

2. S constructs MS║Q(h2)║(XU(h2)⊕AS), concatenation of MS, Q(h2), and XU(h2)⊕AS. Where bit strings XU(h2) and XL(h2) are upper and lower parts of bit string X(h2), in other words, X(h2) = XU(h2)║XL(h2).

Page 33: Development of anonymous networks based on cryptography

Replie

s To

An

onym

ous

Sen

ders

Page 34: Development of anonymous networks based on cryptography

Replie

s To

An

onym

ous

Sen

ders

Page 35: Development of anonymous networks based on cryptography

EVALUATION OF ESEBM• reply mechanism, senders can confirm the deliveries of

their messages.• message travelling times increase when durations

required or obtaining CPs are counted.• Among various threats to networks, DOS attacks in

which meaningless or spam messages are sent to decrease availabilities of networks

• The CP generator in ESEBM reduces the occurrence ofDOS attacks substantially and makes forged (modified)messages detectable.

• ESEBM disables entities to carry out traffic analysis attacks and replay attacks.

Page 36: Development of anonymous networks based on cryptography

Message Processing Performance• multiple PCs that worked as relay servers. Where individual PCs

were equipped with 1.6GHz CPUs and 1GB of RAM and they were connected by 100Mbits/sec Ethernet.

• Fig. 6 while ESEBM needs less than 6 seconds to transfer a 20Mbits message, Mixnet needs more than 3 minutes to transfer the same message.

• Fig. 7 shows the volume of messages that usual non-anonymous networks, ESEBM and Mixnet can send within 1 second. These results show that, although the throughput of ESEBM is 1/4.4 of that of non-anonymous networks, it is more than 36 times higher than that of Mixnet. According to statistics , e-mail message size is 59KB on average, therefore, even in the environments used for evaluations, ESEBM can handle 7 clients at a time that send usual e-mail messages while the non-anonymous network can handle 33 clients at a time.

• On the other hand, Mixnet can handle only 0.2 clients.

Page 37: Development of anonymous networks based on cryptography
Page 38: Development of anonymous networks based on cryptography

Advantages• The capacity of ESEBM is more than 36 times higher

than that of decryption type Mix net.• the CP generator configuration disables unauthorized

entities to send messages because only authorized entities that had obtained secret keys from the CP generator can send messages.

• ESEBM is secure against various kinds of attacks including DOS attacks and message forgeries (or modifications) that are difficult to prevent in existing anonymous networks.

• symmetric key encryption functions also enable message receivers to send reply messages to the anonymous senders.

Page 39: Development of anonymous networks based on cryptography

• ESEBM can be used for large scale networks, in which number of clients exchange usual sizes of messages at less extra costs.

• available, volume of messages can be processed almost in parallel. message processing time of each server in ESEBM, it consists of shuffling (31%), message decryption (26%), and others (43%). On the other hand, message processing time of each server in Mixnet consists of shuffling (0.8%), message decryption (98.6%), and others (0.6%).

• Different from Mixnet in which message decryptions require 123 times of message shuffling time, in ESEBM, message decryptions require less than 0.84 times of the shuffling time.

• ESEBM where messages are encrypted by their senders, in SEBM, they are encrypted by a sequence of encryption servers.

Page 40: Development of anonymous networks based on cryptography

Conclusion

• Enhanced symmetric key encryption based Mixnet has been proposed that removes the drawbacks of many existing anonymous networks such as Mixnet, DC-net, etc. It satisfies all the requirements of anonymous networks.

• As a drawback of ESEBM, a sender must acquire a concealing pattern from the CP generator in advance to send its every message as an offline process.

• CP generator (off-line) and the anonymous channel (on-line) parts, every time-consuming task is removed from the anonymous channel part and highly efficient communication becomes possible.

• When senders or receivers claim that some server is dishonest, ESEBM must prove all servers are honest or detect dishonest servers if exist. Also, ESEBM must continue its operations even some of servers are out of their services.

Page 41: Development of anonymous networks based on cryptography

MD. Hasibur Rashid // MSc. In CSE, KUET, Bangladesh

Thank You