Top Banner
1
26

1. Outline 1. Background 1. Attacks on distance-bounding 2. Symmetric vs asymmetric protocol 3. Motivation: DBPK-Log 2. VSSDB 1. Building blocks 2. Protocol.

Dec 21, 2015

Download

Documents

Gerald Higgins
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: 1. Outline 1. Background 1. Attacks on distance-bounding 2. Symmetric vs asymmetric protocol 3. Motivation: DBPK-Log 2. VSSDB 1. Building blocks 2. Protocol.

1

Page 2: 1. Outline 1. Background 1. Attacks on distance-bounding 2. Symmetric vs asymmetric protocol 3. Motivation: DBPK-Log 2. VSSDB 1. Building blocks 2. Protocol.

Outline1. Background

1. Attacks on distance-bounding2. Symmetric vs asymmetric protocol3. Motivation: DBPK-Log

2. VSSDB1. Building blocks2. Protocol

3. Conclusion

2

Page 3: 1. Outline 1. Background 1. Attacks on distance-bounding 2. Symmetric vs asymmetric protocol 3. Motivation: DBPK-Log 2. VSSDB 1. Building blocks 2. Protocol.

Objective of distance-boundingAuthentication protocol + proximity testing

Verifier is trusted, prover is untrusted.

3

Range

Legitimate prover

Verifier

Page 4: 1. Outline 1. Background 1. Attacks on distance-bounding 2. Symmetric vs asymmetric protocol 3. Motivation: DBPK-Log 2. VSSDB 1. Building blocks 2. Protocol.

Possible applications

4

Wireless payment

Access control

Marc-Olivier Killijian
de manière générale il vaut mieux ne pas mettre de phrases complètes mais plutot les mots clefs, les phrases sont faites à l'oral bien sûr.
Page 5: 1. Outline 1. Background 1. Attacks on distance-bounding 2. Symmetric vs asymmetric protocol 3. Motivation: DBPK-Log 2. VSSDB 1. Building blocks 2. Protocol.

Range

R-A

Distance fraudA malicious prover

want to cheat on the distance computed by the verifier.

Page 6: 1. Outline 1. Background 1. Attacks on distance-bounding 2. Symmetric vs asymmetric protocol 3. Motivation: DBPK-Log 2. VSSDB 1. Building blocks 2. Protocol.

Range

R-A

Prover is unaware that an attack is taking place.

Relay-Attack

Proxy

ATTACKER

Mafia fraudAn attacker relay the

communication through a proxy close to a legitimate prover.

Page 7: 1. Outline 1. Background 1. Attacks on distance-bounding 2. Symmetric vs asymmetric protocol 3. Motivation: DBPK-Log 2. VSSDB 1. Building blocks 2. Protocol.

Range

R-A

Relay-Attack

Collusion of users

Terrorist fraudA far away legitimate

prover colludes with an adversary located close to the verifier to enable him to authenticate only once.

Page 8: 1. Outline 1. Background 1. Attacks on distance-bounding 2. Symmetric vs asymmetric protocol 3. Motivation: DBPK-Log 2. VSSDB 1. Building blocks 2. Protocol.

Generic format of a DB protocol1. Initialization phase (1st lazy phase),2. Interactive phase (heart of the protocol),

3. Verification phase (2nd lazy phase).

8

c

R= F(c)

Ts

Distance =

ProverVerifier

Tp

Tr

Marc-Olivier Killijian
de manière générale il vaut mieux ne pas mettre de phrases complètes mais plutot les mots clefs, les phrases sont faites à l'oral bien sûr.
Page 9: 1. Outline 1. Background 1. Attacks on distance-bounding 2. Symmetric vs asymmetric protocol 3. Motivation: DBPK-Log 2. VSSDB 1. Building blocks 2. Protocol.

Symmetric versus asymmetric protocolsSymmetric response function: secret shared

between the prover and verifier,R=fS(c).

Examples of symmetric protocols : Swiss Knife [Kim et al., ICSC 2008], SKI [Boreanu et al, ISC’13], [Gambs et al, AsiaCCS’13], …

Asymmetric response function: the verifier has not access to the prover’s secret.

Verification of the challenges uses homomorphic property of bit commitment.

Only one protocol in the litterature: [Bussard and Bagga, SEC 2005]

9

Marc-Olivier Killijian
de manière générale il vaut mieux ne pas mettre de phrases complètes mais plutot les mots clefs, les phrases sont faites à l'oral bien sûr.
Page 10: 1. Outline 1. Background 1. Attacks on distance-bounding 2. Symmetric vs asymmetric protocol 3. Motivation: DBPK-Log 2. VSSDB 1. Building blocks 2. Protocol.

Bussard and Bagga protocol (B&B)

10

1. Initialization phase

Prover: •Selects k at random,•Computes e = x k⨁•Computes commitment :

• ai = commit(ki,ui)• bi = commit(ei,vi)

1. ai, bi

ProverVerifier

3. Final verification phase•Z=•ZKProof (x)[Z y]⋀3. ZKProof(x)[Z⋀Y]

2. Fast bit exchange phaseVerifier:•Sends bit challenge {0,1},•Prover replies with ki if 0 or ei if 1.

2. fast bit exchange phase

bi

m rounds

Y=F(x)

Deduce Z=commit(x,v)

Page 11: 1. Outline 1. Background 1. Attacks on distance-bounding 2. Symmetric vs asymmetric protocol 3. Motivation: DBPK-Log 2. VSSDB 1. Building blocks 2. Protocol.

ContributionsB&B-like distance bounding with better

resistance to terrorist attack,Introduction of mode during the fast phase,Security bounds formally proved.

11

Page 12: 1. Outline 1. Background 1. Attacks on distance-bounding 2. Symmetric vs asymmetric protocol 3. Motivation: DBPK-Log 2. VSSDB 1. Building blocks 2. Protocol.

VSSDB

12

Page 13: 1. Outline 1. Background 1. Attacks on distance-bounding 2. Symmetric vs asymmetric protocol 3. Motivation: DBPK-Log 2. VSSDB 1. Building blocks 2. Protocol.

Ingredients

13

(3,3) secret sharing scheme:secret is encrypted using two strings k, l into e,each bit of the secret is shared in three parts,

Verifiable secret sharing:each bit of the secret is verified separately,Homomorphic bit commitment [Brassard et al, 1988]:P, Q primes;N=P×Q and Jacobi(–1/N)= +1,S = –1 mod N,Commit(b,rand)= Sb × rand2 mod N,Commit(b,rand2)× Commit(b,rand2)= Commit(b⨁a,rand3)

Page 14: 1. Outline 1. Background 1. Attacks on distance-bounding 2. Symmetric vs asymmetric protocol 3. Motivation: DBPK-Log 2. VSSDB 1. Building blocks 2. Protocol.

Registration phaseProver Certification Authority (CA):

PrivKey={Sksign,x} kept secret.

Pubkey={Comi},PKSign sent to the verifier. {Comi}, Comi=Commit(xi,vi), vi=Hi(x).

14

Page 15: 1. Outline 1. Background 1. Attacks on distance-bounding 2. Symmetric vs asymmetric protocol 3. Motivation: DBPK-Log 2. VSSDB 1. Building blocks 2. Protocol.

Initialization phase

15

2. Prover computes session specific information.

1. Verifier replies with a nonce.

3. Prover computes fresh proof.

4. Verifier checks for the freshness of the proof.

Page 16: 1. Outline 1. Background 1. Attacks on distance-bounding 2. Symmetric vs asymmetric protocol 3. Motivation: DBPK-Log 2. VSSDB 1. Building blocks 2. Protocol.

Fast bit exchange

16

5. Verifier starts the clock.

5. Verifier stops the clock.

5. Prover replies as soon as possible.

Page 17: 1. Outline 1. Background 1. Attacks on distance-bounding 2. Symmetric vs asymmetric protocol 3. Motivation: DBPK-Log 2. VSSDB 1. Building blocks 2. Protocol.

Verification phase

17

1.Validity of the signature of the transcript,

2.Responses correspond to the commits,3.Commitments corresponds to the secret

key.

Page 18: 1. Outline 1. Background 1. Attacks on distance-bounding 2. Symmetric vs asymmetric protocol 3. Motivation: DBPK-Log 2. VSSDB 1. Building blocks 2. Protocol.

Security analysisDistance fraud

Binding of HBCommit,mode are chosen by the verifier.

Mafia fraudHiding of HBCommit,

Terrorist fraud ?GameTF [Fischlin et al., ACNS 2013].

18

Page 19: 1. Outline 1. Background 1. Attacks on distance-bounding 2. Symmetric vs asymmetric protocol 3. Motivation: DBPK-Log 2. VSSDB 1. Building blocks 2. Protocol.

GameTF securityDefinition: If an attacker succeeds in a

terrorist fraud then he can launch better mafia fraud attack.

Trapdoor in the prover:

19

Page 20: 1. Outline 1. Background 1. Attacks on distance-bounding 2. Symmetric vs asymmetric protocol 3. Motivation: DBPK-Log 2. VSSDB 1. Building blocks 2. Protocol.

Terrorist VSSDB

20

Page 21: 1. Outline 1. Background 1. Attacks on distance-bounding 2. Symmetric vs asymmetric protocol 3. Motivation: DBPK-Log 2. VSSDB 1. Building blocks 2. Protocol.

Security bounds

21

Page 22: 1. Outline 1. Background 1. Attacks on distance-bounding 2. Symmetric vs asymmetric protocol 3. Motivation: DBPK-Log 2. VSSDB 1. Building blocks 2. Protocol.

Conclusion and future work

We designed an asymmetric distance-bounding provably secure against distance, mafia and terrorist frauds.

Additional contribution: Introduction of mode in the response function to avoid response of more than one bit.

Future work: privacy-preservation, other secret sharing schemes.

22

Page 23: 1. Outline 1. Background 1. Attacks on distance-bounding 2. Symmetric vs asymmetric protocol 3. Motivation: DBPK-Log 2. VSSDB 1. Building blocks 2. Protocol.

23Contact: [email protected]

Page 24: 1. Outline 1. Background 1. Attacks on distance-bounding 2. Symmetric vs asymmetric protocol 3. Motivation: DBPK-Log 2. VSSDB 1. Building blocks 2. Protocol.

Attack of Bay and co-authors

2424

Initialization phase:Attacker:•Receives z form the malicious prover •Selects k and e at random,•Computes commitment (for the m-1 last rounds) :

• a’i = commit (ki)• b’i=commit (ei)

•Computes a’0 for k0 at random.

•b’0= a’0×∏ (a’i×b’i)2i-1× Z-1 mod N.

1. ai’, b’i

Attacker

Verifier

3. ZKProof

2. fast bit exchange phase

Final verification phase:The verification phase is relayed to the prover.

Y=F(S)

Deduce Z=F(S)

Prover

Z

Challenge-response phase:•The attacker wins if first challenge=0.

Page 25: 1. Outline 1. Background 1. Attacks on distance-bounding 2. Symmetric vs asymmetric protocol 3. Motivation: DBPK-Log 2. VSSDB 1. Building blocks 2. Protocol.

Opening function

25

Page 26: 1. Outline 1. Background 1. Attacks on distance-bounding 2. Symmetric vs asymmetric protocol 3. Motivation: DBPK-Log 2. VSSDB 1. Building blocks 2. Protocol.

Attacks on distance boundingDistance fraud

Range

R-A

T-A

Legitimate prover