Top Banner
Class 13 Introduction to Anonymity CIS 755: Advanced Computer Security Spring 2014 Eugene Vasserman http://www.cis.ksu.edu/~eyv/CIS755_S 14/
21

Class 13 Introduction to Anonymity CIS 755: Advanced Computer Security Spring 2014 Eugene Vasserman eyv/CIS755_S14

Dec 23, 2015

Download

Documents

Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: Class 13 Introduction to Anonymity CIS 755: Advanced Computer Security Spring 2014 Eugene Vasserman eyv/CIS755_S14/

Class 13Introduction to Anonymity

CIS 755: Advanced Computer SecuritySpring 2014

Eugene Vasserman

http://www.cis.ksu.edu/~eyv/CIS755_S14/

Page 2: Class 13 Introduction to Anonymity CIS 755: Advanced Computer Security Spring 2014 Eugene Vasserman eyv/CIS755_S14/

Administrative stuff

• Quizzes and Exam II– Scheduling– Format

Page 3: Class 13 Introduction to Anonymity CIS 755: Advanced Computer Security Spring 2014 Eugene Vasserman eyv/CIS755_S14/

Anonymity Concepts

• Privacy– Confidentiality

• Anonymity/Pseudonymity– Unobservability– Unlinkability

Page 4: Class 13 Introduction to Anonymity CIS 755: Advanced Computer Security Spring 2014 Eugene Vasserman eyv/CIS755_S14/

Dining Cryptographers

• Three people toss coins: heads=1, tails=0• Menus hide right-hand coin• XOR your coin flip result and left

neighbor’s result• Report value to everyone• Report opposite value to send a single bit• If the sum is odd, someone sent a message

Page 5: Class 13 Introduction to Anonymity CIS 755: Advanced Computer Security Spring 2014 Eugene Vasserman eyv/CIS755_S14/

Dining Cryptographers II

• Slow• Error-prone• Needs tamper detection• Does not scale• Provides unobservability

Page 6: Class 13 Introduction to Anonymity CIS 755: Advanced Computer Security Spring 2014 Eugene Vasserman eyv/CIS755_S14/

Unobservability

• k-anonymity (scalable dining cryptographers)– Must be implemented very carefully

• Link padding– Inefficient– Cover traffic knowledge

Page 7: Class 13 Introduction to Anonymity CIS 755: Advanced Computer Security Spring 2014 Eugene Vasserman eyv/CIS755_S14/

Unlinkability

• Sender can’t identify receiver• Receiver can’t identify sender• Neither knows who the other is

– How do we handle authentication?

• Unobservability implies unlinkability (?)

Page 8: Class 13 Introduction to Anonymity CIS 755: Advanced Computer Security Spring 2014 Eugene Vasserman eyv/CIS755_S14/

For Bob For Bob from Alicefrom AliceFor Carol For Carol from Alicefrom AliceFor David For David from Alicefrom Alice

Onion Encryption

Page 9: Class 13 Introduction to Anonymity CIS 755: Advanced Computer Security Spring 2014 Eugene Vasserman eyv/CIS755_S14/

Message for BobWrapping for CarolWrapping for Doug

Onion Encryption IIBob

Alice

Wrapping for Edward

Edward

Doug

Carol

Page 10: Class 13 Introduction to Anonymity CIS 755: Advanced Computer Security Spring 2014 Eugene Vasserman eyv/CIS755_S14/

Chaum MixesBob

Alice

Output in lexographic order

Page 11: Class 13 Introduction to Anonymity CIS 755: Advanced Computer Security Spring 2014 Eugene Vasserman eyv/CIS755_S14/

Global AdversaryBob

Alice

Page 12: Class 13 Introduction to Anonymity CIS 755: Advanced Computer Security Spring 2014 Eugene Vasserman eyv/CIS755_S14/

Chaum Mix CascadeBob

Alice

Page 13: Class 13 Introduction to Anonymity CIS 755: Advanced Computer Security Spring 2014 Eugene Vasserman eyv/CIS755_S14/

Anonymous Reply

• Address for replies:

• Reply:

• Mix0 decrypts N,A; sends:

• Mix decrypting reply does not know destination• Mix encrypting reply does not know source

Page 14: Class 13 Introduction to Anonymity CIS 755: Advanced Computer Security Spring 2014 Eugene Vasserman eyv/CIS755_S14/

Mixminion

A

B

C

D

E Bob

A,B,C,D,E

Alice

Bob

Page 15: Class 13 Introduction to Anonymity CIS 755: Advanced Computer Security Spring 2014 Eugene Vasserman eyv/CIS755_S14/

Problems with MixMinon

• Centralized entities required– Availability failure– Anonymity failure (how?)

• Malicious nodes:– Control entry and exit– Unlikely

Page 16: Class 13 Introduction to Anonymity CIS 755: Advanced Computer Security Spring 2014 Eugene Vasserman eyv/CIS755_S14/

Anonymous Email

• High-latency• Low-throughput• Provides unlinkability

– Have to be careful about authentication

• No default end-to-end confidentiality (PGP)– Actually, there is for replies

• Secure against global adversary

Page 17: Class 13 Introduction to Anonymity CIS 755: Advanced Computer Security Spring 2014 Eugene Vasserman eyv/CIS755_S14/

Anonymous Web Browsing

• Low-latency• Medium-throughput• Server does not know client• Provides sender unlinkability

– Have to be careful about authentication

• No default end-to-end confidentiality (SSL)• NOT secure against global adversary

Page 18: Class 13 Introduction to Anonymity CIS 755: Advanced Computer Security Spring 2014 Eugene Vasserman eyv/CIS755_S14/

Tor

A

B

C

TCP over TCP (UGH!)

Page 19: Class 13 Introduction to Anonymity CIS 755: Advanced Computer Security Spring 2014 Eugene Vasserman eyv/CIS755_S14/

Anonymous Web Services

• Web service does not know client• Client does not know web service• Provides sender and receiver unlinkability

• Rendezvous

Page 20: Class 13 Introduction to Anonymity CIS 755: Advanced Computer Security Spring 2014 Eugene Vasserman eyv/CIS755_S14/

Tor Hidden Services

A

B

C

D

E

F

Page 21: Class 13 Introduction to Anonymity CIS 755: Advanced Computer Security Spring 2014 Eugene Vasserman eyv/CIS755_S14/

Questions?

Reading discussion