Distributed Public Key Infrastructure via the Blockchain. Sean Pearl smp1697@cs.rit.edu April 28, 2015



Similar documents
Orwell. From Bitcoin to secure Domain Name System

Overview. SSL Cryptography Overview CHAPTER 1

Bitcoin: Concepts, Practice, and Research Directions

Using the Bitcoin Blockchain for secure, independently verifiable, electronic votes. Pierre Noizat - July 2014

Chapter 8. Network Security

BitIodine: extracting intelligence from the Bitcoin network

Key Management Interoperability Protocol (KMIP)

An Analysis of the Bitcoin Electronic Cash System

SSL BEST PRACTICES OVERVIEW

Release: 1. ICANWK502A Implement secure encryption technologies

How To Encrypt Data With Encryption

Sync Security and Privacy Brief

Digital Certificates (Public Key Infrastructure) Reshma Afshar Indiana State University

Overview of CSS SSL. SSL Cryptography Overview CHAPTER

COMP-530 Cryptographic Systems Security *Requires Programming Background. University of Nicosia, Cyprus

Lukasz Pater CMMS Administrator and Developer

Using etoken for SSL Web Authentication. SSL V3.0 Overview

Communication Security for Applications

SSL Protect your users, start with yourself

Namecoin as alternative to the Domain Name System

Public Key Infrastructure (PKI)

Certificate Management. PAN-OS Administrator s Guide. Version 7.0

Payment systems. Tuomas Aura CSE-C3400 Information security. Aalto University, autumn 2015

Security Policy Revision Date: 23 April 2009

Electronic Payments. EITN40 - Advanced Web Security

2. Elections We define an electronic vote as a chain of digital signatures. Each owner transfers the vote to the candidate or legislation by digitally

OpenADR 2.0 Security. Jim Zuber, CTO QualityLogic, Inc.

Chapter 11 Security+ Guide to Network Security Fundamentals, Third Edition Basic Cryptography

Secure Sockets Layer (SSL ) / Transport Layer Security (TLS) Network Security Products S31213

TLS and SRTP for Skype Connect. Technical Datasheet

Savitribai Phule Pune University

CS 758: Cryptography / Network Security

7! Cryptographic Techniques! A Brief Introduction

Public Key Infrastructure

[SMO-SFO-ICO-PE-046-GU-

CoinAMI Coin-Application Mediator Interface

Bit Chat: A Peer-to-Peer Instant Messenger

Network Security [2] Plain text Encryption algorithm Public and private key pair Cipher text Decryption algorithm. See next slide

IT Networks & Security CERT Luncheon Series: Cryptography

Bitcoin: A Peer-to-Peer Electronic Cash System

The World of Emerging Payment Systems A Brief Introduction

Bitcoin Miner Optimization

Electronic Contract Signing without Using Trusted Third Party

An Introduction to Cryptography as Applied to the Smart Grid

WIRELESS PUBLIC KEY INFRASTRUCTURE FOR MOBILE PHONES

OFFICE OF THE CONTROLLER OF CERTIFICATION AUTHORITIES TECHNICAL REQUIREMENTS FOR AUDIT OF CERTIFICATION AUTHORITIES

Certificate Authorities and Public Keys. How they work and 10+ ways to hack them.

Ciphire Mail. Abstract

Digital Signatures: A Panoramic View. Palash Sarkar

Real-Time Communication Security: SSL/TLS. Guevara Noubir CSU610

Network Security. Computer Networking Lecture 08. March 19, HKU SPACE Community College. HKU SPACE CC CN Lecture 08 1/23

SBClient SSL. Ehab AbuShmais

Wireless Mobile Internet Security. 2nd Edition

Chapter 4. Authentication Applications. COSC 490 Network Security Annie Lu 1

Introduction to Cryptography

Blockstack: A Global Naming and Storage System Secured by Blockchains

Forward Secrecy: How to Secure SSL from Attacks by Government Agencies

APNIC elearning: IPSec Basics. Contact: esec03_v1.0

I N F O R M A T I O N S E C U R I T Y

Security. Contents. S Wireless Personal, Local, Metropolitan, and Wide Area Networks 1

National Security Agency Perspective on Key Management

MOMENTUM - A MEMORY-HARD PROOF-OF-WORK VIA FINDING BIRTHDAY COLLISIONS. DANIEL LARIMER dlarimer@invictus-innovations.com Invictus Innovations, Inc

Wildcard and SAN: Understanding Multi-Use SSL Certificates

Introduction to Network Security Key Management and Distribution

SPC5-CRYP-LIB. SPC5 Software Cryptography Library. Description. Features. SHA-512 Random engine based on DRBG-AES-128

Filecoin: A Cryptocurrency Operated File Storage Network

CSE543 - Introduction to Computer and Network Security. Module: Public Key Infrastructure

Network Security Part II: Standards

AN IMPLEMENTATION OF HYBRID ENCRYPTION-DECRYPTION (RSA WITH AES AND SHA256) FOR USE IN DATA EXCHANGE BETWEEN CLIENT APPLICATIONS AND WEB SERVICES

Computer Networks 1 (Mạng Máy Tính 1) Lectured by: Dr. Phạm Trần Vũ MEng. Nguyễn CaoĐạt

Web Security. Mahalingam Ramkumar

, ) I Transport Layer Security

EXECUTIVE BRIEF. IT and Business Professionals Say Website Attacks are Persistent and Varied. In this Paper

CRYPTOGRAPHY AS A SERVICE

I N F O R M A T I O N S E C U R I T Y

Network Security. Gaurav Naik Gus Anderson. College of Engineering. Drexel University, Philadelphia, PA. Drexel University. College of Engineering

Authentication Applications

How encryption works to provide confidentiality. How hashing works to provide integrity. How digital signatures work to provide authenticity and

Lecture 31 SSL. SSL: Secure Socket Layer. History SSL SSL. Security April 13, 2005

Digital Signatures. Meka N.L.Sneha. Indiana State University. October 2015

Wildcard and SAN: Understanding multi-use SSL Certificates

10 Secure Electronic Transactions: Overview, Capabilities, and Current Status

Biometrics, Tokens, & Public Key Certificates

Key Management (Distribution and Certification) (1)

Chapter 8. Cryptography Symmetric-Key Algorithms. Digital Signatures Management of Public Keys Communication Security Authentication Protocols

CrashPlan Security SECURITY CONTEXT TECHNOLOGY

KEY DISTRIBUTION: PKI and SESSION-KEY EXCHANGE. Mihir Bellare UCSD 1

msigna Getting Started

IBM i Version 7.3. Security Digital Certificate Manager IBM

Brocade Engineering. PKI Tutorial. Jim Kleinsteiber. February 6, Page 1

Public Key Encryption and Digital Signature: How do they work?

Connected from everywhere. Cryptelo completely protects your data. Data transmitted to the server. Data sharing (both files and directory structure)

Optimized Certificates A New Proposal for Efficient Electronic Document Signature Validation

Spirent Abacus. SIP over TLS Test 编 号 版 本 修 改 时 间 说 明

Secure Socket Layer (SSL) and Transport Layer Security (TLS)

NIST Test Personal Identity Verification (PIV) Cards

Transcription:

Distributed Public Key Infrastructure via the Blockchain Sean Pearl smp1697@cs.rit.edu April 28, 2015

Overview Motivation: Electronic Money Example TTP: PayPal Bitcoin (BTC) Background Structure Other Topics Motivation: Public Key Infrastructure MIT Certcoin Background Structure 2

Motivation: Electronic Money Currency held in digital form Motivations Instant payment, deposit, transfer Buyer protection systems Transaction histories Concerns Authorizing transactions Double-spending Centralized and Decentralized Systems 3

Motivation: Electronic Money Centralized Systems (Trusted Third Parties) Credit Cards Banking systems Internet Payment services PayPal Convertible Virtual Currencies Digital Wallets Google Wallet, Apple Pay, LoopPay 4

Example TTP: PayPal Client Web Interface TLS (SSL 3.0 and up) SSL Certificate (Symantec) CA Signiture RSA on 2048-bit SHA-1 Digest PayPal s Public Key 2048-bit RSA Key Agreement with RSA Symmetric Encryption with AES-256 in Cipher Block Chaining Mode 5

Example TTP: PayPal Back-end OpenID user authentication Proprietary balance/transaction model, database Fees on certain transactions Interest earned by PayPal on balances held in user accounts Proprietary bank, credit card interfaces Bank account/cc info stored securely Marketed as an additional layer of security 6

Motivation: Electronic Money Decentralized Systems Cryptocurrencies Bitcoin (BTC) At least 677 coin projects based on BTC Litecoin (LTC) Namecoin (NMC) Many defunct Bytecoin (BCN) Ripple (RPL) Map of Cryptocurrency Projects 7

Background: Bitcoin (BTC) "Satoshi's" 2008 White Paper bitcoind released as open-source in 2009 Coin as chain of digital signatures Verify past ownership to entry No inherent double-spending protection Distributed transaction ledger Chaining blocks of transactions Decentralized alternative to TTP Proof-of-work establishes legitimacy 8

Bitcoin Structure: Transaction Intent to transfer coins List of inputs Sources of coins being spent Number of inputs References to previous outputs Hash of previous transaction Index of output ECDSA Signature, Public Key (Generally) Establishes ownership of output address 9

Bitcoin Structure: Transaction List of outputs Destinations for coins being spent Number of outputs Destinations Bitcoin address (Generally) Amount Expressed in Satoshi (1:10-8 BTC) Change Unspent inputs? 10

Bitcoin Structure: Transaction Verification Inputs authorized Pay-to-address ECDSA Public Key hashes to address Addresses are intended single-use Digital signature corresponds to PK Pay-to-script Script in referenced output Valid solution in referencing input Multiple signature verfication (Generally) 11

Bitcoin Structure: Transaction 12

Bitcoin Structure: Transaction 13

Bitcoin Structure: Blockchain Public Distributed Cryptographic Ledger Public Fully visible to clients Distributed Decentralized, peer-to-peer transmission Cryptographic Digitally signed transactions, proof-of-work Ledger Transactional database 14

Bitcoin Structure: Blockchain Blocks Sequences of signed and verified transactions Published and distributed at ~1:600s Magic number, size Header Hash of previous block (chain) Merkle root hash of block Timestamp Target, nonce (mining) Number, list of transactions 15

Bitcoin Structure: Blockchain Chaining Order and timestamp transactions Prevent double-spending Reinforce legitimacy of previous blocks 16

Bitcoin Structure: Blockchain 17

Bitcoin Structure: Mining Transactions distributed among peers Miners Verify transactions Arrange and solve blocks Proof-of-work HashCash-SHA-256 2 Block hash starts with target number of 0 bits Nonce manipulation Exponential difficulty control Rolling average of block generation, every 2016 Blocks published at ~1:600s 18

Bitcoin Structure: Mining Network Verify and accept new blocks Reward miners New bitcoins Unspent inputs of transactions Synchronization Forking Multiple blocks chained to one predecessor Longer chain wins Largest proven body of work 19

Bitcoin Structure: Standards Hashes SHA-256 2 Blocks, transactions SHA-256/RIPEMD-160 Addresses Digital Signatures Elliptic Curve Digital Signature Algorithm (Proposed) Lamport Signatures Quantum security 20

Bitcoin Structure: Standards Merkle Trees Reduce storage Prune spent transactions After some number of blocks Simplified Verification User obtains only block headers Forms longest chain to transaction block Verifies presence of transaction Obtain Merkle branch Basis of network acceptance 21

Bitcoin Structure: Pruning 22

Bitcoin Structure: Verification 23

Bitcoin: Other Topics Wallets Exchanges Mt. Gox Privacy Anonymity Usage Overlay Networks Controversy 24

Other Blockchain Applications Cryptocurrencies Bitcoin, Litecoin... Data storage Namecoin (NMC), Emercoin NVS (EMC) Decentralized DNS Storj (SJCX) Decentralized encrypted cloud storage Darkleaks (BTC overlay) Decentralized leaks 25

Questions so far? 26

Motivation: Public Key Infrastructure Manage and Distribute Public Keys Motivations Digital signature systems Asymmetric key encryption Secure key agreement Concerns Identity spoofing Key revocation 27

Motivation: Public Key Infrastructure Certificate Authorities Trusted Third Parties Single point of failure DigiNotar, TrustWave Key recovery services Web of Trust Distributed system High barrier to entry (PGP) Key loss 28

Motivation: Public Key Infrastructure Blockchain PKI operations in transactions Built on a DNS/Identity system PKI Operations Register key/domain Update public key Look up public key Revoke lost key Others based on implementation 29

Background: Certcoin MIT, 2014; MIT, 2014; Fromknecht, Velicanu, Yakoubov Students of Ron Rivest Built on Namecoin (NMC) Fork of BTC Records vs Transactions Record expiry Record fees not given to miners Merged mining Provides DNS, some PKI 30

Certcoin Structure: Registration Low fixed fee Owner posts record to blockchain User ID (domain, email) User-generated public keys, algorithms Online for message authentication Offline for revocation Signatures, algorithms ID signed with Online private key ID signed with Offline private key 31

Certcoin Structure: Registration Verification Miners, network ID has not been previously registered If previous registry is valid Valid algorithm choice Verify online digital signature Verify offline digital signature Namecoin record expiration Renewal period 32

Certcoin Structure: Update Free Owner posts update record ID Key type Old public key New public key, algorithm ID, new key signed by old private key ID signed by new private key 33

Certcoin Structure: Update Verification Miners, network Verify ownership of old public key ID s most recent operation of that type Chains back to registration Verify signature using old public key Verify signature using new public key 34

Certcoin Structure: Revocation Owner posts revocation record ID Offline public key Old online public key New online public key, algorithm ID, new online key signed by offline private key ID signed by new online private key 35

Certcoin Structure: Revocation Verification Miners, network Verify ownership of old online public key Verify ownership of offline public key Verify signature using offline public key Verify signature using new online public key Does not cover loss of offline private key Proposed solution: Shamir secret sharing Perhaps in version 1 36

Certcoin Structure: Lookup Traverse the blockchain Verify ID registration Initialize public key of relevant type For each operation by ID, type Verify key == old key Verify old signature Verify new signature Set public key to new key 37

Certcoin Structure: Lookup Confirm owner has private key Before communicating Zero-knowledge proof Algorithm-dependent External to Certcoin 38

Example: PayPal Using Certcoin instead of CA Lookup PayPal by traversing blockchain Verifiable chain of ownership Proof of work establishing legitimacy PayPal s online public key 2048-bit RSA Key Agreement with RSA Symmetric Encryption with AES-256 in Cipher Block Chaining Mode 39

Questions? 40

References 1. C. Fromknecht, D. Velicanu and S. Yakoubov, CertCoin: A NameCoin Based Decentralized Authentication System, May 12, 2014. 2. C. Fromknecht, D. Velicanu and S. Yakoubov, A Decentralized Public Key Infrastructure with Identity Retention, November 11, 2014. 3. EmerCoin, Using EmerCoin NVS to deploy and manage Public Key Infrastructure (PKI). 4. J. Benaloh and M. de Mare, One-way accumulators: a decentralized alternative to digital signatures, Advances in Cryptology-Eurocrypt '93, LNCS, vol. 765, Springer-Verlag, 1993, pp. 274-285. 5. N. Fazio and A. Nicolos, Cryptographic Accumulators: Definitions, Constructions and Applications. 41