Lightweight Security using Identity-Based Encryption Guido Appenzeller



Similar documents
Security - The IBE Advantage

How To Understand And Understand The Security Of A Key Infrastructure

Introduction to Cryptography

Security. Contents. S Wireless Personal, Local, Metropolitan, and Wide Area Networks 1

Network Security [2] Plain text Encryption algorithm Public and private key pair Cipher text Decryption algorithm. See next slide

Brocade Engineering. PKI Tutorial. Jim Kleinsteiber. February 6, Page 1

An Introduction to Cryptography as Applied to the Smart Grid

Identity Based Encryption. Terence Spies VP Engineering

Securing Distribution Automation

Network Security Protocols

SSL Handshake Analysis

Forward Secrecy: How to Secure SSL from Attacks by Government Agencies

Network Security. Abusayeed Saifullah. CS 5600 Computer Networks. These slides are adapted from Kurose and Ross 8-1

Digital Certificates (Public Key Infrastructure) Reshma Afshar Indiana State University

Public Key Infrastructure (PKI)

Savitribai Phule Pune University

Security Protocols HTTPS/ DNSSEC TLS. Internet (IPSEC) Network (802.1x) Application (HTTP,DNS) Transport (TCP/UDP) Transport (TCP/UDP) Internet (IP)

Network Security Part II: Standards

Advanced Authentication

Final Exam. IT 4823 Information Security Administration. Rescheduling Final Exams. Kerberos. Idea. Ticket

Chapter 7 Transport-Level Security

Secure Socket Layer (SSL) and Transport Layer Security (TLS)

Overview Windows NT 4.0 Security Cryptography SSL CryptoAPI SSPI, Certificate Server, Authenticode Firewall & Proxy Server IIS Security IE Security

Chapter 8 Security. IC322 Fall Computer Networking: A Top Down Approach. 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012

CRYPTOGRAPHY IN NETWORK SECURITY

An Introduction to Identity-based Cryptography CSEP 590TU March 2005 Carl Youngblood

Overview of CSS SSL. SSL Cryptography Overview CHAPTER

CIPHERMAIL ENCRYPTION. CipherMail white paper

Expert Reference Series of White Papers. Fundamentals of the PKI Infrastructure

The Total Cost of Ownership for Voltage Identity-Based Encryption Solutions

Overview. SSL Cryptography Overview CHAPTER 1

Network Security. Abusayeed Saifullah. CS 5600 Computer Networks. These slides are adapted from Kurose and Ross 8-1

DJIGZO ENCRYPTION. Djigzo white paper

Applying Cryptography as a Service to Mobile Applications

Chapter 8. Cryptography Symmetric-Key Algorithms. Digital Signatures Management of Public Keys Communication Security Authentication Protocols

Authenticity of Public Keys

12/8/2015. Review. Final Exam. Network Basics. Network Basics. Network Basics. Network Basics. 12/10/2015 Thursday 5:30~6:30pm Science S-3-028

Internet Firewall CSIS Internet Firewall. Spring 2012 CSIS net13 1. Firewalls. Stateless Packet Filtering

Chapter 8. Network Security

Chapter 8 Network Security. Slides adapted from the book and Tomas Olovsson

Cornerstones of Security

, ) I Transport Layer Security

CSCE 465 Computer & Network Security

Chapter 10. Network Security

On the Risks of IBE. Himanshu Khurana and Jim Basney

Protocol Rollback and Network Security

Client Server Registration Protocol

Entrust Managed Services PKI. Getting started with digital certificates and Entrust Managed Services PKI. Document issue: 1.0

7 Network Security. 7.1 Introduction 7.2 Improving the Security 7.3 Internet Security Framework. 7.5 Absolute Security?

Wireless Local Area. Network Security

Authentication Types. Password-based Authentication. Off-Line Password Guessing

CPS Computer Security Lecture 9: Introduction to Network Security. Xiaowei Yang

Lecture 9: Application of Cryptography

Chapter 7: Network security

KEY DISTRIBUTION: PKI and SESSION-KEY EXCHANGE. Mihir Bellare UCSD 1

Key Management Interoperability Protocol (KMIP)

Using etoken for SSL Web Authentication. SSL V3.0 Overview

Introduction to Network Security. 1. Introduction. And People Eager to Take Advantage of the Vulnerabilities

Certificate Management. PAN-OS Administrator s Guide. Version 7.0

Authentication applications Kerberos X.509 Authentication services E mail security IP security Web security

SSL Protect your users, start with yourself

IT Networks & Security CERT Luncheon Series: Cryptography

2.4: Authentication Authentication types Authentication schemes: RSA, Lamport s Hash Mutual Authentication Session Keys Trusted Intermediaries

High-speed cryptography and DNSCurve. D. J. Bernstein University of Illinois at Chicago

CS 356 Lecture 27 Internet Security Protocols. Spring 2013

W H I T E PA P E R. Providing Encryption at the Internal Desktop

12/3/08. Security in Wireless LANs and Mobile Networks. Wireless Magnifies Exposure Vulnerability. Mobility Makes it Difficult to Establish Trust

Mobile OTPK Technology for Online Digital Signatures. Dec 15, 2015

Network Security. Gaurav Naik Gus Anderson. College of Engineering. Drexel University, Philadelphia, PA. Drexel University. College of Engineering

Implementing and Administering Security in a Microsoft Windows Server 2003 Network

Bit Chat: A Peer-to-Peer Instant Messenger

WIRELESS PUBLIC KEY INFRASTRUCTURE FOR MOBILE PHONES

Ciphire Mail. Abstract

Key Management and Distribution

Managing and Securing Computer Networks. Guy Leduc. Chapter 4: Securing TCP. connections. connections. Chapter goals: security in practice:

CCNA Security 1.1 Instructional Resource

tcpcrypt Andrea Bittau, Dan Boneh, Mike Hamburg, Mark Handley, David Mazières, Quinn Slack Stanford, UCL

Network Security. Computer Networking Lecture 08. March 19, HKU SPACE Community College. HKU SPACE CC CN Lecture 08 1/23

Network Security Fundamentals

CSE/EE 461 Lecture 23

Network Security. Marcus Bendtsen Institutionen för Datavetenskap (IDA) Avdelningen för Databas- och Informationsteknik (ADIT)

The GlobalCerts TM Secur Gateway TM

Network Security Essentials Chapter 5

Secure Sockets Layer (SSL ) / Transport Layer Security (TLS) Network Security Products S31213

As enterprises conduct more and more

Network Security #10. Overview. Encryption Authentication Message integrity Key distribution & Certificates Secure Socket Layer (SSL) IPsec

SECURITY IN NETWORKS

APNIC elearning: Network Security Fundamentals. 20 March :30 pm Brisbane Time (GMT+10)

Key Management and Distribution

Final exam review, Fall 2005 FSU (CIS-5357) Network Security

Security (II) ISO : Security Architecture of OSI Reference Model. Outline. Course Outline: Fundamental Topics. EE5723/EE4723 Spring 2012

Real-Time Communication Security: SSL/TLS. Guevara Noubir CSU610

Secure in times of rising mobile communication

Lab Exercise SSL/TLS. Objective. Step 1: Open a Trace. Step 2: Inspect the Trace

7 Key Management and PKIs

Djigzo encryption. Djigzo white paper

Transcription:

Lightweight Security using Identity-Based Encryption Guido Appenzeller Chief Technology Officer Voltage Security Inc.

Identity-Based Encryption (IBE) IBE is a new public key encryption algorithm A number of widely-used encryption algorithms are already available (RSA, ECC etc.) Why should we care about a new one? 1. IBE results in vastly simplified key management, which makes it much more lightweight to deploy 2. It can be used to build security protocols with extremely low overhead 3. Industry is adopting it, as it solves problems with existing encryption solutions 2

Agenda 1. Identity-Based Encryption (IBE) Key management How IBE works IBE vs. PKI 2. Lightweight Communications with IBE Identity-Based Key Exchange Handshake-free protocols 3

Agenda 1. Identity-Based Encryption (IBE) Key management How IBE works IBE vs. PKI 2. Lightweight Communications with IBE Identity-Based Key Exchange Handshake-free protocols 4

Good News: Encryption and Signing is Easy! How do we make sure both sides have the right keys? Encryption/ Authentication Key Decryption/ Authentication Key Alice Bob 5

Key Management with Symmetric Keys Encryption Key and Decyrption Key are the same Total Keys How many keys total for 8 participants? 28 6

Key Management with Symmetric Keys Key Management with Symmetric Keys doesn t scale Network of 8 parties requires managing 28 keys Network of 1000 parties requires 500,000 keys Network of N parties requires N(N+1)/2 keys 7

Public Key Infrastructure (PKI) Today, most signing/encryption is done with Public Key Encryption Algorithms Users have a Public Key and a Private Key Only need one key per party, total of N keys for N parties Keys are bound to users with Certificates Examples: RSA, Elliptic Curve etc. Managing PKI Certificates has issues of its own How do I revoke a certificate? How do I find the certificate of a recipient? How do I manage certificate distribution What do I do if private keys are lost 8

Identity-Based Ecryption Basic Idea: Public-key Encryption where Identities are Public Keys IBE Public Key: alice@gmail.com RSA Public Key: Public exponent=0x10001 Modulus=13506641086599522334960321627880596993888147 560566702752448514385152651060485953383394028715 057190944179820728216447155137368041970396419174 304649658927425623934102086438320211037295872576 235850964311056407350150818751067659462920556368 552947521350085287941637732853390610975054433499 9811150056977236890927563 9

IBE does not need certificates Certificates bind Public Keys to Identities e.g. bob@b.com has key 0x87F6 Signed by a Certification Authority In IBE, Identity and Public Key is the same No certificate needed X No certificate revocation No certificate servers No pre-enrollment 10

Identity-Based Encryption (IBE) IBE is an old idea Originally proposed by Adi Shamir, co-inventor of the RSA Algorithm, in 1984 First practical implementation Boneh-Franklin Algorithm published at Crypto 2001 Based on well-tested building blocks for encryption (elliptic curves and pairings) IBE is having a major impact already Over 200 scientific publications on IBE/Pairings Boneh-Franklin paper cited 356 times so far (Google Scholar) Dan Boneh awarded 2005 RSA Conference Award for Mathematics for inventing IBE 11

IEEE 1363.3 Pairing Based IBE Standard IEEE 1363 Standards Group Wrote standard on RSA and Elliptic Curve Cryptography Now taking steps to standardize IBE Pairing Based Cryptography Standard IBE is the main algorithm in the standard Tentative name is IEEE 1363.3 Formal working group expected to start work in Summer 2005 IBE Standards kick-off workshop at the National Institute of Standards (NIST) on April 18 th 12

How IBE works in practice Alice sends a Message to Bob Key Server Requests private key, authenticates 2 Receives 3 Private Key for bob@b.com bob@b.com alice@a.com bob@b.com 13 Alice encrypts with bob@b.com 1 Bob decrypts with Private Key 4

How IBE works in practice Alice sends a Message to Bob Key Server Fully off-line - no connection to server required bob@b.com charlie@a.com bob@b.com 14 Charlie encrypts with bob@b.com 1 Bob decrypts with Private Key 2

Securing Data at the Perimeter INTERNET Internal Network Key Server IBE Gateway Encrypted email arrives 1 Gateway decrypts email 2 User receives encrypted email 3 15

Inspecting Secured Data IBE allows content inspection for end-to-end encrypted data INTERNET DMZ LAN Voltage IBE Gateway Server Exchange, Domino, etc. GW Virus Audit Archive GW Encrypted email arrives 1 Email is scanned 2 User receives encrypted email 3 16

User authentication Voltage can support any type of authentication Authentication needs differs by Application More sensitive data, requires stronger authentication Identity-Based Encryption scales across all levels External auth integration Leverage existing passwords, directories, portals, etc. Out of the box support for ad-hoc, self-provisioning auth Key Server Auth. Service More on this later 17

The IBE Key Server Master Secret s = 1872361923616378 Key Server Request for Private Key for Identity bob@b.com Key Server has Master Secret to generate keys A random secret is picked when the server is set up Each organization has a different Master Secret Private key is generated from Master Secret and Identity 18

Key Revocation, Expiration and Policy bob@wellsfargo.com e-mail address week = 252 key validity Key validity enables revocation key freshness Every week public key changes, so every week a new private key is issued revocation can be done on weekly basis To revoke someone, simply remove him from the authentication mechanism (e.g. corporate directory) 19

Key Management - Public Key Infrastructure Certificate Server binds Identity to Public Key Certificate Server Store Certificate Certification Authority CA Signing Key Look up Bob s Certificate, Check revocation Send Public Key, Authenticate CA Public Key Receive Certificate Store Bob s Private Key Recovery Server CA Public Key alice@a.com Bob s Private Key Bob s Public Key bob@b.com 20

Key Management - IBE Binding is done by mathematics Certificate Server Look up Bob s Certificate, Check revocationx Store Certificate IBE Key Server Send Identity, Authenticate Master Secret Public Parameters Receive Private Key Recovery Server Store Bob s Private KeyX Public Parameters alice@a.com Bob s Private Key bob@b.com 21

Key Management IBE vs. PKI IBE has no Certificates and Certificate management No certificate server, certificate lookups No certificate (or key) revocation, CRLs, OCSP etc. Instead, IBE uses short-lived keys. Unlike PKI, IBE requires no pre-enrollment In PKI, recipient must generate key pair before sender can encrypt message IBE is Ad-Hoc capable, a sender can send message at any time IBE eliminates encryption key recovery/escrow server Most PKI applications require access to private keys (e.g. Lost keys, Financial Audit, Virus Filtering etc.) Key server can generate any key on the fly 22

Hardware support for IBE IBE Smart Cards Two major smart card vendors now support IBE Encryption/Decryption done natively on the card Under one second per operation Special Server Hardware Protect Master Secret with a Hardware Security Module (HSM) Key generation takes place inside the HSM Authentication may also take place inside HSM Even if you steal the server, you can t get the master secret or issue keys 23

Agenda 1. Identity-Based Encryption (IBE) Key management How IBE works IBE vs. PKI 2. Lightweight Communications with IBE Identity-Based Key Exchange Handshake-free protocols 24

Lightweight Communication between Devices with IBE In an IBE System, public keys are not limited to email addresses Any Identifier can be used as public key e.g. IP addresses, Device IDs, If I know your Device ID, I can encrypt data to you We can combine long and short-lived keys E.g. Devices and Controllers get long-lived keys People (service personal) get short-lived keys 25

IBE based Key Exchange With IBE, you can do a key exchange doesn t require communications Shared secret can only be generated if you know the other ID and your private key: S(ID A,K Priv B) = S(ID B,K Priv A) From this you can generate symmetric Encryption Key s and MAC Key h using hashing No lookup to certificate server or naming server required No latency from handshake 26

Example: IPSec with Opportunistic Encryption RFD draft-richardson-ipsec-opportunistic Example: ping c 1 71.64.64.64 1. DNS request: txt record for B 2. DNS reply: txt record for B 3. ISKAMP phase 1, Main Mode 4. ISKAMP phase 1, #2 5. ISKAMP phase 1, #3 6. ISKAMP phase 1, #4 7. ISKAMP phase 1, #5 8. ISKAMP phase 1, success 9. DNS request: txt record for A 10. DNS reply: txt record for A 11. ISKAMP phase 2 negotiation 12. DNS reverse lookup for A 13. DNS reply 14. ISKAMP phase 2, #4 15. First encrypted packet 16. Encrypted return packet cs.stanford.edu 16 14 8 15 2 7 5 11 3 1 home.dsl.net 9 12 6 4 10 13 DNS DNS 27

IBE based Network Layer Security Low overhead, no handshake required Outer packet format IP header Payload Format HMAC h [Encr. Pld] Encr s [Payload] 40 bytes 20 bytes [ ] Random len proto IP Packet Data 20 bytes 2 1 1 [ ] - IP header unencrypted proto is original IP next header protocol length is original length (encrypted length is padded for block cypher) Overhead: 44 bytes per packet 28

Conclusion IBE is a new public key encryption algorithm Identities (e.g. names, device IDs) are public keys IBE reduces the overhead associated with encryption and signing infrastructure No certificates, certificate lookup required Simplified revocation and expiration Key generation at the key server IBE allows you to build lightweight secure protocols Handshake-free key exchange No need for external secure naming service 29

30