Server-Assisted Generation of a Strong Secret from a Password



Similar documents
Capture Resilient ElGamal Signature Protocols

Arcot Systems, Inc. Securing Digital Identities. FPKI-TWG Mobility Solutions Today s Speaker Tom Wu Principal Software Engineer

SECURITY ANALYSIS OF A SINGLE SIGN-ON MECHANISM FOR DISTRIBUTED COMPUTER NETWORKS

Public Key Infrastructure (PKI)

CRYPTOGRAPHY IN NETWORK SECURITY

Client Server Registration Protocol

Why Password- Enabled PKI

Practical Yet Universally Composable Two-Server Password-Authenticated Secret Sharing

Common security requirements Basic security tools. Example. Secret-key cryptography Public-key cryptography. Online shopping with Amazon

Chapter 10. Cloud Security Mechanisms

Alternative: Strong password Protocols

Network Security. Computer Networking Lecture 08. March 19, HKU SPACE Community College. HKU SPACE CC CN Lecture 08 1/23

MANAGING OF AUTHENTICATING PASSWORD BY MEANS OF NUMEROUS SERVERS

Chapter 9 Key Management 9.1 Distribution of Public Keys Public Announcement of Public Keys Publicly Available Directory

CHAPTER 4 DEPLOYMENT OF ESGC-PKC IN NON-COMMERCIAL E-COMMERCE APPLICATIONS

Authentication Types. Password-based Authentication. Off-Line Password Guessing

2.4: Authentication Authentication types Authentication schemes: RSA, Lamport s Hash Mutual Authentication Session Keys Trusted Intermediaries

CIS 6930 Emerging Topics in Network Security. Topic 2. Network Security Primitives

IY2760/CS3760: Part 6. IY2760: Part 6

Security Policy Revision Date: 23 April 2009

KEY DISTRIBUTION: PKI and SESSION-KEY EXCHANGE. Mihir Bellare UCSD 1

Using etoken for Securing s Using Outlook and Outlook Express

Arkansas Department of Information Systems Arkansas Department of Finance and Administration

Computer Networks. Network Security and Ethics. Week 14. College of Information Science and Engineering Ritsumeikan University

Secure Authentication of Distributed Networks by Single Sign-On Mechanism

SSL A discussion of the Secure Socket Layer

CS 758: Cryptography / Network Security

Introduction to Network Security Key Management and Distribution

Network Security. Abusayeed Saifullah. CS 5600 Computer Networks. These slides are adapted from Kurose and Ross 8-1

Data Protection: From PKI to Virtualization & Cloud

Cryptography and Network Security

Secure Remote Password (SRP) Authentication

VoteID 2011 Internet Voting System with Cast as Intended Verification

Mitigating Server Breaches with Secure Computation. Yehuda Lindell Bar-Ilan University and Dyadic Security

WHITE PAPER AUGUST Preventing Security Breaches by Eliminating the Need to Transmit and Store Passwords

Contents. Identity Assurance (Scott Rea Dartmouth College) IdM Workshop, Brisbane Australia, August 19, 2008

CPSC 467b: Cryptography and Computer Security

PRIVACY, SECURITY AND THE VOLLY SERVICE

The Mathematics of the RSA Public-Key Cryptosystem

Windows Remote Access

Entrust Managed Services PKI. Getting started with digital certificates and Entrust Managed Services PKI. Document issue: 1.0

CHOOSING THE RIGHT PORTABLE SECURITY DEVICE. A guideline to help your organization chose the Best Secure USB device

CS 356 Lecture 28 Internet Authentication. Spring 2013

Final exam review, Fall 2005 FSU (CIS-5357) Network Security

Digital Certificates (Public Key Infrastructure) Reshma Afshar Indiana State University

Module 8. Network Security. Version 2 CSE IIT, Kharagpur

Practice Questions. CS161 Computer Security, Fall 2008

The Use of the Simple Certificate Enrollment Protocol (SCEP) and Untrusted Devices

Plain English Guide To Common Criteria Requirements In The. Field Device Protection Profile Version 0.75

1. a. Define the properties of a one-way hash function. (6 marks)

Secure Login Issues & Solutions

Den Gode Webservice - Security Analysis

Chapter 7: Network security

Connected from everywhere. Cryptelo completely protects your data. Data transmitted to the server. Data sharing (both files and directory structure)

Authentication Application

Security vulnerabilities in the Internet and possible solutions

It s All About Authentication

Network Security. Gaurav Naik Gus Anderson. College of Engineering. Drexel University, Philadelphia, PA. Drexel University. College of Engineering

Using etoken for SSL Web Authentication. SSL V3.0 Overview

Cryptography and network security CNET4523

CS 392/681 - Computer Security

Controller of Certification Authorities of Mauritius

HKUST CA. Certification Practice Statement

MANAGED FILE TRANSFER: 10 STEPS TO PCI DSS COMPLIANCE

Cryptosystems. Bob wants to send a message M to Alice. Symmetric ciphers: Bob and Alice both share a secret key, K.

MANAGED FILE TRANSFER: 10 STEPS TO SOX COMPLIANCE

CSCE 465 Computer & Network Security

Securing your Online Data Transfer with SSL

Smart Card- An Alternative to Password Authentication By Ahmad Ismadi Yazid B. Sukaimi

INTERNET SECURITY: FIREWALLS AND BEYOND. Mehernosh H. Amroli

Outline. Computer Science 418. Digital Signatures: Observations. Digital Signatures: Definition. Definition 1 (Digital signature) Digital Signatures

High-speed cryptography and DNSCurve. D. J. Bernstein University of Illinois at Chicago

Fact Sheet FOR PHARMA & LIFE SCIENCES

Security & Privacy on the WWW. Topic Outline. Information Security. Briefing for CS4173

You re FREE Guide SSL. (Secure Sockets Layer) webvisions


Systematization of Knowledge Lessons Learned From SSL/TLS Attacks

Attestation and Authentication Protocols Using the TPM

The DoD Public Key Infrastructure And Public Key-Enabling Frequently Asked Questions

preliminary experiment conducted on Amazon EC2 instance further demonstrates the fast performance of the design.

WHITE PAPER Usher Mobile Identity Platform

12/3/08. Security in Wireless LANs and Mobile Networks. Wireless Magnifies Exposure Vulnerability. Mobility Makes it Difficult to Establish Trust

Criteria for web application security check. Version

Security and Authorization. Introduction to DB Security. Access Controls. Chapter 21

Encryption, Data Integrity, Digital Certificates, and SSL. Developed by. Jerry Scott. SSL Primer-1-1

VICTORIA UNIVERSITY OF WELLINGTON Te Whare Wānanga o te Ūpoko o te Ika a Māui

Overview of CSS SSL. SSL Cryptography Overview CHAPTER

Secure Your Enterprise with Usher Mobile Identity

Browser Enhancements to Support SSL/TLS Session-Aware User Authentication

Overview of Cryptographic Tools for Data Security. Murat Kantarcioglu

Associate Prof. Dr. Victor Onomza Waziri

Chapter 8 Security. IC322 Fall Computer Networking: A Top Down Approach. 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012

Transcription:

Server-Assisted Generation of a Strong Secret from a Password Warwick Ford, VeriSign, Inc. (Joint research with Burt Kaliski, RSA Laboratories)

Requirement! User who roams between client terminals needs to obtain private key or data strongly authenticate to application servers! No local stored state! No smartcards! Private data downloaded from online credentials server

Traditional Credentials Server Solution User presents password Private Data Delivery Protocol Credentials Server Credentials Repository Throttling/lockout function! Surveyed in Perlman & Kaufman, NDSS 99 Examples EKE, SPEKE! Protocol exposes no information about private data! Throttling/lockout: Limits password guessing Makes friendly passwords possible Based on failed password authentications

Weakness in Traditional Design! If server compromised, attacker can potentially: Attack credentials database, e.g., password verifiers by exhaustive attack (even if passwords not determinable directly) Disable throttling/lockout and exhaustively attack with password guesses! Vulnerable to password attack! Password exposure means private data exposure! Many users may be compromised in one attack

Solution - Multiple Servers User presents password Private Data Delivery Protocol Private Data Delivery Protocol Throttling/lockout function Credentials Server Credentials Server Credentials Repository Credentials Repository Throttling/lockout function! Objective: Compromise of one server exposes neither private data nor password! Not as easy as it looks Ordinary secret-sharing not adequate if servers have to verify passwords

Basic Approach! Client generates strong master secret K via interaction with two or more servers! Client proves successful regeneration of K to all servers! K can unlock encrypted private data or facilitate authentication to other servers! No server can learn K or password

In More Detail! Pre-knowledge User knows password P Each server S i holds its own secret d i for that user Each S i also holds its own strong verifier K i for K! Client generates strong master secret K For each S i, client computes strong secret R i via a password hardening transaction depending on P and d i subject to throttling/lockout Combines all the R i to give K! Client proves successful regeneration of K to servers For each server S i generates strong verifier K i from K Demonstrates knowledge of K i to server S i! K can unlock encrypted private data or facilitate authentication to other servers

Secret-Strengthening Protocol User U Shared strong prime p = 2q + 1 Server S 1 Password P entered w = f(p) Generate random k U, r U, d 1 s 1 s 1 = r d 1 mod p r = w k mod p R 1 = s 1 1/k mod p = w d 1 mod p! Properties: R 1 is a strong secret Observer cannot feasibly learn R 1,d 1 or P Server cannot feasibly learn R 1 [or P?] Same R 1 always generated for same P

Do It with Two Servers User U Password P entered w = f(p) Generate random k U, r s 1 Server S 1 s 1 = r d1 mod p U, d 1 r = w k mod p R 1 = s 1 1/k mod p = w d 1 mod p R 2 = s 2 1/k mod p = w d 2 mod p K = KDF (R 1, R 2 ) U, r Server S 2 s 2 = r d2 mod p s 2 U, d 2! Properties: K is a strong secret Observer cannot feasibly learn K or P Neither server can feasibly learn K or P Same K always generated for same P Both servers need to cooperate for K to be generated

Now Prove It was Successful User U Pre-establish K 1 = OWF(K, 1) K 2 = OWF(K, 2) Server S 1 Generate n 1 K 1 = OWF(K, 1) n 1 OWF (K 1,n 1 ) Verify OWF (K 1,n 1 ) U, K 1 K 2 = OWF(K, 2) n 2 Server S 2! Properties: OWF (K 2,n 2 ) Generate n 2 Verify OWF (K 2,n 2 ) Each server gets proof that client knows K Server s knowledge of K i does not feasibly assist determining K (or password) U, K 2

Some Variants! Other secret-strengthening protocols ECC variant is obvious RSA-based also exists! Other verification methods K decrypts a private digital signature key; signed nonce proves regeneration to server holding public key! Use threshold functions in combining hardened passwords! Use other functions of master secret to authenticate to other (application) servers

A Special Case Variant! Client interacts with password hardening server S 1 to obtain R 1! Client uses T 1 derived from R 1 to authenticate to a second server S 2! S 2 confidentially delivers to client: secret K encrypted under T 2 derived from R 1! Client decrypts K! Client verifies to S 1 by proving regeneration of K

Special Case Variant - Protocol User U Password P entered w = f(p) Generate random k r = w k mod p R 1 = s 1/k 1 mod p T 1 = OWF(R 1, 1) T 2 = OWF(R 1, 2) K = D T2 (E T2 (K)) Server S 1 s 1 = r d1 mod p U, r U, d 1 T 1 s 1 Server S 2 E T2 (K) U, T 1, E T2 (K) Secure channel! Properties: Then prove knowledge of K to S 1 Attractive when S 2 already exists (e.g., SSL or SPEKE server) Adding one password hardening server S 1 provides the requisite added strength

The Fundamental Characteristics! Must recover a master secret using more than one independent server all of which contribute to recovering the secret all of which employ throttling/lockout! At least one secret-contributing server must use secret-strengthening! Must prove successful regeneration of a strong secret to at least two verification servers

Non-Repudiation Ramifications! Single server design is weak wrt nonrepudiation user can plausibly claim that insider/penetrator at the server recovered the private key and signed! The multi-server design significantly improves non-repudiation it is much harder to mount a plausible argument that independently controlled servers colluded! But, claims of non-repudiability still rest on confidence that the client terminal is secure there is no silver bullet for this concern

Summary of the Technology! Traditional credentials server architecture is vulnerable to server compromise and exhaustive password guessing against stored password-derived values Server vulnerability raises security concerns and kills non-repudiation! Need multiple independent servers contributing to secret regeneration Each must independently throttle/lockout! Need password hardening as a basis of establishing strong secret from weak secret

Deployment Status!Current-shipping VeriSign enterprise PKI offering includes the option: Two-server secret-strengthening technology to support protection of private key plus arbitrary user data Servers may be operated by Enterprise and/or VeriSign!Alternative packagings (e.g., for SSO, Aggregation) in development

For More Information! See Ford/Kaliski WETICE 2000 paper at: http://www.verisign.com/repository/pubs/roaming.pdf! Contact details: Warwick Ford, VeriSign, Inc. E-mail: wford@verisign.com Tel: (781) 245 6996 x225