Practical Yet Universally Composable Two-Server Password-Authenticated Secret Sharing



Similar documents
Practical Yet Universally Composable Two-Server Password-Authenticated Secret Sharing

Practical Yet Universally Composable Two-Server Password-Authenticated Secret Sharing

MANAGING OF AUTHENTICATING PASSWORD BY MEANS OF NUMEROUS SERVERS

Server-Assisted Generation of a Strong Secret from a Password

Lecture 10: CPA Encryption, MACs, Hash Functions. 2 Recap of last lecture - PRGs for one time pads

On the Limits of Anonymous Password Authentication

Authenticating Humans

Connected from everywhere. Cryptelo completely protects your data. Data transmitted to the server. Data sharing (both files and directory structure)

Q: Why security protocols?

Arnab Roy Fujitsu Laboratories of America and CSA Big Data WG

Efficient Similarity Search over Encrypted Data

Authentication in WLAN

Two Factor Zero Knowledge Proof Authentication System

WHITE PAPER AUGUST Preventing Security Breaches by Eliminating the Need to Transmit and Store Passwords

Secure Deduplication of Encrypted Data without Additional Independent Servers

KEY DISTRIBUTION: PKI and SESSION-KEY EXCHANGE. Mihir Bellare UCSD 1

CSC Network Security. User Authentication Basics. Authentication and Identity. What is identity? Authentication: verify a user s identity

Capture Resilient ElGamal Signature Protocols

Computer and Network Security. Outline

Using etoken for SSL Web Authentication. SSL V3.0 Overview

Data Protection: From PKI to Virtualization & Cloud

Enhancing Cloud Security By: Gotcha (Generating Panoptic Turing Tests to Tell Computers and Human Aparts)

Improving data integrity on cloud storage services

SWFP: Secure Web Feed Protocol

Welcome to the Protecting Your Identity. Training Module

SY system so that an unauthorized individual can take over an authorized session, or to disrupt service to authorized users.

SECURING SELF-SERVICE PASSWORD RESET

The Feasibility and Application of using a Zero-knowledge Protocol Authentication Systems

Using Foundstone CookieDigger to Analyze Web Session Management

Contents. Identity Assurance (Scott Rea Dartmouth College) IdM Workshop, Brisbane Australia, August 19, 2008

Research Article. Research of network payment system based on multi-factor authentication

Bit Chat: A Peer-to-Peer Instant Messenger

Application Security Testing. Generic Test Strategy

Secure Remote Password (SRP) Authentication

Apache Milagro (incubating) An Introduction ApacheCon North America

Lecture 9 - Message Authentication Codes

Verifiable Delegation of Computation over Large Datasets

High-speed cryptography and DNSCurve. D. J. Bernstein University of Illinois at Chicago

PASSWORD MANAGEMENT. February The Government of the Hong Kong Special Administrative Region

Public Key Infrastructure (PKI)

Configuring DoD PKI. High-level for installing DoD PKI trust points. Details for installing DoD PKI trust points

Authentication Types. Password-based Authentication. Off-Line Password Guessing

Outlook 2010 Setup Guide (POP3)

1 Digital Signatures. 1.1 The RSA Function: The eth Power Map on Z n. Crypto: Primitives and Protocols Lecture 6.

How To Encrypt Data With Encryption

Exploiting Transparent User Identification Systems

Overview of Public-Key Cryptography

White Paper: Multi-Factor Authentication Platform

Secure Data transfer in Cloud Storage Systems using Dynamic Tokens.

2.4: Authentication Authentication types Authentication schemes: RSA, Lamport s Hash Mutual Authentication Session Keys Trusted Intermediaries

Ciphermail for Android Quick Start Guide

CSE543 - Introduction to Computer and Network Security. Module: Public Key Infrastructure

Server Security. Contents. Is Rumpus Secure? 2. Use Care When Creating User Accounts 2. Managing Passwords 3. Watch Out For Aliases 4

An Enhanced Remote Authentication Scheme using Secure Key Exchange Protocol with Platform Integrity Attestation

Criteria for web application security check. Version

Mitigating Server Breaches with Secure Computation. Yehuda Lindell Bar-Ilan University and Dyadic Security

PKI: Public Key Infrastructure

Wireless Networks. Welcome to Wireless

Part I. Universität Klagenfurt - IWAS Multimedia Kommunikation (VK) M. Euchner; Mai Siemens AG 2001, ICN M NT

Certificate Based Signature Schemes without Pairings or Random Oracles

7 Key Management and PKIs

WHITE PAPER Usher Mobile Identity Platform

Security vulnerabilities in new web applications. Ing. Pavol Lupták, CISSP, CEH Lead Security Consultant

New Single Sign-on Options for IBM Lotus Notes & Domino IBM Corporation

Authentication. Computer Security. Authentication of People. High Quality Key. process of reliably verifying identity verification techniques

Victor Shoup Avi Rubin. Abstract

Strong and Convenient Multi-Factor Authentication on Mobile Devices

Client Server Registration Protocol

Midterm 2 exam solutions. Please do not read or discuss these solutions in the exam room while others are still taking the exam.

Network Security. Gaurav Naik Gus Anderson. College of Engineering. Drexel University, Philadelphia, PA. Drexel University. College of Engineering

Protocols for Secure Cloud Computing

CS 161 Computer Security Spring 2010 Paxson/Wagner MT2

Part 2 D(E(M, K),K ) E(M, K) E(M, K) Plaintext M. Plaintext M. Decrypt with private key. Encrypt with public key. Ciphertext

2 Protocol Analysis, Composability and Computation

National Cyber Security Month 2015: Daily Security Awareness Tips

Attestation and Authentication Protocols Using the TPM

Remote Access Securing Your Employees Out of the Office

Cloud Computing: What needs to Be Validated and Qualified. Ivan Soto

White Paper Preventing Man in the Middle Phishing Attacks with Multi-Factor Authentication

CSCE 465 Computer & Network Security

Extended SSL Certificates

Attacks on the Pairing Protocol of Bluetooth v2.1

Transcription:

Practical Yet Universally Composable Two-Server Password-Authenticated Secret Sharing Jan Camenisch (IBM Research Zurich) Anna Lysyanskaya (Brown University) Gregory Neven (IBM Research Zurich)

Password breaches summer 2012 2

Password breaches summer 2012 3

Password breaches summer 2012 4

Password breaches summer 2012 5

Password breaches summer 2012 6

Password breaches summer 2012 7

Password breaches summer 2012 8

Password breaches summer 2012 9

Remedies Use strong, hard-to-guess passwords Use different passwords for different sites Change passwords on regular basis Don t write passwords down yeah, right. 10

The root of the problem (1) Passwords inherently insecure? No! We re just using them incorrectly Problem 1: Passwords useless against offline attacks 16-character passwords 30 bits entropy [NIST] 1bn possibilities $150 GPUs test several bn per second 60% of LinkedIn passwords cracked within 24h Online cracking services: $17 for 3bn words, $136 for 25tn, ready in 2h Passwords quite effective against online attacks, iff throttling : block account/ip, CAPTCHAs, time delays after failed attempts 11

The root of the problem (2) Problem 2: Single-server solutions inherently vulnerable to offline attacks: server/hacker can always guess & test Solution: multi-server password verification protocols no server alone can test password Server S 1 User password correct? Server S 2 12

Overview Design goals & related work Universally composable security for 2PASS Protocol idea Conclusion 13

Overview Design goals & related work Universally composable security for 2PASS Protocol idea Conclusion 14

Design goals Two-server password-authenticated secret sharing (2PASS) User remembers username, password, server names Store & reconstruct strong secret K (and thereby any encrypted data) Single corrupt server cannot perform offline attack on password (attempts) learn stored secret K convince honest server that wrong password is correct Assume PKI (e.g., hardcoded in client software) 15

Killer application: distributed password store Website password = JtI$K_0h%xw2 User Server S 1 2PASS( Mem0riz@b1e, K) C = Enc K ( JtI$K_0h%xw2 ) Server S 2 Cloud Storage One person, one password No (hacker of) single 2PASS server can steal website passwords Websites keep ordinary username/password infrastructure 16

Related work Multi-server password-authenticated secret sharing (PASS) Bagherzandi et al. (2011): t-out-of-n servers, property-based security proofs Multi-server password-authenticated key exchange (PAKE) Ford-Kaliski (2000), Jablon (2001), Brainard et al. (2003): no security proofs MacKenzie et al. (2002), Di Raimondo-Gennaro (2003), Szydlo-Kaliski (2005), Katz et al. (2005) property-based proofs Long line of work on single-server PAKE Our contribution: first universally composable (UC) 2PASS 17

Overview Design goals & related work Universally composable security for 2PASS Protocol idea Conclusion 18

The case for UC in password-based protocols Property-based definitions Passwords chosen according to known, independent distributions (reality: people reuse, share, leak info about passwords) Adversary sees authentications with correct password only (reality: typos!) Problematic w.r.t. composition due to non-negligible attack probability UC definitions Environment chooses passwords & password attempts no assumptions on distributions, typos covered Composes nicely with itself & other protocols Overall: UC more natural & practically relevant for password-based protocols 19

2PASS ideal functionality At most one corrupt server doesn t learn anything about password p password attempt q key K learns whether p=q only if all honest servers cooperate (throttling) cannot set honest user up with wrong K cannot make honest server accept if p q Further complications to the model Avoid implying Byzantine agreement or atomic broadcast Multiple concurrent setup/retrieve queries Query hijacking 20

Overview Design goals & related work Universally composable security for 2PASS Protocol idea Conclusion 21

Protocol: high-level idea Setup Brainard et al. (2003) username u password p stored key K u,s 1,S 2, p 1,K 1 Server S 1 u,s 1,S 2, p 1,K 1 p = p 1 p 2 K = K 1 K 2 User (secure channels) secret sharing u,s 1,S 2, p 2,K 2 Server S 2 u,s 1,S 2, p 2,K 2 22

Protocol: high-level idea Retrieve Brainard et al. (2003) username u password p password attempt q stored key K u,q 1 Server S 1 u,s 1,S 2, p 1,K 1 q = q 1 q 2 K K 1 K 2 User K 1? p 1 p 2 = q 1 q 2 K 2 u,q 2 Server S 2 u,s 1,S 2, p 2,K 2 23

Protocol: UC strengthening Setup username u password p stored key K u,s 1,S 2, p 1,K 1 encrypt to the sky (PK in CRS) Server S 1 u,s 1,S 2, p 1,K 1 p = p 1 p 2 K = K 1 K 2 User signed acks u,s 1,S 2, p 2,K 2 Server S 2 u,s 1,S 2, p 2,K 2 24

Protocol: UC strengthening Retrieve username u password p password attempt q stored key K u,q 1 encrypt to the sky (PK in CRS) Server S 1 u,s 1,S 2, p 1,K 1 q = q 1 q 2 K K 1 K 2 User K 1 K 2? p 1 p 2 = q 1 q 2 homomorphic enc + sim-sound ZK u,q 2 encrypt to fresh user pk with labels to bind to query signatures to bind to servers Server S 2 u,s 1,S 2, p 2,K 2 25

Efficiency Avoid heavy UC machinery by careful design F CERT and F CRS as only UC subcomponents CPA encryption to sky by revealing randomness Efficient ZKPs in random-oracle model Most heavy lifting done by servers No additional secure channels needed (e.g., SSL) User comp Server comp User/Server comm Server/Server comm Setup 18 exp 10 exp 17 el 1 el Retrieve 19 exp 30 exp 16 el 6 el, 9 exp, 3 hash 26

Overview Design goals & related work Universally composable security for 2PASS Protocol idea Conclusion 27

Conclusion One person, one password Single-server solutions doomed, multi-server way to go UC security most natural model beyond composability Efficiency through careful crypto design Many open problems stay tuned t-out-of-n PASS Adaptive corruptions Password-only (i.e., no public keys) 28