Alternative: Strong password Protocols



Similar documents
Authentication Types. Password-based Authentication. Off-Line Password Guessing

2.4: Authentication Authentication types Authentication schemes: RSA, Lamport s Hash Mutual Authentication Session Keys Trusted Intermediaries

Authentication Protocols

CS 494/594 Computer and Network Security

Authentication. Computer Security. Authentication of People. High Quality Key. process of reliably verifying identity verification techniques

CSCE 465 Computer & Network Security

Secure Remote Password (SRP) Authentication

Internet Key Exchange (IKE) EJ Jung

Overview of Public-Key Cryptography

Practice Questions. CS161 Computer Security, Fall 2008

Server-Assisted Generation of a Strong Secret from a Password

CIS 6930 Emerging Topics in Network Security. Topic 2. Network Security Primitives

Client Server Registration Protocol

Security and Operating Systems It s the Application

Network Security. Computer Networking Lecture 08. March 19, HKU SPACE Community College. HKU SPACE CC CN Lecture 08 1/23

Key Management. CSC 490 Special Topics Computer and Network Security. Dr. Xiao Qin. Auburn University

Why Password- Enabled PKI

Network Security. Abusayeed Saifullah. CS 5600 Computer Networks. These slides are adapted from Kurose and Ross 8-1

Network Security CS 5490/6490 Fall 2015 Lecture Notes 8/26/2015

THE UNIVERSITY OF TRINIDAD & TOBAGO

CS 758: Cryptography / Network Security

KEY DISTRIBUTION: PKI and SESSION-KEY EXCHANGE. Mihir Bellare UCSD 1

Chapter 8. Cryptography Symmetric-Key Algorithms. Digital Signatures Management of Public Keys Communication Security Authentication Protocols

Chapter 16: Authentication in Distributed System

SFWR ENG 4C03 - Computer Networks & Computer Security

Network Security Protocols: A Tutorial. Radia Perlman May 2005 (radia.perlman@sun.com)

Chapter 8 Security. IC322 Fall Computer Networking: A Top Down Approach. 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012

CSC Network Security. User Authentication Basics. Authentication and Identity. What is identity? Authentication: verify a user s identity

The Mathematics of the RSA Public-Key Cryptosystem

Principles of Network Security

Security. Contents. S Wireless Personal, Local, Metropolitan, and Wide Area Networks 1

Efficient nonce-based authentication scheme for Session Initiation Protocol

SECURITY ANALYSIS OF A SINGLE SIGN-ON MECHANISM FOR DISTRIBUTED COMPUTER NETWORKS

TELE 301 Network Management. Lecture 16: Remote Terminal Services

Digital Cash. is not a check, credit card or a debit card. They leave audit trails. can be sent through computer networks.

YALE UNIVERSITY DEPARTMENT OF COMPUTER SCIENCE

IPsec Details 1 / 43. IPsec Details

High Security Online Backup. A Cyphertite White Paper February, Cloud-Based Backup Storage Threat Models

CS Computer Security Third topic: Crypto Support Sys

: Network Security. Name of Staff: Anusha Linda Kostka Department : MSc SE/CT/IT

Network Security [2] Plain text Encryption algorithm Public and private key pair Cipher text Decryption algorithm. See next slide

Digital Signature. Raj Jain. Washington University in St. Louis

Public Key Cryptography in Practice. c Eli Biham - May 3, Public Key Cryptography in Practice (13)

E- Encryption in Unix

Efficient Nonce-based Authentication Scheme for. session initiation protocol

IPSEC: IKE. Markus Hidell Based on material by Vitaly Shmatikov, Univ. of Texas, and by the previous course teachers

Network Security. HIT Shimrit Tzur-David

Dr. Arjan Durresi. Baton Rouge, LA These slides are available at:

Elements of Applied Cryptography. Key Distribution. Trusted third party: KDC, KTC Diffie-Helmann protocol The man-in-the-middle attack

2-FACTOR AUTHENTICATION FOR MOBILE APPLICATIONS: INTRODUCING DoubleSec

Final Exam. IT 4823 Information Security Administration. Rescheduling Final Exams. Kerberos. Idea. Ticket

SECURITY IN NETWORKS

Module 7 Security CS655! 7-1!

CSC474/574 - Information Systems Security: Homework1 Solutions Sketch

How To Use Kerberos

Secure Socket Layer. Introduction Overview of SSL What SSL is Useful For

CPSC 467b: Cryptography and Computer Security

Security Characteristics of Cryptographic Mobility Solutions

Cryptography and Network Security

Secure File Transfer Using USB

Forward Secrecy: How to Secure SSL from Attacks by Government Agencies

Capture Resilient ElGamal Signature Protocols

Cryptography: Authentication, Blind Signatures, and Digital Cash

Module: Applied Cryptography. Professor Patrick McDaniel Fall CSE543 - Introduction to Computer and Network Security

Application Security: Threats and Architecture

Cryptographic Key Infrastructure

Computer Networks. Network Security and Ethics. Week 14. College of Information Science and Engineering Ritsumeikan University

Q: Why security protocols?

How To Make A Trustless Certificate Authority Secure

Computer Networks - CS132/EECS148 - Spring

CS 772. Network Security: Concepts, Protocols and Programming Fall 2008 Final Exam Time 2 & 1/2 hours Open Book & Notes.

Authentication in WLAN

Part 2 D(E(M, K),K ) E(M, K) E(M, K) Plaintext M. Plaintext M. Decrypt with private key. Encrypt with public key. Ciphertext

Using etoken for SSL Web Authentication. SSL V3.0 Overview

Chapter 7: Network security

Digital Signatures. Murat Kantarcioglu. Based on Prof. Li s Slides. Digital Signatures: The Problem

SENSE Security overview 2014

Network Security. Abusayeed Saifullah. CS 5600 Computer Networks. These slides are adapted from Kurose and Ross 8-1

1. a. Define the properties of a one-way hash function. (6 marks)

RevShield Software Suite Network Security Review

Hash Functions. Integrity checks

Authentication Protocols Using Hoover-Kausik s Software Token *

Princeton University Computer Science COS 432: Information Security (Fall 2013)

Detection and Prevention Mechanism on Call Hijacking in VoIP System

The Feasibility and Application of using a Zero-knowledge Protocol Authentication Systems

The science of encryption: prime numbers and mod n arithmetic

True False questions (25 points + 5 points extra credit)

Design Notes for an Efficient Password-Authenticated Key Exchange Implementation Using Human-Memorable Passwords

Security and Authorization. Introduction to DB Security. Access Controls. Chapter 21

Authenticity of Public Keys

EAP Methods for Wireless LAN Security

What is Web Security? Motivation

Reparing HTTP authentication for Web security

Mathematics of Internet Security. Keeping Eve The Eavesdropper Away From Your Credit Card Information

Discrete logarithms within computer and network security Prof Bill Buchanan, Edinburgh Napier

Security Policy Revision Date: 23 April 2009

Connected from everywhere. Cryptelo completely protects your data. Data transmitted to the server. Data sharing (both files and directory structure)

Outline. CSc 466/566. Computer Security. 8 : Cryptography Digital Signatures. Digital Signatures. Digital Signatures... Christian Collberg

Cryptography and Network Security Chapter 10

Database Security. Chapter 21

Transcription:

Using Passwords send pwd, compare against h(pwd) send h(pwd), compare against h(pwd) send h(pwd), compare against h(h(pwd)) use h(pwd) as secret in challenge/response, server stores h(pwd). Why not h(h(pwd))? Lamport s hash anonymous Diffie-Hellman, then one of above server sends cert, establish SA, do one of above 2

Alternative: Strong password Protocols Requires no user-specific info (like trust anchors) Someone who impersonates Bob or Alice, or who eavesdrops, cannot gain information for dictionary attack 3

EKE (Encrypted Key Exchange) Alice choose A choose C2 share weak secret W=h(pwd) Alice, {g A mod p}w {g B mod p, C1}W K=g AB mod p {C1, C2}K {C2}K Bob choose B, challenge C1 4

SPEKE (simple password exponential key exchange) Alice choose A share weak secret W=h(pwd) Alice, W A mod p W B mod p,c1 Bob choose B, challenge C1 choose C2 K=W AB mod p {C1}K,C2 {C2}K 5

PDM (password derived moduli) compute appropriate prime p = f (pwd) Alice stores p Bob choose A choose C2 Alice, 2 A mod p 2 B mod p, C1 K=2 AB mod p {C1, C2}K choose B, challenge C1 C2 6

These depend on getting no information original EKE paper had lots of variants, almost all of which were found to be flawed. Tried to base it on other public key schemes besides D-H, only D-H worked. But suppose do D-H straightforward way. Eavesdropper sees {g A mod p}w. Any info? 7

Similar SPEKE Vulnerability Only half the numbers are squares mod p Squares only generate half the numbers How tell if something is a square mod p? So eavesdropper can eliminate passwords if see W x mod p, and it isn t a square What is the probability on any exchange? Why isn t this as serious as previous slide? 8

PDM want p to be a safe prime (p-1/2 also prime) if p=3 mod 8, 2 will be a generator (obscure math law of quadratic reciprocity) p has to be 2 mod 3 so p has to be 11 mod 24 9

Potential Vulnerability If g A mod p is greater than the p for some password, then an eavesdropper can eliminate that password Fix it by choosing p from a very small space (top 64 bits fixed) Also near a power of 2 to make maximal use out of the bits 10

Another potential PDM Vulnerability What happens if Trudy chooses A such that 2 A < p? Can Bob detect this easily? (hint: what s g?) 11

Password Guessing Humans are incapable of securely storing high-quality cryptographic keys, and they have unacceptable speed and accuracy when performing cryptographic operations. They are also large, expensive to maintain, difficult to manage, and they pollute the environment. It is astonishing that these devices continue to be manufactured and deployed, but they are sufficiently pervasive that we must design our protocols around their limitations. Network Security: Private Communication in a Public World 12

Obtaining Human s Private Key Encrypt the private key using the password as a key Put the encrypted private key on a floppy or mag-stripe card Post the encrypted private key in a public place Post the encrypted private key on a server that limits pwd guessing with a careful protocol Put the private key on a smart card 13

Credentials Download Have server store Y={priv key}pwd Could send Y in msg 4 in EKE, SPEKE, or PDM. But can do it in 2 msgs! Simplification for credential download: No reason to authenticate Bob, or even Alice Other features we could do salt saving server computation http://www.isoc.org/isoc/conferences/ndss/99/proceedings/ papers/perlman.pdf 14

4-msg credentials download Alice choose A choose C2 share weak secret W=h(pwd) Alice, {g A mod p}w {g B mod p}w K=g AB mod p h(k) {Y}K Bob store Y={priv}pwd choose B, challenge C1 15

2-msg credentials download Alice agree on g,p Alice, {g A mod p}x directory X=h(pwd) Y={priv key}pwd g B mod p, {Y}g AB slight disadvantage: unaudited on-line guess 16

Save Bob work: Reuse B So store, for Alice (EKE variant) username Y={priv}pwd B {g B mod p}w W Can t use B with multiple users with EKE, but can with PDM or SPEKE 17

Properties of these Vulnerabilities to eavesdropper someone impersonating Alice someone impersonating Bob server database theft 18

So what can we do about server database theft? augmented EKE (and SPEKE and PDM) Augmented EKE came up with the idea, but the protocol is complicated We ll show something simpler that has the same properties (and fewer msgs) Main idea: store something at server that can authenticate pwd Don t ever give server a pwd-equiv 19

Augmented PDM compute p = f (pwd), W=h(pwd) Alice stores p, 2 W mod p Bob choose A Alice, 2 A mod p 2 B mod p, h(2 AB mod p, 2 BW mod p) choose B h (2 AB mod p, 2 BW mod p) 20

More efficient (for Bob) augmented authentication Use RSA key instead of Diffie-Hellman Like credentials download, but use RSA key for augmented property (and get credentials download as bonus!) 21

Alice compute W=h(pwd) choose A RSA-Augmented EKE Alice, {g A mod p} g B mod p, {Y) (g AB mod p) [h (g AB mod p)]signed Bob stores W Y={priv}pwd public key choose B 22

SRP (Secure Remote Pwd) compute W=h(pwd) Alice choose A Alice, g A mod p g B + g W mod p, u, c1 K=g B(A+uW) mod p {c1}k, c2 stores g W mod p Bob choose B. challenge c1, 32-bit # u {c2}k 23

SRP How does each side compute K? What s u? (without it, someone that has stolen Bob s database and therefore knows g W mod p can impersonate Alice) assume u known in advance, or doesn t exist instead of sending g A mod p, send g A-uW mod p Get this by raising g W to the u, getting g uw Then compute multiplicative inverse of g uw and multiply that by g A 24