How to Send Stealth Text From Your Cell Phone



Similar documents
Connected from everywhere. Cryptelo completely protects your data. Data transmitted to the server. Data sharing (both files and directory structure)

Crypho Security Whitepaper

Overview of Cryptographic Tools for Data Security. Murat Kantarcioglu

3.2: Transport Layer: SSL/TLS Secure Socket Layer (SSL) Transport Layer Security (TLS) Protocol

The Misuse of RC4 in Microsoft Word and Excel

Network Security (2) CPSC 441 Department of Computer Science University of Calgary

How To Encrypt Data With Encryption

SecureCom Mobile s mission is to help people keep their private communication private.

Dashlane Security Whitepaper

WS_FTP Professional 12. Security Guide

1 Step 1: Select... Files to Encrypt 2 Step 2: Confirm... Name of Archive 3 Step 3: Define... Pass Phrase

Designing a Secure Client-Server System Master of Science Thesis in the Programme Software Engineering & Technology

Client Server Registration Protocol

OPENID AUTHENTICATION SECURITY

Chapter 6 CDMA/802.11i

Ciphermail Gateway PDF Encryption Setup Guide

TLS and SRTP for Skype Connect. Technical Datasheet

SubmitedBy: Name Reg No Address. Mirza Kashif Abrar T079 kasmir07 (at) student.hh.se

SSL A discussion of the Secure Socket Layer

1.2 Using the GPG Gen key Command

Analyzing the Security Schemes of Various Cloud Storage Services

WS_FTP Professional 12. Security Guide

BlackBerry Enterprise Solution Security Release Technical Overview

SecureDoc Disk Encryption Cryptographic Engine

Authentication requirement Authentication function MAC Hash function Security of

Advanced Authentication

Ciphire Mail. Abstract

WS_FTP Professional 12

Outline. Computer Science 418. Digital Signatures: Observations. Digital Signatures: Definition. Definition 1 (Digital signature) Digital Signatures

Computer Security: Principles and Practice

Princeton University Computer Science COS 432: Information Security (Fall 2013)

First Semester Examinations 2011/12 INTERNET PRINCIPLES

Healthcare Compliance Solutions

CS 393 Network Security. Nasir Memon Polytechnic University Module 11 Secure

C O M P U T E R S E C U R I T Y

PGP from: Cryptography and Network Security

Network Security - Secure upper layer protocols - Background. Security. Question from last lecture: What s a birthday attack? Dr.

PHOENIX: SECURE FILE TRANSFER USING SSL

Network Security Part II: Standards

Communication Security for Applications

BlackBerry Enterprise Solution

Chapter 6 Electronic Mail Security

Healthcare Compliance Solutions

U.S. Federal Information Processing Standard (FIPS) and Secure File Transfer

CIS433/533 - Computer and Network Security Cryptography

The Security Behind Sticky Password

WiFi Security Assessments

Network Security Essentials Chapter 7

Web Security Considerations

CS 758: Cryptography / Network Security

Bitmessage: A Peer to Peer Message Authentication and Delivery System

BlackBerry Enterprise Service 10. Secure Work Space for ios and Android Version: Security Note

Cryptography and Network Security Chapter 15

Technical White Paper BlackBerry Security

SY system so that an unauthorized individual can take over an authorized session, or to disrupt service to authorized users.

Efficient Framework for Deploying Information in Cloud Virtual Datacenters with Cryptography Algorithms

Authenticated encryption

An Introduction to Cryptography as Applied to the Smart Grid

Cryptosystems. Bob wants to send a message M to Alice. Symmetric ciphers: Bob and Alice both share a secret key, K.

7 Network Security. 7.1 Introduction 7.2 Improving the Security 7.3 Internet Security Framework. 7.5 Absolute Security?

Security+ Guide to Network Security Fundamentals, Third Edition. Chapter 6. Wireless Network Security

Cryptography and Network Security Prof. D. Mukhopadhyay Department of Computer Science and Engineering Indian Institute of Technology, Kharagpur

Usable Crypto: Introducing minilock. Nadim Kobeissi HOPE X, NYC, 2014

How To Understand And Understand The History Of Cryptography

SAMES - Short Anonymous Message Encryption Scheme

Secure Socket Layer. Introduction Overview of SSL What SSL is Useful For

Chapter 10. Network Security

CUNSHENG DING HKUST, Hong Kong. Computer Security. Computer Security. Cunsheng DING, HKUST COMP4631

Complying with PCI Data Security

How To Secure My Data

Part I. Universität Klagenfurt - IWAS Multimedia Kommunikation (VK) M. Euchner; Mai Siemens AG 2001, ICN M NT

Chapter 11 Security+ Guide to Network Security Fundamentals, Third Edition Basic Cryptography

CLTA Data Protection Guidance

An Introduction to Cryptography and Digital Signatures

SECURITY IN NETWORKS

Overview of CSS SSL. SSL Cryptography Overview CHAPTER

EE 7376: Introduction to Computer Networks. Homework #3: Network Security, , Web, DNS, and Network Management. Maximum Points: 60

Security Technical. Overview. BlackBerry Enterprise Server for Microsoft Exchange. Version: 5.0 Service Pack: 4

13 Virtual Private Networks 13.1 Point-to-Point Protocol (PPP) 13.2 Layer 2/3/4 VPNs 13.3 Multi-Protocol Label Switching 13.4 IPsec Transport Mode

Chapter 8 Security. IC322 Fall Computer Networking: A Top Down Approach. 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012

Safeguarding Data Using Encryption. Matthew Scholl & Andrew Regenscheid Computer Security Division, ITL, NIST

Network Security. Computer Networking Lecture 08. March 19, HKU SPACE Community College. HKU SPACE CC CN Lecture 08 1/23

Bit Chat: A Peer-to-Peer Instant Messenger

Lecture 9: Application of Cryptography

Network-Enabled Devices, AOS v.5.x.x. Content and Purpose of This Guide...1 User Management...2 Types of user accounts2

All vulnerabilities that exist in conventional wired networks apply and likely easier Theft, tampering of devices

Security Protocols HTTPS/ DNSSEC TLS. Internet (IPSEC) Network (802.1x) Application (HTTP,DNS) Transport (TCP/UDP) Transport (TCP/UDP) Internet (IP)

Secure Shell SSH provides support for secure remote login, secure file transfer, and secure TCP/IP and X11 forwarding. It can automatically encrypt,

Asymetrical keys. Alices computer generates a key pair. A public key: XYZ (Used to encrypt) A secret key: ABC98765 (Used to decrypt)

12/3/08. Security in Wireless LANs and Mobile Networks. Wireless Magnifies Exposure Vulnerability. Mobility Makes it Difficult to Establish Trust

BBM Protected: Secure enterprise- GrAde MoBIle MeSSAGING

Using an approximated One-Time Pad to Secure Short Messaging Service (SMS)

National Security Agency Perspective on Key Management

Securing Distribution Automation

Developing and Investigation of a New Technique Combining Message Authentication and Encryption

CSE/EE 461 Lecture 23

Network FAX Driver. Operation Guide

NISTIR 7676 Maintaining and Using Key History on Personal Identity Verification (PIV) Cards

Security Technical. Overview. BlackBerry Enterprise Service 10. BlackBerry Device Service Solution Version: 10.2

Transcription:

anonymous secure decentralized SMS stealthtext transactions WHITEPAPER

STATE OF THE ART 2/8 WHAT IS STEALTHTEXT? stealthtext is a way to send stealthcoin privately and securely using SMS texting. stealthtext is invaluable in situations where you can not access a data plan. With stealthtext, you can send others stealthcoin directly from your wallet and receive confirmation by SMS. Unlike other services, it uses banking-grade encryption to protect your transactions from the prying eyes of onlookers. Additionally, your transactions are tamper resistant, so you can be completely confident that the transaction you enter into your phone is faithfully executed by the stealthcoin network. LET S IMAGINE BOB 420 XST CAROL Bob wants to send 420 XST to Carol although Bob operates under serious constraints today. He has his phone and can send texts (SMS), but for reasons beyond his control has no access to his data services. Bob absolutely needs his transaction to get to Carol securely and privately (anonymously). He can't afford for anyone to tamper with his transaction, like blindly "flipping a bit" to change the amount, nor can he afford for an adversary, such as a competing business, to know the nature of his transaction with Carol. Bob is in luck though, because he has installed stealthtext on his phone. In his settings dialog, he has entered his client ID, the phone number of his SMS forwarding service (like google voice), and a secret Passphrase. The client ID, useful for routing or selecting accounts, may be any sequence of seven or fewer characters. Because his phone sends text messages using the SMS protocol but stealthcoin is a TCP/IP protocol, Bob needs a route (or "pipeline")

STATE OF THE ART 3/8 between his phone and his wallet. Bob may have previously established his own pipeline using tools provided for stealthtext. Or Bob might be the customer of an online wallet service that provides a pipeline. Either case is possible because anyone can set up his or her own pipeline. Bob's wallet (whether in the cloud or his computer at home) knows his secret passphrase and his PIN, which together make both parts of stealthtext's two-factor authentication. To make his transaction, he enters Carol's XST address (SGVQhkwom..), the amount (420 XST) and his PIN, which he shares with no one and has memorized. He then hits "Send" and confirms the transaction. stealthtext then sends the anonymous, encrypted transaction through SMS where it enters the pipeline. In this example, the SMS message with the anonymous transaction is routed to Bob's SMS forwarding service (like google voice) which then turns it into an email that is sent to Bob's email account. If using google voice, this email account would be a gmail account. The email is then handled by Bob's mail client, which is enabled to send it to a simple message relay running on his computer. This message relay extracts the encrypted transaction from the email and sends it, still encrypted, to the wallet as part of a command. GOAL 420 XST BOB CAROL 420 XST TOR NETWORK TXN: 420 XST BOB S PHONE Carol s XST Address SGVQhkw... Bob s 2FA PIN: ****** Bob s Phone (Settings): 1-555 Phone Secret **** BOB S XST WALLET SMS (Anon/Encrypted) WALLET COMMAND (Anon/Encrypted) CELL PHONE TOWER SMS FORWARDING (google voice) EMAIL (Anon/Encrypted) BOB S EMAIL CLIENT OR SIMPLE MESSAGE PROCESSOR

STATE OF THE ART 4/8 The stealthcoin wallet recognizes this command and decrypts the anonymous transaction. Because the transaction is encrypted on Bob's phone but never decrypted until it gets to his wallet, the transaction remains secure and anonymous while traversing the entire pipeline. As with all transactions, the wallet broadcasts Carol's 420 XST to the TOR network, which ensures that Carol gets her funds safely and privately. STEALTHTEXT IS: 1 ANONYMOUS stealthtext is anonymous because no one except Bob can know the contents of the encrypted transaction while on transit to his wallet. Once there, it remains anonymous because stealthcoin uses the Tor network. It is true that an adversary may be able to note meta-information about the communication, like the phone number. However, since the transaction is fully encrypted, it is impossible for anyone but Bob to know whether Bob is sending stealthcoin to Carol, a thank-you note to his grandmother, or a recipe to his wife. 2 SECURE stealthtext uses AES encryption combined with GCM authentication. This combination of cryptographic technology ensures that a multitude of attacks that try to blindly manipulate the encrypted transaction to change its value, recipient, or otherwise corrupt it, will be detected by the wallet. In fact, the transaction will be rejected by the wallet if just one bit of one byte of the encrypted transaction is modified. Moreover the wallet has safeguards against delayed transactions and "replay attacks". That is, once the wallet broadcasts the transaction, it will not accept the same transaction again. So, if an adversary intercepts the message and sends it numerous times to Bob's wallet, the wallet will not re-send the funds no matter how many replays the adversary attempts to create.

STATE OF THE ART 5/8 3 DECENTRALIZED AND TRUSTLESS Any person or servcie can establish a pipeline. They only need the stealthtext Android application and a stealthcoin wallet of a version greater than or equal to 1.2.0.1. Any SMS forwarding service can send the message to any medium of delivery. Email is probably the the most convenient for a majority of users because google voice can send SMS messages to gmail, taking care of most of the pipeline. Of course the medium could also be http or some other protocol, depending on one's SMS service. If using google voice and gmail, the only glue in the entire pipeline is a program that can change an email with the encrypted message into a wallet command. We call this program stealthrelay because it relays the message from email to the wallet. stealthrelay will be available as an open source project with downloads available for Linux, Mac, and Windows. 4 SMS stealthtext does not rely on Bob's phone having data capabilities. This allows Bob to send funds anonymously and securely from any part of the world where SMS is available, or when his data services experience outage due to adversarial attack or natural causes.

STATE OF THE ART 6/8 CRYPTOGRAPHY stealthtext uses the American Encryption Standard (AES) block cipher combined with Galois/Counter Mode (GCM) authentication. AES has a 16 byte block size and is the National Institute of Standards and Technology (NIST) standard FIPS 197. GCM is recommended by NIST in its NIST Special Publication 800-38D. SMS MESSAGE DATA STRUCUTRE The SMS message is packed as printable text. It may have any text encoding, but UTF-8 or ASCII are most common. The message consists of two parts, separated by a comma. The first part is the client ID, which can be any printable string of seven or fewer characters. The second part is a base 64 encoded block that itself consists of the 16 byte, cryptographically random AES/GCM initialization vector (IV) followed by the encrypted transaction. Decrypted, the transaction consists of the base 58 stealthcoin recipient address, the transaction amount, followed by the system time in milliseconds. This system time, established by the phone, is used by the wallet as the transaction time (ntime). To protect against replay attacks, all new stealthtext transactions are checked against all previous transactions for ntime. Any new stealthtext transaction with an ntime of an existing transaction will be rejected by the wallet. Although this safeguard is in place, it is highly recommended to have the final relay filter transactions by comparing their cipher texts, and rejecting duplicates. Additionally, the wallet will reject stealthtext transactions differing in system time from the wallet by more than five minutes.

STATE OF THE ART 7/8 KEY DERIVATION The AES/GCM encryption key is the SHA256 hash of the stealthtext secret, the PIN, and the cryptographically random IV represented as a base 16 string. Including the IV in the key derivation ensures that the encryption key for each transaction is unique, in accord with cryptographic best practices. stealth-coin.com

2014 STEALTHCOIN PAHLKE MEDIA www.pahlkemedia.de