References: Adi Shamir, How to Share a Secret, CACM, November 1979.



Similar documents
Network Security. Computer Networking Lecture 08. March 19, HKU SPACE Community College. HKU SPACE CC CN Lecture 08 1/23

RSA Attacks. By Abdulaziz Alrasheed and Fatima

Mathematics of Internet Security. Keeping Eve The Eavesdropper Away From Your Credit Card Information

An Introduction to Identity-based Cryptography CSEP 590TU March 2005 Carl Youngblood

CSCE 465 Computer & Network Security

Capture Resilient ElGamal Signature Protocols

Key Management in Ad Hoc Networks. Klas Fokine

Comments on "public integrity auditing for dynamic data sharing with multi-user modification"

Public Key Cryptography. c Eli Biham - March 30, Public Key Cryptography

Network Security. Abusayeed Saifullah. CS 5600 Computer Networks. These slides are adapted from Kurose and Ross 8-1

Network Security. Gaurav Naik Gus Anderson. College of Engineering. Drexel University, Philadelphia, PA. Drexel University. College of Engineering

Public Key Cryptography and RSA. Review: Number Theory Basics

3/25/ /25/2014 Sensor Network Security (Simon S. Lam) 1

CIS 6930 Emerging Topics in Network Security. Topic 2. Network Security Primitives

How To Encrypt Data With A Power Of N On A K Disk

Outline. Computer Science 418. Digital Signatures: Observations. Digital Signatures: Definition. Definition 1 (Digital signature) Digital Signatures

CIS 5371 Cryptography. 8. Encryption --

7. Some irreducible polynomials

Key Management and Distribution

Database Security and Authorization

Security Sensor Network. Biswajit panja

Cryptography and Network Security Chapter 9

A New, Publicly Veriable, Secret Sharing Scheme

Elements of Applied Cryptography Public key encryption

Lecture Note 5 PUBLIC-KEY CRYPTOGRAPHY. Sourav Mukhopadhyay

Overview of Public-Key Cryptography

KEY DISTRIBUTION: PKI and SESSION-KEY EXCHANGE. Mihir Bellare UCSD 1

Computer and Network Security. Outline

Cryptography and Network Security Chapter 10

SECURITY IN NETWORKS

Lukasz Pater CMMS Administrator and Developer

Software Implementation of Gong-Harn Public-key Cryptosystem and Analysis

U.C. Berkeley CS276: Cryptography Handout 0.1 Luca Trevisan January, Notes on Algebra

Module: Applied Cryptography. Professor Patrick McDaniel Fall CSE543 - Introduction to Computer and Network Security

An Efficient and Secure Key Management Scheme for Hierarchical Access Control Based on ECC

EXAM questions for the course TTM Information Security May Part 1

CS 758: Cryptography / Network Security

Introduction to Cryptography

ZQL. a cryptographic compiler for processing private data. George Danezis. Joint work with Cédric Fournet, Markulf Kohlweiss, Zhengqin Luo

Secure Communication in a Distributed System Using Identity Based Encryption

Notes on Network Security Prof. Hemant K. Soni

TELE 301 Network Management. Lecture 18: Network Security


Privacy-Preserving Aggregation of Time-Series Data

The Feasibility of SET-IBS and SET-IBOOS Protocols in Cluster-Based Wireless Sensor Network

Chapter 4. Authentication Applications. COSC 490 Network Security Annie Lu 1

Number Theory. Proof. Suppose otherwise. Then there would be a finite number n of primes, which we may

1 Digital Signatures. 1.1 The RSA Function: The eth Power Map on Z n. Crypto: Primitives and Protocols Lecture 6.

Cryptography and Network Security

Improved Online/Offline Signature Schemes

Cryptography and Network Security

RSA Encryption. Tom Davis October 10, 2003

Multiuser Message Authentication, Application to Verifiable Secret Sharing and Key Management Schemes

Universal hashing. In other words, the probability of a collision for two different keys x and y given a hash function randomly chosen from H is 1/m.

Secure Network Communication Part II II Public Key Cryptography. Public Key Cryptography

Secured Secret Sharing over Single Path in VoIP with Consistent Data Transfer

Introduction. Digital Signature

The Mathematics of the RSA Public-Key Cryptosystem

CRYPTOG NETWORK SECURITY

Mobile Security Wireless Mesh Network Security. Sascha Alexander Jopen

QUANTUM COMPUTERS AND CRYPTOGRAPHY. Mark Zhandry Stanford University

Forward Secrecy: How to Secure SSL from Attacks by Government Agencies

Security Strength of RSA and Attribute Based Encryption for Data Security in Cloud Computing

Secure File Transfer Using USB

4.3 Lagrange Approximation

Discrete Mathematics, Chapter 4: Number Theory and Cryptography

CS 392/681 - Computer Security

Network Security. Abusayeed Saifullah. CS 5600 Computer Networks. These slides are adapted from Kurose and Ross 8-1

Lecture 13: Factoring Integers

CUNSHENG DING HKUST, Hong Kong. Computer Security. Computer Security. Cunsheng DING, HKUST COMP4631

Applied Cryptography Public Key Algorithms

Network Security Concepts: Review

A Secure Intrusion Avoidance System Using Hybrid Cryptography

Chapter 9 Key Management 9.1 Distribution of Public Keys Public Announcement of Public Keys Publicly Available Directory

On the representability of the bi-uniform matroid

IPSEC: IKE. Markus Hidell Based on material by Vitaly Shmatikov, Univ. of Texas, and by the previous course teachers

Public Key (asymmetric) Cryptography

Cryptography and Network Security Digital Signature

An Overview of Common Adversary Models

CRYPTOGRAPHY IN NETWORK SECURITY

Authentication Application

Primality Testing and Factorization Methods

Cryptography: Authentication, Blind Signatures, and Digital Cash

The application of prime numbers to RSA encryption

Transcription:

Ad Hoc Network Security References: Adi Shamir, How to Share a Secret, CACM, November 1979. Jiejun Kong, Petros Zerfos, Haiyun Luo, Songwu Lu, Lixia Zhang, Providing Robust and Ubiquitous Security Support for Mobile Ad-Hoc Networks, Proceedings IEEE ICNP 2001. 3/17/2014 Ad Hoc Network Security (Simon S. Lam) 1 1

How to share a secret [Shamir 1979] (K, N) threshold h scheme Secret D is represented by N pieces D 1,, D N o D is easily computable from any K or more pieces o D cannot be determined with knowledge of K-1 or fewer pieces Tradeoff between reliability and security o Reliability: D can be recovered even if N-K pieces are destroyed o Security: foe can acquire K-1 pieces and still cannot uncover D Tradeoff between safety and convenience o Example A company s checks must be (digitally) signed by three executives 3/17/2014 Ad Hoc Network Security (Simon S. Lam) 2 2

(K, N) scheme by polynomial interpolation Given K points in 2D, (x 1, y 1 ),, (x K, y K ), with distinct x i s, i o there is one and only one polynomial q(x) of degree K-1 such that q(x i )=y i for all i. Let the secret D be a number. Randomly select a K-1 degree polynomial qx ( ) a ax... a x where a D K 1 0 1 k 1 0 Compute N values of q(x) D 1 q (1),..., D i q( i),..., D N q ( N ) 3/17/2014 Ad Hoc Network Security (Simon S. Lam) 3 3

Scheme by ypolynomial interpolation (cont.) Given any subset of K of the (i, D i ) pairs, the coefficients i of q(x) can be found by interpolation (or solving a set of K linear equations with K unknowns) The secret D is q(0) Knowledge of just K-1 of the (i, D i ) pairs provides no information about D 3/17/2014 Ad Hoc Network Security (Simon S. Lam) 4 4

Explanation of the previous claim Consider d the special case of a finite field GF(p) where p is a prime number (larger than D, larger than N) o The coefficients, a 1,, a K-1, are randomly chosen from a uniform distribution over the integers in [0, p) o D 1,, D N are computed modulo p Suppose K-1 of the (i, D i ) pairs are revealed to a foe. For each value D in [0, p), the foe can construct one and only one polynomial q (x) of degree K-1. o These p possible polynomials are equally likely. So there is nothing the foe can deduce about the real value of D. 3/17/2014 Ad Hoc Network Security (Simon S. Lam) 5 5

Useful properties Size of each piece D i is not larger than size of secret D When K is kept fixed, D i pieces can be dynamically added or deleted Individual D i pieces can be changed without changing g the secret D o Such changes enhance security over the long term. o How? Use a new polynomial with the same a 0 value (D) VIPs can be given more than one D i pieces 3/17/2014 Ad Hoc Network Security (Simon S. Lam) 6 6

Application to mobile ad hoc networks [Kong et al. 2001] 3/17/2014 Ad Hoc Network Security (Simon S. Lam) 7 7

Distributed Certificate Authority A mobile ad hoc network has no infrastructure support Requirement: No single node in the network knows the system secret, i.e., the key for signing digital certificates o N nodes hold secret shares of the system secret (signing key) K nodes with secret shares in a one-hop locality jointly sign new certificates o Certificates enable data confidentiality, authenticity, and integrity 3/17/2014 Ad Hoc Network Security (Simon S. Lam) 8 8

Distributed Certificate Authority (cont.) Design Challenges for mobile ad hoc networks o Security breach of some nodes over a large time window is likely o Mobility anywhere service o Network dynamics nodes join, leave, fail o Scalability Certificates signed by K nodes in a neighborhood o Tolerant of up to K-1 collaborative intruders, N-K failures 3/17/2014 Ad Hoc Network Security (Simon S. Lam) 9 9

Two possible intrusion models A node s private key will not be exposed for a certain period of time (even after capture by an intruder) o Each node updates its certificate periodically for a new public key (and private key) o Intruder cannot get the correct private key in time to respond to a challenge A node s private key may be exposed but its ID, v i, is not forgeable by an intruder or any intruder s attempt to pretend to be v i can be detected. 3/17/2014 Ad Hoc Network Security (Simon S. Lam) 10 10

RSA The system certification authority (CA) s RSA key pair is {SK, PK} where SK is the signing key (system secret) For message M, large primes, p and q, and n=pq, the signed message is M SK mod n 3/17/2014 Ad Hoc Network Security (Simon S. Lam) 11 11

Notation Each node v i o may hold a secret share,, o maintains i an individual id RSA key pair and o holds a certificate P vi v, pk, T, T i i sign expire ( sk i, pk ) i where T sign is signing i time and T expire is certificate expiration time T T T expire sign renew 3/17/2014 Ad Hoc Network Security (Simon S. Lam) 12 12

Certificate issuing At network initialization, nodes can obtain their certificates cates from a trusted central manager Later on, when a node joins the network, a node wishes to renew its certificate, or recovers from a crash, it will obtain a certificate from K nodes with secret shares within a one-hop neighborhood o out of bound physical proofs human perceptions, biometrics, etc. 3/17/2014 Ad Hoc Network Security (Simon S. Lam) 13 13

Certificate revocation Implicit it A node s certificate t expires if it is not renewed prior to its expiration time Explicit If v x s certificate is considered compromised, a SK-signed counter-certificate with time stamp T C sign is flooded over the network o Neighbor nodes can safely exchange their local certificate revocation list (CRL) cache o With implicit certificate revocation, each node only needs to maintain counter certificates signed within the past T renew time. 3/17/2014 Ad Hoc Network Security (Simon S. Lam) 14 14

Protocol design using Shamir s scheme At system initialization, a trusted secret share dealer obtains the RSA signing ng key <d, n> and randomly selects a secret polynomial f(x) with degree K-1 K f ( x) d f x... f x 1 K 1 Each node v i (i=1, 2,, N) holds a secret share P f( v )modn v i i 1 3/17/2014 Ad Hoc Network Security (Simon S. Lam) 15 15

Interpolation polynomial in the Lagrange form Given K points in 2D, (v 1, f(v 1 )),, (v K, f(v K )), with distinct t v i s, K Lx ( ) f( v) ( x) P ( x) j v v v j 1 j 1 where ( x) v j K j j j K ( x v i ) ( v v ) i 1, i j j i Since ( v ) 1 and ( v ) 0, we have v j v i j Lv ( ) f( v) for 1 j K Thus Lx ( ) = f ( x ) j j j 3/17/2014 Ad Hoc Network Security (Simon S. Lam) 16 16

The system secret d Given K secret share holders in a neighborhood d f (0) L (0) system secret K ( P (0)mod n ) SK (mod n) vj vj j j 1 j 1 K where SK j is computed by secret share holder j using and {v 1,, v K } P v j The system secret d as well as secret shares {SK i } should not be revealed! 3/17/2014 Ad Hoc Network Security (Simon S. Lam) 17 17

A multi-signature Let M be the new public key certificate of a node to be signed Each of the K secret share holders provides a partially signed certificate,, for i = 1,, K, without revealing its private SK i M SK i mod n Having collected K partial certificates, the requesting node can obtain the fully signed certificate with some more work 3/17/2014 Ad Hoc Network Security (Simon S. Lam) 18 18

Partially signed certificates 3/17/2014 Ad Hoc Network Security (Simon S. Lam) 19 19

K-bounded coalition offsetting The product of the K partial certificates is 1 2 K 1 2 M M M M... K K... SK SK SK SK SK SK The system secret is however K d ( SK i ) mod n K i 1 Thus SK t n d for some integer t i 1 i The signed certificate should be M d 3/17/2014 Ad Hoc Network Security (Simon S. Lam) 20 20

K-bounded coalition offsetting (cont.) From modular arithmetic, SK i 0 to n-1n o Thus t satisfies 0 t K is a value from o Try each possible value of t. Decrypt using the system s public key and find the correct t value with help of the original message M Complexity is the sum of O(1) exponentiation, O(K) modular multiplications, and O(K) RSA public operations o RSA public key operation is relatively fast 3/17/2014 Ad Hoc Network Security (Simon S. Lam) 21 21

Becoming a secret share holder Each certificate-holding node v x can also obtain a secret share P v x, which it uses to derive SK x to become a secret share holder K secret share holders can compute the secret share of v x by Lagrange interpolation K P v f( vx) Pv v ( vx) SSx, j (mod n ) x j j Problem Since {v i } of the K secret share holders are publicly known, v x can derive from SS x,j and K j 1 j 1 v i ( v ) x P v j 3/17/2014 Ad Hoc Network Security (Simon S. Lam) 22 22

Becoming a secret share holder (2) Shuffling scheme A random nonce is exchanged between any two members of the K share holders (the one with lower id creates the nonce) o The node with larger id treats it as a positive number o The other node treats it as a negative number. o Each share holder, v i, has K-1 such nonces. nces It sums the nonces and SS x,j. The sum is sent to v x It is easy to show that v x value P vx gets the same P 3/17/2014 Ad Hoc Network Security (Simon S. Lam) 23 23

Becoming a secret share holder (3) Each nonce is encrypted with the individual public key of the intended receiver The requester forwards encrypted nonces Still K-out-of-N secure if there are at least two uncompromised nodes in the K nodes 3/17/2014 Ad Hoc Network Security (Simon S. Lam) 24 24

Conclusions Application of Shamir s idea to mobile ad hoc networks Most results borrowed from crypto literature Authors claim that prior work assumes a fixed number of secret share holders, not applicable to large networks with dynamic node membership o In this paper, existing secret shares and the current signing i key are not affected by membership changes (We have omitted many details in the paper.) 3/17/2014 Ad Hoc Network Security (Simon S. Lam) 25 25

The End 3/17/2014 Ad Hoc Network Security (Simon S. Lam) 26 26