SlideShare a Scribd company logo
Challenges for information security theory

                      R. Ramanujam

      The Institute of Mathematical Sciences, Chennai, India

                       jam@imsc.res.in
Your email account




         ◮   Do you have an account on some public email facility ?
         ◮   How do you login to such an account ?
         ◮   You give user name and password. Why ?




ICAC’09 Cauvery College, Tiruchi – August 8, 2009
Sending secrets


         ◮   How does A send a secret x to B on a public channel ?
         ◮   A locks x in a box, sends the box across to B.
         ◮   Assume that locks are unbreakable, and that for every
             lock, there exists a unique key that opens it.
         ◮   The secret reaches B securely.
         ◮   But the key is with A; by assumption, B cannot open it.
         ◮   Should A send the key in another locked box !?




ICAC’09 Cauvery College, Tiruchi – August 8, 2009
One-way functions



         ◮   Given x, finding f (x) is easy to compute.
         ◮   Given y , finding f −1 (y ) is hard.
         ◮   Easy / hard in what sense ?
         ◮   The idea of trapdoor: helps to find the inverse.




ICAC’09 Cauvery College, Tiruchi – August 8, 2009
Secrets without cryptography


         ◮   Seven cards numbered 1 to 7 are distributed among three
             people, say A, B, C.
         ◮   A gets three cards, B gets three and C gets the last.
         ◮   They have to talk in public, tell the truth, exchange any
             messages.
         ◮   At the end, A should know all of B’s cards and vice versa,
             but for each of the six cards, C should be uncertain
             whether A has it or B.
         ◮   Is such a protocol possible at all ?




ICAC’09 Cauvery College, Tiruchi – August 8, 2009
Zero knowledge proofs



         ◮   Children A and B are looking at a ”Spot Arjun” puzzle.
         ◮   A has seen it, would like to convince that she has, but
             without revealing to B the location of Arjun.
         ◮   Is this possible ?
         ◮   These are called zero knowledge proofs.




ICAC’09 Cauvery College, Tiruchi – August 8, 2009
Key establishment


         ◮   A and B wish to generate a session key to be used
             subsequently. The need a protocol to establish a new key
             KAB .
         ◮   Assume that a reliable, trustworthy key server S exists.
         ◮   At the end of the protocol, KAB should be known to both
             A and B but to nobody else, except perhaps S.
         ◮   Both A and B should know that KAB is newly generated.




ICAC’09 Cauvery College, Tiruchi – August 8, 2009
First attempt


         ◮   Here is a protocol:
             1. A → S : A, B
             2. S → A : KAB
             3. A → B : KAB , A
         ◮   Remarks about notation:
                  ◮   No internal actions are specified.
                  ◮   Only the communications in successful runs are specified.
                  ◮   It is assumed that A and B understand that these are
                      protocol messages.




ICAC’09 Cauvery College, Tiruchi – August 8, 2009
Insecurity in it



         ◮   Confidentiality is compromised.
         ◮   Security Assumption: The adversary can eavesdrop on all
             messages sent on public channels.
         ◮   Pragmatic assumption: Assume that the server has an
             initial shared key with every principal in the system.




ICAC’09 Cauvery College, Tiruchi – August 8, 2009
Second attempt


         ◮   1. A → S : A, B
             2. S → A : {KAB }KAS , {KAB }KBS
             3. A → B : {KAB }KBS , A
         ◮   The notation {x}k denotes a message x encrypted with
             key k.
         ◮   It does not matter which encryption algorithm is used.
         ◮   We make the perfect encryption assumption.




ICAC’09 Cauvery College, Tiruchi – August 8, 2009
An attack

         ◮   Security Assumption: The adversary can also capture
             messages, alter them at will, reroute them (but cannot
             break encryption).
         ◮   Here is the attack:
             1. A → S : A, B
             2. S → A : {KAB }KAS , {KAB }KBS
             3. A → B(I ) : {KAB }KBS , A
             3’. (I )C → B : {KAB }KBS , C
         ◮   Now B believes that he is sharing a key with C, whereas
             he is actually sharing it with A.
         ◮   Some secrets meant only for A can be leaked to C.


ICAC’09 Cauvery College, Tiruchi – August 8, 2009
Another attack


         ◮   In the attack we saw, I does not get hold of KAB . Here is
             one where he does.
         ◮   1. A → S(I ) : A, B
             1’. I → S : A, I
             2. S → I : {KAI }KAS , {KAI }KIS
             2’. (I )S → A : {KAI }KAS , {KAI }KIS
             3. A → B(I ) : {KAI }KIS , A
         ◮   A believes that the protocol is completed with B, and
             hence I can masquerade as B.




ICAC’09 Cauvery College, Tiruchi – August 8, 2009
Insiders


         ◮   In the attack we saw, I could have been a legitimate user
             known to S.
         ◮   Security Assumption: The adversary may be a legitimate
             participant in the protocol (insider), or an external party,
             or a combination of both.
         ◮   In fact, security threats from insiders are more of a
             problem than from outsiders, in many systems.
         ◮   Typically referred to as the “person in the middle” attack.
         ◮   Solution ?




ICAC’09 Cauvery College, Tiruchi – August 8, 2009
Another attempt



         ◮   Bind keys to agent names.
         ◮   1. A → S : A, B
             2. S → A : {KAB , B}KAS , {KAB , A}KBS
             3. A → B : {KAB , A}KBS
         ◮   It can be checked that neither of the attacks considered
             earlier are possible any longer.




ICAC’09 Cauvery College, Tiruchi – August 8, 2009
Replay
         ◮   The generated key is supposed to be new !
         ◮   Security Assumption: The adversary may be able to
             obtain the value of the session key KAB used in any
                                                    ′

             sufficiently old earlier run of the protocol.
         ◮   A replay attack:
             1. A → S(I ) : A, B
             2. (I )S → A : {KAB , B}KAS , {KAB , A}KBS
                               ′              ′

             3. A → B : {KAB , A}KBS
                             ′

         ◮   Note that I need not actually have the value of KAB but
                                                               ′

             simply replay the earlier message, forcing A and B to
             accept an old, dated key.
         ◮   Now I can replay an earlier (legitimate) message, which
             can be, say: “Deposit Rs 1 lakh into I’s account” !

ICAC’09 Cauvery College, Tiruchi – August 8, 2009
Nonces


         ◮   How do we ensure that old keys are not replayed ?
         ◮   A generates a new random value NA called nonce.
         ◮   A starts the protocol by sending a nonce NA . If by the
             end of the protocol, the same value returns, she knows
             that the key has not been replayed.
         ◮   What about B ? He generates his own nonce as well.
         ◮   This is typically called a challenge - response technique.




ICAC’09 Cauvery College, Tiruchi – August 8, 2009
Needham - Schroeder


         ◮   We now have the following version of the protocol:
             1. A → S : A, B, NA
             2. S → A : {KAB , B, NA , {KAB , A}KBS }KAS
             3. A → B : {KAB , A}KBS
             4. B → A : {NB }KAB
             5. A → B : {NB + 1}KAB
         ◮   This is the famous Needham - Schroeder protocol, 1978.
         ◮   Denning and Sacco found an attack in 1986.




ICAC’09 Cauvery College, Tiruchi – August 8, 2009
The attack and its fix


         ◮   A replay attack:
             3’. (I )A → B : {KAB , A}KBS
                                ′

             4. B → A(I ) : {NB }KAB
                                   ′

             5. (I )A → B : {NB + 1}KAB′

         ◮   The fix is quite simple:
             1. B → A : B, NB
             2. A → S : A, B, NA , NB
             3. S → A : {KAB , B, NA }KAS , {KAB , A, NB }KBS
             4. A → B : {KAB , A, NB }KBS




ICAC’09 Cauvery College, Tiruchi – August 8, 2009
Are we done?



         ◮   Is this protocol secure ? Can we prove it secure ?
         ◮   Yes, but this takes a great deal of effort and machinery.
         ◮   Note that it still achieves less. At the end of the run,
             neither A nor B can actually deduce that the other has
             actually received KAB !




ICAC’09 Cauvery College, Tiruchi – August 8, 2009
Infrastructure


     The architecture of a security protocol crucially depends on:
         ◮   Existing cryptographic keys (shared, public)
         ◮   Key generation mechanisms
         ◮   Nonce generation mechanisms
         ◮   Number of users
         ◮   Number of multisessions concurrently active




ICAC’09 Cauvery College, Tiruchi – August 8, 2009
Security properties


         ◮   Confidentiality: Data is available only to those authorized
             to obtain it.
         ◮   Integrity: Data has not been altered by unauthorised
             entities.
         ◮   Authentication: Data has indeed originated from the
             purported sender.
         ◮   Non-repudiation: Entities cannot deny sending data they
             have committed to.
         ◮   Freshness: Nonces are unguessable, and never re-used.




ICAC’09 Cauvery College, Tiruchi – August 8, 2009
Attacks


         ◮   Eavesdropping
         ◮   Modification
         ◮   Replay
         ◮   Preplay
         ◮   Denial of service
         ◮   Type flaws
         ◮   Cryptanalysis




ICAC’09 Cauvery College, Tiruchi – August 8, 2009
Contract signing



         ◮   Two parties agree on the contract text
         ◮   Each will sign if the other will.
         ◮   Physical solution is easy: sit at a table.
         ◮   Over a network ?




ICAC’09 Cauvery College, Tiruchi – August 8, 2009
Why is this difficult ?



         ◮   Cannot trust communication channels. (Intruder may
             block or insert messages.)
         ◮   Cannot trust the other party in the protocol !
             Public key certificate does not certify honesty.
         ◮   Even if a trustworthy judge exists, she may become a
             communication bottleneck.




ICAC’09 Cauvery College, Tiruchi – August 8, 2009
Optimistic contract signing



         ◮   A    tells B: “I am going to sign the contract”
         ◮   B    tells A: “I am going to sign the contract”
         ◮   A    sends her signature to B
         ◮   B    sends his signature to A
     A judge may declare contract binding if given first two
     messages.




ICAC’09 Cauvery College, Tiruchi – August 8, 2009
Requirements

         ◮   Fairness: If A cannot obtain a contract, B should not be
             able to obtain a contract either, and vice versa.
             If A cannot get a deed for the house, B should not be
             able to collect A’s money.
         ◮   No advantage: No party may solely determine the
             outcome of the protocol.
             At no stage should A be able to decide by herself whether
             the house is sold or not.
         ◮   No provable advantage: No party may prove that it can
             solely determine the outcome of the protocol.
             B should not be able to show A’s offer to C and convince
             C to pay more.


ICAC’09 Cauvery College, Tiruchi – August 8, 2009
Negative result


         ◮   Dishonest party has advantage in any fixed-round
             optimistic fair exchange protocol.
                  ◮   Dishonest party always has a strategy to reach a state
                      where it can unilaterally force an outcome.
                  ◮   Similar to impossibility result for distributed consensus.
                  ◮   Cryptography cannot help.
         ◮   Need a trusted party for every transaction: bad news for
             e-commerce (or maybe good news !?).




ICAC’09 Cauvery College, Tiruchi – August 8, 2009
Electronic voting

         ◮   Secrecy: Every voter’s choice should be private, and
             others should not be able to figure out how she voted.
         ◮   Individual verifiability: Each voter should be able to check
             whether her vote has been counted properly.
         ◮   Universal verifiability: It should be possible to check
             whether every voter’s vote has been counted properly.
         ◮   Fairness: Voters do not have any knowledge of the
             distribution of votes until the tallies are finally announced.
         ◮   Receipt-freeness: No voter has any means of proving to
             another that he has voted in a particular manner.



ICAC’09 Cauvery College, Tiruchi – August 8, 2009
Receipt-freeness

         ◮   A problem characteristic of elections, and an important
             one.
         ◮   Lack of receipt-freeness (that is, the presence of a
             receipt) allows vote buying and coercion which has the
             potential to drastically affect the election process.
         ◮   When a receipt exists, it could be constructed in any
             manner that convinces the sceptical second party.
         ◮   Demonstrating that no such way exists is highly
             demanding, and is seen as a significant challenge to
             formal models.



ICAC’09 Cauvery College, Tiruchi – August 8, 2009
Protocol structure


         ◮   Three kinds of agents: voters are one kind.
         ◮   Administrators know the voters’ identity, but cannot see
             the votes, and their job is to check voters’ eligibility to
             vote.
         ◮   Talliers see the votes, but not the voters’ identities, and
             their job is to count votes for each candidate and
             announce the result.




ICAC’09 Cauvery College, Tiruchi – August 8, 2009
Homomorphic encryption



         ◮   Based on Adi Shamir’s secret sharing technique.
         ◮   Voters split their votes into several shares which they
             send to different administrators.
         ◮   Unless many administrators collude, it is difficult to
             reconstruct the vote.




ICAC’09 Cauvery College, Tiruchi – August 8, 2009
Blind signature

         ◮   Voter sends an encrypted vote {t}k to the administrator.
         ◮   The administrator A cannot decrypt the vote, but checks
             the voter’s eligibility, “blindly” signs the message and
             returns {tA }k to the voter.
         ◮   The voter, who generated k, can strip it off from {tA }k
             obtaining tA , which is the vote t duly attested by A.
         ◮   Now the voter sends tA anonymously to the tallier.
         ◮   The tallier verifies the attestation, and gets the vote t
             (while not knowing the origin).




ICAC’09 Cauvery College, Tiruchi – August 8, 2009
Summary


         ◮   Security protocols are difficult to design and analyse, bugs
             hard to attack.
         ◮   We need a development methodology which would always
             generate provably correct protocols.
         ◮   We need automaated tools for discovering attacks.
         ◮   Our main contribution: we identify subclasses of security
             protocols for which it is possible to automatically verify
             many security properties.




ICAC’09 Cauvery College, Tiruchi – August 8, 2009

More Related Content

Recently uploaded

Trusted Execution Environment for Decentralized Process Mining
Trusted Execution Environment for Decentralized Process MiningTrusted Execution Environment for Decentralized Process Mining
Trusted Execution Environment for Decentralized Process Mining
LucaBarbaro3
 
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Malak Abu Hammad
 
Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...
Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...
Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...
saastr
 
dbms calicut university B. sc Cs 4th sem.pdf
dbms  calicut university B. sc Cs 4th sem.pdfdbms  calicut university B. sc Cs 4th sem.pdf
dbms calicut university B. sc Cs 4th sem.pdf
Shinana2
 
Nordic Marketo Engage User Group_June 13_ 2024.pptx
Nordic Marketo Engage User Group_June 13_ 2024.pptxNordic Marketo Engage User Group_June 13_ 2024.pptx
Nordic Marketo Engage User Group_June 13_ 2024.pptx
MichaelKnudsen27
 
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with SlackLet's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
shyamraj55
 
Recommendation System using RAG Architecture
Recommendation System using RAG ArchitectureRecommendation System using RAG Architecture
Recommendation System using RAG Architecture
fredae14
 
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
saastr
 
AWS Cloud Cost Optimization Presentation.pptx
AWS Cloud Cost Optimization Presentation.pptxAWS Cloud Cost Optimization Presentation.pptx
AWS Cloud Cost Optimization Presentation.pptx
HarisZaheer8
 
Serial Arm Control in Real Time Presentation
Serial Arm Control in Real Time PresentationSerial Arm Control in Real Time Presentation
Serial Arm Control in Real Time Presentation
tolgahangng
 
Operating System Used by Users in day-to-day life.pptx
Operating System Used by Users in day-to-day life.pptxOperating System Used by Users in day-to-day life.pptx
Operating System Used by Users in day-to-day life.pptx
Pravash Chandra Das
 
GraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracyGraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracy
Tomaz Bratanic
 
leewayhertz.com-AI in predictive maintenance Use cases technologies benefits ...
leewayhertz.com-AI in predictive maintenance Use cases technologies benefits ...leewayhertz.com-AI in predictive maintenance Use cases technologies benefits ...
leewayhertz.com-AI in predictive maintenance Use cases technologies benefits ...
alexjohnson7307
 
Programming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup SlidesProgramming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup Slides
Zilliz
 
Building Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and MilvusBuilding Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and Milvus
Zilliz
 
Letter and Document Automation for Bonterra Impact Management (fka Social Sol...
Letter and Document Automation for Bonterra Impact Management (fka Social Sol...Letter and Document Automation for Bonterra Impact Management (fka Social Sol...
Letter and Document Automation for Bonterra Impact Management (fka Social Sol...
Jeffrey Haguewood
 
WeTestAthens: Postman's AI & Automation Techniques
WeTestAthens: Postman's AI & Automation TechniquesWeTestAthens: Postman's AI & Automation Techniques
WeTestAthens: Postman's AI & Automation Techniques
Postman
 
Skybuffer AI: Advanced Conversational and Generative AI Solution on SAP Busin...
Skybuffer AI: Advanced Conversational and Generative AI Solution on SAP Busin...Skybuffer AI: Advanced Conversational and Generative AI Solution on SAP Busin...
Skybuffer AI: Advanced Conversational and Generative AI Solution on SAP Busin...
Tatiana Kojar
 
Presentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of GermanyPresentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of Germany
innovationoecd
 
Azure API Management to expose backend services securely
Azure API Management to expose backend services securelyAzure API Management to expose backend services securely
Azure API Management to expose backend services securely
Dinusha Kumarasiri
 

Recently uploaded (20)

Trusted Execution Environment for Decentralized Process Mining
Trusted Execution Environment for Decentralized Process MiningTrusted Execution Environment for Decentralized Process Mining
Trusted Execution Environment for Decentralized Process Mining
 
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
 
Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...
Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...
Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...
 
dbms calicut university B. sc Cs 4th sem.pdf
dbms  calicut university B. sc Cs 4th sem.pdfdbms  calicut university B. sc Cs 4th sem.pdf
dbms calicut university B. sc Cs 4th sem.pdf
 
Nordic Marketo Engage User Group_June 13_ 2024.pptx
Nordic Marketo Engage User Group_June 13_ 2024.pptxNordic Marketo Engage User Group_June 13_ 2024.pptx
Nordic Marketo Engage User Group_June 13_ 2024.pptx
 
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with SlackLet's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
 
Recommendation System using RAG Architecture
Recommendation System using RAG ArchitectureRecommendation System using RAG Architecture
Recommendation System using RAG Architecture
 
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
 
AWS Cloud Cost Optimization Presentation.pptx
AWS Cloud Cost Optimization Presentation.pptxAWS Cloud Cost Optimization Presentation.pptx
AWS Cloud Cost Optimization Presentation.pptx
 
Serial Arm Control in Real Time Presentation
Serial Arm Control in Real Time PresentationSerial Arm Control in Real Time Presentation
Serial Arm Control in Real Time Presentation
 
Operating System Used by Users in day-to-day life.pptx
Operating System Used by Users in day-to-day life.pptxOperating System Used by Users in day-to-day life.pptx
Operating System Used by Users in day-to-day life.pptx
 
GraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracyGraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracy
 
leewayhertz.com-AI in predictive maintenance Use cases technologies benefits ...
leewayhertz.com-AI in predictive maintenance Use cases technologies benefits ...leewayhertz.com-AI in predictive maintenance Use cases technologies benefits ...
leewayhertz.com-AI in predictive maintenance Use cases technologies benefits ...
 
Programming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup SlidesProgramming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup Slides
 
Building Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and MilvusBuilding Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and Milvus
 
Letter and Document Automation for Bonterra Impact Management (fka Social Sol...
Letter and Document Automation for Bonterra Impact Management (fka Social Sol...Letter and Document Automation for Bonterra Impact Management (fka Social Sol...
Letter and Document Automation for Bonterra Impact Management (fka Social Sol...
 
WeTestAthens: Postman's AI & Automation Techniques
WeTestAthens: Postman's AI & Automation TechniquesWeTestAthens: Postman's AI & Automation Techniques
WeTestAthens: Postman's AI & Automation Techniques
 
Skybuffer AI: Advanced Conversational and Generative AI Solution on SAP Busin...
Skybuffer AI: Advanced Conversational and Generative AI Solution on SAP Busin...Skybuffer AI: Advanced Conversational and Generative AI Solution on SAP Busin...
Skybuffer AI: Advanced Conversational and Generative AI Solution on SAP Busin...
 
Presentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of GermanyPresentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of Germany
 
Azure API Management to expose backend services securely
Azure API Management to expose backend services securelyAzure API Management to expose backend services securely
Azure API Management to expose backend services securely
 

Featured

2024 State of Marketing Report – by Hubspot
2024 State of Marketing Report – by Hubspot2024 State of Marketing Report – by Hubspot
2024 State of Marketing Report – by Hubspot
Marius Sescu
 
Everything You Need To Know About ChatGPT
Everything You Need To Know About ChatGPTEverything You Need To Know About ChatGPT
Everything You Need To Know About ChatGPT
Expeed Software
 
Product Design Trends in 2024 | Teenage Engineerings
Product Design Trends in 2024 | Teenage EngineeringsProduct Design Trends in 2024 | Teenage Engineerings
Product Design Trends in 2024 | Teenage Engineerings
Pixeldarts
 
How Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental HealthHow Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental Health
ThinkNow
 
AI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdfAI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdf
marketingartwork
 
Skeleton Culture Code
Skeleton Culture CodeSkeleton Culture Code
Skeleton Culture Code
Skeleton Technologies
 
PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024
Neil Kimberley
 
Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)
contently
 
How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024
Albert Qian
 
Social Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsSocial Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie Insights
Kurio // The Social Media Age(ncy)
 
Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024
Search Engine Journal
 
5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary
SpeakerHub
 
ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd
Clark Boyd
 
Getting into the tech field. what next
Getting into the tech field. what next Getting into the tech field. what next
Getting into the tech field. what next
Tessa Mero
 
Google's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentGoogle's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search Intent
Lily Ray
 
How to have difficult conversations
How to have difficult conversations How to have difficult conversations
How to have difficult conversations
Rajiv Jayarajah, MAppComm, ACC
 
Introduction to Data Science
Introduction to Data ScienceIntroduction to Data Science
Introduction to Data Science
Christy Abraham Joy
 
Time Management & Productivity - Best Practices
Time Management & Productivity -  Best PracticesTime Management & Productivity -  Best Practices
Time Management & Productivity - Best Practices
Vit Horky
 
The six step guide to practical project management
The six step guide to practical project managementThe six step guide to practical project management
The six step guide to practical project management
MindGenius
 
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
RachelPearson36
 

Featured (20)

2024 State of Marketing Report – by Hubspot
2024 State of Marketing Report – by Hubspot2024 State of Marketing Report – by Hubspot
2024 State of Marketing Report – by Hubspot
 
Everything You Need To Know About ChatGPT
Everything You Need To Know About ChatGPTEverything You Need To Know About ChatGPT
Everything You Need To Know About ChatGPT
 
Product Design Trends in 2024 | Teenage Engineerings
Product Design Trends in 2024 | Teenage EngineeringsProduct Design Trends in 2024 | Teenage Engineerings
Product Design Trends in 2024 | Teenage Engineerings
 
How Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental HealthHow Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental Health
 
AI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdfAI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdf
 
Skeleton Culture Code
Skeleton Culture CodeSkeleton Culture Code
Skeleton Culture Code
 
PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024
 
Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)
 
How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024
 
Social Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsSocial Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie Insights
 
Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024
 
5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary
 
ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd
 
Getting into the tech field. what next
Getting into the tech field. what next Getting into the tech field. what next
Getting into the tech field. what next
 
Google's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentGoogle's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search Intent
 
How to have difficult conversations
How to have difficult conversations How to have difficult conversations
How to have difficult conversations
 
Introduction to Data Science
Introduction to Data ScienceIntroduction to Data Science
Introduction to Data Science
 
Time Management & Productivity - Best Practices
Time Management & Productivity -  Best PracticesTime Management & Productivity -  Best Practices
Time Management & Productivity - Best Practices
 
The six step guide to practical project management
The six step guide to practical project managementThe six step guide to practical project management
The six step guide to practical project management
 
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
 

Challenges for Information Security Theory

  • 1. Challenges for information security theory R. Ramanujam The Institute of Mathematical Sciences, Chennai, India jam@imsc.res.in
  • 2. Your email account ◮ Do you have an account on some public email facility ? ◮ How do you login to such an account ? ◮ You give user name and password. Why ? ICAC’09 Cauvery College, Tiruchi – August 8, 2009
  • 3. Sending secrets ◮ How does A send a secret x to B on a public channel ? ◮ A locks x in a box, sends the box across to B. ◮ Assume that locks are unbreakable, and that for every lock, there exists a unique key that opens it. ◮ The secret reaches B securely. ◮ But the key is with A; by assumption, B cannot open it. ◮ Should A send the key in another locked box !? ICAC’09 Cauvery College, Tiruchi – August 8, 2009
  • 4. One-way functions ◮ Given x, finding f (x) is easy to compute. ◮ Given y , finding f −1 (y ) is hard. ◮ Easy / hard in what sense ? ◮ The idea of trapdoor: helps to find the inverse. ICAC’09 Cauvery College, Tiruchi – August 8, 2009
  • 5. Secrets without cryptography ◮ Seven cards numbered 1 to 7 are distributed among three people, say A, B, C. ◮ A gets three cards, B gets three and C gets the last. ◮ They have to talk in public, tell the truth, exchange any messages. ◮ At the end, A should know all of B’s cards and vice versa, but for each of the six cards, C should be uncertain whether A has it or B. ◮ Is such a protocol possible at all ? ICAC’09 Cauvery College, Tiruchi – August 8, 2009
  • 6. Zero knowledge proofs ◮ Children A and B are looking at a ”Spot Arjun” puzzle. ◮ A has seen it, would like to convince that she has, but without revealing to B the location of Arjun. ◮ Is this possible ? ◮ These are called zero knowledge proofs. ICAC’09 Cauvery College, Tiruchi – August 8, 2009
  • 7. Key establishment ◮ A and B wish to generate a session key to be used subsequently. The need a protocol to establish a new key KAB . ◮ Assume that a reliable, trustworthy key server S exists. ◮ At the end of the protocol, KAB should be known to both A and B but to nobody else, except perhaps S. ◮ Both A and B should know that KAB is newly generated. ICAC’09 Cauvery College, Tiruchi – August 8, 2009
  • 8. First attempt ◮ Here is a protocol: 1. A → S : A, B 2. S → A : KAB 3. A → B : KAB , A ◮ Remarks about notation: ◮ No internal actions are specified. ◮ Only the communications in successful runs are specified. ◮ It is assumed that A and B understand that these are protocol messages. ICAC’09 Cauvery College, Tiruchi – August 8, 2009
  • 9. Insecurity in it ◮ Confidentiality is compromised. ◮ Security Assumption: The adversary can eavesdrop on all messages sent on public channels. ◮ Pragmatic assumption: Assume that the server has an initial shared key with every principal in the system. ICAC’09 Cauvery College, Tiruchi – August 8, 2009
  • 10. Second attempt ◮ 1. A → S : A, B 2. S → A : {KAB }KAS , {KAB }KBS 3. A → B : {KAB }KBS , A ◮ The notation {x}k denotes a message x encrypted with key k. ◮ It does not matter which encryption algorithm is used. ◮ We make the perfect encryption assumption. ICAC’09 Cauvery College, Tiruchi – August 8, 2009
  • 11. An attack ◮ Security Assumption: The adversary can also capture messages, alter them at will, reroute them (but cannot break encryption). ◮ Here is the attack: 1. A → S : A, B 2. S → A : {KAB }KAS , {KAB }KBS 3. A → B(I ) : {KAB }KBS , A 3’. (I )C → B : {KAB }KBS , C ◮ Now B believes that he is sharing a key with C, whereas he is actually sharing it with A. ◮ Some secrets meant only for A can be leaked to C. ICAC’09 Cauvery College, Tiruchi – August 8, 2009
  • 12. Another attack ◮ In the attack we saw, I does not get hold of KAB . Here is one where he does. ◮ 1. A → S(I ) : A, B 1’. I → S : A, I 2. S → I : {KAI }KAS , {KAI }KIS 2’. (I )S → A : {KAI }KAS , {KAI }KIS 3. A → B(I ) : {KAI }KIS , A ◮ A believes that the protocol is completed with B, and hence I can masquerade as B. ICAC’09 Cauvery College, Tiruchi – August 8, 2009
  • 13. Insiders ◮ In the attack we saw, I could have been a legitimate user known to S. ◮ Security Assumption: The adversary may be a legitimate participant in the protocol (insider), or an external party, or a combination of both. ◮ In fact, security threats from insiders are more of a problem than from outsiders, in many systems. ◮ Typically referred to as the “person in the middle” attack. ◮ Solution ? ICAC’09 Cauvery College, Tiruchi – August 8, 2009
  • 14. Another attempt ◮ Bind keys to agent names. ◮ 1. A → S : A, B 2. S → A : {KAB , B}KAS , {KAB , A}KBS 3. A → B : {KAB , A}KBS ◮ It can be checked that neither of the attacks considered earlier are possible any longer. ICAC’09 Cauvery College, Tiruchi – August 8, 2009
  • 15. Replay ◮ The generated key is supposed to be new ! ◮ Security Assumption: The adversary may be able to obtain the value of the session key KAB used in any ′ sufficiently old earlier run of the protocol. ◮ A replay attack: 1. A → S(I ) : A, B 2. (I )S → A : {KAB , B}KAS , {KAB , A}KBS ′ ′ 3. A → B : {KAB , A}KBS ′ ◮ Note that I need not actually have the value of KAB but ′ simply replay the earlier message, forcing A and B to accept an old, dated key. ◮ Now I can replay an earlier (legitimate) message, which can be, say: “Deposit Rs 1 lakh into I’s account” ! ICAC’09 Cauvery College, Tiruchi – August 8, 2009
  • 16. Nonces ◮ How do we ensure that old keys are not replayed ? ◮ A generates a new random value NA called nonce. ◮ A starts the protocol by sending a nonce NA . If by the end of the protocol, the same value returns, she knows that the key has not been replayed. ◮ What about B ? He generates his own nonce as well. ◮ This is typically called a challenge - response technique. ICAC’09 Cauvery College, Tiruchi – August 8, 2009
  • 17. Needham - Schroeder ◮ We now have the following version of the protocol: 1. A → S : A, B, NA 2. S → A : {KAB , B, NA , {KAB , A}KBS }KAS 3. A → B : {KAB , A}KBS 4. B → A : {NB }KAB 5. A → B : {NB + 1}KAB ◮ This is the famous Needham - Schroeder protocol, 1978. ◮ Denning and Sacco found an attack in 1986. ICAC’09 Cauvery College, Tiruchi – August 8, 2009
  • 18. The attack and its fix ◮ A replay attack: 3’. (I )A → B : {KAB , A}KBS ′ 4. B → A(I ) : {NB }KAB ′ 5. (I )A → B : {NB + 1}KAB′ ◮ The fix is quite simple: 1. B → A : B, NB 2. A → S : A, B, NA , NB 3. S → A : {KAB , B, NA }KAS , {KAB , A, NB }KBS 4. A → B : {KAB , A, NB }KBS ICAC’09 Cauvery College, Tiruchi – August 8, 2009
  • 19. Are we done? ◮ Is this protocol secure ? Can we prove it secure ? ◮ Yes, but this takes a great deal of effort and machinery. ◮ Note that it still achieves less. At the end of the run, neither A nor B can actually deduce that the other has actually received KAB ! ICAC’09 Cauvery College, Tiruchi – August 8, 2009
  • 20. Infrastructure The architecture of a security protocol crucially depends on: ◮ Existing cryptographic keys (shared, public) ◮ Key generation mechanisms ◮ Nonce generation mechanisms ◮ Number of users ◮ Number of multisessions concurrently active ICAC’09 Cauvery College, Tiruchi – August 8, 2009
  • 21. Security properties ◮ Confidentiality: Data is available only to those authorized to obtain it. ◮ Integrity: Data has not been altered by unauthorised entities. ◮ Authentication: Data has indeed originated from the purported sender. ◮ Non-repudiation: Entities cannot deny sending data they have committed to. ◮ Freshness: Nonces are unguessable, and never re-used. ICAC’09 Cauvery College, Tiruchi – August 8, 2009
  • 22. Attacks ◮ Eavesdropping ◮ Modification ◮ Replay ◮ Preplay ◮ Denial of service ◮ Type flaws ◮ Cryptanalysis ICAC’09 Cauvery College, Tiruchi – August 8, 2009
  • 23. Contract signing ◮ Two parties agree on the contract text ◮ Each will sign if the other will. ◮ Physical solution is easy: sit at a table. ◮ Over a network ? ICAC’09 Cauvery College, Tiruchi – August 8, 2009
  • 24. Why is this difficult ? ◮ Cannot trust communication channels. (Intruder may block or insert messages.) ◮ Cannot trust the other party in the protocol ! Public key certificate does not certify honesty. ◮ Even if a trustworthy judge exists, she may become a communication bottleneck. ICAC’09 Cauvery College, Tiruchi – August 8, 2009
  • 25. Optimistic contract signing ◮ A tells B: “I am going to sign the contract” ◮ B tells A: “I am going to sign the contract” ◮ A sends her signature to B ◮ B sends his signature to A A judge may declare contract binding if given first two messages. ICAC’09 Cauvery College, Tiruchi – August 8, 2009
  • 26. Requirements ◮ Fairness: If A cannot obtain a contract, B should not be able to obtain a contract either, and vice versa. If A cannot get a deed for the house, B should not be able to collect A’s money. ◮ No advantage: No party may solely determine the outcome of the protocol. At no stage should A be able to decide by herself whether the house is sold or not. ◮ No provable advantage: No party may prove that it can solely determine the outcome of the protocol. B should not be able to show A’s offer to C and convince C to pay more. ICAC’09 Cauvery College, Tiruchi – August 8, 2009
  • 27. Negative result ◮ Dishonest party has advantage in any fixed-round optimistic fair exchange protocol. ◮ Dishonest party always has a strategy to reach a state where it can unilaterally force an outcome. ◮ Similar to impossibility result for distributed consensus. ◮ Cryptography cannot help. ◮ Need a trusted party for every transaction: bad news for e-commerce (or maybe good news !?). ICAC’09 Cauvery College, Tiruchi – August 8, 2009
  • 28. Electronic voting ◮ Secrecy: Every voter’s choice should be private, and others should not be able to figure out how she voted. ◮ Individual verifiability: Each voter should be able to check whether her vote has been counted properly. ◮ Universal verifiability: It should be possible to check whether every voter’s vote has been counted properly. ◮ Fairness: Voters do not have any knowledge of the distribution of votes until the tallies are finally announced. ◮ Receipt-freeness: No voter has any means of proving to another that he has voted in a particular manner. ICAC’09 Cauvery College, Tiruchi – August 8, 2009
  • 29. Receipt-freeness ◮ A problem characteristic of elections, and an important one. ◮ Lack of receipt-freeness (that is, the presence of a receipt) allows vote buying and coercion which has the potential to drastically affect the election process. ◮ When a receipt exists, it could be constructed in any manner that convinces the sceptical second party. ◮ Demonstrating that no such way exists is highly demanding, and is seen as a significant challenge to formal models. ICAC’09 Cauvery College, Tiruchi – August 8, 2009
  • 30. Protocol structure ◮ Three kinds of agents: voters are one kind. ◮ Administrators know the voters’ identity, but cannot see the votes, and their job is to check voters’ eligibility to vote. ◮ Talliers see the votes, but not the voters’ identities, and their job is to count votes for each candidate and announce the result. ICAC’09 Cauvery College, Tiruchi – August 8, 2009
  • 31. Homomorphic encryption ◮ Based on Adi Shamir’s secret sharing technique. ◮ Voters split their votes into several shares which they send to different administrators. ◮ Unless many administrators collude, it is difficult to reconstruct the vote. ICAC’09 Cauvery College, Tiruchi – August 8, 2009
  • 32. Blind signature ◮ Voter sends an encrypted vote {t}k to the administrator. ◮ The administrator A cannot decrypt the vote, but checks the voter’s eligibility, “blindly” signs the message and returns {tA }k to the voter. ◮ The voter, who generated k, can strip it off from {tA }k obtaining tA , which is the vote t duly attested by A. ◮ Now the voter sends tA anonymously to the tallier. ◮ The tallier verifies the attestation, and gets the vote t (while not knowing the origin). ICAC’09 Cauvery College, Tiruchi – August 8, 2009
  • 33. Summary ◮ Security protocols are difficult to design and analyse, bugs hard to attack. ◮ We need a development methodology which would always generate provably correct protocols. ◮ We need automaated tools for discovering attacks. ◮ Our main contribution: we identify subclasses of security protocols for which it is possible to automatically verify many security properties. ICAC’09 Cauvery College, Tiruchi – August 8, 2009