CIS-6935-8:
Security Issues (Fall 2004)
Description
- The seminar is informal and everybody can participate, ask
questions, suggest topics to be discussed etc. If you want to,
this could count as a 1hr pass/fail credit course. Otherwise just
come for the discussion. Each meeting will have a central theme
on some timely security issue, and at least one person will steer
the discussions. However there is no fixed itinerary, although we
will always have a backup plan in case we all run out of ideas.
- Want to submit a topic for future discussion? E-mail one of the
chairs: {burmeste,breno} + `at` symbol + <cs domain name>
- See the announcement for this week's discussion topic below:
Coming Topic
- Date: 10/22/2004
- Topic: Correlation-Resistant Storage
- Abstract:
The past decade has seen growing interest in techniques for protecting critical data even in the face of catastrophic
storage failure. A number of loosely related approaches seek to guard data by massively replicating records across a geographically
distributed network of thousands of machines connected by high-speed links. This approach, sometimes
referred to as survivable or pervasive information storage has been the subject of a number of research efforts.
The goal of a survivable storage network is to guarantee data availability by ensuring that copies of each data object
are stored at different locations in the system. Additionally, many survivable systems require that data be continuously
re-distributed from place to place in order to maintain availability as individual storages fail or leave the network.
Secure storage systems seek to maintain not only the availability, but also the confidentiality and integrity of stored
data despite the efforts of a motivated adversary. Complicating the design of these secure survivable storage systems
is the possibility that large-scale distributed systems, particularly those composed of volunteers, are at increased risk
of including untrustworthy or even malicious elements.
By far the most common approach to securing data in large-scale storage networks is to encrypt data on the clientside,
before it is submitted to the storage system. Strong client-side encryption is sufficient to protect the confidentiality
of stored data, regardless of nature of the storage network. Unfortunately, client-side encryption cannot prevent all
attacks on a distributed storage system. One concern is the possibility of correlation attack, in which an adversary
identifies identical copies of a ciphertext stored on different nodes, in order to gain information on file usage and
distribution. This problem is easily addressed through the use of randomized encryption, providing the client submits
multiple unlinkable ciphertexts to the network. Unfortunately, this approach requires the participation of the client; if
the attacker is not online, the storage network cannot generate new, unlinkable ciphertexts. Therefore, it is of particular
concern when storage networks dynamically replicate records from one storage node to another without contacting
the client. Unfortunately, none of the proposed survivable storage schemes provide mechanisms for dynamically
re-encrypting a file without cooperation from the publisher or some on-line trusted party.
In this talk, we consider the problem of using untrusted components to build correlation-resistant distributed storage systems
capable of on-demand re-encryption of stored files. Correlation-resistant storage systems are designed to provide
remote retrieval of stored files, while resisting correlation attacks in which an adversary targets a storage system by
linking instances of files that have been stored in different places within a storage system. We discuss the security
requirements of these systems, and propose a protocol designed to allow dynamic re-encryption ensuring unlinkability
between different instances of a file.
Previous talks
- Date: 10/15/2004
- Topic: Key-Exposure Free Chameleon Hashes and Applications
- Abstract:
Chameleon signatures are non-interactive signature schemes that provide non-transferability.
For wide applicability, a chameleon signature scheme should address the key exposure problem,
or otherwise non-transferability is supported through exposure of the recipients secret key, and
subsequent invalidation of all signatures issued to the associated public key.
Two distinct approaches have been proposed to address this key-revocation issue. Identity-based
schemes employ single-use public keys (called customizable identities) tied to specific transactions,
while key-exposure-free constructions directly eliminate the problem of key-exposure,
for instance by splitting the public key into two components, one ephemeral and transactiondependent
and the other permanent a scenario that requires multiple trapdoors. By clarifying
the definitions and properties of identity-based and key-exposure-free schemes we reveal that,
under certain assumptions, the two notions are equivalent.
We present several efficient and practical constructions of key exposure-free chameleon hash
functions based on different cryptographic assumptions, such as the RSA and the discrete logarithm
assumptions, including the first key-exposure free scheme that relies on a single trapdoor,
instead using multiple signatures. This scheme is realizable over a large set of cryptographic
groups (where the discrete logarithm is hard). Finally, we demonstrate the potential applicability
of identity-based chameleon signatures in e-commerce by using them in the design of a closed
auction protocol, and describe a proof-of-concept implementation of the protocol.
- Date: 10/08/2004
- Continuation of Topic: Anonymous Wireless Authentication on a Portable Cellular Mobile System.
- Presenter: Dr. Shiuh-Jeng Wang
- Plan:
- Dr. Wang's presentation was not completed within the allotted time last week, as it inspired
many interesting discussions. It is to be continued this week.
- Date: 10/01/2004
- Topic: Anonymous Wireless Authentication on a Portable Cellular Mobile System.
- Presenter: Dr. Shiuh-Jeng Wang
- Abstract:
Dr. Wang presents his paper [1], to appear in IEEE Transactions on Computers.
Wireless has recently become a widely discussed research topic. Many people have already enjoyed
the convenience provide by mobile phone systems. With the inclusion of mobile data services in the
foreseeable future, we shall march into a new era of personal multimedia mobile communications service.
The paper presents a secure and anonymous conference call set-up scheme for a portable cellular mobile
system. It uses techniques from identity-based cryptography to enable a mobile unit and a base station
to directly authenticate each other by their public identity.
It provides subscribers with user identification privacy from other members of the conference call:
Each mobile unit joining this system can determine whether it is part of a conference call, but it cannot
derive any further information about who else is also in the conference.
Re-authentication in the course of hand-off is also discussed, and the reauthentication
procedure is performed through a privacy homomorphism mechanism. The time computation with an
8-bit microcontroller handset is acceptable for performing an anonymous conference call in such mobile
systems.
-
Shiuh-Jeng Wang. Anonymous Wireless Authentication of a Portable Cellular Mobile System. In
IEEE Transactions on Computers, vol. 53, no. 10, October 2004. Pp. 1317--1329.
- Date: 09/24/2004
- Topic: Efficient Revocation of Certificates
- Presenters: Eric Hokansen, Matthew Pouliotte.
- Plan:
- Date: 09/17/2004
- Continuation of Topic: Trust
Introduction to new Topic:
Revocation
- Presenters: Goce Jakimoski, Jiangyi Hu, Breno de Medeiros.
- Plan:
- Goce Jakimoski will talk about (acyclic) AND/OR trust graphs, in which
flows are used to measure trust (with appropriate weights: hopefully
this will be defined by then(!)).
- Jiangyi Hu will talk about reputation models
for secure routing in ad-hoc networks, in which trust/reputation
is used to mitigate "node selfishness".
- Breno M. will introduce the topic of
revocation. This topic is a natural continuation
of the discussion on trust: Even if one has a robust infrastructure for authentication
and for conveying trust, it does not follow that one has adequate mechanisms to withdraw this
trust if it is violated, for instance by exposure of a private key. As a result, trust may
be placed on entities and keys which are not trustworthy because trust revocation does not
take place efficiently, timely, or at all. This topic will be followed by presentations by
several students on our next meeting.
- Date: 09/10/2004
- General Topic: Trust
- Presenters: Mike Burmester
, Karolina Maneva-Jakimoska, Goce Jakimoski, Jiangyi Hu.
- Abstract:
Trust is an essential component of any distributed system. We cannot have security without it.
Trust is particularly needed in the context of public key cryptography.
But, what kind of trust do we need? Is "binary trust" sufficient, or do we need to work with a
more fine-grained "degree" of trust? How do we define metrics for trust?
The seminar consist of two presentations:
- Mike B. will start with a discussion on Public Key Infrastructures
Based on the Aug. 2004 article in the CACM (collaboration w. Yvo Desmedt):
"Hierarchical Public-Key Certification: The Next Target for Hackers?".
Viewable at:
http://www.cs.fsu.edu/~burmeste/p68-burmester.pdf (skip 1st page).
- Karolina Maneva-Jakimoska will talk about weighted (acyclic) trust graphs,
in which flows are used to measure trust (with probabilistic weights,
based on good behavior).
- Date: 09/03/2004
- Title: (In)Secure Hash Functions, or Have we built security over
fundamentally weak foundations?
- Presenter: Breno
de Medeiros.
- Abstract:
Cryptography, once a subject of scientific inquiry only within military
and intelligence circles, has established itself as a fertile area of
academic research over the past few decades. Increasing
Governmental recognition of the maturity of non-classified
cryptographic research is translated into an ongoing trend for
standardization efforts to embrace transparent, competitive processes
to choose cryptographic standards, such as the one that determined AES
(Advanced Encryption Standard). Indeed, it had become a matter of
tacit agreement among security experts that reasonably strong
cryptographic primitives were available in the open, commercial domain,
and that practical security efforts should concentrate more on system
engineering and human engineering aspects (e.g. protocol design and
analysis, trust assumptions, economic incentives).
However, over the past few years developments in crypto-analytic
techniques have placed question marks on many of these comfortable
assumptions. In particular, secure hash functions such as MD5
(highly used in practice) seemed less and less resilient to
increasingly sophisticated theoretical attacks, until it was
successfully crypto-analyzed via a practical attack that takes an hour
in an IBM P690 cluster (CRYPTO, 08/17/2004). Equally worrisome
are developments (also presented at CRYPTO 2004) that undermine
confidence in the security of SHA-1, a NIST standard drafted by the
NSA, and the only secure hash function approved for use by US
Government agencies (and amended as recently as Feb. 2004).
Have we overestimated the security of our basic cryptographic
primitives? While good cryptography is only one piece in the
edifice of a secure infrastructure, the economic consequences of
adopting insecure cryptography can be much bigger than mistakes
at the higher levels -- for instance, a single cryptographic standard
gets implemented in a myriad of systems. If it needs to be
replaced, all these systems need to be upgraded, often without the
luxury of backward compatibility.
*Join us for an investigation of these very recent results. I
will give a slide presentation on secure hash
functions and the new developments, follow it with a video screening of
the now notorious
CRYPTO 2004 Rump Session, and then open the floor to questions and
discussions.*
- Date: 08/27/2004
- Title: Cryptolight: Single-pass, Parellelizable Encryption
and Authentication Primitives
- Presenter: Goce Jakimoski
- Background on topic (from Virgil Gligor's ):
During the past few years we have witnessed the rapid growth in the use
of
network devices that are power-constrained and have limited computation
and communication capabilities. These devices range from PDAs and
embedded
processors to arrays of sensors. They may be used in networks deployed
in
hostile areas where communication can be monitored and altered, and thus
require cryptographic protection. However, the use of traditional
cryptographic constructs (e.g., public-key cryptography, conventional
authenticated encryption modes, and random number generators) may be
hampered by energy and computation constraints of these network devices.
"lightweight cryptography" offers practical alternatives
for use with many such devices particularly when they are networked on
an
ad-hoc basis.
"Lightweight cryptography, or cryptolight" encompasses symmetric
encryption algorithms, modes of encryption, and key-management schemes
that require reduced levels of energy and can be deployed without
substantial infrastructures.
