1 / 11

Key Establishment Pitfalls

CS 378. Key Establishment Pitfalls. Vitaly Shmatikov. Secure Sessions. Secure sessions are one of the most important applications in network security Enable us to talk securely on an insecure network Goal: secure bi-directional communication channel between two parties

jill
Télécharger la présentation

Key Establishment Pitfalls

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. CS 378 Key Establishment Pitfalls Vitaly Shmatikov

  2. Secure Sessions • Secure sessions are one of the most important applications in network security • Enable us to talk securely on an insecure network • Goal: secure bi-directional communication channel between two parties • The channel must provide confidentiality • Third party cannot read messages on the channel • The channel must provide authentication • Each party must be sure who the other party is • Other desirable properies: integrity, protection against denial of service, anonymity against eavesdroppers

  3. Key Establishment Protocols • Common implementation of secure sessions: establish a secret key known only to two parties • Can then use block ciphers for confidentiality, HMAC for authentication, and so on • Challenge: how to establish a secret key using only public information • Even if the two parties share a long-term secret, a fresh key should be created for each session • Long-term secrets are valuable; want to use them as sparingly as possible to limit exposure and the damage if the key is compromised

  4. Key Establishment Techniques • Use a trusted key distribution center (KDC) • Every party shares a pairwise secret key with KDC • KDC creates a new random session key and then distributes it, encrypted under the pairwise keys • Example: Kerberos • Use public-key cryptography • Diffie-Hellman authenticated with signatures • Example: IKE (Internet Key Exchange) • One party creates a random key, sends it encrypted under the other party’s public key • Example: TLS (Transport Layer Security)

  5. Private-Key Needham-Schroeder Creates fresh random session key KAB KDC (knows secret keys KAlice and KBob) Fresh, random nonce N1, “I’m Alice, wanna talk to Bob” EncryptKAlice(N1,“Bob”,KAB, EncryptKBob(KAB,“Alice”)) ticket ticket, EncryptKAB(N2) Another nonce EncryptKAB(N2-1, N3) Yet another nonce Alice Bob EncryptKAB(N3-1)

  6. Replay an old message from Alice Alice’s ticket, EncryptKAB(N2) EncryptKAB(N2-1, N3) Can’t decrypt, but in ECB mode can extract EncryptKAB(N3) Open a new session with Bob… Alice’s ticket, EncryptKAB(N3) Extract EncryptKAB(N3-1) EncryptKAB(N3-1, N4) Now successfully authenticate in first session… EncryptKAB(N3-1) Weird Reflection Attack • Suppose symmetric encryption is in ECB mode… • Bad idea in general Bob

  7. Otway-Rees Protocol Creates fresh random session key KAB KDC (knows secret keys KAlice and KBob)  EncryptKAlice(NA,NC,“Alice”,“Bob”) EncryptKBob(NB,NC,“Alice”,“Bob”) NC, EncryptKAlice(NA,KAB), EncryptKBob(NB,KAB), Bob’s own nonce  This nonce is sent in the clear This nonce is hidden from Bob NC, “Alice”, “Bob”, EncryptKAlice(NA,NC,“Alice”,“Bob”)  NC, EncryptKAlice(NA, KAB)  Alice Bob EncryptKAB(anything recognizable) 

  8. Brief Analysis of Otway-Rees • Lesson: randomness of nonces is essential KDC (knows secret keys KAlice and KBob) Match between these values is the only thing that authenticates Bob to KDC If NC is predictable, attacker can send a bogus message to Bob and fool him into creating EncryptKBob(NB,NC,“Alice”,“Bob”). When Alice actually uses NC, attacker will be able to impersonate Bob to KDC.  EncryptKAlice(NA,NC,“Alice”,“Bob”) EncryptKBob(NB,NC,“Alice”,“Bob”) NC, EncryptKAlice(NA,KAB), EncryptKBob(NB,KAB),  NC, “Alice”, “Bob”, EncryptKAlice(NA,NC,“Alice”,“Bob”)  NC, EncryptKAlice(NA, KAB)  Alice Bob EncryptKAB(anything recognizable) 

  9. Public-Key Needham-Schroeder Alice’s nonce EncryptPublicKey(Bob)(“Alice”, NA) Bob’s nonce EncryptPublicKey(Alice)(NA, NB) EncryptPublicKey(Bob)(NB) Bob Alice Create new key from NA and NB, e.g., NANB Alice’s reasoning: • The only person who could know NA is the person who decrypted 1st message • Only Bob can decrypt message encrypted with Bob’s public key • Therefore, Bob is on the other end of the line Bob is authenticated! Bob’s reasoning: • The only way to learn NB is to decrypt 2nd message • Only Alice can decrypt 2nd message • Therefore, Alice is on the other end Alice is authenticated!

  10. EncryptPublicKey(Bob)(“Alice”, NA) EncryptPublicKey(Alice)(NA, NC) EncryptPublicKey(Bob)(NC) Bob can’t decrypt this message, but he can replay it to Alice Evil Bob pretends that he is Alice EncryptPublicKey(Alice)(NA, NC) Evil Bob tricks honest Alice into revealing Charlie’s secret Nc EncryptPublicKey(Charlie) (“Alice”, NA) Charlie is convinced that he is talking to Alice! Charlie Attack on Needham-Schroeder [published by Gavin Lowe] Alice Bob

  11. Lessons of Needham-Schroeder • Yet another example of faulty reasoning • Alice is correct that Bob must have decrypted EncryptPublicKey(Bob)(“Alice”, NA), but this does not mean that EncryptPublicKey(Alice)(NA, NB) came from Bob • It is important to realize limitations of protocols • The attack requires that Alice willingly talk to attacker • Attacker uses a legitimate conversation with Alice to impersonate Alice to Charlie • Needham and Schroeder intended this protocol to be used by well-behaved workstations on an insecure network. In their setting, the protocol is correct!

More Related