90 likes | 177 Vues
Explore the realm of weak authentication in this presentation by Jari Arkko and Pekka Nikander, presented by Riku Honkanen. Discover why weak authentication is relevant, various techniques, economic impacts, and probabilities. Delve into concrete techniques like Anonymous Encryption, Challenge-Response, Leap-of-Faith, and more for securing communications between unknown parties. Gain insights on the benefits, risks, and importance of economic analysis in designing application protocols. Understand how weak authentication can sometimes be sufficient and learn how to leverage basic techniques effectively.
E N D
Weak Authentication: How to Authenticate Unknown Principals without Trusted Parties Jari Arkko & Pekka Nikander Presented by Riku Honkanen
Presentation Outline • ”Cryptographically strong authentication between previously unknown parties without relying on trusted third parties” • Why weak authentication? • Weak authentication techniques • Classification • Concrete techniques • Technique Analysis • Economic impacts & probabilities
Why Weak Authentication? • If there are no real-world identities/effects • Imperfect security is sometimes enough • Higher cost of strong authentication • Current & potential applications: • Personal area networks • Secure Shell (SSH) • Session Initiation Protocol (SIP) • Multi-homing • Mobilitity
Technique Categories (1/2) • Spatial Separation • Ensuring that the peer is on a certain path • Temporal Separation • Peers relate past & current communications • Asymmetric Costs • Cost of attack is higher than cost of defense • Application Semantics • Cryptographic properties of identifiers
Technique Categories (2/2) • Combined and Transitive Techniques • The mentioned categories can be combined for improved security • Time and location as main dimensions Same peer, different location Time Same peer One time use Over a specific path Location
Concrete Techniques • Anonymous Encryption - temporal • e.g. unauthenticated Diffie-Hellman secures a single session • Challenge-Response - spatial • Freshness and peer on a certain path • Leap-of-Faith – temporal, spatial, asymmetric cost • Unauthenticated at start of first connection • Following connections authenticated • Cryptographically Generated Addresses – spatial & application • Opportunistic IPSec
Technique Analysis • Anonymous Encryption • Vulnurable for man-in-the-middle attack in the beginning of the session • Benefits community more than a single user • Challenge-Response • Probability of a certain path having an attacker • Leap-of-Faith • Uncertainty gets smaller when number of connections increases between specific peers
Economic Impacts & Probabilities • Cost of attack vs. cost of defense • Weak authentication may be enough to raise the cost of the attack to multiples of cost of the defense • Probability of the attack • Weak authentication may lower the probability of an attacker being present significantly • Economics and probabilities should be understood before application protocol design
Summary • Weak authentication is good enough for some applications • Basic WA techniques can provide significant advantage with low cost • Importance of uncertainty, probability and economic impact analysis • the results may be surprising