cryptography post-snowden - surf · cryptography post-snowden bart preneel ... – collection and...

73
1 Cryptography Post-Snowden Bart Preneel COSIC KU Leuven and iMinds, Belgium Bart.Preneel(at)esat.kuleuven.be 12 February 2015 © KU Leuven COSIC, Bart Preneel

Upload: phamnhu

Post on 18-Apr-2018

216 views

Category:

Documents


1 download

TRANSCRIPT

Page 1: Cryptography Post-Snowden - SURF · Cryptography Post-Snowden Bart Preneel ... – collection and analysis of foreign communications and foreign ... NSA contractor suggest that the

1

Cryptography Post-Snowden

Bart Preneel COSIC KU Leuven and iMinds, Belgium

Bart.Preneel(at)esat.kuleuven.be 12 February 2015

© KU Leuven COSIC, Bart Preneel

Page 2: Cryptography Post-Snowden - SURF · Cryptography Post-Snowden Bart Preneel ... – collection and analysis of foreign communications and foreign ... NSA contractor suggest that the

2

Outline • Snowden revelation: the essentials

• Snowden revelations: some details

• Going after crypto

• Impact on research and policy

Page 3: Cryptography Post-Snowden - SURF · Cryptography Post-Snowden Bart Preneel ... – collection and analysis of foreign communications and foreign ... NSA contractor suggest that the

3

National Security Agency cryptologic intelligence agency of the USA DoD

– collection and analysis of foreign communications and foreign signals intelligence

– protecting government communications and information systems

Page 4: Cryptography Post-Snowden - SURF · Cryptography Post-Snowden Bart Preneel ... – collection and analysis of foreign communications and foreign ... NSA contractor suggest that the

4

Snowden revelations NSA: “Collect it all, know it all, exploit it all”

– most capabilities could have been extrapolated from open sources

But still… massive scale and impact (pervasive) level of sophistication both organizational and technical

– redundancy: at least 3 methods to get to Google’s data – many other countries collaborated (beyond five eyes) – industry collaboration through bribery, security letters, …

• including industrial espionage

undermining cryptographic standards with backdoors (Bullrun) … and also the credibility of NIST

Page 5: Cryptography Post-Snowden - SURF · Cryptography Post-Snowden Bart Preneel ... – collection and analysis of foreign communications and foreign ... NSA contractor suggest that the

5

Snowden revelations (2)

Most spectacular: active defense • networks

– Quantum insertion: answer before the legitimate website – inject malware in devices

• devices – malware based on backdoors and 0-days (FoxAcid) – supply chain subversion

Translation in human terms: complete control of networks and systems, including bridging the air gaps No longer deniable Oversight weak

Page 6: Cryptography Post-Snowden - SURF · Cryptography Post-Snowden Bart Preneel ... – collection and analysis of foreign communications and foreign ... NSA contractor suggest that the

6

Page 7: Cryptography Post-Snowden - SURF · Cryptography Post-Snowden Bart Preneel ... – collection and analysis of foreign communications and foreign ... NSA contractor suggest that the

7

NSA surveillance by country

Page 8: Cryptography Post-Snowden - SURF · Cryptography Post-Snowden Bart Preneel ... – collection and analysis of foreign communications and foreign ... NSA contractor suggest that the

8

The Netherlands and France

Page 9: Cryptography Post-Snowden - SURF · Cryptography Post-Snowden Bart Preneel ... – collection and analysis of foreign communications and foreign ... NSA contractor suggest that the

9

TEMPORA architecture (GCHQ) (1) Gain “access” to raw content: intercept (cable, satellite), hack, buy, ask.

(2) “Selector” based “promotion”

Target Selectors

Signals Intelligence

Translation, collation, Analysis, products

Sel

ecto

rs

Tempora / Xks

Ring Buffer

(4) “Map Reduce” Queries Target

Enrichment

Sel

ecto

rs

Pro

mot

ed T

raffi

c

Pro

mot

ed

Tra

ffic

(3) Standard Queries

Meta-Data

Long Term Intel. Database

Que

ries

Turbulence

Slide credit: George Danezis, UCL

3 days:125 Petabyte (US$ 200M)

Page 10: Cryptography Post-Snowden - SURF · Cryptography Post-Snowden Bart Preneel ... – collection and analysis of foreign communications and foreign ... NSA contractor suggest that the

10

Which questions can one answer with these systems?

• I have one phone number – find all the devices of

this person, his surfing behavior, the location where he has travelled to and his closest collaborators

• Find all Microsoft Excel sheets containing MAC addresses in country X

• Find all exploitable machines in country X • Find everyone in country X who communicates in

German and who uses the encryption tool Z

Page 11: Cryptography Post-Snowden - SURF · Cryptography Post-Snowden Bart Preneel ... – collection and analysis of foreign communications and foreign ... NSA contractor suggest that the

11

Rule #1 of cryptanalysis: search for plaintext [B. Morris]

Clear text

CRYPTOBOX

CRYPTOBOX

Clear text

Clear text

Clear text

Alice Bob Eve/NSA

Page 12: Cryptography Post-Snowden - SURF · Cryptography Post-Snowden Bart Preneel ... – collection and analysis of foreign communications and foreign ... NSA contractor suggest that the

12

Where do you find plaintext?

2. Upstream (fiber) 1. PRISM (server)

Tempora

Page 13: Cryptography Post-Snowden - SURF · Cryptography Post-Snowden Bart Preneel ... – collection and analysis of foreign communications and foreign ... NSA contractor suggest that the

13

Muscular (GCHQ) help from Level 3

(LITTLE)

Jan 9 2013: In the preceding 30 days, field collectors had processed and sent back 181,280,466 new records — including “metadata,” which would indicate who sent or received e-mails and when, as well as content such as text, audio and video (from Yahoo! and Google)

Page 14: Cryptography Post-Snowden - SURF · Cryptography Post-Snowden Bart Preneel ... – collection and analysis of foreign communications and foreign ... NSA contractor suggest that the

14 Source: The Guardian

Upstream (continued): 90% of traffic over cables

GCHQ plan in 2009: tap 16.9Tbs and select 3.9Tbs (egress) ~20%

Page 15: Cryptography Post-Snowden - SURF · Cryptography Post-Snowden Bart Preneel ... – collection and analysis of foreign communications and foreign ... NSA contractor suggest that the

15

3. Traffic data (meta data) (DNR) • traffic data is not plaintext itself, but it is very informative

• it may contain URLs of websites • it allows to map networks • location information reveals social relations

6 June 2013: NSA collecting phone records of millions of

Verizon customers daily EU: data retention directive (2006/24/EC)

– declared illegal by EU Court of Justice in April 2014: disproportionate and contrary to some fundamental rights protected by the Charter of Fundamental Rights, in particular to the principle of privacy

http://radiobruxelleslibera.wordpress.com/2014/04/08/the-annulment-of-the-data-

retention-directive-and-the-messy-consequences-on-national-legislations/

Page 16: Cryptography Post-Snowden - SURF · Cryptography Post-Snowden Bart Preneel ... – collection and analysis of foreign communications and foreign ... NSA contractor suggest that the

16

3. Traffic data (DNR) – phone location

• NSA collects about 5B records a day on cell phone location

• Co-traveler

Page 17: Cryptography Post-Snowden - SURF · Cryptography Post-Snowden Bart Preneel ... – collection and analysis of foreign communications and foreign ... NSA contractor suggest that the

17

3. The meta data debate

It’s only meta data

Former National Security Agency (NSA) and Central Intelligence Agency (CIA) Director Michael Hayden (Reuters/Larry Downing)

We kill people based on meta data

… but that’s not what we do with

this metadata

Page 18: Cryptography Post-Snowden - SURF · Cryptography Post-Snowden Bart Preneel ... – collection and analysis of foreign communications and foreign ... NSA contractor suggest that the

18

4. Client systems • hack the client devices

• use unpatched weaknesses (disclosed by vendors or by update mechanism?)

• sophisticated malware • get plaintext

• e.g. webcam pictures of users

• it is well known that any mobile phone can be converted into a remote microphone

Page 19: Cryptography Post-Snowden - SURF · Cryptography Post-Snowden Bart Preneel ... – collection and analysis of foreign communications and foreign ... NSA contractor suggest that the

19

4. Client systems: TAO • Tailored Access Operations

• many technologies • large number on bridging air gaps • number of targets is limited by cost/effort

• Examples: • use radio interfaces and radar activation • supply chain interception • FOXACID: A system for installing spyware with a "quantum insert"

that infects spyware at the packet level

Page 20: Cryptography Post-Snowden - SURF · Cryptography Post-Snowden Bart Preneel ... – collection and analysis of foreign communications and foreign ... NSA contractor suggest that the

20

Page 21: Cryptography Post-Snowden - SURF · Cryptography Post-Snowden Bart Preneel ... – collection and analysis of foreign communications and foreign ... NSA contractor suggest that the

21

Lessons learned (1) Never underestimate a motivated, well-funded and competent

attacker Pervasive surveillance requires pervasive collection and active

attacks (also on innocent bystanders) Active attacks undermines integrity of and trust in computing

infrastructure

Emphasis moving from COMSEC to COMPUSEC (from network security to systems security)

Page 22: Cryptography Post-Snowden - SURF · Cryptography Post-Snowden Bart Preneel ... – collection and analysis of foreign communications and foreign ... NSA contractor suggest that the

22

Lessons learned (2) Economics of scale play a central role It is not about the US or US/UK or even five eyes

– other nations have similar capabilities

– more are developing them

– organized crime and terrorists working on this too

Need for combination of industrial policy and non-proliferation treaties

Page 23: Cryptography Post-Snowden - SURF · Cryptography Post-Snowden Bart Preneel ... – collection and analysis of foreign communications and foreign ... NSA contractor suggest that the

23

Outline • Snowden revelation: the essentials

• Snowden revelations: some details

• Going after crypto

• Impact on research and policy

Page 24: Cryptography Post-Snowden - SURF · Cryptography Post-Snowden Bart Preneel ... – collection and analysis of foreign communications and foreign ... NSA contractor suggest that the

24

NSA foils much internet encryption

NYT 6 September 2013 The National Security Agency is winning its long-

running secret war on encryption, using supercomputers, technical trickery, court orders and behind-the-scenes persuasion to undermine the major tools protecting the privacy of everyday communications in the Internet age

Page 25: Cryptography Post-Snowden - SURF · Cryptography Post-Snowden Bart Preneel ... – collection and analysis of foreign communications and foreign ... NSA contractor suggest that the

25

If you can’t get the plaintext

Clear text

CRYPTOBOX

CRYPTOBOX

Clear text

%^C&@&^(

%^C&@&^(

Alice Bob Eve/NSA

Ask for the key!

Page 26: Cryptography Post-Snowden - SURF · Cryptography Post-Snowden Bart Preneel ... – collection and analysis of foreign communications and foreign ... NSA contractor suggest that the

26

Asking for the key • (alleged) examples

• Lavabit email encryption • CryptoSeal Privacy VPN • SSL/TLS servers of large companies • Truecrypt?

This experience has taught me one very important lesson: without congressional action or a strong judicial precedent, I would strongly recommend against anyone trusting their private data to a company with physical ties to the United States. Ladar Levison, Owner and Operator, Lavabit LLC

Page 27: Cryptography Post-Snowden - SURF · Cryptography Post-Snowden Bart Preneel ... – collection and analysis of foreign communications and foreign ... NSA contractor suggest that the

27

If you can’t get the private key, substitute the public key

fake SSL certificates or SSL person-in-the-middle • Flame: rogue certificate by cryptanalysis* • Comodo, Diginotar, Turktrust • TLS data stored by GCHQ FLYING PIG

(Google, Hotmail, Yahoo!)

* Stevens, Counter-cryptanalysis, Crypto 2013

Page 28: Cryptography Post-Snowden - SURF · Cryptography Post-Snowden Bart Preneel ... – collection and analysis of foreign communications and foreign ... NSA contractor suggest that the

28

The CA Mess on the web [Eckersley10] “An observatory for the SSLiverse”

10.8M servers start SSL handshake 4.3M use valid certificate chains 650 CA certs trustable by Windows or Firefox 1.4M unique valid leaf certs

– 300K signed by one GoDaddy cert

80 distinct keys used in multiple CA certs several CAs sign the IP adr. 192.168.1.2 (reserved by RFC 1918)

2 leaf certs have 508-bit keys Debian OpenSSL bug (2006-2008)

– resulted in 28K vulnerable certs – fortunately only 530 validate – only 73 revoked

Page 29: Cryptography Post-Snowden - SURF · Cryptography Post-Snowden Bart Preneel ... – collection and analysis of foreign communications and foreign ... NSA contractor suggest that the

29

If you can’t get the key make sure that the key is generated using a

random number generator with trapdoor

Pseudo-random number

generator (PRNG)

seed

trapdoor allows to predict keys

Page 30: Cryptography Post-Snowden - SURF · Cryptography Post-Snowden Bart Preneel ... – collection and analysis of foreign communications and foreign ... NSA contractor suggest that the

30

Dual_EC_DRBG Dual Elliptic Curve Deterministic Random Bit Generator

• ANSI and ISO standard • 1 of the 4 PRNGs in NIST SP 800-90A

• draft Dec. 2005; published 2006; revised 2012

• Two “suspicious” parameters P and Q • Many warnings and critical comments

• before publication [Gjøsteen05], [Schoenmakers-Sidorenko06] • after publication [Ferguson-Shumov07]

Appendix: The security of Dual_EC_DRBG requires that the points P and Q be properly generated. To avoid using potentially weak points, the points specified in Appendix A.1 should be used.

Page 31: Cryptography Post-Snowden - SURF · Cryptography Post-Snowden Bart Preneel ... – collection and analysis of foreign communications and foreign ... NSA contractor suggest that the

31

Dual_EC_DRBG • NSA Bullrun program: NSA has been actively working to

"Insert vulnerabilities into commercial encryption systems, IT systems, networks, and endpoint communications devices used by targets."

• 10 Sept. 2013, NYT: "internal memos leaked by a former NSA contractor suggest that the NSA generated one of the random number generators used in a 2006 NIST standard — called the Dual EC DRBG standard — which contains a backdoor for the NSA."

• 9 Sept. 2013: NIST “strongly recommends" against the use of Dual_EC_DRBG, as specified in the January 2012 version of SP 800-90A.

Why was the slowest and least secure of the 4 PRNGs chosen

as the default algorithm in BSAFE?

Page 32: Cryptography Post-Snowden - SURF · Cryptography Post-Snowden Bart Preneel ... – collection and analysis of foreign communications and foreign ... NSA contractor suggest that the

32

Cryptovirology [Young-Yung]

http://www.cryptovirology.com/cryptovfiles/research.html

Page 33: Cryptography Post-Snowden - SURF · Cryptography Post-Snowden Bart Preneel ... – collection and analysis of foreign communications and foreign ... NSA contractor suggest that the

33

NSA can (sometimes) break SSL/TLS, IPsec, SSH, PPTP, Skype

• ask for private keys • implementation weaknesses • weak premaster secret

(IPsec) • end 2011: decrypt 20,000

secure VPN connections/hour

• http://www.spiegel.de/international/germany/inside-the-nsa-s-war-on-internet-security-a-1010361.html • http://blog.cryptographyengineering.com/2014/12/on-new-snowden-documents.html

Page 34: Cryptography Post-Snowden - SURF · Cryptography Post-Snowden Bart Preneel ... – collection and analysis of foreign communications and foreign ... NSA contractor suggest that the

34

Can NSA break AES with TUNDRA?

TUNDRA = 2009 undergraduate student project

Page 35: Cryptography Post-Snowden - SURF · Cryptography Post-Snowden Bart Preneel ... – collection and analysis of foreign communications and foreign ... NSA contractor suggest that the

35

Cryptography that seems to work difficulty decrypting certain types of traffic, including

• Truecrypt • PGP/GPG • Tor* (“Tor stinks”) • ZRTP from implementations such as RedPhone

commonalities RSA, Diffie-Hellman, ECDH and AES open source end-to-end limited user base

* some Tor traffic can be deanonymized

Page 36: Cryptography Post-Snowden - SURF · Cryptography Post-Snowden Bart Preneel ... – collection and analysis of foreign communications and foreign ... NSA contractor suggest that the

36

Cryptography that seems to work

Snowden had no access to cryptanalytic know-how and documents of NSA (only SIGINT)

Page 37: Cryptography Post-Snowden - SURF · Cryptography Post-Snowden Bart Preneel ... – collection and analysis of foreign communications and foreign ... NSA contractor suggest that the

37

Fighting cryptography • Undermining standards • Going after keys • Weak implementations • Cryptanalysis • Increase complexity of standards • Export controls • Hardware backdoors • Work with law enforcement to promote backdoor access

and data retention

Page 38: Cryptography Post-Snowden - SURF · Cryptography Post-Snowden Bart Preneel ... – collection and analysis of foreign communications and foreign ... NSA contractor suggest that the

38

Outline • Snowden revelation: the essentials

• Snowden revelations: some details

• Going after crypto

• Impact on research and policy

Page 39: Cryptography Post-Snowden - SURF · Cryptography Post-Snowden Bart Preneel ... – collection and analysis of foreign communications and foreign ... NSA contractor suggest that the

39

Deployment of cryptography • most crypto in volume and market serves for data and

entity authentication • code updates • payments: credit/debit/ATM/POS and SSL/TLS

• confidentiality • government/military secrets • DRM/content protection • ehealth (growing market) • telco: not end-to-end or with a backdoor • hard disk encryption: backdoored? • most data in the cloud is not encrypted

Page 40: Cryptography Post-Snowden - SURF · Cryptography Post-Snowden Bart Preneel ... – collection and analysis of foreign communications and foreign ... NSA contractor suggest that the

40

Symmetric Key Deployments ~19B

7,5

8

8,5

9

9,5

10

Mobile Access Banking Blu ray/DVD Hard disk Pay TV Game consoles Access Reader

log10

6.3B

Not end to end

6B 3.5B

1.5B

300M 250M 200M

500M

Missing: IPsec, SSH © Bart Preneel

Page 41: Cryptography Post-Snowden - SURF · Cryptography Post-Snowden Bart Preneel ... – collection and analysis of foreign communications and foreign ... NSA contractor suggest that the

41

Public Key Deployments ~9B

0

1

2

3

4

5

6

7

8

9

10

https:// http://

Browser

HTTP over SSL

SSL Transport System log10

3B 2.7B 600M 500M

200M 37M

10M 1M

500

Missing: IPsec, SSH © Bart Preneel

2B

Page 42: Cryptography Post-Snowden - SURF · Cryptography Post-Snowden Bart Preneel ... – collection and analysis of foreign communications and foreign ... NSA contractor suggest that the

42

Conclusions (research)

• Keep improving cryptographic algorithms, secure channels and meta-data protection

• Shift from network security to system security • Rethink architectures: distributed • Increase robustness against powerful opponents

who can subvert many subsystems during several lifecycle stages

• Open technologies and review by open communities

Page 43: Cryptography Post-Snowden - SURF · Cryptography Post-Snowden Bart Preneel ... – collection and analysis of foreign communications and foreign ... NSA contractor suggest that the

43

Conclusions (policy)

• Pervasive surveillance needs pervasive collection and active attacks with massive collateral damage on our ICT infrastructure

• Back to targeted surveillance under the rule of law

– avoid cyber-colonialism [Danezis] – need industrial policy with innovative technology that

can guarantee economic sovereignty – need to give law enforcement sufficient options

Page 44: Cryptography Post-Snowden - SURF · Cryptography Post-Snowden Bart Preneel ... – collection and analysis of foreign communications and foreign ... NSA contractor suggest that the

44

Crypto recommendations http://www.enisa.europa.eu/activities/identity-and-trust/library/deliverables/algorithms-key-sizes-and-parameters-report

Good Authenticated encryption

– AES-CCM – HC-128 + Poly1305

HMAC-SHA-2 SHA-3 Diffie-Hellman

– Zp ≥ 2048 – ECC ≥ 256 and up

ECIES ≥ 256 and up RSA KEM-DEM ≥ 2048 RSA-PSS

Bad Encryption only, e.g. AES-CBC RC4, A5/1, A5/2, E0, DST, Keeloq, Crypto-1, Hitag-

2, DSAA, DSC, GMR-1, GMR-2, CSS MD2, MD4, MD5, SHA-1

RSA PKCS#1v.5 DSA, ECDSA Dual_EC_DRBG ECC curves from NIST SSL 3.0 TLS with RSA key exchange Skype Implementations that do not run in constant time

Page 45: Cryptography Post-Snowden - SURF · Cryptography Post-Snowden Bart Preneel ... – collection and analysis of foreign communications and foreign ... NSA contractor suggest that the

45

The end

Thank you for your attention

Page 46: Cryptography Post-Snowden - SURF · Cryptography Post-Snowden Bart Preneel ... – collection and analysis of foreign communications and foreign ... NSA contractor suggest that the

46

Boundless informant (NSA) (8 June 2013)

• summarizes data records from 504 separate DNR and DNI collection sources

• scale: millions of items per day and per country • big data analysis and data visualization for

surveillance overview • Hence no vertical operation in silos

DNI: Digital Network Intelligence – content DNR: Dial Number Recognition – meta data

Page 47: Cryptography Post-Snowden - SURF · Cryptography Post-Snowden Bart Preneel ... – collection and analysis of foreign communications and foreign ... NSA contractor suggest that the

47

Xkeyscore (NSA) (July 2013)

700 servers at approximately 150 sites

• F6 (Special Collection Service) – CIA/NSA clandestine operations including espionage on foreign diplomats and leaders

• FORNSAT (foreign satellite collection): intercepts from satellites • SSO (Special Source Operations) – cooperation with telcos • Overhead: US spy planes, drones and satellites • TAO (Tailored Access Operations) – hacking and cyberwarfare • FISA – approved by the Foreign Intelligence Surveillance Court • Third party – foreign partners of the NSA such as the (signals)

intelligence agencies of other nations • Also Windows error reporting

Page 48: Cryptography Post-Snowden - SURF · Cryptography Post-Snowden Bart Preneel ... – collection and analysis of foreign communications and foreign ... NSA contractor suggest that the

48

Upstream (continued): worldwide • Echelon (European Parliament 2001)

– fiber – satellites – microwave tower – submarines (underwater cables)

• reroute traffic– who ever believed that internet routing was secure?

• Sometimes with hacking, e,.g. the telcos (Belgacom or Vodafone Greece) • Regin malware (Symantec, Nov 2014)

Page 49: Cryptography Post-Snowden - SURF · Cryptography Post-Snowden Bart Preneel ... – collection and analysis of foreign communications and foreign ... NSA contractor suggest that the

49

Dual_EC_DRBG: state recovery

s0

Xco(.P)

s1

Xco(.P)

s2

Xco(.P)

Xco(.Q)

r1

trunc

Xco(.Q)

r2

trunc

Xco(.Q)

r3

trunc

s2

S0 = secret seed Si = secret state P and Q: curve points Q = d. P Xco() = X-coordinate trunc(): drop 2 bytes

Page 50: Cryptography Post-Snowden - SURF · Cryptography Post-Snowden Bart Preneel ... – collection and analysis of foreign communications and foreign ... NSA contractor suggest that the

50

Dual_EC_DRBG: state recovery

On the Practical Exploitability of Dual EC in TLS Implementations S. Checkoway, M. Fredrikson, T. Niederhagen, A. Everspaugh, M. Green, T. Lange, T. Ristenpart, D.J. Bernstein, J. Maskiewicz, H. Shacham, Usenix Security 2014

s0

Xco(.P)

s1

Xco(.P)

s2

Xco(.P)

Xco(.Q)

r1

trunc

Xco(.Q)

r2

trunc

Xco(.Q)

r3

trunc

s2

S0 = secret seed Si = secret state P and Q: curve points Q = d. P Xco() = X-coordinate trunc(): drop 2 bytes

nonce key key

Depending on library: key recovery in a few seconds or a few hours

Page 51: Cryptography Post-Snowden - SURF · Cryptography Post-Snowden Bart Preneel ... – collection and analysis of foreign communications and foreign ... NSA contractor suggest that the

51

COMSEC - Communication Security Protecting data in transit: (authenticated) encryption

– effective when done right (encryption works) – ok (but complex) standards: TLS, IPsec, S/MIME

– weak legacy systems: GSM, Bluetooth – not end-to-end: WLAN, 3G – lack of transparency: Skype – weak implementations: Dual EC DRBG – weak governance and key management: DigiNotar – insecure routing and domain name services – backdoors likely

Limited fraction(a few %) of traffic is protected. A very small fraction of traffic is protected end-to-end with a high security level

Page 52: Cryptography Post-Snowden - SURF · Cryptography Post-Snowden Bart Preneel ... – collection and analysis of foreign communications and foreign ... NSA contractor suggest that the

52

COMSEC - Communication Security Do not move problems to a single secret key

– example: Lavabit email – solution: threshold cryptography; proactive cryptography

Do not move problems to the authenticity of a single public key

Page 53: Cryptography Post-Snowden - SURF · Cryptography Post-Snowden Bart Preneel ... – collection and analysis of foreign communications and foreign ... NSA contractor suggest that the

53

COMSEC - Communication Security

Secure channels • authenticated encryption studied in CAESAR

http://competitions.cr.yp.to/caesar.html • protection against replay, reordering, packet deletion • hiding length of plaintext • release of unverified plaintext [Asiacrypt’14]

Forward secrecy: Diffie-Hellman versus RSA Denial of service Simplify internet protocols with security by default:

DNS, BGP, TCP, IP, http, SMTP,…

Page 54: Cryptography Post-Snowden - SURF · Cryptography Post-Snowden Bart Preneel ... – collection and analysis of foreign communications and foreign ... NSA contractor suggest that the

54

COMSEC - Communication Security meta data

Hiding communicating identities – few solutions – need more – largest one is TOR with a few million users – well managed but known limitations

• e.g. security limited if user and destination are in same country

Location privacy: problematic

Page 55: Cryptography Post-Snowden - SURF · Cryptography Post-Snowden Bart Preneel ... – collection and analysis of foreign communications and foreign ... NSA contractor suggest that the

55

COMPUSEC - Computer Security

Protecting data at rest – well established solutions for local encryption:

Bitlocker, Truecrypt – infrequently used in cloud

• Achilles heel is key management • Territoriality

– what if computations are needed?

Page 56: Cryptography Post-Snowden - SURF · Cryptography Post-Snowden Bart Preneel ... – collection and analysis of foreign communications and foreign ... NSA contractor suggest that the

56

COMPUSEC - Computer Security Complex ecosystem developed over 40 years by thousands of people that has

many weaknesses

• Errors at all levels leading to attacks (think ) – governments have privileged access to those weaknesses

• Continuous remote update needed – entity that controls updates is in charge

• Current defense technologies (firewall, anti-virus) not very strong – cannot resist a motivated attacker

• Not designed to resist human factor attacks: coercion, bribery, blackmail

• Supply chain of software and hardware vulnerable and hard to defend • backdoors are hard to detect

Page 57: Cryptography Post-Snowden - SURF · Cryptography Post-Snowden Bart Preneel ... – collection and analysis of foreign communications and foreign ... NSA contractor suggest that the

57

COMPUSEC - Computer Security

• Simplify to reduce attack surface

• Secure local computation • with minimal trusted computing base • with threshold security

• MPC, (F)HE, .. in practice

• hardware support: TPM, SMART, Sancus, SGX,…

• Secure and open standards and implementations

• Community driven open audit

Page 58: Cryptography Post-Snowden - SURF · Cryptography Post-Snowden Bart Preneel ... – collection and analysis of foreign communications and foreign ... NSA contractor suggest that the

58

Reconsider every stage

Kleptography Crypto design

Hardware/software design

Hardware production

Firmware/sw impl.

Device assembly

Device shipping

Device configuration

Device update

Hardware backdoors

Software backdoors

Adding/modifying hardware backdoors

Configuration errors

Backdoor insertion

Page 59: Cryptography Post-Snowden - SURF · Cryptography Post-Snowden Bart Preneel ... – collection and analysis of foreign communications and foreign ... NSA contractor suggest that the

59 59

Architecture is politics [Mitch Kaipor’93]

Page 60: Cryptography Post-Snowden - SURF · Cryptography Post-Snowden Bart Preneel ... – collection and analysis of foreign communications and foreign ... NSA contractor suggest that the

60

Governance and Architectures

Back to principles: minimum disclosure – stop collecting massive amounts of data

• local secure computation – if we do collect data: encrypt with key outside control of host

• with crypto still useful operations

Bring “cryptomagic” to use without overselling

– zero-knowledge, oblivious transfer, functional encryption – road pricing, smart metering, health care

Page 61: Cryptography Post-Snowden - SURF · Cryptography Post-Snowden Bart Preneel ... – collection and analysis of foreign communications and foreign ... NSA contractor suggest that the

61

IACR Copenhagen Declaration May 2014

The membership of the IACR repudiates mass surveillance and the undermining of cryptographic solutions and standards. Population-wide surveillance threatens democracy and human dignity. We call for expediting research and deployment of effective techniques to protect personal privacy against governmental and corporate overreach.

Page 62: Cryptography Post-Snowden - SURF · Cryptography Post-Snowden Bart Preneel ... – collection and analysis of foreign communications and foreign ... NSA contractor suggest that the

62

Information about NSA/GCHQ

1982

2002

2010

1987

Page 63: Cryptography Post-Snowden - SURF · Cryptography Post-Snowden Bart Preneel ... – collection and analysis of foreign communications and foreign ... NSA contractor suggest that the

63

NSA surveillance by country

Page 64: Cryptography Post-Snowden - SURF · Cryptography Post-Snowden Bart Preneel ... – collection and analysis of foreign communications and foreign ... NSA contractor suggest that the

64

The Netherlands and France

Page 65: Cryptography Post-Snowden - SURF · Cryptography Post-Snowden Bart Preneel ... – collection and analysis of foreign communications and foreign ... NSA contractor suggest that the

65

Spain and Italy

Page 66: Cryptography Post-Snowden - SURF · Cryptography Post-Snowden Bart Preneel ... – collection and analysis of foreign communications and foreign ... NSA contractor suggest that the

66

Is upstream surprising? • 7 April 2006 • whistleblower Marc Klein, ex-AT&T Technician

reports about NSA room 641A at 611 Folsom Street in San Francisco

• includes splitter + data mining

Page 67: Cryptography Post-Snowden - SURF · Cryptography Post-Snowden Bart Preneel ... – collection and analysis of foreign communications and foreign ... NSA contractor suggest that the

67

Upstream (continued) With help of foreign agencies?

• in 1 day:

• 444,743 e-mail address books from Yahoo • 105,068 from Hotmail • 82,857 from Facebook • 33,697 from Gmail • 22,881 from unspecified other providers

• 250 M email addresses per year

• 500,000 buddy lists and inboxes per day • 180 M per year

Page 68: Cryptography Post-Snowden - SURF · Cryptography Post-Snowden Bart Preneel ... – collection and analysis of foreign communications and foreign ... NSA contractor suggest that the

68

3. Traffic data (DNR) - defense • TOR: tool for anonymous browsing and services

• not designed to resist global attacker

• NSA’s attempts – denial of service – compromise end systems e.g. via bug in browser package

(EgotisticalGiraffe) – meet-in-the middle via web site impersonations (Quantum)

• according to leaked documents from 2006: “We will never

be able to de-anonymize all Tor users all the time” but “with manual analysis we can de-anonymize a very small fraction of Tor users”

http://www.washingtonpost.com/blogs/the-switch/wp/2013/10/04/everything-you-

need-to-know-about-the-nsa-and-tor-in-one-faq/

Page 69: Cryptography Post-Snowden - SURF · Cryptography Post-Snowden Bart Preneel ... – collection and analysis of foreign communications and foreign ... NSA contractor suggest that the

69

NSA foils much internet encryption

NYT 6 September 2013 The National Security Agency is winning its long-

running secret war on encryption, using supercomputers, technical trickery, court orders and behind-the-scenes persuasion to undermine the major tools protecting the privacy of everyday communications in the Internet age

Page 70: Cryptography Post-Snowden - SURF · Cryptography Post-Snowden Bart Preneel ... – collection and analysis of foreign communications and foreign ... NSA contractor suggest that the

70

How to Improve the State of the Art Technology factor: research

+

Human factor: education of IT people combined with security & privacy by default

Legal: strong privacy and security legislation with technical enforcement and substantial fines

Economic dimension: – standardization

• going for gold standards, not compromises • open process, not driven by a single country (ideally European) or by industry

only – procurement: European backdoor-free security

Page 71: Cryptography Post-Snowden - SURF · Cryptography Post-Snowden Bart Preneel ... – collection and analysis of foreign communications and foreign ... NSA contractor suggest that the

71

COMSEC - Communication Security We are (finally) starting to understand what a secure channel

means – confidentiality – data authentication – protection against replay, reordering, packet deletion – hiding length of plaintext – release of unverified plaintext [Asiacrypt’14] – denial of service – meta data protection

Authenticated encryption studied in CAESAR http://competitions.cr.yp.to/caesar.html

Simplify internet protocols with security by default: DNS, BGP, TCP, IP, http, SMTP,…

Page 72: Cryptography Post-Snowden - SURF · Cryptography Post-Snowden Bart Preneel ... – collection and analysis of foreign communications and foreign ... NSA contractor suggest that the

72

COMSEC - Communication Security Randomized encryption

– great success of theory – but vulnerable to kleptography such as algorithm substitution attack

[Paterson+’14]

Deterministic stateful encryption – can avoid some of these problems – security guarantees not much worse if carefully implemented

Similar observation for MAC algorithms and digital signatures; see e.g. : – subliminal channels [Simmons] – kleptography [Young-Yung]

Page 73: Cryptography Post-Snowden - SURF · Cryptography Post-Snowden Bart Preneel ... – collection and analysis of foreign communications and foreign ... NSA contractor suggest that the

73

Governance and architectures Governments: want access for themselves but preclude this for others

– seems elusive with current state of the art Industry: conflicting requirements

1. government requirements for access and backdoors 2. DRM for content and software 3. privacy of consumer

Individual: cannot manage complex tradeoffs

Need to rethink centralized architectures with massive storage of raw data • avoid single point of trust that becomes single point of failure • data minimization through infrastructure