rennes, 23/10/2014 cristina onete [email protected] key-exchange protocols....

13
Rennes, 23/10/2014 Cristina Onete maria- [email protected] Key-Exchange Protocols. Diffie-Hellman, Active Attacks, and TLS/SSL

Upload: juniper-oneal

Post on 16-Dec-2015

218 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Rennes, 23/10/2014 Cristina Onete maria-cristina.onete@irisa.fr Key-Exchange Protocols. Diffie-Hellman, Active Attacks, and TLS/SSL

Rennes, 23/10/2014

Cristina Onete

[email protected]

Key-Exchange Protocols. Diffie-Hellman, Active Attacks, and TLS/SSL

Page 2: Rennes, 23/10/2014 Cristina Onete maria-cristina.onete@irisa.fr Key-Exchange Protocols. Diffie-Hellman, Active Attacks, and TLS/SSL

Assume we share a Key

Alice Bob

Symmetric encryption:

• Confidentiality of exchanged messages

Cristina Onete || 17/11/2014 || 2

Shared

• Long-term security as long as key is “safe”

𝑐𝐵←𝑆𝐸𝑛𝑐𝐾❑ (𝑚𝐵)

𝑐𝐴←𝑆𝐸𝑛𝑐𝐾❑(𝑚𝐴)

Page 3: Rennes, 23/10/2014 Cristina Onete maria-cristina.onete@irisa.fr Key-Exchange Protocols. Diffie-Hellman, Active Attacks, and TLS/SSL

Assume we share a Key

Alice Bob

Symmetric authentication – MACs:

• Authenticity of exchanged messages

Cristina Onete || 17/11/2014 || 3

Shared

• Nobody else can sign while the key is safe

𝑚𝐵 ,𝑠𝐵←𝑀𝐴𝐶𝐾❑(𝑚𝐵)

• But: slightly weaker demand on key-secrecy than for encryption schemes

𝑚𝐴 , 𝑠𝐴←𝑀𝐴𝐶𝐾❑(𝑚𝐴)

Page 4: Rennes, 23/10/2014 Cristina Onete maria-cristina.onete@irisa.fr Key-Exchange Protocols. Diffie-Hellman, Active Attacks, and TLS/SSL

Assume we share a Key

Prover Verifier

Authentication and Identification• Legitimacy of a prover with respect to a verifier

Shared

• Nobody can impersonate prover while the key is safe

challenge

response

Cristina Onete || 17/11/2014 || 4

Page 5: Rennes, 23/10/2014 Cristina Onete maria-cristina.onete@irisa.fr Key-Exchange Protocols. Diffie-Hellman, Active Attacks, and TLS/SSL

How do we get the keys?

TTP

Alice Bob

Generate

Cristina Onete || 17/11/2014 || 5

Page 6: Rennes, 23/10/2014 Cristina Onete maria-cristina.onete@irisa.fr Key-Exchange Protocols. Diffie-Hellman, Active Attacks, and TLS/SSL

Key-Exchange: Diffie Hellman

Alice Bob

Part of Key

Part of Key

Can we send the key part in clear?

Diffie-Hellman: group , prime field

• Alice’s key part: . She sends: • Bob’s key part: . He sends: • Computed key

DLog assumption: hides , and hides

Cristina Onete || 17/11/2014 || 6

Page 7: Rennes, 23/10/2014 Cristina Onete maria-cristina.onete@irisa.fr Key-Exchange Protocols. Diffie-Hellman, Active Attacks, and TLS/SSL

Secure Key-Exchange

Alice Bob

Security goal:

• If Alice and Bob share a session, their key is indistingui-shable from a random key

All the messages exchanged in that sessions are private and securely authenticated

Cristina Onete || 17/11/2014 || 7

Page 8: Rennes, 23/10/2014 Cristina Onete maria-cristina.onete@irisa.fr Key-Exchange Protocols. Diffie-Hellman, Active Attacks, and TLS/SSL

Active attacks on DH

Alice Bob

𝑦 𝐴=𝑔𝑥𝐴

𝑦𝐵=𝑔𝑥𝐵

= (𝑔𝑥 𝐴)𝑥𝐵=¿

𝑥𝐵𝑥𝐴

Cruella

Exercise 1: Show how Cruella can intercept and inject messages between Alice and Bob

Cristina Onete || 17/11/2014 || 8

Page 9: Rennes, 23/10/2014 Cristina Onete maria-cristina.onete@irisa.fr Key-Exchange Protocols. Diffie-Hellman, Active Attacks, and TLS/SSL

Active attacks on DH

Alice Bob

𝑦 𝐴=𝑔𝑥𝐴

𝑦𝐵=𝑔𝑥𝐵

= (𝑔𝑥 𝐴)𝑥𝐵=¿

𝑦𝐵=𝑔𝑥𝐵

𝑥𝐵𝑥𝐴

𝒚 𝑪=𝒈𝒙𝑪

Cruella

𝑦 𝐴=𝑔𝑥𝐴 𝒚 𝑪=𝒈𝒙𝑪

Exercise 2: Show how you prevent this by using a signa-ture scheme

Cristina Onete || 17/11/2014 || 9

Page 10: Rennes, 23/10/2014 Cristina Onete maria-cristina.onete@irisa.fr Key-Exchange Protocols. Diffie-Hellman, Active Attacks, and TLS/SSL

Client-Server scenario

Bob = Amazon.frClient

Say server’s transmissions are authenticated during Key-Exchange, but the client’s are not

Say the key exchange is secure

Exercise 3: What does this say about the security against a MiM adversary Cruella?

Cristina Onete || 17/11/2014 || 10

Page 11: Rennes, 23/10/2014 Cristina Onete maria-cristina.onete@irisa.fr Key-Exchange Protocols. Diffie-Hellman, Active Attacks, and TLS/SSL

TLS-RSA

Bob = Amazon.frClient , certified for RSA

Exercise 4: Explain how the Client and server can agree on a key by using RSA-encryption. What are the security guarantees in this case?

Cristina Onete || 17/11/2014 || 11

Page 12: Rennes, 23/10/2014 Cristina Onete maria-cristina.onete@irisa.fr Key-Exchange Protocols. Diffie-Hellman, Active Attacks, and TLS/SSL

TLS-DH

Bob = Amazon.frClient, certified

Exercise 5: How about now?

Cristina Onete || 17/11/2014 || 12

Page 13: Rennes, 23/10/2014 Cristina Onete maria-cristina.onete@irisa.fr Key-Exchange Protocols. Diffie-Hellman, Active Attacks, and TLS/SSL

CIDRE

Thanks!