computer and network security - PowerPoint PPT Presentation

1 / 13
About This Presentation
Title:

computer and network security

Description:

Alice is eating at Fat Tony's Mafia Diner. Fast Eddie is shopping at Bob's jewelery store ... to any number of diners. elec5610. handout 13 :: crypto protocols ... – PowerPoint PPT presentation

Number of Views:26
Avg rating:3.0/5.0
Slides: 14
Provided by: stephe304
Category:

less

Transcript and Presenter's Notes

Title: computer and network security


1
computer and network security
  • matt barrie
  • ltmattb_at_alumni.stanford.orggt

2
zero knowledge proofs
  • Problem
  • Peggy wants to prove to Victor she knows some
    piece of information without revealing it.
  • Proofs take the form of interactive protocols
  • Victor asks Peggy a question
  • If Peggy knows the answer she will always get it
    correct
  • Otherwise there is a small chance she can guess
    correctly
  • Repeat asking questions until Victor is convinced
  • Already seen ZKPs have applications in
    authentication by challenge-response (e.g. proof
    of identity)

3
ali babas cave
  • Quisquater Guillou 1989
  • Illustration of ZKPs
  • Peggy claims she knows the password to open
    trapdoor but doesnt want to tell it to Victor
  • Algorithm
  • Victor stands at outside cave
  • Peggy goes into random branch of cave
  • Victor enters cave and calls for Peggy to either
    come from one branch (left or right)
  • If Peggy knows password she can come out correct
    side every time
  • Repeat enough times until Victor is sure Peggy
    knows it

4
zero-knowledge proofs
  • Cut and choose protocol
  • Alice cuts something in half
  • Bob picks which half he wants
  • Alice takes the remaining half
  • Each round is called an accreditation
  • Properties of ZKPs
  • Victor cannot learn anything from the protocol
  • Peggy cannot cheat Victor
  • Victor cannot cheat Peggy
  • Victor cannot pretend to be Peggy to any third
    party

5
attacks on zkps of identity
  • The Mafia fraud
  • Alice is eating at Fat Tonys Mafia Diner
  • Fast Eddie is shopping at Bobs jewelery store
  • Alice starts the ZKP identity protocol with Fat
    Tony
  • Fat Tony radios Fast Eddie who starts a ZKP
    identity protocol with Bob
  • Fat Tony and Fast Eddie as a communications
    channel
  • Alice ends up being ripped off by the mafia
  • The Terrorist fraud
  • Carlos the terrorist wants to enter the country
  • Bob is scheming to help Carlos enter the country
  • Carlos is challenged at the border by Alice with
    a ZKP of identity
  • Carlos radios Bob and gets him to enter the ZKP
    identity protocol
  • Alice thinks Carlos is Bob and lets him in

6
dining cryptographers problem
  • Problem
  • Three cryptographers are sitting down to dinner
    at their favourite three-star restaurant. Their
    waiter informs them that arrangements have been
    made with the maitre d'hotel for the bill to be
    paid anonymously. One of the cryptographers might
    be paying for the dinner, or it might have been
    NSA. The three cryptographers respect each
    other's right to make an anonymous payment, but
    they wonder if NSA is actually paying.
  • - David Chaum (1988)

7
dining cryptographers problem
  • Algorithm
  • Each cryptographer flips an unbiased coin (in
    secret)
  • Each shows the result to the person on the right
  • Each cryptographer states whether the two coins
    he can see are the same or different
  • If one of the cryptographers is the payer he says
    the opposite of what he sees
  • An odd number of differences means that a
    cryptographer has paid, otherwise the NSA paid
  • The algorithm is extensible to any number of
    diners

8
dining cryptographers problem
  • Shows unconditional secrecy channels can be used
    to construct an unconditional sender (and
    receiver) untraceability channel.
  • Implies also that a public-key distribution
    system can be used to construct a secure
    sender-untraceability channel.
  • Otherwise know as anonymous broadcast
  • It can also be extended to a full network
    (DC-net) by having the parties share a OTP rather
    than a coin-toss
  • Transfer many bytes at a time rather than a bit
  • XOR the OTPs between each party.. the sender also
    XORs their message
  • The biggest problem is that if two people try to
    transmit a message at the same time, both
    messages will be mangled.
  • Overcome using a back off procedure similar to
    that in Ethernet CSMA/CD

9
random numbers
  • Many protocols we have seen make use of random
    numbers
  • Nonces to avoid replay attacks
  • Session key generation
  • Key generation in RSA
  • Dealing cards in poker
  • Two desirable but distinct properties
  • Randomness
  • Uniform distribution (testable)
  • Independence (not testable)
  • Unpredictability
  • Sources of random numbers
  • Hard to find
  • Physical noise generators
  • Reverse biased diodes
  • Pulse detection with ionizing radiation

10
PRNGs
  • Pseudorandom number generators
  • Linear Congruential Generator
  • Linear Feedback Shift Registers (LFSRs)
  • PRNGs constructed from cryptographic primitives
  • Specially designed PRNG functions
  • Linear Congruential Generator
  • e.g. UNIX rand()
  • Xn1 (aXn c ) mod m
  • Number sequence is deterministic
  • Can solve given four values for a, c and m
  • Do not use UNIX rand() for cryptographic
    functions!

11
PRNGs
  • Linear Feedback Shift Registers
  • Shift register with XOR taps back to input
  • Hardware efficient
  • High speed
  • Cycles after 2n-1 values (no all 0s)
  • Easy to break
  • The Berlekamp-Massey algorithm will recover a
    LFSR of length l after 2l observed output values

State S0 011 S1 001 S2 100 S3 010 S4 101 S5
110 S6 111 S7 S0 001
?
0
1
1
12
PRNGs
  • Cryptographic Functions
  • e.g. DES or AES in OFB mode
  • Reasonably secure
  • Slow
  • Specially designed PRNG functions
  • e.g. ANSI X.917 PRNG
  • Used in financial applications and PGP
  • Uses triple-DES internally

13
references
  • Handbook of Applied Cryptography
  • Read 10.4.1
  • Stallings
  • Read 5.4
Write a Comment
User Comments (0)
About PowerShow.com