Title: Chapter 4. Public Key Cryptography
1Identification ZKIP
2Contents
- Introduction
- Passwords
- Challenge-Response
- ZKIP
3Why do we need Identification ?
- Bank machine withdrawals 4 6 digit
PIN(Personal Identification Number) at
ATM(Automatic Teller Machine) - In store credit card purchases
- Prepaid calling card Asking a service by
telephone card or membership cards - Remote login Remote access to host under
Client /Server environment - Access to restricted areas, etc.
4Identification by personal info.
Method Examples Reliability Security Cost
What you Remember (know) Password Telephone Reg. M/L M(theft) L(imperso- nation) Cheap
What you have Registered Seal Magnetic Card IC Card M L(theft) M(imperso- nation) Reason- Able
What you Are Bio-metric( Fingerprint, Eye, DNA, face, Voice, etc.) H H(theft) H(imperso- nation) Reasonable Expensive
5Biometric Information
Extracted from A. Jails presentation in
SCIS2006, Japan
6Way of Identification
- Password-based scheme (weak authentication)
- crypt passwd under UNIX
- one-time password
- Challenge-Response scheme (strong
authentication) - Symmetric cryptosystem
- MAC(keyed-hash) function
- Asymmetric cryptosystem
- Cryptographic Protocols
- Fiat-Shamir identification protocol
- Schnorr identification protocol, etc
7Identification by Password
8Attack against Fixed PWDs
- Replay fixed pwds
- Observe pwd as it is typed in
- Eavesdrop the data in cleartext
- Not suitable over open communication networks
- Exhaustive pwd search
- Let E(c) be the entropy of 8-char pwds from
choices - E(26)37.6, E(36)41.4, E(62)47.6, E(95)52.6
- Pwd guessing and dictionary attacks
- A large dictionary contains 250,000 words
- Dictionary attack order lists and compared to
entries in the encrypted dictionary - Combine numerical and alphabetical characters.
9crypt passwd in UNIX
I1 00
next input Ii 2 ? i? 25
64
user salt
truncate to 8 ASCII chars 0-pad if necessary
user passwd
56
DES
12
output, Oi
O25
64
12
Repack 76 bits into 11 7-bit characters
salt 12-bit random from system clock when
select passwd. DES DES with expansion E
modified by 12-bit salt, 212 4056 DES
variations,
encrypted passwd
/etc/passwd
10Challenge-Response Protocol
- Assumption
- Secret Key known to only P and V
- Random Challenge P and V have perfect random
number generator as their challenges. Very small
probability that same challenges occur by chance
in 2 different sessions - MAC security MAC is secure which no (e,
Q)-forger exist. Probability that Attack can
correctly compute MAC is at most e, given Q
other MACs. (e.g. Q10,000 or 100,000)
11Challenge-Response Scheme(I)
- Using Symmetric Cryptosystem
K
V
P
random challenge,x
x
yeK(x)
y
yeK(x) yy ?
- Vulnerable to parallel session attack
(man-in-the-middle). - Need to change x to be ID(V)r
12Challenge-Response Scheme(II)
- Using Asymmetric Cryptosystem
- P can prove to have secret information in
either way - (1) P decrypts a challenge encrypted under Ps
public key. - (2) P digitally signs a challenge.
PK
V
P
random challenge,x
x
yesK,x
y
y dpk ,x y y ?
13Zero-Knowledge Interactive Proof(I)
- GMR (Goldwasser, Micali, Rackoff)
- The knowledge complexity of interactive-proof
systems, Proc. of 17th ACM Sym. on Theory of
Computation, pp.291-304, 1985 - The knowledge complexity of interactive-proof
systems, Siam J. on Computation, Vol. 18,
pp.186-208, 1989 (revised version) - ZKIP (Zero Knowledge Interactive Proof) between
P and V - Completeness Only true P can prove V.
- Soundness False P cant prove V.
- 0-Knowledge No knowledge transfer to V.
14Zero Knowledge Interactive Proof(II)
15Concept of ZKIP
16Classification of ZKIPs
17F-S Identification (I)
- (Preparation)
- (TA) Unlike in RSA, a trusted center can
generate a universal n, used by everyone as long
as none knows the factorization. - (P)
- (i) private key choose random value S,
s.t. gcd(S,n)1. - (1 lt S lt n)
- (ii) public key P computes IS2 mod n, and
publishes (I,n) as public - Goal
- P has to convince V that he knows his private
key S and its corresponding public key (I,n)
(i.e., to prove that he knows a modular square
root of I mod n), without revealing S.
18F-S Identification (II)
- 1. P chooses random value r (1ltrltn) and computes
xr2mod n. - then sends x to V.
- 2. V requests from P one of the following request
at random - (a) r or (b) rS mod n
- 3. P sends the requested information to V.
- 4. V verifies that he received the right answer
by checking whether - (a) r2 x mod n or (b) (rS)2 xI mod n
- 5. If verification fails, V concludes that P does
not know S, and thus he is not the claimed party. - 6. This protocol is repeated t (usually 20 or 30)
times, and if in all of them the verification
succeeds, V concludes that P is the claimed
party.
19F-S Identification (III)
public I,n
npq, IS2 mod n
P
V
x
2.ei0,1
ei
Repeat t-times
y
3. If ei0, send yr If ei1, send yrS
4.If ei0, check y2x mod n? If ei1, check
y2xI mod n?
commitment-witness-challenge-response-verificati
on and repeat
20Security of F-S scheme
- Assuming that computing S is difficult, the
breaking is equivalent to that of factoring n. - Since P doesnt know (when he chooses r or rS
mod n) which question V will ask, he cant choose
the required answer in advance. - P can succeed in guessing Vs question with prob.
1/2 for each question. If the protocol is
repeated t times, the prob. that V fails to catch
P in all the times is only 2-t, which is
exponentially reducing with t. (t20 or 30)
21Other Identification schemes
- Schnorr Identification Scheme
- Okamoto Identification scheme
- Guillou-Quisquarter Identification scheme
- Others