+ All Categories
Home > Documents > How to Cope with Information Leakage in The Ubiquitous ... · establishment protocols,” Proc. of...

How to Cope with Information Leakage in The Ubiquitous ... · establishment protocols,” Proc. of...

Date post: 22-Aug-2020
Category:
Upload: others
View: 0 times
Download: 0 times
Share this document with a friend
27
How to Cope with Information Leakage in The Ubiquitous Environment Kaz Kobara 1,2 and Hideki Imai 2,1 No. 1 1: Research Center for Information Security (RCIS), Advanced Industrial Science and Technology (AIST) 2: Chuo University
Transcript
Page 1: How to Cope with Information Leakage in The Ubiquitous ... · establishment protocols,” Proc. of ASIACRYPT 2003, LNCS 2894, pp.166-172, 2003 [SKI07] S. H. Shin, K. Kobara, and H.

How to Cope with Information Leakage in The

Ubiquitous Environment

Kaz Kobara1,2 and Hideki Imai2,1

No. 1

1: Research Center for Information Security (RCIS),Advanced Industrial Science and Technology (AIST)2: Chuo University

Page 2: How to Cope with Information Leakage in The Ubiquitous ... · establishment protocols,” Proc. of ASIACRYPT 2003, LNCS 2894, pp.166-172, 2003 [SKI07] S. H. Shin, K. Kobara, and H.

# of Personal Data Leakage Incidents and Victims in Japan

0

500

1000

1500

2000

2500

2002 2003 2004 2005 2006

# of incidents  # of victims (x 10,000 people)

2

Year

Damages per victim depend on:•Significance of the leaked data•Response of the entity who leaked themUsually $50 to several $1000s

Ref. ”Report of Information Security Incidents 2006 (in Japanese)”, Japan Network Security Association (JNSA),

Page 3: How to Cope with Information Leakage in The Ubiquitous ... · establishment protocols,” Proc. of ASIACRYPT 2003, LNCS 2894, pp.166-172, 2003 [SKI07] S. H. Shin, K. Kobara, and H.

Causes of Leaks (Japan 2006)

Loss or theft of devices or 

storage media48%Human error

25%

Bugs, viruses and worms13%

Violation of rules or internal crime

11%

Other causes3%

No. 3

Ref. ”Report of Information Security Incidents 2006 (in Japanese)”, Japan Network Security Association (JNSA),

Page 4: How to Cope with Information Leakage in The Ubiquitous ... · establishment protocols,” Proc. of ASIACRYPT 2003, LNCS 2894, pp.166-172, 2003 [SKI07] S. H. Shin, K. Kobara, and H.

Channels of Leaks (Across the Globe 2006)

No. 4

“Global Data Leakage Survey 2006,” InfoWatch, http://www.infowatch.com/threats?chapter=162971949&id=207784626

Mobile devices and other storage 

media55%Internet

12%

E‐mail and faxes3%

Standard mail3%

Other channels17%

Unknown10%

Page 5: How to Cope with Information Leakage in The Ubiquitous ... · establishment protocols,” Proc. of ASIACRYPT 2003, LNCS 2894, pp.166-172, 2003 [SKI07] S. H. Shin, K. Kobara, and H.

These statistics show

Protection of mobile devices and storage media is important to resist against information leakage

Question is how to protect them?One solution must be encryption but the problem is where to store the decryption key

No. 5

Page 6: How to Cope with Information Leakage in The Ubiquitous ... · establishment protocols,” Proc. of ASIACRYPT 2003, LNCS 2894, pp.166-172, 2003 [SKI07] S. H. Shin, K. Kobara, and H.

Trivial Solutions

How about storing it in TRM?It is still hard to realize perfect TRM with low-cost due to side channel attacks, such as DPA

How about encrypting it with a password?Short passwords can easily be exhaustively searchedLong passwords are hard to remember

No. 6

TRM: Tamper Resistant ModuleDPA: Differential Power Analysis

Page 7: How to Cope with Information Leakage in The Ubiquitous ... · establishment protocols,” Proc. of ASIACRYPT 2003, LNCS 2894, pp.166-172, 2003 [SKI07] S. H. Shin, K. Kobara, and H.

7

Scenario I: Two Node Construction (2NC)

Internet

serverclient

One short password

User

secure channel

data /keys

1. Each user remembers only one short password

2. Each user has one device that can establish secure channels with remote servers

3. Servers may be placed in non-protected area, e.g. in a house, a office, a car or even a bag

4. No TRM, i.e. stored data will leak out if adversaries get the device

5. Data/keys are divided and stored in the devices and then can be retrieved online

Page 8: How to Cope with Information Leakage in The Ubiquitous ... · establishment protocols,” Proc. of ASIACRYPT 2003, LNCS 2894, pp.166-172, 2003 [SKI07] S. H. Shin, K. Kobara, and H.

Problem 2

While our scenario assumes leakage Most of the currently available protocols are vulnerable against information leakage

Since they are designed under the assumptionthat keys to establish secure channels are protected securely and never leak out

So, once the keys leak out In their protocols, adversaries can obtain the stored data or/and the user’s personal password

No. 8

Page 9: How to Cope with Information Leakage in The Ubiquitous ... · establishment protocols,” Proc. of ASIACRYPT 2003, LNCS 2894, pp.166-172, 2003 [SKI07] S. H. Shin, K. Kobara, and H.

Bad Example I(Hashed Password)

abductionabnormalabolish

absolute...

Short password

...

?

h(pass)=S

?

?

PK SK

h(“abduction”)=S

h(“abnormal”)=S

h(“abolish”)=S

Leak

S

Page 10: How to Cope with Information Leakage in The Ubiquitous ... · establishment protocols,” Proc. of ASIACRYPT 2003, LNCS 2894, pp.166-172, 2003 [SKI07] S. H. Shin, K. Kobara, and H.

Bad Example II (PW-Protected-Keys )

Short password

C=Eh(pass)( )

10

abductionabnormalabolish

absolute...

...

Dh(“abnormal”)(C)=?

Dh(“abduction”)(C)=?

Dh(“abolish”)(C)=?

Leak

C Adversary

Page 11: How to Cope with Information Leakage in The Ubiquitous ... · establishment protocols,” Proc. of ASIACRYPT 2003, LNCS 2894, pp.166-172, 2003 [SKI07] S. H. Shin, K. Kobara, and H.

Comparison among AKE Protocols

Protocols

Eavesdropp

ing

Parallel On-line Attack

Resilience against Leakage PW to

remember

From client

From server

From both with time difference

Conventional PW-Only

X X X X Many

PAKE X X X Many

PKI (Server Auth.+PW)

X X X Many

PKI (Server Auth.+PW+OTP)

X X Many

KPS+PW X X X One

PKI(Mutual Auth.) X X One

LR-AKE (Our proposal)

One

Can adversary obtain data or PW ?

: No, X: Yes

Page 12: How to Cope with Information Leakage in The Ubiquitous ... · establishment protocols,” Proc. of ASIACRYPT 2003, LNCS 2894, pp.166-172, 2003 [SKI07] S. H. Shin, K. Kobara, and H.

LR-AKE (Leakage-Resilient AKE)

New class of AKE (Authenticated Key Establishment) protocols

designed under the assumption thatKeys (more generally stored secrets) may leak out

can resist against information-leakage They fit with the scenario we consider

No. 12

[SKI03] S. H. Shin, K. Kobara, and H. Imai, "Leakage-resilient authenticated key establishment protocols,” Proc. of ASIACRYPT 2003, LNCS 2894, pp.166-172, 2003[SKI07] S. H. Shin, K. Kobara, and H. Imai, "An Efficient and Leakage-Resilient RSA-Based Authenticated Key Exchange Protocol with Tight Security Reduction", IEICE Trans. Vol. E90-A, No. 2, pp. 474-490, 2007[NGSP] “New Generation Security Project,” Ministry of Economy, Trade and Industry, 2005-2007

Page 13: How to Cope with Information Leakage in The Ubiquitous ... · establishment protocols,” Proc. of ASIACRYPT 2003, LNCS 2894, pp.166-172, 2003 [SKI07] S. H. Shin, K. Kobara, and H.

13

Leakage-Resilience of Stored Data or Password

X △ ○

Availability of Stored Data

Situation that must be avoided

not available

available with communicating with a remote server

available but by visiting a remote server

Situ

atio

n th

at

mus

t be

avoi

ded

Better Situation

Off-line exhaustive search is the best attack

Parallel on-line exhaustive search is the best attack

Serial on-line exhaustive search is the best attack

Attack is not possible

Leakage-Resilience and Availability

Page 14: How to Cope with Information Leakage in The Ubiquitous ... · establishment protocols,” Proc. of ASIACRYPT 2003, LNCS 2894, pp.166-172, 2003 [SKI07] S. H. Shin, K. Kobara, and H.

2007/9/514

On-line Exhaustive Search

abductionabnormalabolish

absolute...

password

Alice, xxxx

Alice, xxxx

Bob, xxxx

Carol, xxxx

Alice, xxxx

Serial

Parallel

Page 15: How to Cope with Information Leakage in The Ubiquitous ... · establishment protocols,” Proc. of ASIACRYPT 2003, LNCS 2894, pp.166-172, 2003 [SKI07] S. H. Shin, K. Kobara, and H.

2007/9/515

Off-line Exhaustive Search

abductionabnormalabolish

absolute...

password

password

XXX

f("abduction") =XXX

f("abnormal") =XXX

?

?

f("abolish") =XXX ? ...

2. Tries password candidates off-line ID PW Alice xxx Bob yyy

1. Gets the data for verifying the password

This can be done with high speed in parallel

Page 16: How to Cope with Information Leakage in The Ubiquitous ... · establishment protocols,” Proc. of ASIACRYPT 2003, LNCS 2894, pp.166-172, 2003 [SKI07] S. H. Shin, K. Kobara, and H.

16

Leakage-Resilience

X △ ○Availability

Damage against Node Compromise

Initial stateclientserver

Automatic recovery mechanism (if any)

Leakage from

Leakage and loss/crash of

clientserver

Page 17: How to Cope with Information Leakage in The Ubiquitous ... · establishment protocols,” Proc. of ASIACRYPT 2003, LNCS 2894, pp.166-172, 2003 [SKI07] S. H. Shin, K. Kobara, and H.

17

Leakage-Resilience

X △ ○Availability

Conventional PW-Only Protocols in 2NC

Initial stateclientserver

Leakage from

Leakage and loss/crash of

clientserver

Such as CHAP, IPsec/IKE (PSK), EAP-PSK and so on

Page 18: How to Cope with Information Leakage in The Ubiquitous ... · establishment protocols,” Proc. of ASIACRYPT 2003, LNCS 2894, pp.166-172, 2003 [SKI07] S. H. Shin, K. Kobara, and H.

18

Leakage-Resilience

X △ ○Availability

PKI (Server Auth+PW) or PAKE in 2NC

Initial stateclientserver

Leakage from

Leakage and loss/crash of

clientserver

Page 19: How to Cope with Information Leakage in The Ubiquitous ... · establishment protocols,” Proc. of ASIACRYPT 2003, LNCS 2894, pp.166-172, 2003 [SKI07] S. H. Shin, K. Kobara, and H.

19

Leakage-Resilience

X △ ○Availability

PKI (Server Auth+PW+OTP) in 2NC

Initial stateclientserver

Leakage from

Leakage and loss/crash of

clientserver

Page 20: How to Cope with Information Leakage in The Ubiquitous ... · establishment protocols,” Proc. of ASIACRYPT 2003, LNCS 2894, pp.166-172, 2003 [SKI07] S. H. Shin, K. Kobara, and H.

20

Leakage-Resilience

X △ ○Availability

PKI (Mutual Auth) in 2NC

Initial stateclientserver

Leakage from

Leakage and loss/crash of

clientserver

Page 21: How to Cope with Information Leakage in The Ubiquitous ... · establishment protocols,” Proc. of ASIACRYPT 2003, LNCS 2894, pp.166-172, 2003 [SKI07] S. H. Shin, K. Kobara, and H.

21

Leakage-Resilience

X △ ○Availability

LR-AKE (Single Mode) in 2NC

Initial stateclientserver

Automatic recovery mechanism

Leakage from

Leakage and loss/crash of

clientserver

Page 22: How to Cope with Information Leakage in The Ubiquitous ... · establishment protocols,” Proc. of ASIACRYPT 2003, LNCS 2894, pp.166-172, 2003 [SKI07] S. H. Shin, K. Kobara, and H.

Scenario II : Three Node Construction (3NC [Type A])

Primary ServerSecondary Server/Client

Client

22

Data or keys

1. A user uses Device C as a client and Devices A and B as primary and secondary servers, respectively

2. When he/she lost Device C, visits at Device B and uses it as a client

3. Data/keys are divided and stored in these devices

Device ADevice B

Device C

Page 23: How to Cope with Information Leakage in The Ubiquitous ... · establishment protocols,” Proc. of ASIACRYPT 2003, LNCS 2894, pp.166-172, 2003 [SKI07] S. H. Shin, K. Kobara, and H.

23

Leakage-Resilience

X △ ○Availability

client

PKI(Server Auth + PW) in 3NC

Initial state

primary serversecondary server

Leakage from

Leakage and loss/crash of

clientprimary server

secondary server

Page 24: How to Cope with Information Leakage in The Ubiquitous ... · establishment protocols,” Proc. of ASIACRYPT 2003, LNCS 2894, pp.166-172, 2003 [SKI07] S. H. Shin, K. Kobara, and H.

24

Leakage-Resilience

X △ ○Availability

PKI (Server Auth+PW+OTP) in 2NC

Initial stateclientprimary serversecondary server

Leakage from

Leakage and loss/crash of

clientprimary server

secondary server

Page 25: How to Cope with Information Leakage in The Ubiquitous ... · establishment protocols,” Proc. of ASIACRYPT 2003, LNCS 2894, pp.166-172, 2003 [SKI07] S. H. Shin, K. Kobara, and H.

25

Leakage-Resilience

X △ ○Availability

client

PKI (Mutual-Auth) in 3NC

Initial state

primary serversecondary server

Leakage from

Leakage and loss/crash of

clientprimary server

secondary server

Page 26: How to Cope with Information Leakage in The Ubiquitous ... · establishment protocols,” Proc. of ASIACRYPT 2003, LNCS 2894, pp.166-172, 2003 [SKI07] S. H. Shin, K. Kobara, and H.

Situation that must be avoided

Situ

atio

n th

at

mus

t be

avoi

ded

26

Leakage-Resilience

X △ ○Availability

client

LR-AKE (Cluster Mode) in 3NC

Initial state

primary serversecondary server

Leakage from

Leakage and loss/crash of

clientprimary server

secondary server

Automatic recovery mechanism

Page 27: How to Cope with Information Leakage in The Ubiquitous ... · establishment protocols,” Proc. of ASIACRYPT 2003, LNCS 2894, pp.166-172, 2003 [SKI07] S. H. Shin, K. Kobara, and H.

Conclusion

Leakage of critical information causes serious problemsEncryption may be a solution, but the problem is where to store the decryption keyWe considered to store it in a distributed network And then showed the relationship of leakage resilience and availability

3NC using LR-AKE has the best leakage resilience and availability

No. 27


Recommended