Privacy Preserving Protocols Workshop on Cryptography for the - - PowerPoint PPT Presentation

privacy preserving protocols
SMART_READER_LITE
LIVE PREVIEW

Privacy Preserving Protocols Workshop on Cryptography for the - - PowerPoint PPT Presentation

Privacy Preserving Protocols Privacy Preserving Protocols Workshop on Cryptography for the Internet of Things Jens Hermans KU Leuven - COSIC 20 November 2012 Privacy Preserving Protocols Introduction Cryptography in Daily Life RFID Privacy


slide-1
SLIDE 1

Privacy Preserving Protocols

Privacy Preserving Protocols

Workshop on Cryptography for the Internet of Things Jens Hermans KU Leuven - COSIC 20 November 2012

slide-2
SLIDE 2

Privacy Preserving Protocols Introduction Cryptography in Daily Life

RFID

slide-3
SLIDE 3

Privacy Preserving Protocols Introduction Cryptography in Daily Life

Car Keys

slide-4
SLIDE 4

Privacy Preserving Protocols Introduction Cryptography in Daily Life

Access Control

slide-5
SLIDE 5

Privacy Preserving Protocols Introduction Cryptography in Daily Life

Product Tracking

slide-6
SLIDE 6

Privacy Preserving Protocols RFID Privacy

1 RFID Privacy

Requirements

2 Privacy Models

Protocol Analysis Provable Security (Privacy) Privacy Model Insider Attacks Requirements

3 Lightweight Cryptography 4 Existing Protocols 5 Protocol Design

Design Performance

6 Conclusions and Future Perspectives

slide-7
SLIDE 7

Privacy Preserving Protocols RFID Privacy

Why?

Industrial espionage

slide-8
SLIDE 8

Privacy Preserving Protocols RFID Privacy

Why?

User privacy

slide-9
SLIDE 9

Privacy Preserving Protocols RFID Privacy

Why?

Das Kapital Insulin pump Underwear

Membership implant

User privacy

slide-10
SLIDE 10

Privacy Preserving Protocols RFID Privacy

Why?

Wireless Gun

slide-11
SLIDE 11

Privacy Preserving Protocols RFID Privacy

RFID Privacy: goals

ID = u0012345, S = ...

...

{ (ID=u0012345, P=...) , ...}

ID = ?

slide-12
SLIDE 12

Privacy Preserving Protocols RFID Privacy

RFID Privacy: goals

ID = u0012345, S = ... ID = u7654321, S = ...

Link? #T ags?

slide-13
SLIDE 13

Privacy Preserving Protocols RFID Privacy

Corrupting Tags

slide-14
SLIDE 14

Privacy Preserving Protocols RFID Privacy Requirements

Different Privacy Solutions

Protocol Level Privacy Kill Command Destroy Tag Shielding (Read Range Reduction) ...

slide-15
SLIDE 15

Privacy Preserving Protocols RFID Privacy Requirements

Threat Analysis / Requirements

Privacy Low High Security Low Supply Chain Public Transport Payments High Car Keys Access Control Passports

slide-16
SLIDE 16

Privacy Preserving Protocols Privacy Models

1 RFID Privacy

Requirements

2 Privacy Models

Protocol Analysis Provable Security (Privacy) Privacy Model Insider Attacks Requirements

3 Lightweight Cryptography 4 Existing Protocols 5 Protocol Design

Design Performance

6 Conclusions and Future Perspectives

slide-17
SLIDE 17

Privacy Preserving Protocols Privacy Models Protocol Analysis

Protocol Analysis

ID = u0012345, S = ...

...

{ (ID=u0012345, P=...) , ...}

ID = ? Properties: Security Privacy: untraceability Allow corruption

slide-18
SLIDE 18

Privacy Preserving Protocols Privacy Models Protocol Analysis

Protocol Analysis

ID = u0012345, S = ...

...

{ (ID=u0012345, P=...) , ...}

ID = ? Results Many published protocols broken: ⇒ Lack of formal proofs!

slide-19
SLIDE 19

Privacy Preserving Protocols Privacy Models Provable Security (Privacy)

Provable Security (Privacy)

slide-20
SLIDE 20

Privacy Preserving Protocols Privacy Models Provable Security (Privacy)

Provable Security (Privacy)

Adversary System

Adversary wins if ...

slide-21
SLIDE 21

Privacy Preserving Protocols Privacy Models Privacy Model

Juels-Weis model (2005)

Adversary System

A B

A or B

Adversary wins if output is correct tag.

slide-22
SLIDE 22

Privacy Preserving Protocols Privacy Models Privacy Model

Vaudenay model (2007)

Adversary (Blinded) System B

Adversary wins if output is true and not trivial

slide-23
SLIDE 23

Privacy Preserving Protocols Privacy Models Privacy Model

Privacy Model Hermans et al. (2011)

Design goals: Strong adversary: can always corrupt Solve issues with wide strong privacy Model ‘reality’ Easy to use

slide-24
SLIDE 24

Privacy Preserving Protocols Privacy Models Privacy Model

Privacy Model Hermans et al. (2011)

Adversary System

A B A C

slide-25
SLIDE 25

Privacy Preserving Protocols Privacy Models Privacy Model

Privacy Model Hermans et al. (2011)

Adversary System

A B A C

Adversary wins if random bit is guessed correctly.

slide-26
SLIDE 26

Privacy Preserving Protocols Privacy Models Privacy Model

Privacy Model Hermans et al. (2011)

New Features: corruption → on real tag wide strong privacy Features (reused): Virtual tag handles Indistinguishability based Single random bit for entire system

slide-27
SLIDE 27

Privacy Preserving Protocols Privacy Models Privacy Model

Indistinguishability

Encryption: RO IND-CPA IND-CCA IND-CCA2 ...

abc

#!$

xyz

Privacy-models: Juels-Weis Vaudenay Hermans et al.

slide-28
SLIDE 28

Privacy Preserving Protocols Privacy Models Privacy Model

Indistinguishability

Encryption: RO IND-CPA IND-CCA IND-CCA2 ...

A B

Privacy-models: Juels-Weis Vaudenay Hermans et al.

slide-29
SLIDE 29

Privacy Preserving Protocols Privacy Models Privacy Model

Privacy Levels

Strong Forward Wide Narrow Weak

at end at end

slide-30
SLIDE 30

Privacy Preserving Protocols Privacy Models Privacy Model

Privacy Requirements

Privacy Level Application Narrow Weak Supply Chain Narrow Forward Smart Products Wide Weak Car Keys Wide Forward Payments Access Tokens Passports Public Transport

slide-31
SLIDE 31

Privacy Preserving Protocols Privacy Models Insider Attacks

Insider Attacks

Adversary System Insider T ag

slide-32
SLIDE 32

Privacy Preserving Protocols Privacy Models Requirements

Privacy Requirements

Privacy Level Application Narrow Weak Supply Chain Narrow Forward Smart Products Wide Weak Car Keys Payments Wide Forward + Insider Access Tokens Passports Public Transport

slide-33
SLIDE 33

Privacy Preserving Protocols Privacy Models Requirements

Privacy Requirements

Privacy Level Application Narrow Weak Supply Chain Narrow Forward Smart Products Wide Weak Car Keys Payments Wide Forward + Insider Access Tokens Currently: Wide Strong Passports Public Transport

slide-34
SLIDE 34

Privacy Preserving Protocols Lightweight Cryptography

1 RFID Privacy

Requirements

2 Privacy Models

Protocol Analysis Provable Security (Privacy) Privacy Model Insider Attacks Requirements

3 Lightweight Cryptography 4 Existing Protocols 5 Protocol Design

Design Performance

6 Conclusions and Future Perspectives

slide-35
SLIDE 35

Privacy Preserving Protocols Lightweight Cryptography

Lightweight Devices

slide-36
SLIDE 36

Privacy Preserving Protocols Lightweight Cryptography

Lightweight Cryptography?

Limits: Area (➾➾➾) Time Power Energy

slide-37
SLIDE 37

Privacy Preserving Protocols Lightweight Cryptography

Typical Ingredients for Protocols

Primitive Status RNG OK? Key Update ??? Block Cipher OK Hash Function OK ECC OK

  • ???
slide-38
SLIDE 38

Privacy Preserving Protocols Lightweight Cryptography

Lightweight Elliptic Curve Cryptography

R P Q x y

Implementation [LBSV10]: Area (14.5 kGE) Time (85 ms) Power (13.8 ➭W) Energy (1.18 ➭J)

slide-39
SLIDE 39

Privacy Preserving Protocols Existing Protocols

1 RFID Privacy

Requirements

2 Privacy Models

Protocol Analysis Provable Security (Privacy) Privacy Model Insider Attacks Requirements

3 Lightweight Cryptography 4 Existing Protocols 5 Protocol Design

Design Performance

6 Conclusions and Future Perspectives

slide-40
SLIDE 40

Privacy Preserving Protocols Existing Protocols

PRF (Block cipher) based [ISO/IEC 9798-2]

State: xj Tag T Secrets: DB = {xj} Reader c ∈R {0, 1}n c p ∈R {0, 1}m r = Fx(c||p) r, p Search xj ∈ DB s.t. Fxj(c||p) = r

Privacy Wide-Weak

slide-41
SLIDE 41

Privacy Preserving Protocols Existing Protocols

Symmetric Key and Efficiency

Damg˚ ard-Pedersen ’08: Independent keys: inefficient O(n) Correlated keys:

efficient O(log(n)) privacy loss

slide-42
SLIDE 42

Privacy Preserving Protocols Existing Protocols

Symmetric Key and Efficiency

Damg˚ ard-Pedersen ’08: Independent keys: inefficient O(n) Correlated keys:

efficient O(log(n)) privacy loss

Key Updating Higher Privacy Level (narrow forward) Desynchronization Attacks / Efficiency Problems Implementation cost?

slide-43
SLIDE 43

Privacy Preserving Protocols Existing Protocols

EC Schnorr Protocol

State: xj, Y Tag T Secrets: y, DB = {Xj} Reader r ∈R Zℓ R = rP R = O? e e = 0? s = x + er s ˙ X = sP − eR ∈ DB ?

Privacy None

slide-44
SLIDE 44

Privacy Preserving Protocols Existing Protocols

Randomized Schnorr [BCI08]

State: xj, Y Tag T Secrets: y, DB = {Xj} Reader r1, r2 ∈R Zℓ R1 = r1P, R2 = r2Y R1, R2 = O? e s = ex + r1 + r2 s ˙ X = e−1(sP −R1−y−1R2) ∈ DB

Privacy Narrow Strong

slide-45
SLIDE 45

Privacy Preserving Protocols Existing Protocols

Randomized Hash GPS [BCI09]

State: xj, Y Tag T Secrets: y, DB = {Xj} Reader r1, r2 ∈R Zℓ R1 = r1P, R2 = r2Y z = H(R1, R2) R1, R2 = O? e s = ex + r1 + r2 s, R1, R2 Verify z ˙ X = e−1(sP −R1−y−1R2) ∈ DB

Privacy Narrow Strong and Wide Forward

slide-46
SLIDE 46

Privacy Preserving Protocols Existing Protocols

IND-CCA2 Encryption [Vau07]

State: sj, ID Tag T PK: KP . Secrets: DB = {sj} Reader c ∈R {0, 1}n c r = EncKP (ID||sj||c) r ID||sj||c ← DecKS(r) Search sj ∈ DB

Privacy Wide Strong

slide-47
SLIDE 47

Privacy Preserving Protocols Existing Protocols

Performance

Protocol Privacy Ins.

  • Ext. Snd.

Operations Schnorr no no yes 1 EC mult Randomized Schnorr narrow-strong no yes 2 EC mult

  • Rand. Hashed GPS

narrow-strong no yes 2 EC mult wide-forward 1 hash

slide-48
SLIDE 48

Privacy Preserving Protocols Existing Protocols

Performance

Protocol Privacy Ins.

  • Ext. Snd.

Operations Schnorr no no yes 1 EC mult Randomized Schnorr narrow-strong no yes 2 EC mult

  • Rand. Hashed GPS

narrow-strong no yes 2 EC mult wide-forward 1 hash Vaudenay wide-strong yes no 2 EC mult + DHIES 1 hash 1 MAC 1 symm enc Hash ElGamal wide-strong yes no 2 EC mult 1 hash 1 MAC

slide-49
SLIDE 49

Privacy Preserving Protocols Protocol Design Design

1 RFID Privacy

Requirements

2 Privacy Models

Protocol Analysis Provable Security (Privacy) Privacy Model Insider Attacks Requirements

3 Lightweight Cryptography 4 Existing Protocols 5 Protocol Design

Design Performance

6 Conclusions and Future Perspectives

slide-50
SLIDE 50

Privacy Preserving Protocols Protocol Design Design

New Protocol [Peeters, Hermans 2012]

Design protocol: Correct Extended soundness (At least) Wide Forward + Insider privacy Efficient

slide-51
SLIDE 51

Privacy Preserving Protocols Protocol Design Design

EC Schnorr Protocol

State: xj, Y Tag T Secrets: y, DB = {Xj} Reader r ∈R Zℓ R = rP R = O? e e = 0? s = x + er s ˙ X = sP − eR ∈ DB ?

slide-52
SLIDE 52

Privacy Preserving Protocols Protocol Design Design

Key Assumptions

Oracle Diffie-Hellman Assumption (A = aP, B = bP, abP) ∼ (A = aP, B = bP, rP) with extra O(Z) := xcoord(bZ)P. X Logarithm xcoord(rP)P ∼ r ′P

slide-53
SLIDE 53

Privacy Preserving Protocols Protocol Design Design

New Protocol

State: x, Y = yP Tag T Secrets: y DB : {Xi = xiP} Reader R r1, r2 ∈R Z∗

R1 = r1P, R2 = r2P e ∈R Z∗

e d = xcoord(xcoord(r2Y )P) s = x + er1 + d ˙ d = xcoord(xcoord(yR2)P) ˙ X = (s − ˙ d)P − eR1 ∈ DB ?

slide-54
SLIDE 54

Privacy Preserving Protocols Protocol Design Design

New Protocol - Extended Soundness

State: x, Y = yP Tag T Secrets: y DB : {Xi = xiP} Reader R r1, r2 ∈R Z∗

R1 = r1P, R2 = r2P e ∈R Z∗

e d = xcoord(xcoord(r2Y )P) s = x + er1 + d ˙ d = xcoord(xcoord(yR2)P) ˙ X = (s − ˙ d)P − eR1 ∈ DB ?

Extended Soundness Schnorr protocol ⇒ extended soundness (OMDL assumption)

slide-55
SLIDE 55

Privacy Preserving Protocols Protocol Design Design

New Protocol - Privacy

State: x, Y = yP Tag T Secrets: y DB : {Xi = xiP} Reader R r1, r2 ∈R Z∗

R1 = r1P, R2 = r2P e ∈R Z∗

e d = xcoord(xcoord(r2Y)P) s = x + er1 + d ˙ d = xcoord(xcoord(yR2)P) ˙ X = (s − ˙ d)P − eR1 ∈ DB ?

slide-56
SLIDE 56

Privacy Preserving Protocols Protocol Design Performance

Performance

Protocol Privacy Ins.

  • Ext. Snd.

Operations Schnorr no no yes 1 EC mult Randomized Schnorr narrow-strong no yes 2 EC mult

  • Rand. Hashed GPS

narrow-strong no yes 2 EC mult wide-forward 1 hash Vaudenay wide-strong yes no 2 EC mult + DHIES 1 hash 1 MAC 1 symm enc Hash ElGamal wide-strong yes no 2 EC mult 1 hash 1 MAC

slide-57
SLIDE 57

Privacy Preserving Protocols Protocol Design Performance

Performance

Protocol Privacy Ins.

  • Ext. Snd.

Operations Schnorr no no yes 1 EC mult Randomized Schnorr narrow-strong no yes 2 EC mult

  • Rand. Hashed GPS

narrow-strong no yes 2 EC mult wide-forward 1 hash Vaudenay wide-strong yes no 2 EC mult + DHIES 1 hash 1 MAC 1 symm enc Hash ElGamal wide-strong yes no 2 EC mult 1 hash 1 MAC Our Protocol wide-forward-insider yes yes 4 EC mult

  • optimised version

wide-forward-insider yes yes 2 EC mult

slide-58
SLIDE 58

Privacy Preserving Protocols Conclusions and Future Perspectives

Summary

Overview RFID Privacy Models & Privacy Levels Implementation Aspects RFID Protocols New Private & Efficient RFID Protocol

slide-59
SLIDE 59

Privacy Preserving Protocols Conclusions and Future Perspectives

Future Perspectives

Privacy models ‘Fair’ comparison Restrictions on tag corruption Simulatability vs indistinguishability Protocols New applications Other primitives → feasible? Analyze underlying assumptions (DDH-variants)

slide-60
SLIDE 60

Privacy Preserving Protocols Conclusions and Future Perspectives

?