anonymity and secure messaging - courses.cs.washington.edu · 2016-12-07 · – confidential...

54
CSE 484 / CSE M 584: Computer Security and Privacy Anonymity and Secure Messaging Fall 2016 Ada (Adam) Lerner [email protected] Thanks to Franzi Roesner, Dan Boneh, Dieter Gollmann, Dan Halperin, Yoshi Kohno, John Manferdelli, John Mitchell, Vitaly Shmatikov, Bennet Yee, and many others for sample slides and materials ...

Upload: others

Post on 05-Aug-2020

0 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Anonymity and Secure Messaging - courses.cs.washington.edu · 2016-12-07 · – Confidential business negotiations • Law enforcement and intelligence ... • Modern anonymity

CSE484/CSEM584:ComputerSecurityandPrivacy

AnonymityandSecureMessaging

Fall2016

Ada(Adam)[email protected]

ThankstoFranziRoesner,DanBoneh,DieterGollmann,DanHalperin,YoshiKohno,JohnManferdelli,JohnMitchell,VitalyShmatikov,BennetYee,andmanyothersforsampleslidesandmaterials...

Page 2: Anonymity and Secure Messaging - courses.cs.washington.edu · 2016-12-07 · – Confidential business negotiations • Law enforcement and intelligence ... • Modern anonymity

Cookies

•  Alternative/additionaltechnology:–  Icecream

•  Someofyouaskedifwecouldstudythesetechnologies

12/7/16 CSE484/CSEM584-Fall2016 2

Page 3: Anonymity and Secure Messaging - courses.cs.washington.edu · 2016-12-07 · – Confidential business negotiations • Law enforcement and intelligence ... • Modern anonymity

Cookies

•  Sectioniscancelled,but:

•  Duringsection,we’llhaveaspecialculinaryseminaronthetopicof“DelectableTechnology”

12/7/16 CSE484/CSEM584-Fall2016 3

Page 4: Anonymity and Secure Messaging - courses.cs.washington.edu · 2016-12-07 · – Confidential business negotiations • Law enforcement and intelligence ... • Modern anonymity

Cookies

•  Duringsection,we’llhaveaspecialculinaryseminaronthetopicof“DelectableTechnology”

12/7/16 CSE484/CSEM584-Fall2016 4

Page 5: Anonymity and Secure Messaging - courses.cs.washington.edu · 2016-12-07 · – Confidential business negotiations • Law enforcement and intelligence ... • Modern anonymity

SecurityMindsetish–ReflectionsonTrustingTrust

12/7/16 CSE484/CSEM584-Fall2016 5

Page 6: Anonymity and Secure Messaging - courses.cs.washington.edu · 2016-12-07 · – Confidential business negotiations • Law enforcement and intelligence ... • Modern anonymity

IdentifyingWebPages:ElectricalOutlets

Clarketal.“CurrentEvents:IdentifyingWebpagesbyTappingtheElectricalOutlet”ESORICS2013

12/7/16 CSE484/CSEM584-Spring2016 6

Page 7: Anonymity and Secure Messaging - courses.cs.washington.edu · 2016-12-07 · – Confidential business negotiations • Law enforcement and intelligence ... • Modern anonymity

PowerlineEavesdropping

12/7/16 CSE484/CSEM584-Spring2016 7

Enevetal.:Televisions,VideoPrivacy,andPowerlineElectromagneticInterference,CCS2011

Page 8: Anonymity and Secure Messaging - courses.cs.washington.edu · 2016-12-07 · – Confidential business negotiations • Law enforcement and intelligence ... • Modern anonymity

PrivacyonPublicNetworks

•  Internetisdesignedasapublicnetwork– MachinesonyourLANmayseeyourtraffic,network

routersseealltrafficthatpassesthroughthem•  Routinginformationispublic–  IPpacketheadersidentifysourceanddestination–  Evenapassiveobservercaneasilyfigureoutwhois

talkingtowhom•  Encryptiondoesnothideidentities–  Encryptionhidespayload,butnotroutinginformation–  EvenIP-levelencryption(tunnel-modeIPSec/ESP)

revealsIPaddressesofIPSecgateways

12/7/16 CSE484/CSEM584-Spring2016 8

Page 9: Anonymity and Secure Messaging - courses.cs.washington.edu · 2016-12-07 · – Confidential business negotiations • Law enforcement and intelligence ... • Modern anonymity

Questions

Q1:Whatisanonymity?

Q2:WhymightpeoplewantanonymityontheInternet?

Q3:WhymightpeoplenotwantanonymityontheInternet?

12/7/16 CSE484/CSEM584-Spring2016 9

Page 10: Anonymity and Secure Messaging - courses.cs.washington.edu · 2016-12-07 · – Confidential business negotiations • Law enforcement and intelligence ... • Modern anonymity

ApplicationsofAnonymity(I)

•  Privacy–  Hideonlinetransactions,Webbrowsing,etc.from

intrusivegovernments,marketersandarchivists•  Untraceableelectronicmail–  Corporatewhistle-blowers–  Politicaldissidents–  Sociallysensitivecommunications(onlineAAmeeting)–  Confidentialbusinessnegotiations

•  Lawenforcementandintelligence–  Stingoperationsandhoneypots–  Secretcommunicationsonapublicnetwork

12/7/16 CSE484/CSEM584-Spring2016 10

Page 11: Anonymity and Secure Messaging - courses.cs.washington.edu · 2016-12-07 · – Confidential business negotiations • Law enforcement and intelligence ... • Modern anonymity

ApplicationsofAnonymity(II)

•  Digitalcash–  Electroniccurrencywithpropertiesofpapermoney(onlinepurchasesunlinkabletobuyer’sidentity)

•  Anonymouselectronicvoting•  Censorship-resistantpublishing

12/7/16 CSE484/CSEM584-Spring2016 11

Page 12: Anonymity and Secure Messaging - courses.cs.washington.edu · 2016-12-07 · – Confidential business negotiations • Law enforcement and intelligence ... • Modern anonymity

WhatisAnonymity?

•  Anonymityisthestateofbeingnotidentifiablewithinasetofsubjects–  Youcannotbeanonymousbyyourself!

•  Bigdifferencebetweenanonymityandconfidentiality–  Hideyouractivitiesamongothers’similaractivities

•  Unlinkabilityofactionandidentity–  Forexample,senderandemailhe/shesendsarenomore

relatedafterobservingcommunicationthanbefore•  Unobservability(hardtoachieve)–  Observercannoteventellwhetheracertainactiontook

placeornot

12/7/16 CSE484/CSEM584-Spring2016 12

Page 13: Anonymity and Secure Messaging - courses.cs.washington.edu · 2016-12-07 · – Confidential business negotiations • Law enforcement and intelligence ... • Modern anonymity

Part1:AnonymityinDatasets

12/7/16 CSE484/CSEM584-Spring2016 13

Page 14: Anonymity and Secure Messaging - courses.cs.washington.edu · 2016-12-07 · – Confidential business negotiations • Law enforcement and intelligence ... • Modern anonymity

Howtoreleaseananonymousdataset?

•  Possibleapproach:removeidentifyinginformationfromdatasets?

12/7/16 CSE484/CSEM584-Spring2016 14

Massachusettsmedical+voterdata[Sweeney1997]

Page 15: Anonymity and Secure Messaging - courses.cs.washington.edu · 2016-12-07 · – Confidential business negotiations • Law enforcement and intelligence ... • Modern anonymity

k-Anonymity

•  Eachpersoncontainedinthedatasetcannotbedistinguishedfromatleastk-1othersinthedata.

12/7/16 CSE484/CSEM584-Spring2016 15

Doesn’tworkforhigh-dimensionaldatasets(whichtendtobesparse)

Page 16: Anonymity and Secure Messaging - courses.cs.washington.edu · 2016-12-07 · – Confidential business negotiations • Law enforcement and intelligence ... • Modern anonymity

DifferentialPrivacy

•  Setting:Trustedpartyhasadatabase•  Goal:allowqueriesonthedatabasethatareusefulbutpreservetheprivacyofindividualrecords

•  Differentialprivacyintuition:addnoisesothatanoutputisproducedwithsimilarprobabilitywhetheranysingleinputisincludedornot

•  Privacyofthecomputation,notofthedataset

12/7/16 CSE484/CSEM584-Spring2016 16

[Dworketal.]

Page 17: Anonymity and Secure Messaging - courses.cs.washington.edu · 2016-12-07 · – Confidential business negotiations • Law enforcement and intelligence ... • Modern anonymity

Part2:AnonymityinCommunication

12/7/16 CSE484/CSEM584-Spring2016 17

Page 18: Anonymity and Secure Messaging - courses.cs.washington.edu · 2016-12-07 · – Confidential business negotiations • Law enforcement and intelligence ... • Modern anonymity

Chaum’sMix

•  Earlyproposalforanonymousemail–  DavidChaum.“Untraceableelectronicmail,return

addresses,anddigitalpseudonyms”.CommunicationsoftheACM,February1981.

•  Publickeycrypto+trustedre-mailer(Mix)–  Untrustedcommunicationmedium–  Publickeysusedaspersistentpseudonyms

•  ModernanonymitysystemsuseMixasthebasicbuildingblock

12/7/16 CSE484/CSEM584-Spring2016 18

Beforespam,peoplethoughtanonymousemailwasagoodideaJ

Page 19: Anonymity and Secure Messaging - courses.cs.washington.edu · 2016-12-07 · – Confidential business negotiations • Law enforcement and intelligence ... • Modern anonymity

BasicMixDesign

12/7/16 CSE484/CSEM584-Spring2016 19

A

C

D

E

B

Mix

{r1,{r0,M}pk(B),B}pk(mix){r0,M}pk(B),B

{r2,{r3,M’}pk(E),E}pk(mix)

{r4,{r5,M’’}pk(B),B}pk(mix)

{r5,M’’}pk(B),B

{r3,M’}pk(E),E

Adversaryknowsallsendersandallreceivers,butcannotlinkasentmessagewithareceivedmessage

Page 20: Anonymity and Secure Messaging - courses.cs.washington.edu · 2016-12-07 · – Confidential business negotiations • Law enforcement and intelligence ... • Modern anonymity

Q2

12/7/16 CSE484/CSEM584-Spring2016 20

A

C

D

E

B

Mix

{r1,{r0,M}pk(B),B}pk(mix){r0,M}pk(B),B

{r2,{r3,M’}pk(E),E}pk(mix)

{r4,{r5,M’’}pk(B),B}pk(mix)

{r5,M’’}pk(B),B

{r3,M’}pk(E),E

Adversaryknowsallsendersandallreceivers,butcannotlinkasentmessagewithareceivedmessage

Page 21: Anonymity and Secure Messaging - courses.cs.washington.edu · 2016-12-07 · – Confidential business negotiations • Law enforcement and intelligence ... • Modern anonymity

AnonymousReturnAddresses

12/7/16 CSE484/CSEM584-Spring2016 21

A

BMIX

{r1,{r0,M}pk(B),B}pk(mix) {r0,M}pk(B),B

Mincludes{K1,A}pk(mix),K2whereK2isafreshpublickey

ResponseMIX

{K1,A}pk(mix),{r2,M’}K2A,{{r2,M’}K2}K1

Secrecywithoutauthentication(goodforanonlineconfessionserviceJ)

Page 22: Anonymity and Secure Messaging - courses.cs.washington.edu · 2016-12-07 · – Confidential business negotiations • Law enforcement and intelligence ... • Modern anonymity

MixCascadesandMixnets

12/7/16 CSE484/CSEM584-Spring2016 22

•  Messagesaresentthroughasequenceofmixes•  Canalsoformanarbitrarynetworkofmixes(“mixnet”)

•  Someofthemixesmaybecontrolledbyattacker,butevenasinglegoodmixensuresanonymity

•  Padandbuffertraffictofoilcorrelationattacks

Page 23: Anonymity and Secure Messaging - courses.cs.washington.edu · 2016-12-07 · – Confidential business negotiations • Law enforcement and intelligence ... • Modern anonymity

DisadvantagesofBasicMixnets

•  Public-keyencryptionanddecryptionateachmixarecomputationallyexpensive

•  Basicmixnetshavehighlatency– OKforemail,notOKforanonymousWebbrowsing

•  Challenge:low-latencyanonymitynetwork

12/7/16 CSE484/CSEM584-Spring2016 23

Page 24: Anonymity and Secure Messaging - courses.cs.washington.edu · 2016-12-07 · – Confidential business negotiations • Law enforcement and intelligence ... • Modern anonymity

AnotherIdea:RandomizedRouting

12/7/16 CSE484/CSEM584-Spring2016 24

•  Hidemessagesourcebyroutingitrandomly–  Populartechnique:Crowds,Freenet,Onionrouting

•  Routersdon’tknowforsureiftheapparentsourceofamessageisthetruesenderoranotherrouter

Page 25: Anonymity and Secure Messaging - courses.cs.washington.edu · 2016-12-07 · – Confidential business negotiations • Law enforcement and intelligence ... • Modern anonymity

OnionRouting

12/7/16 CSE484/CSEM584-Spring2016 25

R R4

R1 R2

R

R R3

Bob

R

R

R Alice

[Reed,Syverson,Goldschlag1997]

•  Senderchoosesarandomsequenceofrouters•  Someroutersarehonest,somecontrolledbyattacker•  Sendercontrolsthelengthofthepath

Page 26: Anonymity and Secure Messaging - courses.cs.washington.edu · 2016-12-07 · – Confidential business negotiations • Law enforcement and intelligence ... • Modern anonymity

RouteEstablishment

12/7/16 CSE484/CSEM584-Spring2016 26

R4

R1

R2 R3 Bob Alice

{R2,k1}pk(R1),{ }k1 {R3,k2}pk(R2),{ }k2

{R4,k3}pk(R3),{ }k3 {B,k4}pk(R4),{ }k4

{M}pk(B)

• Routinginfoforeachlinkencryptedwithrouter’spublickey• Eachrouterlearnsonlytheidentityofthenextrouter

Page 27: Anonymity and Secure Messaging - courses.cs.washington.edu · 2016-12-07 · – Confidential business negotiations • Law enforcement and intelligence ... • Modern anonymity

Tor

•  Second-generationonionroutingnetwork–  http://tor.eff.org– DevelopedbyRogerDingledine,NickMathewsonandPaulSyverson

–  Specificallydesignedforlow-latencyanonymousInternetcommunications

•  RunningsinceOctober2003•  “Easy-to-use”clientproxy–  Freelyavailable,canuseitforanonymousbrowsing

12/7/16 CSE484/CSEM584-Spring2016 27

Page 28: Anonymity and Secure Messaging - courses.cs.washington.edu · 2016-12-07 · – Confidential business negotiations • Law enforcement and intelligence ... • Modern anonymity

TorCircuitSetup(1)

12/7/16 CSE484/CSEM584-Spring2016 28

•  ClientproxyestablishesasymmetricsessionkeyandcircuitwithOnionRouter#1

Page 29: Anonymity and Secure Messaging - courses.cs.washington.edu · 2016-12-07 · – Confidential business negotiations • Law enforcement and intelligence ... • Modern anonymity

TorCircuitSetup(2)

12/7/16 CSE484/CSEM584-Spring2016 29

•  ClientproxyextendsthecircuitbyestablishingasymmetricsessionkeywithOnionRouter#2–  TunnelthroughOnionRouter#1

Page 30: Anonymity and Secure Messaging - courses.cs.washington.edu · 2016-12-07 · – Confidential business negotiations • Law enforcement and intelligence ... • Modern anonymity

TorCircuitSetup(3)

12/7/16 CSE484/CSEM584-Spring2016 30

•  ClientproxyextendsthecircuitbyestablishingasymmetricsessionkeywithOnionRouter#3–  TunnelthroughOnionRouters#1and#2

Page 31: Anonymity and Secure Messaging - courses.cs.washington.edu · 2016-12-07 · – Confidential business negotiations • Law enforcement and intelligence ... • Modern anonymity

UsingaTorCircuit

12/7/16 CSE484/CSEM584-Spring2016 31

•  ClientapplicationsconnectandcommunicateovertheestablishedTorcircuit.

Page 32: Anonymity and Secure Messaging - courses.cs.washington.edu · 2016-12-07 · – Confidential business negotiations • Law enforcement and intelligence ... • Modern anonymity

TorManagementIssues

•  Manyapplicationscanshareonecircuit– MultipleTCPstreamsoveroneanonymousconnection

•  Torrouterdoesn’tneedrootprivileges–  Encouragespeopletosetuptheirownrouters– Moreparticipants=betteranonymityforeveryone

•  Directoryservers– Maintainlistsofactiveonionrouters,theirlocations,

currentpublickeys,etc.–  Controlhownewroutersjointhenetwork

•  “Sybilattack”:attackercreatesalargenumberofrouters

–  Directoryservers’keysshipwithTorcode

12/7/16 CSE484/CSEM584-Spring2016 32

Page 33: Anonymity and Secure Messaging - courses.cs.washington.edu · 2016-12-07 · – Confidential business negotiations • Law enforcement and intelligence ... • Modern anonymity

LocationHiddenService

•  Goal:deployaserverontheInternetthatanyonecanconnecttowithoutknowingwhereitisorwhorunsit

•  Accessiblefromanywhere•  Resistanttocensorship•  Cansurviveafull-blownDoSattack•  Resistanttophysicalattack–  Can’tfindthephysicalserver!

12/7/16 CSE484/CSEM584-Spring2016 33

Page 34: Anonymity and Secure Messaging - courses.cs.washington.edu · 2016-12-07 · – Confidential business negotiations • Law enforcement and intelligence ... • Modern anonymity

CreatingaLocationHiddenServer

12/7/16 CSE484/CSEM584-Spring2016 34

ServercreatescircuitsTo“introductionpoints”

Servergivesintropoints’descriptorsandaddressestoservicelookupdirectory

Clientobtainsservicedescriptorandintropointaddressfromdirectory

Page 35: Anonymity and Secure Messaging - courses.cs.washington.edu · 2016-12-07 · – Confidential business negotiations • Law enforcement and intelligence ... • Modern anonymity

UsingaLocationHiddenServer

12/7/16 CSE484/CSEM584-Spring2016 35

Clientcreatesacircuittoa“rendezvouspoint”

Clientsendsaddressoftherendezvouspointandanyauthorization,ifneeded,toserverthroughintropoint

Ifserverchoosestotalktoclient,connecttorendezvouspoint

Rendezvouspointsplicesthecircuitsfromclient&server

Page 36: Anonymity and Secure Messaging - courses.cs.washington.edu · 2016-12-07 · – Confidential business negotiations • Law enforcement and intelligence ... • Modern anonymity

AttacksonAnonymity

•  Passivetrafficanalysis–  Inferfromnetworktrafficwhoistalkingtowhom–  Tohideyourtraffic,mustcarryotherpeople’straffic!

•  Activetrafficanalysis–  Injectpacketsorputatimingsignatureonpacketflow

•  Compromiseofnetworknodes–  Attackermaycompromisesomerouters–  Itisnotobviouswhichnodeshavebeencompromised

•  Attackermaybepassivelyloggingtraffic–  Betternottotrustanyindividualrouter

•  Assumethatsomefractionofroutersisgood,don’tknowwhich

12/7/16 CSE484/CSEM584-Spring2016 36

Page 37: Anonymity and Secure Messaging - courses.cs.washington.edu · 2016-12-07 · – Confidential business negotiations • Law enforcement and intelligence ... • Modern anonymity

DeployedAnonymitySystems

•  Tor(http://tor.eff.org)– Overlaycircuit-basedanonymitynetwork– Bestforlow-latencyapplicationssuchasanonymousWebbrowsing

•  Mixminion(http://www.mixminion.net)– Networkofmixes– Bestforhigh-latencyapplicationssuchasanonymousemail

•  Not:YikYakJ

12/7/16 CSE484/CSEM584-Spring2016 37

Page 38: Anonymity and Secure Messaging - courses.cs.washington.edu · 2016-12-07 · – Confidential business negotiations • Law enforcement and intelligence ... • Modern anonymity

SomeCaution

•  Torisn’tcompletelyeffectivebyitself– Trackingcookies,fingerprinting,etc.– Exitnodescanseeeverything!

12/7/16 CSE484/CSEM584-Spring2016 38

Page 39: Anonymity and Secure Messaging - courses.cs.washington.edu · 2016-12-07 · – Confidential business negotiations • Law enforcement and intelligence ... • Modern anonymity

IdentifyingWebPages:TrafficAnalysis

Herrmannetal.“WebsiteFingerprinting:AttackingPopularPrivacyEnhancingTechnologieswiththeMultinomialNaïve-BayesClassifier”CCSW2009

12/7/16 CSE484/CSEM584-Spring2016 39

Page 40: Anonymity and Secure Messaging - courses.cs.washington.edu · 2016-12-07 · – Confidential business negotiations • Law enforcement and intelligence ... • Modern anonymity

OTRANDSECUREMESSAGING

12/7/16 CSE484/CSEM584-Fall2016 40

Page 41: Anonymity and Secure Messaging - courses.cs.washington.edu · 2016-12-07 · – Confidential business negotiations • Law enforcement and intelligence ... • Modern anonymity

OTR–“OffTheRecord”

•  Protocolforend-to-endencryptedinstantmessaging

•  End-to-end:Onlytheendpointscanreadmessages.– PGP,iMessage,WhatsApp,andavarietyofotherservicesprovidesomeformofend-to-endencryptiontoday.

12/7/16 CSE484/CSEM584-Fall2016 41

Page 42: Anonymity and Secure Messaging - courses.cs.washington.edu · 2016-12-07 · – Confidential business negotiations • Law enforcement and intelligence ... • Modern anonymity

OTR–“OffTheRecord”

•  End-to-endencryption•  Authentication•  Deniability,afterthefact•  PerfectForwardSecrecy

12/7/16 CSE484/CSEM584-Fall2016 42

Page 43: Anonymity and Secure Messaging - courses.cs.washington.edu · 2016-12-07 · – Confidential business negotiations • Law enforcement and intelligence ... • Modern anonymity

OTR–“OffTheRecord”

•  End-to-endencryption•  Authentication•  Deniability,afterthefact•  PerfectForwardSecrecy

12/7/16 CSE484/CSEM584-Fall2016 43

Page 44: Anonymity and Secure Messaging - courses.cs.washington.edu · 2016-12-07 · – Confidential business negotiations • Law enforcement and intelligence ... • Modern anonymity

OTR:Deniability

12/7/16 CSE484/CSEM584-Fall2016 44

Eve

Alice Bob

“Somethingincriminating”

Page 45: Anonymity and Secure Messaging - courses.cs.washington.edu · 2016-12-07 · – Confidential business negotiations • Law enforcement and intelligence ... • Modern anonymity

OTR:Deniability

•  Duringaconversationsession,messagesareauthenticatedandunmodified.

•  AuthenticationhappensusingaMACderivedfromasharedsecret.

12/7/16 CSE484/CSEM584-Fall2016 45

Page 46: Anonymity and Secure Messaging - courses.cs.washington.edu · 2016-12-07 · – Confidential business negotiations • Law enforcement and intelligence ... • Modern anonymity

OTR:Deniability

•  Duringaconversationsession,messagesareauthenticatedandunmodified.

•  AuthenticationhappensusingaMACderivedfromasharedsecret.

•  Q1

12/7/16 CSE484/CSEM584-Fall2016 46

Page 47: Anonymity and Secure Messaging - courses.cs.washington.edu · 2016-12-07 · – Confidential business negotiations • Law enforcement and intelligence ... • Modern anonymity

OTR:Deniability

•  Can’tprovetheotherpersonsentthemessage,becauseyoualsocouldhavecomputedtheMAC!

12/7/16 CSE484/CSEM584-Fall2016 47

Page 48: Anonymity and Secure Messaging - courses.cs.washington.edu · 2016-12-07 · – Confidential business negotiations • Law enforcement and intelligence ... • Modern anonymity

OTR:Deniability

•  Can’tprovetheotherpersonsentthemessage,becauseyoualsocouldhavecomputedtheMAC!

•  OTRtakesthisonestepfarther:Afteramessagingsessionisover,AliceandBobsendtheMACkeypubliclyoverthewire!

12/7/16 CSE484/CSEM584-Fall2016 48

Page 49: Anonymity and Secure Messaging - courses.cs.washington.edu · 2016-12-07 · – Confidential business negotiations • Law enforcement and intelligence ... • Modern anonymity

OTR:Deniability

•  EvenowknowstheMACkey,sotechnicallyspeaking,shealsohastheabilitytoforgemessagesfromAliceorBob.

12/7/16 CSE484/CSEM584-Fall2016 49

Page 50: Anonymity and Secure Messaging - courses.cs.washington.edu · 2016-12-07 · – Confidential business negotiations • Law enforcement and intelligence ... • Modern anonymity

PerfectForwardSecrecy

12/7/16 CSE484/CSEM584-Fall2016 50

Eve

Alice Bob

Page 51: Anonymity and Secure Messaging - courses.cs.washington.edu · 2016-12-07 · – Confidential business negotiations • Law enforcement and intelligence ... • Modern anonymity

PerfectForwardSecrecy

12/7/16 CSE484/CSEM584-Fall2016 51

Eve

Alice Bob

Publicinfo,e.g.C1C2C3…Cn

SecretsA SecretsB

Page 52: Anonymity and Secure Messaging - courses.cs.washington.edu · 2016-12-07 · – Confidential business negotiations • Law enforcement and intelligence ... • Modern anonymity

PerfectForwardSecrecy

12/7/16 CSE484/CSEM584-Fall2016 52

Eve

Alice Bob

Publicinfo,e.g.C1C2C3…Cn

SecretsA SecretsBIfEvecompromisesAliceorBob’scomputersatalaterdate,wewouldliketopreventherfrombeingabletolearnwhatM1,M2,M3,etc.correspondtoC1,C2,C3,etc.

Page 53: Anonymity and Secure Messaging - courses.cs.washington.edu · 2016-12-07 · – Confidential business negotiations • Law enforcement and intelligence ... • Modern anonymity

OTR:Ratcheting

•  Idea:Useanewkeyforeverysession/message/timeperiod.

12/7/16 CSE484/CSEM584-Fall2016 53

Page 54: Anonymity and Secure Messaging - courses.cs.washington.edu · 2016-12-07 · – Confidential business negotiations • Law enforcement and intelligence ... • Modern anonymity

Signal

12/7/16 CSE484/CSEM584-Fall2016 54

•  End-to-endencryptedchat/IMbasedonOTR

•  Providesvariationsonratcheting,deniability,etc.

•  Widelyused,publiccode,audited.