rol#lsss mass surveillancecms16.item.ntnu.no/slides/ruxandra.pdf29 shares replacement attack...

40
Security of Linear Secret-Sharing Schemes Against Mass Surveillance Ruxandra F. Olimid Crypto vs. Mass Surveillance: The Uneasy Relationship Workshop 2016 November 14, 2016 Trondheim, Norway

Upload: others

Post on 14-Aug-2020

1 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: ROL#LSSS Mass Surveillancecms16.item.ntnu.no/slides/ruxandra.pdf29 Shares Replacement Attack Subverted dealer: • generates t shares using big brother`s PK such that: • big brother

Security of Linear Secret-Sharing Schemes Against Mass SurveillanceRuxandra F. Olimid

Crypto vs. Mass Surveillance: The Uneasy Relationship Workshop 2016

November 14, 2016 Trondheim, Norway

Page 2: ROL#LSSS Mass Surveillancecms16.item.ntnu.no/slides/ruxandra.pdf29 Shares Replacement Attack Subverted dealer: • generates t shares using big brother`s PK such that: • big brother

2

Security of

Linear Secret-Sharing Schemes

Against Mass Surveillance

Page 3: ROL#LSSS Mass Surveillancecms16.item.ntnu.no/slides/ruxandra.pdf29 Shares Replacement Attack Subverted dealer: • generates t shares using big brother`s PK such that: • big brother

3

Secret Sharing Schemes (SSS)

Split a secret into shares such that the secret can be recovered only by using an authorised set of shares

Page 4: ROL#LSSS Mass Surveillancecms16.item.ntnu.no/slides/ruxandra.pdf29 Shares Replacement Attack Subverted dealer: • generates t shares using big brother`s PK such that: • big brother

4

Secret Sharing Schemes (SSS)

Split a secret into shares such that the secret can be recovered only from authorised sets of shares

Page 5: ROL#LSSS Mass Surveillancecms16.item.ntnu.no/slides/ruxandra.pdf29 Shares Replacement Attack Subverted dealer: • generates t shares using big brother`s PK such that: • big brother

5

Secret Sharing Schemes (SSS)

Split a secret into shares such that the secret can be recovered only from authorised sets of shares

Page 6: ROL#LSSS Mass Surveillancecms16.item.ntnu.no/slides/ruxandra.pdf29 Shares Replacement Attack Subverted dealer: • generates t shares using big brother`s PK such that: • big brother

6

Secret Sharing Schemes (SSS)

Split a secret into shares such that the secret can be recovered only from authorised sets of shares

Page 7: ROL#LSSS Mass Surveillancecms16.item.ntnu.no/slides/ruxandra.pdf29 Shares Replacement Attack Subverted dealer: • generates t shares using big brother`s PK such that: • big brother

7

Visual SSS

= +

= +

Split a secret into shares such that the secret can be recovered only from authorised sets of shares

Page 8: ROL#LSSS Mass Surveillancecms16.item.ntnu.no/slides/ruxandra.pdf29 Shares Replacement Attack Subverted dealer: • generates t shares using big brother`s PK such that: • big brother

8

All-or-Nothing SSS

1000 1101 = 1011 0110 XOR 0011 1011

0??? ???? = 1011 0110 XOR 1??? ????

???? ???? = 1011 0110 XOR ???? ????

Split a secret into shares such that the secret can be recovered only from authorised sets of shares

Page 9: ROL#LSSS Mass Surveillancecms16.item.ntnu.no/slides/ruxandra.pdf29 Shares Replacement Attack Subverted dealer: • generates t shares using big brother`s PK such that: • big brother

9

Linear SSS

s

rMS = .

Split a secret into shares such that the secret can be recovered only from authorised sets of shares

Page 10: ROL#LSSS Mass Surveillancecms16.item.ntnu.no/slides/ruxandra.pdf29 Shares Replacement Attack Subverted dealer: • generates t shares using big brother`s PK such that: • big brother

10

Linear SSS s

rMS = .

Page 11: ROL#LSSS Mass Surveillancecms16.item.ntnu.no/slides/ruxandra.pdf29 Shares Replacement Attack Subverted dealer: • generates t shares using big brother`s PK such that: • big brother

11

Connection to Mass Surveillance?

Motivation: management of cryptographic keys

[A.Shamir, How to Share a Secret (1979)]

Page 12: ROL#LSSS Mass Surveillancecms16.item.ntnu.no/slides/ruxandra.pdf29 Shares Replacement Attack Subverted dealer: • generates t shares using big brother`s PK such that: • big brother

12

Real-Life Scenario: DNSSEC

https://www.youtube.com/watch?v=1LLHPnxQm-M

https://www.iana.org/dnssec/ceremonies

https://www.nanog.org/sites/default/files/1_Lewis_Rolling_the_Root_Zone_DNSSEC_Key_Signing_Key.pdf

Page 13: ROL#LSSS Mass Surveillancecms16.item.ntnu.no/slides/ruxandra.pdf29 Shares Replacement Attack Subverted dealer: • generates t shares using big brother`s PK such that: • big brother

13

Assumptions

(1) decouple the user from the dealer (2) the dealer only interacts with the user

Page 14: ROL#LSSS Mass Surveillancecms16.item.ntnu.no/slides/ruxandra.pdf29 Shares Replacement Attack Subverted dealer: • generates t shares using big brother`s PK such that: • big brother

14

Assumptions

(1) decouple the user from the dealer (2) the dealer only interacts with the user

Page 15: ROL#LSSS Mass Surveillancecms16.item.ntnu.no/slides/ruxandra.pdf29 Shares Replacement Attack Subverted dealer: • generates t shares using big brother`s PK such that: • big brother

15

Assumptions

(1) decouple the user from the dealer (2) the dealer only interacts with the user

Page 16: ROL#LSSS Mass Surveillancecms16.item.ntnu.no/slides/ruxandra.pdf29 Shares Replacement Attack Subverted dealer: • generates t shares using big brother`s PK such that: • big brother

16

Assumptions

(3) big brother controls some servers (not enough to reconstruct!) (4) big brother might had previously interacted with the dealer

Page 17: ROL#LSSS Mass Surveillancecms16.item.ntnu.no/slides/ruxandra.pdf29 Shares Replacement Attack Subverted dealer: • generates t shares using big brother`s PK such that: • big brother

17

Assumptions

(3) big brother controls some servers (not enough to reconstruct!) (4) big brother might had previously interacted with the dealer

Page 18: ROL#LSSS Mass Surveillancecms16.item.ntnu.no/slides/ruxandra.pdf29 Shares Replacement Attack Subverted dealer: • generates t shares using big brother`s PK such that: • big brother

18

Existing Work

[Crypto’14]

[EuroCrypt’97]

randomisation

Encryption

Key Exchange

Signature Schemes

[’04]

Page 19: ROL#LSSS Mass Surveillancecms16.item.ntnu.no/slides/ruxandra.pdf29 Shares Replacement Attack Subverted dealer: • generates t shares using big brother`s PK such that: • big brother

19

Security of Linear Secret-SharingSchemes Against Mass Surveillance

- Based on the paper by -

Irene Giacomelli, Ruxandra F.Olimid , Samuel Ranellucci

Aarhus University, Denmark; University of Bucharest, Romania

Special thanks to Samuel Ranellucci for kindly allowing meto build my presentation on top of the slides he had used for CANS`15.

Page 20: ROL#LSSS Mass Surveillancecms16.item.ntnu.no/slides/ruxandra.pdf29 Shares Replacement Attack Subverted dealer: • generates t shares using big brother`s PK such that: • big brother

20

Parties

Page 21: ROL#LSSS Mass Surveillancecms16.item.ntnu.no/slides/ruxandra.pdf29 Shares Replacement Attack Subverted dealer: • generates t shares using big brother`s PK such that: • big brother

21

GoalsUser

Big Brother

wants to hide secrets from big brother

wants to learn the user`s secret

wants to detect if big brother is trying to learn the secret

might use a detector

wants to hide that he is trying to learn the secret

might previously subvert the dealer

Page 22: ROL#LSSS Mass Surveillancecms16.item.ntnu.no/slides/ruxandra.pdf29 Shares Replacement Attack Subverted dealer: • generates t shares using big brother`s PK such that: • big brother

22

Successful Subversion

Surveillance

Page 23: ROL#LSSS Mass Surveillancecms16.item.ntnu.no/slides/ruxandra.pdf29 Shares Replacement Attack Subverted dealer: • generates t shares using big brother`s PK such that: • big brother

23

Successful Subversion

Undetectability

Page 24: ROL#LSSS Mass Surveillancecms16.item.ntnu.no/slides/ruxandra.pdf29 Shares Replacement Attack Subverted dealer: • generates t shares using big brother`s PK such that: • big brother

24

Successful Subversion

Page 25: ROL#LSSS Mass Surveillancecms16.item.ntnu.no/slides/ruxandra.pdf29 Shares Replacement Attack Subverted dealer: • generates t shares using big brother`s PK such that: • big brother

25

Successful Resilience

No surveillance

Page 26: ROL#LSSS Mass Surveillancecms16.item.ntnu.no/slides/ruxandra.pdf29 Shares Replacement Attack Subverted dealer: • generates t shares using big brother`s PK such that: • big brother

26

Successful Resilience

Detectable subversion

Page 27: ROL#LSSS Mass Surveillancecms16.item.ntnu.no/slides/ruxandra.pdf29 Shares Replacement Attack Subverted dealer: • generates t shares using big brother`s PK such that: • big brother

27

Successful Resilience

Page 28: ROL#LSSS Mass Surveillancecms16.item.ntnu.no/slides/ruxandra.pdf29 Shares Replacement Attack Subverted dealer: • generates t shares using big brother`s PK such that: • big brother

28

Results

Page 29: ROL#LSSS Mass Surveillancecms16.item.ntnu.no/slides/ruxandra.pdf29 Shares Replacement Attack Subverted dealer: • generates t shares using big brother`s PK such that: • big brother

29

Shares Replacement Attack

Subverted dealer:

• generates t shares using big brother`s PK such that: • big brother uses SK to reconstruct (part of) s from

the t corrupted shares (surveillance) • the t shares are indistinguishable from shares

generated by a honest dealer (undetectability)

• fixes the above shares and extends to the full set of shares

Page 30: ROL#LSSS Mass Surveillancecms16.item.ntnu.no/slides/ruxandra.pdf29 Shares Replacement Attack Subverted dealer: • generates t shares using big brother`s PK such that: • big brother

30

Shares Replacement Attack (t>1)

Page 31: ROL#LSSS Mass Surveillancecms16.item.ntnu.no/slides/ruxandra.pdf29 Shares Replacement Attack Subverted dealer: • generates t shares using big brother`s PK such that: • big brother

31

Subversion Resilience

Page 32: ROL#LSSS Mass Surveillancecms16.item.ntnu.no/slides/ruxandra.pdf29 Shares Replacement Attack Subverted dealer: • generates t shares using big brother`s PK such that: • big brother

32

Subversion Resilience

Page 33: ROL#LSSS Mass Surveillancecms16.item.ntnu.no/slides/ruxandra.pdf29 Shares Replacement Attack Subverted dealer: • generates t shares using big brother`s PK such that: • big brother

33

Subversion Resilience

Page 34: ROL#LSSS Mass Surveillancecms16.item.ntnu.no/slides/ruxandra.pdf29 Shares Replacement Attack Subverted dealer: • generates t shares using big brother`s PK such that: • big brother

34

Subversion Resilience

Page 35: ROL#LSSS Mass Surveillancecms16.item.ntnu.no/slides/ruxandra.pdf29 Shares Replacement Attack Subverted dealer: • generates t shares using big brother`s PK such that: • big brother

35

Subversion Resilience

Page 36: ROL#LSSS Mass Surveillancecms16.item.ntnu.no/slides/ruxandra.pdf29 Shares Replacement Attack Subverted dealer: • generates t shares using big brother`s PK such that: • big brother

36

Subversion Resilience

Page 37: ROL#LSSS Mass Surveillancecms16.item.ntnu.no/slides/ruxandra.pdf29 Shares Replacement Attack Subverted dealer: • generates t shares using big brother`s PK such that: • big brother

37

Subversion Resilience

Page 38: ROL#LSSS Mass Surveillancecms16.item.ntnu.no/slides/ruxandra.pdf29 Shares Replacement Attack Subverted dealer: • generates t shares using big brother`s PK such that: • big brother

38

Subversion Resilience

Page 39: ROL#LSSS Mass Surveillancecms16.item.ntnu.no/slides/ruxandra.pdf29 Shares Replacement Attack Subverted dealer: • generates t shares using big brother`s PK such that: • big brother

39

Subversion Resilience

Page 40: ROL#LSSS Mass Surveillancecms16.item.ntnu.no/slides/ruxandra.pdf29 Shares Replacement Attack Subverted dealer: • generates t shares using big brother`s PK such that: • big brother

40

Thank you!

Q&A