Authentication Protocols in Pervasive Computing
Total Page:16
File Type:pdf, Size:1020Kb
Authentication protocols in pervasive¡ computing Nguyen Hoang Long University College University of Oxford A thesis submitted for the degree of Doctor of Philosophy Hilary Term 2009 Abstract The popularity of personal computing devices (e.g. smart cards) exposes users to risks, notably identity theft, and creates new requirements for secure communication. A recently proposed approach to creating secure communication is to use human trust and human interactions. These approaches potentially eliminate the need for passwords as in Blue- tooth, shared secrets or trusted parties, which are often too complex and expensive to use in portable devices. In this new technology, handheld devices exchange data (e.g. payment, heart rates or public keys) over some medium (e.g. WiFi) and then display a short and non-secret digest of the protocol's run that the devices' human owners manually compare to ensure they agree on the same data, i.e. human interactions are used to prevent fraud. In this thesis, we present several new protocols of this type which are designed to optimise the work required of humans to achieve a given level of security. We discover that the design of these protocols is influenced by several principles, including the ideas of commitment without knowledge and separation of security concerns, where random and cryptographic attacks should be tackled separately. Underpinning the technology is a new cryptographic function, termed a keyed digest func- tion, which produces a short number for humans to compare. This is similar to the notion of a universal hash function, but its output length is shorter (e.g. 16 bits). Hence, it should be faster to compute. We propose several digest constructions using Toeplitz matrices, in- teger multiplication and pseudorandom numbers. The application of digest functions leads us to develop more efficient alternatives to standard digital signatures. Our protocol security analysis leads to a new bound on the key length for an almost universal hash function, which can be derived by the pigeon-hole principle. The new bound turns out to be tighter than another similar bound derived from the combination of the Singleton bound in coding theory and an equivalence between error-correcting codes and almost universal hash functions. Acknowledgements I would like to thank my supervisor, Professor Bill Roscoe, who has made many large contributions to this work as well as given me much advice throughout my time at Oxford. This work is supported by studentships from the Oxford University Computing Laboratory. I would like to thank Professor Gavin Lowe (my D.Phil. advisor), Dr. Andrew Ker (my College advisor), Dr. Dusko Pavlovic (a long-term visiting academic at Oxford), Dr. An- drew Simpson (my D.Phil. internal examiner) and Professor Chris Mitchell (my external D.Phil. examiner from Royal Holloway, University of London) for making suggestions as how the structure of a thesis should be organised as well as correcting many technical and English mistakes in my D.Phil. transfer status report (Hilary 2007), D.Phil. status confirmation report (Michaelmas 2008) and the preliminary versions of this thesis (Hilary and Summer 2009). In addition, thanks also go to my colleagues from other universities for many fruitful conversations and new ideas as well as inviting me to give talks about my work at their in- stitutions, especially Professor Richard Brent (Australian National University) for helping me understand pseudo-random numbers, Professor Bart Preneel (Katholieke Universiteit Leuven) for telling me the relationship between bounds for almost XOR universal and almost strongly universal families of hash functions, Professor Chris Mitchell for suggest- ing me to serve as editor of an international standard, and Professor Nigel Smart (Bristol University) for information about cost model of hashing as well as Professor Kenny Pa- terson (Royal Holloway, University of London), Dr. Siraj Shaikh (Cranfield University), Professor Ross Anderson (Cambridge University), Professor Bruce Christianson (Hertford- shire University), Professor Serge Vaudenay, Professor Jean-Pierre Hubaux and Dr. Atefeh Mashatan (Ecole Polytechnique Federale de Lausanne), Professor Srdjan Capkunˇ (ETH Zurich), Dr. Sasa Radomirovic and Dr. Baptiste Alcalde (University of Luxembourg), Professor Jaap-Henk Hoepman (Radboud University Nijmegen), Professor Kaisa Nyberg (Helsinki University of Technology), Professor Adrian Perrig (Carnegie Mellon University), Dr. Dusko Pavlovic (Kestrel Institute), Professor John Mitchell (Stanford University), Dr. Diana Smetters (Xerox PARC), Professor Kefei Chen (Shanghai Jiao Tong University), Professor He Jifeng (East China Normal University), Professor Andrew Yao (Tsinghua University), and Professor Gene Tsudik (University of California, Irvine). I would like to dedicate my work to my parents who have made sacrifices throughout their lives so that I am able to come to Britain to pursue a higher education, and to complete my D.Phil. studies at the University of Oxford. Contents 1 Introduction 1 1.1 Motivation and Applications . .1 1.2 Overview . .3 2 Notation and basic definitions 8 2.1 Communication links . .9 2.2 Protocol citations . 10 2.3 Cryptographic primitives . 11 2.3.1 Commitment schemes and Commitment without knowledge . 12 2.3.2 Universal hash functions . 15 2.3.3 Short hash and digest functions . 15 2.3.4 Digital signatures . 16 2.4 Attack model . 17 2.5 Cost model . 19 2.5.1 Human effort . 19 2.5.2 Computation cost of cryptographic primitives . 20 3 Pairwise authentication protocols 24 3.1 Multiple empirical short authentication strings . 26 3.2 Indirect binding . 29 3.2.1 Indirect pairwise . 29 3.2.2 Hybrid protocol . 33 3.3 Direct binding pairwise protocols . 33 3.4 Efficiency of pairwise authentication protocols . 39 3.5 Conclusions . 41 4 Group protocols 42 4.1 Man-in-the-middle attack on a group protocol . 44 4.2 Asymmetrised group protocols . 45 4.2.1 HCBK protocol analysis . 47 4.2.2 Modified versions of HCBK . 51 4.3 Symmetrised group protocols . 52 4.3.1 SHCBK protocol analysis . 55 4.3.2 Modified version of the protocol SHCBK with proof of security . 57 4.3.3 Indirect binding group protocol . 57 4.4 De-symmetrised SHCBK protocol . 59 4.5 Hybrid of the HCBK and SHCBK protocols . 61 4.6 Efficiency of group protocols . 63 4.7 Conclusions . 64 iii 5 Non-interactive and one-way authentication protocols 65 5.1 Long authentication string protocols . 67 5.2 Short authentication string protocols . 70 5.3 Improved versions of the (V-)MANA I protocol . 73 5.3.1 Direct binding solution . 73 5.3.2 Indirect binding solution . 75 5.3.3 Solution in Diffie-Hellman style . 76 5.4 Security analysis of the Improved (V-)MANA I protocols . 76 5.4.1 Security analysis of the direct binding improved (V-)MANA I . 78 5.4.2 Security analysis of the indirect binding improved (V-)MANA I . 81 5.4.3 Security analysis of Improved V-MANA I in Diffie-Hellman style . 81 5.5 Efficiency of one-way authentication protocols . 83 5.6 Separation of security concerns . 84 5.7 Digital signature without hashing . 86 5.8 Flexi-MACs . 89 5.9 Conclusions . 90 6 Digest functions 92 6.1 Notation . 93 6.2 Background information . 95 6.3 Toeplitz matrix product construction of a digest function . 96 6.3.1 Efficiency of Toeplitz matrix based digest functions . 98 6.3.2 Hardware implementation of digest functions . 98 6.4 Comparing Toeplitz matrix and integer long multiplication . 100 6.5 Word multiplication based digest functions . 101 6.5.1 Efficiency of word multiplication based digest functions . 103 6.5.2 Security analysis and usability . 104 6.6 Statistical tests of word and Toeplitz matrix multiplications . 106 6.6.1 Analysis of statistical test results . 108 6.7 Conclusions and future research for short-output functions . 110 7 New bounds for almost universal hash functions 124 7.1 Notations and definitions of universal hash functions . 126 7.2 Bounds for almost universal hash functions . 127 7.2.1 New AU-bound . 128 7.2.2 Error-correcting codes and almost universal hash functions . 129 7.3 The significance of the threshold value of ......................... 131 7.3.1 Comparison between the new and other AU-bounds . 131 7.3.2 Comparison between the new AU-bound and known ASU-bounds . 132 7.3.3 Comparison between the new AU-bound and known AXU-bounds . 134 7.4 The optimality of polynomial hashing as an AU ...................... 135 7.5 Conclusions . 136 8 Conclusions and future research 138 8.1 Conclusions . 138 8.2 Short-term public key cryptography . 140 8.3 Future research . 141 8.3.1 Security proofs of the new family of authentication protocols . 141 8.3.2 Digest functions . 141 8.3.3 Applications of digest functions . 142 8.3.4 Unifying bounds of universal families of hash functions (UHF) . 142 8.3.5 Relaxation in human work . 143 iv Chapter 1 Introduction 1.1 Motivation and Applications Imagine that a group of people come together and agree that they want to transfer data between them securely, meaning that they want it to be secret and of authenticated origin. They all have some pieces of computing hardware (e.g. a mobile phone or a Personal Digital Assistant, PDA). Unfortunately none of them knows the unique name of any of the others' equipment, and in any case no Public Key Infrastructure (PKI) would encompasses them all. How can they achieve their goal in the context that their machines are connected by an insecure network (whether created by WiFi, the Internet, telephony, or a mixture of these)? In the absence of established cryptographic keys (whether shared secret keys or reliable copies of each other's public keys) this goal is very difficult to achieve. However, a little creative thinking can easily solve the problem: if each person tells the others (using human conversation) a public key for his or her machine, they can then use, for example, the Needham-Schroeder-Lowe protocol [63] (over the insecure network) to establish secure and authenticated communication.