Simple Password-Hardened Encryption Services Russell W

Simple Password-Hardened Encryption Services Russell W

Simple Password-Hardened Encryption Services Russell W. F. Lai and Christoph Egger, Friedrich-Alexander University Erlangen-Nuremberg; Manuel Reinert, Saarland University; Sherman S. M. Chow, Chinese University of Hong Kong; Matteo Maffei, Vienna University of Technology; Dominique Schröder, Friedrich-Alexander University Erlangen-Nuremberg https://www.usenix.org/conference/usenixsecurity18/presentation/lai This paper is included in the Proceedings of the 27th USENIX Security Symposium. August 15–17, 2018 • Baltimore, MD, USA 978-1-939133-04-5 Open access to the Proceedings of the 27th USENIX Security Symposium is sponsored by USENIX. Simple Password-Hardened Encryption Services Russell W. F. Lai1, Christoph Egger1, Manuel Reinert2, Sherman S. M. Chow3, Matteo Maffei4, and Dominique Schroder¨ 1 1Friedrich-Alexander University Erlangen-Nuremberg 2Saarland University 3Chinese University of Hong Kong 4Vienna University of Technology Abstract personal interests, etc. Pragmatically, accesses to this data is restricted to authorized users by an access con- Passwords and access control remain the popular choice trol mechanism instead of by encryption and decryp- for protecting sensitive data stored online, despite their tion, for a very simple reason that (the users of) the on- well-known vulnerability to brute-force attacks. A natu- line services eventually need to use them. Nevertheless, ral solution is to use encryption. Although standard prac- some information is required to be stored in an encrypted tices of using encryption somewhat alleviate the prob- form, such as credit card information, as mandated by lem, decryption is often needed for utility, and keeping the payment card industry data security standard (PCI the decryption key within reach is obviously dangerous. DSS) [19]. Note that any form of encryption is use- To address this seemingly unavoidable problem in less if an attacker gains access to anything which pos- data security, we propose password-hardened encryp- sesses the decryption capabilities or leads to the decryp- tion (PHE). With the help of an external crypto server, tion. For example, an attacker who gets access to a pass- a service provider can recover the user data encrypted word database can first launch an offline dictionary at- by PHE only when an end user supplied a correct pass- tack to obtain user passwords, then logs in as these users word. PHE inherits the security features of password- and “legitimately” requests the online service provider to hardening (Usenix Security ’15), adding protection for perform decryption. Even worse, an insider or a persis- the user data. In particular, the crypto server does not tent attacker who obtains the decryption key can down- learn any information about any user data. More impor- load the entire database and perform decryption offline. tantly, both the crypto server and the service provider can It is clear that as long as an online service provider has rotate their secret keys, a proactive security mechanism the full capability of decrypting the database, an attacker mandated by the Payment Card Industry Data Security fully compromising it is just as powerful and can launch Standard (PCI DSS). catastrophic attacks. We build an extremely simple password-hardened en- cryption scheme. Compared with the state-of-the-art password-hardening scheme (Usenix Security ’17), our 1.1 Password-Hardening Services scheme only uses minimal number-theoretic operations To defend against such a powerful attacker, an appeal- and is, therefore, 30% - 50% more efficient. In fact, our ing approach is to use external crypto services to pro- extensive experimental evaluation demonstrates that our vide an extra layer of protection. This is a central idea in scheme can handle more than 525 encryption and (suc- password-hardening (PH) services [10, 16]. In the con- cessful) decryption requests per second per core, which text of PH, an online service provider who is providing shows that it is lightweight and readily deployable in services to end users is itself a client of a crypto server large-scale systems. Regarding security, our scheme also providing PH services. Hereinafter, we call the online achieves a stronger soundness property, which puts less service provider as the server and the crypto server as the trust on the good behavior of the crypto server. rate-limiter1. When an end user registers with the server, the latter cooperates with the rate-limiter to jointly cre- 1 Introduction ate a record which encrypts the password of the end user. Later, when this end user logs in with a candidate pass- Online services store huge amount of sensitive user data word, the server cooperates with the rate-limiter again to in their databases, such as email and physical addresses, 1Lai et al. [16] call them the client and the server respectively. USENIX Association 27th USENIX Security Symposium 1405 check if the candidate password is identical to the one scheme (e.g., AES). The server then encrypts any sensi- encrypted in the corresponding record. tive information belonging to this end user with this key Due to the cooperation requirement above, PH essen- and discards the key after encryption. Later, when the tially performs a double encryption of the passwords. end user logs in, the server and the rate-limiter jointly What makes PH interesting is its set of four fundamen- validate the given candidate password. If and only if the tal guarantees tailored to practical deployment. First, password is correct, the server can then recover the key the server (or the rate-limiter) alone is unable to check and proceed to decrypt the sensitive user information. whether a candidate password is correct. This means the Figure 1 depicts the basic workflow of a PHE scheme. best strategy for any attacker who has fully compromised the server is to launch online (instead of offline) attacks. Second, the rate-limiter can track the number of unsuc- End User Server Rate-Limiter cessful login attempts of each end user, and rate-limit (Online Service Provider) (Crypto Service Provider) password validation requests, and hence online attacks, on a per-user basis. The third guarantee is that the rate- limiter learns no information about the passwords, mean- (un, pw) Sample M Encrypt(M) ing that PH is not just “transferring” the problem to the 1 (e.g., AES key) 2 rate-limiter. Lastly, if either the server or the rate-limiter 3 1. Store (un, T) is compromised, or if the secret keys are in use for quite 2. Use M (e.g., to encrypt) Record T some time, the parties can jointly execute a key-rotation Encryption 3. Delete M mechanism to refresh their secret keys. Furthermore, the key-rotation is seamless to the end users and requires ar- (un, pw) Decrypt(T) 1 Retrieve T guably minimal help from the rate-limiter. Specifically, 2 the server can locally update the records of its end users 3 1. Use M (e.g., to decrypt) Message M without interacting with the rate-limiter or the end users. 2. Delete M Decryption This proactive mechanism provides forward security. These strong security guarantees of PH make it very difficult for an attacker to get access to the passwords of Figure 1: General Workflow of PHE the end users, even if the server is fully compromised. However, the protection of PH is confined to just the password itself. An attacker who fully compromises the server can simply decrypt any encrypted database and re- 1.2.1 Security Guarantee of PHE trieve all other related data in it. PHE inherits all four fundamental security guarantees provided by PH, with the protection of passwords ex- 1.2 Password-Hardened Encryption tended to additional secret messages as well. In particu- The problem of PH services stems from its limitation of lar, PHE inherits the key rotation capability. This makes functionality. In an abstract sense, PH can only “en- PHE an appealing approach, for example, to conform to crypt” a special message: the password. Decryption is PCI DSS which requires credit card information to be not possible; one can just test whether a given message encrypted by a mechanism supporting key rotation. is encrypted. It is thus not suitable for encrypting gen- With per-user secret messages, each user can now en- eral messages. In other words, PH only provides authen- joy the benefit of encrypting their respective data using tication. To solve this problem, we propose password- an independent key. Data leakage is thus limited even if hardened encryption (PHE) services, which is an exten- some of the keys are compromised. More importantly, if sion of PH services that goes beyond authentication and the server decides to rotate not only its own secret key uses the passwords to secure general data in addition to but also some of the (data-)keys, the rotation is not as the passwords. PHE aims to ensure that any attacker who costly as re-encrypting the whole database. can compromise the storage of these encrypted data can- In a nutshell, PHE is a one-package data-security solu- not decrypt directly. tion for online service providers who employ password- The formulation of PHE is similar to that of PH de- based authentication and store sensitive user data. scribed above, with the following key differences. When an end user registers, the server and the rate-limiter 1.2.2 General Applicability of PHE jointly create a record which not only encrypts the user password but also a secret message. The message can be PHE can be applied to any scenarios where a password- a freshly generated key for a symmetric key encryption based authentication system is employed to protect user 1406 27th USENIX Security Symposium USENIX Association data, as a cryptographic replacement to access-control- of the Cramer-Shoup encryption scheme [9] – is unnec- based protection.

View Full Text

Details

  • File Type
    pdf
  • Upload Time
    -
  • Content Languages
    English
  • Upload User
    Anonymous/Not logged-in
  • File Pages
    18 Page
  • File Size
    -

Download

Channel Download Status
Express Download Enable

Copyright

We respect the copyrights and intellectual property rights of all users. All uploaded documents are either original works of the uploader or authorized works of the rightful owners.

  • Not to be reproduced or distributed without explicit permission.
  • Not used for commercial purposes outside of approved use cases.
  • Not used to infringe on the rights of the original creators.
  • If you believe any content infringes your copyright, please contact us immediately.

Support

For help with questions, suggestions, or problems, please contact us