Sphinx: a Compact and Provably Secure Mix Format

Sphinx: a Compact and Provably Secure Mix Format

Sphinx: A Compact and Provably Secure Mix Format George Danezis Ian Goldberg Microsoft Research University of Waterloo Cambridge, UK Waterloo, ON, Canada [email protected] [email protected] Abstract format. The cryptographic mechanism is to some ex- tent independent from other traffic analysis protections Sphinx is a cryptographic message format used to offered by the mix network, as long as they guarantee relay anonymized messages within a mix network. It that some aspects of the routing information, such as is more compact than any comparable scheme, and path length or position in the path, are not leaked [4]. supports a full set of security features: indistinguish- The minimum overhead introduced by the crypto- able replies, hiding the path length and relay position, graphic packet format impacts the types of traffic that as well as providing unlinkability for each leg of the can realistically be anonymized. Previous work, like message’s journey over the network. We prove the Mixminion[8]andMinx[9]addedanoverheadof full cryptographic security of Sphinx in the random at least a full RSA ciphertext (at least 256 additional oracle model, and we describe how it can be used as bytes for modern 128-bit security levels). Provable an efficient drop-in replacement in deployed remailer designs, such as the ones proposed by M¨oller [15], Ca- systems. menish and Lysyanskaya [5] or Shimshock et al. [21], use multiple RSA-sized ciphertexts to relay informa- 1. Introduction tion for each stage of the mixing, making the header necessary for anonymization many kilobytes long. Mix networks were proposed by David Chaum [7] Such formats may be acceptable for relaying large in 1981 as an efficient means to achieve anonymous email messages, but add a significant overhead to short communications. A mix (or a mix node)issimply messages, the length of Instant Messaging or SMS a message relay that accepts a batch of encrypted messages (that are up to 160 characters.) It is therefore messages, decrypts them and sends them on their of great importance to devise cryptographic schemes way. An observer of a mix node should be unable to that are compact to efficiently anonymize those classes link incoming and outgoing messages; this provides of traffic. Furthermore, anonymous replies rely on anonymity to the users of the network. A number of cryptographic addresses that are of similar size to the theoretical [12], [15], [9], [5], [21] as well as deployed headers required to route messages thought the net- systems [16], [8] have been proposed that further work. Compact packet formats directly lead to compact develop the idea of mixes. The Mixmaster network [16] addresses and thus to cheaper receiver anonymity. is currently composed of about 25 reliable remailers, Traditionally, cryptographic packet formats have while the newer Mixminion [8], adding the ability to been based on heuristic security arguments. From early reply anonymously to messages, is composed of about on it became apparent that these complex crypto- 20 reliable nodes. graphic systems are difficult to get right: the original Anonymizing messages through a mix network scheme by Chaum [7] was shown to have crypto- comes at a cost: the messages are batched and therefore graphic weaknesses by Pfitzmann and Pfitzmann [18] delayed, as well as padded to a standard length to and Minx [9] leaked information which theoretically prevent traffic analysis. Furthermore, multiple encryp- allowed an adversary to extract the full plaintext of tion layers have to be used to encapsulate the routing messages [21]. As a result several authors proposed information necessary to relay the message through a provably secure packet formats. Some of them only sequence of mixes. The cryptographic mechanism used provide the bare minimum functionality [15], [5], and to deliver this routing information to each intermediate in particular no provision for anonymous replies, while mix, as well as to transform the message as it travels others suffer a significant transmission overhead [21]. through the network, is called the cryptographic packet It has so far been an open problem to devise a compact and provably secure packet format. of the cryptographic format and the associated proofs Our key contribution is Sphinx: a cryptographic of security respectively. In section 5 we discuss the packet format that can be used to route messages over efficiency of the scheme and compare it with other pro- a mix network. Sphinx provides all features expected posals. Finally we provide some concluding remarks in by modern remailer applications: section 6. • It provides bitwise unlinkability, making it cryp- tographically difficult to link incoming and out- 2. Design overview going messages from a mix. This is the basic Mix networks achieve anonymity by relaying mes- property all packet formats provide. sages over a sequence of mixes, called the path.The • It allows for paths up to an arbitrary maximum sender cryptographically encodes a message, which is length, while hiding the number of hops a mes- partially decoded by each mix along the path. As long sage has travelled so far, as well as the actual as a single mix in the path is honest, meaning that number of mixes on the path of a message. it does not share its secrets with an adversary, the These are hidden even from the mixes that are message will benefit from some anonymity. processing the messages. • The processing of reply messages is indistinguish- able from the processing of normal “forward” 2.1. Threat Model & Requirements messages. The anonymity sets of both types of It is traditional to consider the security of crypto- traffic are therefore confounded, providing greater graphic packet formats against an active adversary that protection for both. is able to observe all traffic in the network, as well as • It resists any active tagging attacks,wherethe to intercept and inject arbitrary messages. Furthermore, adversary modifies and re-injects messages to we assume that some, but not all, of the mixes in the extract information about their destinations or path of a relayed message are corrupt; i.e., under the content. direct control of an adversary that knows all their keys, • It is compact: for 128-bit security, the overhead and other secrets, and is able to fully control their is only 32 bytes plus a single group element functioning. The principal aim of the adversary is to (not one per hop) plus 32 bytes of routing and extract some information about the ultimate destination integrity protection information per hop. The size of mixed messages through inferring the final address of the group element can be as small as 32 bytes or some of their contents. The security properties of using Dan Bernstein’s Curve25519 elliptic curve cryptographic mix packet formats prevent or tightly library [3]; the element is the x-coordinate (in 255 control any such information leakage. GF (2 −19)) of a point on an elliptic curve. For Specifically, Sphinx needs to ensure that if multiple example, the header of a Sphinx message with a messages enter an honest mix and are batched together, maximum path length of 5 mixes can be encoded it is not feasible to link an output message to any in as little as 224 bytes. input message with probability significantly higher From a systems perspective, Sphinx is designed as than uniform. This is the fundamental requirement of a drop-in replacement for the Mixminion packet for- any packet format. Yet modern packet formats also mat [8]. It makes the same systems and security control the amount of information leaked to mixes assumptions as Mixminion, but is more compact and (including dishonest mixes) along the path. A dishonest cryptographically provably secure. This means that mix should not be able to infer either the full length Sphinx can be easily integrated with the Mixminion of the path of a particular message, or its own position software to take advantage of the thousands of lines of on that path. Simple traffic analysis detects if a mix is robust client and server code. Our reference implemen- first or last on the path, so we do not consider this a tation of Sphinx, which provides all of the functionality compromise. needed for clients, mix nodes, and the nymserver, and An advantage of mix networks is that they pro- which works either over a 2048-bit prime field or vide a unified mechanism for both sender and re- Curve25519, is less than 600 lines of Python code ceiver anonymity. Alice may encode a single-use reply (including simple tests). block [8] and attach it to an anonymous message Our description of Sphinx will proceed in the fol- destined to Bob. Bob cannot know that the originator lowing fashion: section 2 provides an overview of of the message is Alice, but can use the reply block the threat model, requirements and design rationale of contained in the message as an address to send a reply. Sphinx; sections 3 and 4 provide a formal definition The reply is then routed through the network until it reaches Alice. In both cases Alice benefits from channel to each of the mixes on a message’s path. This anonymity properties, first as the sender of the message requires keys to be shared, or distributed, securely to (sender anonymity) and the second time as the anony- each of the mixes on the path, in order that they may mous receiver of a message (receiver anonymity). decode the routing information, as well as other parts Nymservers [14] have been developed as services that of the message. Traditionally, this has been done with make use of anonymous replies to bridge the world RSA [19] encryption, while Sphinx instead uses Diffie- of mix networks with traditional email.

View Full Text

Details

  • File Type
    pdf
  • Upload Time
    -
  • Content Languages
    English
  • Upload User
    Anonymous/Not logged-in
  • File Pages
    14 Page
  • File Size
    -

Download

Channel Download Status
Express Download Enable

Copyright

We respect the copyrights and intellectual property rights of all users. All uploaded documents are either original works of the uploader or authorized works of the rightful owners.

  • Not to be reproduced or distributed without explicit permission.
  • Not used for commercial purposes outside of approved use cases.
  • Not used to infringe on the rights of the original creators.
  • If you believe any content infringes your copyright, please contact us immediately.

Support

For help with questions, suggestions, or problems, please contact us