1 / 7

Project: IEEE P802.15 Working Group for Wireless Personal Area Networks (WPANs)

Project: IEEE P802.15 Working Group for Wireless Personal Area Networks (WPANs) Submission Title: [Security Comments on D10] Date Submitted: [September 8, 2002]

monifa
Download Presentation

Project: IEEE P802.15 Working Group for Wireless Personal Area Networks (WPANs)

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Project: IEEE P802.15 Working Group for Wireless Personal Area Networks (WPANs) Submission Title: [Security Comments on D10] Date Submitted: [September 8, 2002] Source: [Daniel V. Bailey, Product Manager for Wireless Networks, William Whyte, Director of Cryptographic R&D, and Ari Singer, Principal Engineer] Company [NTRU] Address [5 Burlington Woods, Burlington, MA 01803] Voice:[(781) 418-2500], FAX: [(781) 418-2507], E-Mail:[dbailey@ntru.com] Re: [Draft P802.15.4/D14] Abstract: [This presentation gives an overview of some recent results on NTRUEncrypt padding.] Purpose: [To familiarize the working group with some security-related comments from LB19.] Notice: This document has been prepared to assist the IEEE P802.15. It is offered as a basis for discussion and is not binding on the contributing individual(s) or organization(s). The material in this document is subject to change in form and content after further study. The contributor(s) reserve(s) the right to add, amend or withdraw material contained herein. Release: The contributor acknowledges and accepts that this contribution becomes the property of IEEE and may be made publicly available by P802.15.

  2. Public-Key Cryptography in 802.15.3 • 802.15.3 uses two kinds of cryptography: symmetric and public-key • Symmetric cryptography used to encrypt bits to be transmitted over the air • AES-CCM the algorithm in 802.15.3 • Public-key cryptography used during authentication to establish symmetric keys • This is done by public-key encrypting two random challenges: one from the DEV and one from the Security Manager • Recent research asks: What if the challenges weren’t random? • If Ophelia injected two random challenges into your device, and it encrypted one of them, could she tell which was which?

  3. Padding for public-key cryptosystems • What is Padding? • With a public-key cryptosystem, *anyone* can encrypt a message • Just use the public key, which is, uh, public • So if I send a message that is “yes” or “no,” you can check which one I sent by encrypting “yes” and “no” both, and matching your resulting encrypted message to my transmitted message • These attacks only work if the attacker can guess the message. They don’t work if the message is random (e.g. a symmetric key, for example) • PADDING is just random data added to the message, so I send “YesXXXXXXXX” and if you encrypt “Yes” and try to match, it won’t match, unless the padding matches also • Padding isn’t as simple as the example above – the padding has to be intermixed with the message so that: • Every bit of the padding affects every bit of the message • There are 80 bits of padding for 80-bit security, etc.

  4. Overview: Results • Nguyen and Pointcheval recently published a result about the provable security of NTRUEncrypt padding scheme SVES-1 • Prove that for N=251, individual encrypted messages have at least 240 (40-bit) strength, but cannot be proved to have 280 strength • Dai has since demonstrated how to construct specific messages that have only 240 strength in a specialized attack scenario • A Chosen Plaintext Attack where the attacker chooses two messages, you encrypt one, and she tries to tell which one you encrypted • NTRU research team have applied this attack to general messages and a more general attack scenario (Known Plaintext Attack) • This attack requires the ‘message space’ to be small • The larger the set of messages, the less well the attack works • Entirely ineffective against encrypted AES keys, or NTRUEncrypt as used in 802.15.3. • Analysis of the effectiveness of this attack with non-random messages is still ongoing

  5. Overview: Recommendations • This attack is not practical in any realistic setting • In particular, not effective against 802.15.3 • Could carry on using SVES-1 entirely safely • NTRU is proposing a new padding scheme • SVES-2 • Almost as efficient as SVES-1 (one more hash function call required) • … but proof of 280 strength for individual encrypted messages • Specified in EESS#1 draft 5. (http://www.ceesstandards.org) • NTRU Recommendation: 802.15.3 switches to use of SVES-2. • No danger from use of SVES-1 • … but no need to interoperate with legacy SVES-1. • All things being equal, it’s better to use schemes that have tighter bounds on their provable security

  6. Scrutiny of padding methods • How are these padding methods arrived at? • Either ad hoc, or by using methods with associated security proofs • Proofs give additional level of assurance • RSA ad hoc padding attacked, addressed by use of security proof: • ftp://ftp.rsasecurity.com/pub/pdfs/bulletn7.pdf • NTRUEncrypt ad hoc padding attacked, partially addressed by use of security proof: • http://www.ntru.com/cryptolab/pdf/NTRUTech016.pdf • Result this year says NTRUEncrypt padding cannot be proved to offer more than 40-bit security if the message can be dictated by the attacker: • [NP02] Phong Q. Nguyen, David Pointcheval. Analysis and Improvements of NTRU Encryption Paddings. CRYPTO 2002, LNCS 2442, http://www.di.ens.fr/~pointche/Documents/Papers/2002_cryptoB.pdf • Proposed new padding method has 80-bit provable security

  7. NTRUEncrypt padding and 802.15.3 • Padding-based attacks work when the encrypted message is guessable (so-called “chosen-plaintext” attacks and dictionary, or “known-plaintext” attacks) or modifiable (“chosen-ciphertext’ attacks) • Padding-based attacks don’t work when the original message is random (e.g. symmetric security keys) and the attacker can’t modify the ciphertext • This new attack is not a threat to 802.15.3 (using NTRUEncrypt SVES-1), because in 802.15.3 the public-key cryptosystem encrypts a symmetric key and because SVES-1 ciphertexts cannot be modified [NP02] • However, NTRU still recommends the use of the system with tighter security proofs as good practice.

More Related