Authentication of Broadcast Messages and Hash Chains

authenticationof broadcast messages with hash n.w
1 / 30
Embed
Share

Explore the authentication of broadcast messages using hash chains and its significance in various scenarios such as digital TV, disaster recovery, defense, and more. Learn about challenges, solutions, and the use of hash functions for secure communication.

  • Authentication
  • Broadcast Messages
  • Hash Chains
  • Cryptography
  • Security

Uploaded on | 0 Views


Download Presentation

Please find below an Image/Link to download the presentation.

The content on the website is provided AS IS for your information and personal use only. It may not be sold, licensed, or shared on other websites without obtaining consent from the author. If you encounter any issues during the download, it is possible that the publisher has removed the file from their server.

You are allowed to download the files provided on this website for personal or commercial use, subject to the condition that they are used lawfully. All files are the property of their respective owners.

The content on the website is provided AS IS for your information and personal use only. It may not be sold, licensed, or shared on other websites without obtaining consent from the author.

E N D

Presentation Transcript


  1. Authenticationof broadcast messages with hash chains J nosFoll th, Tam s Herendi, Attila Peth , R bert T thand D vid Veres(University of Debrecen) Central European Conference onCryptography, Tel June 12, 2019.

  2. Onesender manyreceiver Sender: Powerfull, Whatis broadcasting? has time forpreparation Receivers: limited power, direct action

  3. The Capitoline Geese. SavedRomein390 BC throughcackle, a kindof broadcast message . The messageof geese, dogs, etc is not always authentic.

  4. Authentic broadcasting Town crier, Gemeindediener, krzykacz miejski, kisb r , etc

  5. (Digital) TV and broadcast Sensor networks Spread of data(e.g. share-lists) Smart city Modern applications Autonomous vehicles, Satellite position GPS Disaster recovery Defense

  6. Authentication of sender content Challenges (A. Perrig, 2001) Efficient generation and verification Real-time/instant authentication Individualmessageauthentication Robustness topacketloss Scalability Small size of authentication information.(low communicationoverhead) Secure broadcast communication

  7. Usual: digital signature with asymmetriccryptography Security widelyaccepted, but Complicatedcomputation(receiver sidetoo!) The authenticationinformationis large Solutions Need: electronic signature with symmetric cryptography Solution: hash chains (L. Lamport, 1981, Password authentication with insecure communication)

  8. ?: 0,1 0,1? Maps a bitstring of anylength toa string of fix lenght. Easy to computethe image, butveryhardto compute the preimage. Hardtofind collision, i.e. x y suchthat H(x) = H(y). Hashfunction Message Hash value (SHA-256) CF43E029EFE6476E1F7F84691F89C876818610C2EAEAEB881103790A48745B82 alma

  9. Cryptographic construction Segment of an orbitof a hash function: H^k(x), k=0,1, ,n. C0 C1 C2 C3 Hashchain Public data Random string C0 X C2 H(X) C1 KnowingC0itis hard to computeC2, but KnowingC0and x itis easy to verify whether x = C2.

  10. A. Perrig, 2001: BiBa stands for Bins and Balls signature - a collisionof balls under a hash function in bins forms the signature Needs: ?: 0,1 0,1?, hash function, Gh: 0,1? [0,u-1], h=0, 2n-1, family of hash functions, s1, ,sl 0,1?: SEALs = SelfAuthenticating vaLues. Firstexample: theBiBa signature scheme

  11. The BiBa signature scheme

  12. Simplestcase: one hash chain Advanced: more hash chains Generationof theSEALs

  13. BroadcastAuthentication Protocol Secondexample: theTESLA protocol Timed EfficientStreamLoss-tolerantAuthentication A. Perrig, et al. 2002.

  14. Uses simple cryptographicprimitivs Hash functions Hash chains Pseudo random strings MAC (messageauthentication code) Cryptographic ingredients Fromthese symmetric ingrediens a protocolis invented with asymmetric properties.

  15. Client-server application Main functions of theTESLA protocol Time synchronization Broadcasting messages Receiving messages

  16. Properties: Low computation overhead for generationand verification of authentication information. Lowcommunicationoverhead. Limited buffering for the sender andthe receivers Robustness topacketloss Scales to a large number of receivers The TESLA protocol Invented toPCs, later to microcontrollerenvironment

  17. Vital importance The server and the clients haveto be synchronized, enoughthe loose timesynchronization Time synchronization Weimplemented extra applications bothin Server side(PC) and Clientside (PC, Android) After carefulcomparisonwe choosedtheTCP protocol

  18. Generation of the hashchain Importantparameters (default) Lengthof the chain(100) Frequency (1 message/5 seconds) Lengthof retardation(2 interval) Preparationof theserver C10 C11 C6 C7 C8 C9 7. interval 6. interval 11. interval 9. interval 10. interval 8. interval time 5 second

  19. 1 yearlifetime, 128 bit hash Storage capacity1 I : message frequency N: lengthof the hash chain

  20. Storage capacity2

  21. Disclosure schedule Includes: Lengthof the chain Frequency of the messages Index of the interval Lengthof retardation Publishedkey Sharingthe publicdata

  22. Message Message MAC Broadcasting C6 C6 C8 C8 C10 C11 C7 C9 7. interval 6. interval 11. interval 9. interval 10. interval 8. interval time

  23. Buffer Message Message zenet MAC MAC MAC C6 C6 C8 8 Receiving messages 7. interval 6. interval 11. interval 9. interval 10. interval 8. interval time

  24. Buffer Message Message MAC MAC C10 C8 Receiving messages C6 C7 C8 7. interval 6. interval 11. interval 9. interval 10. interval 8. interval time

  25. Buffer Message Message Message Message MAC MAC C8 C8 Receiving messages C8 C8 C6 C7 7. interval 6. interval 11. interval 9. interval 10. interval 8. interval time

  26. New implementation inthe operating systemAndroid mobile applications Ourresultson theTESLA protocol Carefulanalyses of the networkrequirements suggested network protocol: UDP

  27. Camera system from Android phones Mobile camera system controlled by a PC The clients are mobile phones with camera Onthe commandof the server they take photo The results (photos) canbe seenona web envorinment A mobile application Security cameras Baby orpetobserver cameras Recycling old mobile phones green informatics

  28. Video presentation https://youtu.be/H7hZOc2XoQs

  29. /unideb-tesla Sourcecodes

  30. Thankyouforyour attention!

More Related Content