02/22/2005 joint seminer satoshi koga information technology & security lab. kyushu univ. a...

24
02/22/2005 Joint Seminer Satoshi Koga Satoshi Koga Information Technology & Security Lab. Kyushu Univ. A Distributed A Distributed Online Certificate Status Online Certificate Status Protocol Protocol with Low Communication Costs with Low Communication Costs A preliminary version of this paper is presented at PKC 2004

Upload: dulcie-carter

Post on 12-Jan-2016

221 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: 02/22/2005 Joint Seminer Satoshi Koga Information Technology & Security Lab. Kyushu Univ. A Distributed Online Certificate Status Protocol with Low Communication

02/22/2005 Joint Seminer

Satoshi KogaSatoshi Koga

Information Technology & Security Lab.

Kyushu Univ.

A Distributed A Distributed Online Certificate Status Protocol Online Certificate Status Protocol with Low Communication Costswith Low Communication Costs

A preliminary version of this paper is presented at PKC 2004

Page 2: 02/22/2005 Joint Seminer Satoshi Koga Information Technology & Security Lab. Kyushu Univ. A Distributed Online Certificate Status Protocol with Low Communication

2

BackgroundBackground

• Public Key Infrastructure (PKI)– secure e-mail, authentication system etc..

• Certificate revocation problem– The certificate must be revoked if

The user’s private key is compromisedUser’s personal information is changed

– The verifier must check the revocation information

Page 3: 02/22/2005 Joint Seminer Satoshi Koga Information Technology & Security Lab. Kyushu Univ. A Distributed Online Certificate Status Protocol with Low Communication

3

Certificate revocationCertificate revocation

• Compromise of private key, or changing personal information– The certificate must be revoked The certificate must be revoked

• If a certificate is revoked…– Certificate owner sends a revocation requests to the

CA who issues certificates– The CA should publish revocation information– The certificate verifier should check the status of

certificateIs this certificate

valid? or revoked?

Certificate verifier

Page 4: 02/22/2005 Joint Seminer Satoshi Koga Information Technology & Security Lab. Kyushu Univ. A Distributed Online Certificate Status Protocol with Low Communication

4

Certificate revocation systemsCertificate revocation systems

• Certificate Revocation List (CRL)• The list of revoked certificates

• The size of the CRL is long

• High communication costs

• Online Certificate Status Protocol (OCSP)• Provide the up-to-date response to certificate

status queries

• Low Communication costs

Page 5: 02/22/2005 Joint Seminer Satoshi Koga Information Technology & Security Lab. Kyushu Univ. A Distributed Online Certificate Status Protocol with Low Communication

5

Online Certificate Status Protocol Online Certificate Status Protocol (OCSP)(OCSP)

Responder checks the status of a certificate instead of users– User requests the status of a certificate– Responder sends the response including the status of

requested certificate– Mitigate the load of user– Reduce the communication costs, compared with CRL

CAResponder

User

request

response

Revocationinformation

Back

Page 6: 02/22/2005 Joint Seminer Satoshi Koga Information Technology & Security Lab. Kyushu Univ. A Distributed Online Certificate Status Protocol with Low Communication

6

OCSP (cont’d)OCSP (cont’d)

• Security– Responses are signed by OCSP responder

• Communication costs– A user receives response– Independent on number of revoked certificates

• problem– High computation costs of OCSP responder

It is vulnerable to Denial-of-Service (DoS) attacks

Page 7: 02/22/2005 Joint Seminer Satoshi Koga Information Technology & Security Lab. Kyushu Univ. A Distributed Online Certificate Status Protocol with Low Communication

7

MotivationMotivation

• Centralized OCSP

Compromise of responder’s private key affects the entire system

• Protection of the private key Hardware Security Module (FIPS140-2 by NIST) Threshold cryptography :each server holds a shared

private key and a predetermined number of servers must cooperate in order to perform the operation

• Private key exposures appear to be unavoidableunavoidable

Page 8: 02/22/2005 Joint Seminer Satoshi Koga Information Technology & Security Lab. Kyushu Univ. A Distributed Online Certificate Status Protocol with Low Communication

8

Distributed OCSPDistributed OCSP

• Minimize the damage caused by responder’s key exposures

• A Distributed OCSP(D-OCSP) composed of the multiple responders– Each responder has the different private key

If a responder’s private key is compromised, the others are not derived

Page 9: 02/22/2005 Joint Seminer Satoshi Koga Information Technology & Security Lab. Kyushu Univ. A Distributed Online Certificate Status Protocol with Low Communication

9

Traditional D-OCSPTraditional D-OCSP

CACAresponder’scertificate

CA’scertificate

UserUser

response+

signature

responder 1responder 1 responder responder nnresponder 2responder 2

PK1, SK1 PK2, SK2 PKn, SKn

To eliminate the validation of certificate revocation,

the CA issues responder’s certificate with short lifetime

Page 10: 02/22/2005 Joint Seminer Satoshi Koga Information Technology & Security Lab. Kyushu Univ. A Distributed Online Certificate Status Protocol with Low Communication

10

Challenging issueChallenging issue

• Responder’s certificate with a short lifetime In case that the client receives the response, she

must download responder’s certificate

Communication costs is inefficient

• Responder’s certificate with a long lifetime The client needs to obtain the different responder’s

certificates

The client must store the multiple certificates

Page 11: 02/22/2005 Joint Seminer Satoshi Koga Information Technology & Security Lab. Kyushu Univ. A Distributed Online Certificate Status Protocol with Low Communication

11

Our Proposed Distributed OCSPOur Proposed Distributed OCSP

• To mitigate the damage caused by responder’s private key exposure

A distributed OCSP (D-OCSP)

• Propose an efficient D-OCSP– The client can verify any responses by using a

single public key

The client just obtains a single certificate

Page 12: 02/22/2005 Joint Seminer Satoshi Koga Information Technology & Security Lab. Kyushu Univ. A Distributed Online Certificate Status Protocol with Low Communication

12

Our ideaOur idea

• To generate the responder’s private keys

– Use the Key-Insulated Signature scheme (KIS) [DO03]

– Each responder has the different private key, but corresponding public key remains fixed

– The client can verify any responses by using a single public key

• To validate responder’s private key– Use the NOVOMODO [M02]

[DO03] Y. Dodis et al. , “Strong Key-Insulated Signature Schemes”, PKC 2003.[M02] S. Micali, “NOVOMODO”, 1st Annual PKI Research Workshop, 2002.

Page 13: 02/22/2005 Joint Seminer Satoshi Koga Information Technology & Security Lab. Kyushu Univ. A Distributed Online Certificate Status Protocol with Low Communication

13

• The lifetime of protocol is divided into short time periods

• The beginning of period i, a private key is updated

• The private key is updated frequently, but the corresponding public key is fixed

• Even if SKi is exposed, the attacker cannot forge signature for any time periods (key-insulated security)

SK1 Lifetime

Period 1 Period 2

SKT

Period T

SK2

Key-insulated signature scheme (KIS)Key-insulated signature scheme (KIS)

Period i

SKi

PK

Page 14: 02/22/2005 Joint Seminer Satoshi Koga Information Technology & Security Lab. Kyushu Univ. A Distributed Online Certificate Status Protocol with Low Communication

14

• The master key SK* is stored on the secure device• The Secure-device computes the partial key SKi ’• The user derives Ski+1 using partial key SKi ’ and SKi

• Once Ski+1 is derived, SKi is deleted• If an attacker can know SKi, she cannot derive any other private keys (as long as SK* is secure)

Secure device

SK*

SK1’SKT’

SK1

LifetimePeriod 1 Period 2

SKT

Period T

SK2

Update algorithm in KISUpdate algorithm in KIS

signer

Page 15: 02/22/2005 Joint Seminer Satoshi Koga Information Technology & Security Lab. Kyushu Univ. A Distributed Online Certificate Status Protocol with Low Communication

15

All signatures can be verified by using a fixed public key

Key-insulated security

• Responder’s private keys are generated using Key-Insulated signature scheme

• n (= the number of responders) private keys are generated at first stage

Our methodOur method

Page 16: 02/22/2005 Joint Seminer Satoshi Koga Information Technology & Security Lab. Kyushu Univ. A Distributed Online Certificate Status Protocol with Low Communication

16

• The CA stores the master key• The CA generates n private keys using key update

algorithm in KIS• The CA delivers a private key to each responder

securely

CACA

responder 1responder 1 responder nresponder n

PK

Decentralization MethodDecentralization Method

Reponder’s public key

responder 2responder 2

SK1 SK2 SKn

The user must check that responder’s private key is not

revoked

Page 17: 02/22/2005 Joint Seminer Satoshi Koga Information Technology & Security Lab. Kyushu Univ. A Distributed Online Certificate Status Protocol with Low Communication

17

• Use the NOVOMODO [M02]– Using one-way hash function h– Generating the following hash-chain

– At period t, the verifier checks the following equation

)(XhX tt

0

XInput value

h XTh h X0

Validation of responder’s private keyValidation of responder’s private key

XT-1h

Page 18: 02/22/2005 Joint Seminer Satoshi Koga Information Technology & Security Lab. Kyushu Univ. A Distributed Online Certificate Status Protocol with Low Communication

18

• The CA produces n hash-chains and stores them securely

• The CA issues responder’s certificate D: certificate data

Responder 1

Responder n

Issuance of responder’s certificateIssuance of responder’s certificate

XT,1h XT-1, 1

h h X0, 1XT-2, 1h

XT,2h XT-1, 2

h h X0 ,2XT-2, 2h

XT,nh XT-1, n

h h X0, nXT-2, nh

Responder 2

Cres=SigCA(D, PKres, X0, 1, X0, 2 , …, X 0, n)

Page 19: 02/22/2005 Joint Seminer Satoshi Koga Information Technology & Security Lab. Kyushu Univ. A Distributed Online Certificate Status Protocol with Low Communication

19

• If responder’s private key is valid at period t, the CA delivers the hash value to responder

• The responder sends both the signed response and this hash value

• The user checks the following equation at period t– The user can verify the responder’s private key using

hash function

CA responder i

Validation processValidation process

Xt, i

X 0, i = ht(X t, i)

Page 20: 02/22/2005 Joint Seminer Satoshi Koga Information Technology & Security Lab. Kyushu Univ. A Distributed Online Certificate Status Protocol with Low Communication

20

CACA

responder’scertificate

CA’scertificate

UserUser

Our Proposed D-OCSPOur Proposed D-OCSP

responder 1responder 1 responder responder nnresponder 2responder 2

SK1 SK2SKn

Response+

X t, i

Xt,1 Xt,2 Xt,i

Page 21: 02/22/2005 Joint Seminer Satoshi Koga Information Technology & Security Lab. Kyushu Univ. A Distributed Online Certificate Status Protocol with Low Communication

21

DiscussionsDiscussions

• Security– If one private key is exposed, the attacker can not

derive the others (Key-insulated security)– If the attacker obtains the hash value, she cannot

derive the next hash value (one-way function)

Minimize the impact of responder’s private key exposure

Page 22: 02/22/2005 Joint Seminer Satoshi Koga Information Technology & Security Lab. Kyushu Univ. A Distributed Online Certificate Status Protocol with Low Communication

22

Discussions (cont’d)Discussions (cont’d)

• Communication costs– The client can check any responses using a single

public key – The client simply obtains one responder’s

certificate the communication cost is efficient – The client only stores one certificate

the memory space is small

• Computational costs– Signing cost and verification cost are less efficient

Page 23: 02/22/2005 Joint Seminer Satoshi Koga Information Technology & Security Lab. Kyushu Univ. A Distributed Online Certificate Status Protocol with Low Communication

23

EfficiencyEfficiency

Traditional Traditional

D-OCSP (DSA)D-OCSP (DSA)

Our proposed Our proposed D-OCSP (KIS)D-OCSP (KIS)

Size of a responseSize of a response 1750-1950 bytes 250-350 bytes

Verification costs Verification costs

(# of multiplications)(# of multiplications)

3+EX|q| t+2+3EX|q|

Signature costs Signature costs

(# of multiplications)(# of multiplications)

2+EX|q| 2+2EX|q|

・ OpenSSL・ CA’s key size : 2048 bit・ Responder’s key size : 1024 bit・ EX : # of multiplication required to compute a exponentiation・ |q| =160・ t = (# of responders)

Page 24: 02/22/2005 Joint Seminer Satoshi Koga Information Technology & Security Lab. Kyushu Univ. A Distributed Online Certificate Status Protocol with Low Communication

24

ConclusionConclusion

• Centralized OCSP– Compromise of private key affects the entire system– Mitigate the damage caused by compromise of

responder

• Efficient distributed OCSP– Apply key-insulated signature scheme and

NOVOMODO– Any responses can be checked by using fixed public

key