Survey
* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project
* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project
Problem 1 ο Suppose that ORCA cards and readers are only capable of symmetric (e.g. AES) encryption but you want each card to have its own symmetric key for communications with readers. Although you donβt like it, you are assured that there is enough physical security around the readers so that they can all share a single key. Describe a design wherein each card can use its unique symmetric key to communicate securely with any reader. 2/17/2011 Practical Aspects of Modern Cryptography Problem 1 ο Readers share secret symmetric key π. ο Cards each have a unique symmetric key ππ ο A couple possible solutions: 1. On card π, store ππ and πΈπ (ππ ). When communicating with a reader, send πΈπ ππ from the card to the reader. The reader can decrypt πΈπ ππ , retrieving ππ . Then the card & reader can communicate using ππ . ο This is like pre-loading a Kerberos ticket for the reader βserviceβ onto each card. 2/17/2011 Practical Aspects of Modern Cryptography Problem 1 2. On card π, store π and ππ , where ππ = HMAC(π, π). When communicating with a reader, send π from the card to the reader. The reader can then derive ππ from π and π. Then the card & reader can communicate using ππ . 2/17/2011 Practical Aspects of Modern Cryptography Problem 2 ο βFun with CRLsβ ο 1,000,000 ORCA cards, 1%/month loss rate. ο Q: How big is the CRL in the steady state if you have to hold 2 years of info? ο Assume CRL requires 512 bytes of fixed information plus 36 bytes of storage per revocation entry when ASN.1 encoded. ο 1,000,000 cards, 1% month ο¨ 24% loss over 2 years ο¨ 240,000 entries on the CRL ο CRL size: (240,000 * 36) + 512 bytes = 8,640,512 bytes 2/17/2011 Practical Aspects of Modern Cryptography Problem 3 ο βFun with CRLs, Part IIβ ο Design an alternative data structure for holding CRL information on each reader that has the following properties, where π is the total number of revoked cards in the data structure and π is the number of additions and deletions made to the data structure in a single day: ο Each dayβs incremental updates involve only π(π log π) modifications to the data structure. ο Searching the βCRLβ for an entry takes π(log π) time. ο Like a βregularβ CRL, the data structure is always integrity- protected with a digital signature from the CA. 2/17/2011 Practical Aspects of Modern Cryptography Problem 3 ο Solution: βCertificate Revocation Treesβ* ο Basic idea: Create a tree data structure where the leaves of the tree hold (in sorted order) the serial numbers of revoked certs. ο Intermediate parent nodes are formed by hashing the contents of the nodeβs children. ο Digitally sign the root node using the CAβs private key and distribute that signature as part of the root node. *Kocher, βOn Certificate Revocation and Validation,β Proceedings of Financial Cryptography β98, LCS 1465, pp. 127-177. 2/17/2011 Practical Aspects of Modern Cryptography Problem 3 N2,0: SHA256(N1,0 || N1,1) Root w/ signature N1,0: SHA-256(N0 || N1) N0,0: SN #5 2/17/2011 N0,1: SN#12 Practical Aspects of Modern Cryptography N1,1: SHA256(N2) N0,2: SN#17 Problem 3 ο Updates: ο Just need to update leaf nodes that change on each incremental update and the intermediate nodes between each changed leaf and the root. ο Also need to send a new signature on the root each time (because any change will change the root). 2/17/2011 Practical Aspects of Modern Cryptography Problem 4 ο Pres and two VPs share modulus π = ππ. ο Pres uses public exponent π = 65537. ο VPs use public exponents π1 = 3 and π2 = 5. π15π1 π2 mod π = 5π2 3π 1 π mod π = π5π2 πππ π = π The bad news: A corresponding π, π pair allows you to factor π. 1/20/2011 Practical Aspects of Modern Cryptography Problem 4 (cont.) What can you do with the VP keys? ππ = π π β 1 π β 1 3π1 = π1 (π β 1)(π β 1) 5π2 = π2 (π β 1)(π β 1) π1 and π2 must be very small. Given one of π1 and π2 , one need try very few possibilities for π1 and π2 to derive the ππ that you donβt already have. 1/20/2011 Practical Aspects of Modern Cryptography