Strong authentication – on smart wireless devices – Motivation



Strong authentication – on smart wireless devices – Motivation

0 0


fgct

Presentation for the II Conference on Future Generation Communication Technologies

On Github vivictormora / fgct

Strong authentication

on smart wireless devices

V. Mora-Afonso / P. Caballero-Gil / J. Molina-Gil

Heads Up

proposal to protect communications combining IBC for Bluetooth communication with the promising NFC technology for secure authentication.

Layout

  • Brief introduction
  • State of the art
  • Let's dive into IBE
  • Our proposal
  • Conclusions

Motivation

  • Smartphones are everywhere
  • All kind of environments
  • Computing, power and battery limitations.

Identity Based Cryptography

  • Any piece of text as public key
  • Shorter encryption keys
  • No certificates
  • No CRLs
  • Less computational complexity

Near Field Communication

  • Short-range high frequency wireless communications
  • Enables simple and safe interactions
  • Contactless transitions. Tap & connect

State of the art

  • Encryption of messages sent within different social providers
  • Access control through Zero-Knowledge proof authentication
  • Encryption of phone calls

Identity-Based Cryptography

  • Piece of information linked to node as public key
  • Proposed by Shamir but did not come up with specific solution
  • Private Key Generator (PKG) with master secret key

Bilinear maps

Bilinear: $e(aP,bQ) = e(P,Q)^{ab} \forall P,Q \in G_1$ Non-degenerate: $e(P,P)$ is a generator of $G_2$. In other words $e(P,P)\not=1$ Computable: Give $P,Q \in G_1$ there is an efficient algorithm to compute $e(P,Q)$

Pairing over elliptic curves

  • Tate pairing
  • Weil pairing
  • Miller's algorithm

Security based on assumptions of hard problems in Elliptic Curves

Computational Diffie-Hellman. No efficient algorithm exists to compute $abP$ from $P,aP,bP \in G_1$ for some $a,b \in {Z \ast}_q$ Weak Diffie-Hellman. No efficient algorithm exists to compute $sQ$ from $P,Q,sP\in G_1 and$ $s \in {Z \ast}_q $ Billinear Diffie-Hellman. No efficient algorithm exists to compute $e(P,P)^{abc}$ from $P,aP,bP,cP \in G_1$ where $a,b,c \in {Z \ast}_q$ Decisional Billinear Diffie-Hellman. No efficient algorithm exsits to decide if $r=e(P,P)^{abc}$ given $P,aP,bP,cP \in G_1, r \in G_2 and a,b,c \in {Z \ast}_q$

Boneh-Franklin scheme

  • Setup stage. Generation of the master secret key and a set of public parameters
  • Extract stage. Generation of a user's private key
  • Encrypt stage. A user wants to encrypt a message M to send the resulting ciphertext C to the user with identity ID
  • Decrypt state. A user that recieves C uses its private key to obtain the original message M

Our proposal

  • Bluetooth lacks of user friendliness
  • Too much time to pair two unknown devices
  • NFC is a breath of fresh air
  • There are some security problems with its ciphers

The situation

Two users A and B want to securely share information through the bluetooth of their smartphones. They are both registered to a TTP PKG server.

Pairing phase

Communication phase

Implementation details

  • Elliptic curve $y^2=x^3 + 1$ over $F_p$ for primes $p$ congruent to 11 modulo 12
  • Use of the group $E(F_p)$ with points (x,y) and the group $E({F_p}^2)$
  • Tate pairing and Miller's algorithm for its computation

Windows Phone 8

  • Nokia Lumia 920
  • First implementations a little bit dissapointing
  • Message size Time to encrypt Time to decrypt 128 7497.198 ms 7368.289 ms 512 7498.221 ms 6998.858 ms
  • App to encrypt emails published as a result of this work

MacOs and iOs

  • Use of the Pairing Based Cryptography Library
  • Performance boost
  • Encryption time around 60ms

Conclusions

  • It was proposed a communication protocol which use NFC for pairing and IBE for securing communications
  • Implement the proposal in different platforms and testing environments
  • In-depth analysis of its security
  • Signcryption and applications in everyday life

THE END

Thank you very much

V. Mora-Afonso / P. Caballero-Gil / J. Molina-Gil