background study :802.11i encryption

35
Background Study :802.11i Encryption

Upload: elton-bowman

Post on 03-Jan-2016

39 views

Category:

Documents


2 download

DESCRIPTION

Background Study :802.11i Encryption. MK (Master Key) PMK (Pair-wise Master Key) PTK (Pair-wise Transient Key) GMK (Group Master Key) GTK (Group Transient Key). Background Study : ECC (Elliptic Curve Cryptography)[Neil Koblitz, Victor Miller, 1985]. General Form. 質數體. 二元體. 質數體加法規則. - PowerPoint PPT Presentation

TRANSCRIPT

Page 1: Background Study :802.11i Encryption

Background Study :802.11i Encryption

Page 2: Background Study :802.11i Encryption

• MK (Master Key)

• PMK (Pair-wise Master Key)

• PTK (Pair-wise Transient Key)

• GMK (Group Master Key)

• GTK (Group Transient Key)

Page 3: Background Study :802.11i Encryption

Background Study : ECC (Elliptic Curve Cryptography)[Neil Koblitz, Victor

Miller, 1985]• General Form

E y xy x ax b: 2 3 2

pF E y x ax b: 2 3 0274 23 ba

2nF b0E y xy x ax b: 2 3 2

質數體

二元體

Page 4: Background Study :802.11i Encryption

質數體加法規則• O: Point at infinity• P+O=O+P=P

1 1( , ) ( )pP x y E F 2 2( , ) ( )pQ x y E F

3 3( , )P Q x y 23 1 2x x x 3 1 3 1( )y x x y

y y

x xP Q

x a

yP Q

2 1

2 1

12

1

3

2

if

if

Page 5: Background Study :802.11i Encryption

乘法規則

pk FkP P P

k

( ) ( )s tP st P , ps t F

•nP=O n稱為 order

•Given G, Q=dG, d is randomly selected. It is nearly impossible to derive d (橢圓曲線離散對數問題 ). G is called generator. Q is called public key. d is called private key.

Page 6: Background Study :802.11i Encryption

ECCDH

• Given E, a generator point P.• A selects a private key da. A derives public

key Qa= da∙P• B selects a private key db. B derives public

key Qb=db∙P• A and B exchange their public Key• A derives share key Sab=da∙Qb• B derives share key Sab=db∙Qa

Page 7: Background Study :802.11i Encryption

Bilinear pairing

• Establishment of a session key requires only one message for exchange

• Two cyclic group bilinear mapping

• G1: cyclic addition group, G2 cyclic multiply group

Page 8: Background Study :802.11i Encryption
Page 9: Background Study :802.11i Encryption

Introduction

• Roaming delay is composed by– Channel scanning and probing

• Mobile client must disconnect from the current AP and join a new AP and it takes 20ms~380ms

– Authentication at the new AP

• The overall roaming delay should be kept under 50ms, ideally the authentication should not take more than 20ms to allow 30ms for channel scanning and probing.

Page 10: Background Study :802.11i Encryption

• 802.11i– Authentication is done by 802.1x, or by a pre-

shared key.– PMK, 4-way handshake for PTK, 2-way

handshake for GTK.– Full authentication takes 750~1200ms– Roaming authentication takes 200ms, or 50ms

for the best case.

Page 11: Background Study :802.11i Encryption

• Proactive key distribution method– Distributes a new PMK to neighbor APs– Roaming authentication time reduce to 21ms on the

average.– Heavy burden on AS– AP must track the movement of clients

• Pre-authentication– A client connects to multiple APs first.– 0 delay– Impose heavy burden on AS and may not extend

beyond the first access router

Page 12: Background Study :802.11i Encryption

• Predictive authentication– All the neighboring APs can receive the authentication

response.

– Drawbacks are similar to pre-distribution

• 802.11r– Authentication time of best case is 10ms

– Pre-distribution of the keys to all the AP within the subnet

– Drawbacks still remain

Page 13: Background Study :802.11i Encryption

• Reducing 4-way handshake is important. Best case analysis of 4-way handshake is 20ms.

• Inter-domain roaming

Page 14: Background Study :802.11i Encryption

Background

• IDC (Identity-based Cryptography)– Known identity information is used in ID-based

cryptography to derive a public key thus no public key exchange is necessary.

– Identity value may be alphanumeric character string or MAC address.

• PKG (Private Key Generator)– Given private key to the ID owner through a

secure channel

Page 15: Background Study :802.11i Encryption

• Bilinear map

• Multiply integers with points on elliptic curves– Given P and sP, it is nearly impossible to

compute s

Page 16: Background Study :802.11i Encryption

• Public/private key generation – PKG uses a master key s and a fixed point P on

a elliptic curve.– Public key Oid

• PKG hashes user’s ID to a point Qid on the curve.

– Private key s∙Qid

• P, s∙P, cryptographic function H1 can be made available in public

Page 17: Background Study :802.11i Encryption
Page 18: Background Study :802.11i Encryption
Page 19: Background Study :802.11i Encryption
Page 20: Background Study :802.11i Encryption

Proposed scheme SFRIC

• To use a WLAN, a user logs into the network through 802.11i process.

• For static client SFRIC is not necessary• SFRIC has 2 phases. In phase 1 a client accesses

the PKG to get a private key. When the client decides to roam it first finds and joins a new APs by probing and scanning, and follows the phase 2 procedure to exchange authentication messages.

Page 21: Background Study :802.11i Encryption
Page 22: Background Study :802.11i Encryption

Phase 1 preparation

• APs and client both contact to PKG with their MAC and receive a private key via secure channel

• Private key of client– {MAC||expiration date||expiration hour||Nounce}

• Private key of AP– {MAC||current date||current hour}

• Both are periodically refreshed in every hour

Page 23: Background Study :802.11i Encryption

Phase 2 roaming

Page 24: Background Study :802.11i Encryption
Page 25: Background Study :802.11i Encryption

• Comment

• Figure 3 says message 1 is encrypted in Ka, but figure 4 says it is K1 to be used for encrypted instead.

Page 26: Background Study :802.11i Encryption

Comment: The above equation can prove anything.

Comment:(rKa, sP)=(Kc-1, rP)?

• Serious error in equation. Can not prove security key of a equals to security key of csKa = Kc

-1??

Page 27: Background Study :802.11i Encryption

• {MACc} is called the proof of ID. If the MAC address of ID matches the MAC address in the packet header, the sender is proven to posses the MAC address and the right private key.

• Comment: Verification of MAC is smart but weak.

Page 28: Background Study :802.11i Encryption

• Comment: If MACc is encrypt by c’s private key, there is no way to decrypt it in a.

Page 29: Background Study :802.11i Encryption

Performance Analysis

Page 30: Background Study :802.11i Encryption

• The most time consuming is the pairing operations E2, D1, and D2, while the cost of the rest is almost negligible.

• Comment: I am not convincible why E1 pairing operation can be negligible.

• Comment: Authors is too optimistic to neglect the network operation, especially in worst cases.

Page 31: Background Study :802.11i Encryption

• Comment: Inconsistent typos

Page 32: Background Study :802.11i Encryption

• The authors claim there will be only 2 pairing operations require, which take 17ms (cited by [23] that one pairing operation is 8.7ms for best case), one can be done in advance.

• Comment: there is no simulation for the computation. Nothing but site by other work. Conviction is weak.

Page 33: Background Study :802.11i Encryption

Thank You

Page 34: Background Study :802.11i Encryption

Review Suggestion

• Rate the importance of the topic addressed in the paper and its timeliness within its area of research Excellent Above average Average Below average None

• Rate the technical contribution of the paper, its soundness and scientific rigourExcellent Solid work Valid work Marginal work Questionable

• Rate the novelty and originality of the work presented in the paperPioneering Novel Some Novel Minor variation It has been said many times before

Page 35: Background Study :802.11i Encryption

• Rate the paper organization, the clearness of text and figures, the completeness and accuracy of references.Excellent Well written Readable Substantial revision work is needed Unacceptable

• Strengths:

• Weakness:

• Recommended changes: