2003.03.31 (c) Mitsubishi Electric Corp. User Scenarios & Security Considerations in APPAGG part 2/2 2003.03.31 Nobuhiro Kobayashi@Mitsubishi Electric Corp. [email protected] 1 2003.03.31 (c) Mitsubishi Electric Corp. Solution • • • • • • • Who grants the rights to the subject ? Who stores the rights ? How describe the rights ? Who authenticates the subject ? Who authenticates the object ? Who authorizes the subject ? (? Any other items ? ) 2 2003.03.31 (c) Mitsubishi Electric Corp. Solution (cont.) • Who grants the rights to the subject ? – Owner – (? default settings by manufacturer ) 3 2003.03.31 (c) Mitsubishi Electric Corp. Solution (cont.) • Who stores the rights ? – ? each appliance – ? Owner’s wearable appliance (ex. watch) 4 2003.03.31 (c) Mitsubishi Electric Corp. Solution (cont.) • How describe the rights ? – ? XML – ? original format 5 2003.03.31 (c) Mitsubishi Electric Corp. Solution (cont.) • Who authenticates the subject ? – Owner – ? Owner’s wearable appliance – ? each appliance – ? Trusted third party 6 2003.03.31 (c) Mitsubishi Electric Corp. Solution (cont.) • Who authenticates the object ? – Owner – ? Owner’s wearable appliance – ? each appliance – ? Trusted third party 7 2003.03.31 (c) Mitsubishi Electric Corp. Solution (cont.) • Who authorizes the subject ? – Owner – ? Owner’s wearable appliance – ? each appliance – ? Trusted third party 8 2003.03.31 (c) Mitsubishi Electric Corp. Example. John’s wearable appliance “watch” has the rights list. The “watch” sends command to the light. How to set the rights to the lights ? John John grants the rights to the light. John grants the rights to his watch. Rights List for light Rights List for watch Owner is John. Owner is John. Owner can turn on the lights. Owner can use the laptop. command Turn ON the light. 9 Version 1 A( watch ) 2003.03.31 (c) Mitsubishi Electric Corp. C( attacker ) B( light ) command command command normal attack command command command success replay attack 10 2003.03.31 (c) Mitsubishi Electric Corp. Solution (cont.) • To protect from replay attack. – Use Random Number – Use HMAC ( Keyed-Hashing for Message Authentication) • It is more lightweight than other cryptographic routines. 11 Version 2 A( watch ) 2003.03.31 (c) Mitsubishi Electric Corp. C( attacker ) start request B( light ) start request start request RN RN check RN RN command key HMAC compute HMAC with key generate Random Number ( RN ). RN RN command command HMAC HMAC key HMAC tmp check normal start request attack start request RN2 RN2 RN RN command command HMAC HMAC 12cannot replay attack ERROR 2003.03.31 (c) Mitsubishi Electric Corp. Version 2’ A( watch ) C( attacker ) start request B( light ) start request start request RN RN RN key check RN RN command RN command command HMAC HMAC HMAC key HMAC tmp check normal attack start request start request RN RN RN RN command command HMAC HMAC doesn’t execute command 13 2003.03.31 (c) Mitsubishi Electric Corp. Version 3 A( watch ) C( attacker ) B( light ) start request start request start request RN_A RN_A RN_A key key RN_B RN_B HMAC tmp RN_B HMAC_B HMAC_B HMAC_B check RN_B RN_B command key command key HMAC_A HMAC_A HMAC tmp check start request start request RN_A2 RN_A2 attack key RN_B RN_B HMAC tmp HMAC_B HMAC_B check ERROR attack detected normal 14 2003.03.31 (c) Mitsubishi Electric Corp. References • Appliance Aggregation Architecture Terminology, Survey, and Scenarios http://www.hpl.hp.com/hosted/ggf/AppAggSurvery.doc, March 2003 • terminology translation ( English <-> Japanese ) http://www.ipa.go.jp/security/ciadr/word_idx.html http://www.ipa.go.jp/security/ciadr/crword.html http://www.sisnet.or.jp/sis/dokuhon/p10.htm 15 2003.03.31 (c) Mitsubishi Electric Corp. END Thank you. 16 2003.03.31 (c) Mitsubishi Electric Corp. NOT USE 17 2003.03.31 (c) Mitsubishi Electric Corp. Example. (cont.) John sets “secret key” to the “watch” and the light. The “watch” make HMAC from the command by “secret key”, and sends the command and HMAC to the light. John The lights make HMAC from the received command by “secret key”, and compares this HMAC and the received HMAC. John sets “secret key”. John sets “secret key”. Rights List for light Rights List for watch Owner is John. Owner is John. Owner can turn on the lights. A Owner can use the laptop. command Turn ON the light. HMAC made by watch command Turn ON the light. A HMAC made by watch HMAC made by light compare the HMAC 18 2003.03.31 (c) Mitsubishi Electric Corp. Example. (cont.) To against “replay attack”, use 3 handshakes and random numbers. Generate random number. Session Start Request HMAC_W (R.N.) W HMAC_W (R.N.) R.N. compare the HMAC HMAC_W (R.N.) HMAC_L (R.N.) L HMAC_L (R.N.) HMAC_L (R.N.) command Turn ON the light. R.N. compare the HMAC A HMAC_L (R.N.) Generate random number. A command Turn ON the light. HMAC made by watch HMAC made by light HMAC made by watch compare the HMAC 19 2003.03.31 (c) Mitsubishi Electric Corp. Terminology translation ( English <-> Japanese ) • • • Impersonation, spoof authentication replay attack なりすまし 認証 再送攻撃 • • eavesdrop encryption 盗聴 暗号化 • • • • • alteration Integrity hash message digest digital signature 改ざん 完全性 ハッシュ メッセージ・ダイジェスト デジタル証明 • • repudiation non-repudiation 否認(事後否認) 否認拒否 • • • authorization access control privilege control 認可 アクセス制御 特権制御 • principal 認証をうける単位(ユーザ、ホスト、アプリケーション等) 20
© Copyright 2025 Paperzz