Upgrade to Pro — share decks privately, control downloads, hide ads and more …

What Happened to Mathematically Provable Security?

What Happened to Mathematically Provable Security?

Research Presentation 1 for CSC 405.
Spring 2016.

Frances Coronel

January 28, 2016
Tweet

More Decks by Frances Coronel

Other Decks in Technology

Transcript

  1. Mathematical Proofs • A mathematical proof is an argument which

    convinces other people that something is true. • They improve but do not guarantee security, safety, and friendliness. • In 1979, Michael Rabin proved that his encryption system could be inverted as long as he uses the factor “n” when computing his algorithm. He uses “n” because it would be relatively hard for someone to compute a large value of “n” based off the given algorithm.
  2. Mathematical Proofs Cont. • Mathematical Proofs can sometimes be wrong.

    • In 2007, Boldyreva created the Order Multi-Signatures (OMS) which was claimed more efficient and more secure than other systems with similar functionality. This was proved wrong by Hwang in 2009.
  3. Provable Security is false? • Instead of creating a secure

    computer system, they instead created a secure algorithm that has a possibility of being breached when the algorithm is figured out. • The system’s former security requirements might fall victim to attacks by not capturing everything an attacker can do to break the system. This also does not show what information is available to the hacker. • Mathematical proofs can sometimes be wrong
  4. Types of Provable Security • Unconditional Security ◦ Characterized by

    resisting all attackers ◦ Key pre-distribution schemes in large • Computational Security ◦ Characterized by resisting attacks made by PPT algorithms or circuits ◦ Typically uses complexity theoretic techniques to prove security ◦ Non-uniform algorithms are considered to be given a different “hint” for each value of the security parameter. • Formal Methods ◦ Characterized by Style of Proof Rather Than Class of Attackers ◦ Verification of Protocol Security ◦ Verification of Algorithmic Correctness
  5. Provable Security and Proofs • Proving the security of a

    computer is “hard” • Proofs often come in 3 parts ◦ A description of the simulator ◦ A justification of why the simulators provides inputs which look like those in the security model ◦ A justification of why the simulator solves the problem whenever the attacker breaks the cryptosystem
  6. Multics • Multiplexed Information and Computing Service is a timesharing

    operating system that started in 1965 and was used until 2000. • Created by MIT’s Project MAC. • Honeywell offered Multics as a commercial product and sold dozens of systems.
  7. Multics Contains... • A supervisor program that managed everything •

    An innovative segmented memory addressing system • A tree structured file system • Device support • Hundreds of program commands, languages and tools • Hundreds of library routines • Operational and Support Tools • User and system documentation
  8. Multics and Money? • Despite its shutdown in 2000, Multics

    has leaded pathway for computing systems’ security. There was no need for a Multics computer since methods used in Multics were now developed in Windows and Macintosh computers. There are still emulators today running Multic Systems. • Mathematically provable secure systems are more difficult to be proved than thought possible and it shows that not having a completely secure system would prove very resourceful when it comes to money. Industry wishes to make profit wherever seems profitable and having a mathematically provable secure system will take away from that profit. • I personally don’t believe that there isn’t such a thing as a mathematically provable secure system when it comes to computer systems but I do believe that people would rather make profit off of security than have a secure system.
  9. What is KSOS ? • Kernelized Secure Operating System (KSOS,

    formerly called Secure UNIX). KSOS is intended to provide a provably secure operating system for larger minicomputers • KSOS will provide a system call interface closely compatible with the UNIX operating system • KSOS is composed of three components: ◦ The Security Kernel ▪ Provides a simple operating system which can be shown to be secure ◦ The UNIX Emulator ◦ The Non-Kernel System Software
  10. Goals of KSOS • The goal of the system is

    to provide strong assurances that it is impossible for an unprivileged user to cause an information compromise. • The overall design goals for KSOS are: ◦ The system must provide provable security, i.e. its design and mechanization must be oriented towards the proof of its security properties. ◦ The copying of the UNIX system call interface must be as faithful as possible given the constraints of the security model. ◦ The performance of the system should be "good," specifically, the performance should be comparable to that of a UNIX system. ◦ The Kernel should be usable by itself as a simple, secure operating system. ◦ The design should be amenable to implementation on other hardware bases.
  11. What happened to KSOS? • Designed to be a replacement

    for UNIX version 6 with: ◦ A security kernel ◦ Non-kernel security-related utility programs ◦ UNIX Application development and support environments (optional) • First full use of HDM (Hierarchical Development Methodology)
  12. What is PSOS ? • PSOS was designed as a

    useful general-purpose operating system with demonstrable security properties • PSOS was designed using a combo of disciplined engineering processes in order to provide a sound basis for claiming that the resulting system could meet its security requirements • The PSOS design was strongly motivated by the formal approach: ◦ The Hierarchical Development Methodology (HDM) • In PSOS, capabilities are the means by which all system objects are referenced and accessed • Each object in PSOS can be accessed only upon presentation of an appropriate capability to a module responsible for that object
  13. What happened to PSOS? • Provides a uniform means of

    accessing and protecting objects ◦ Simplifies the proof process, unifies the design and has a great impact • Led to the usage of extended-type objects using the hierarchical design ◦ Providing layers of abstraction and protection • Reduces the proof of larger programs to many smaller programs which simplifies the input and output of each program
  14. What is SCOMP ? • The idea for the Scomp

    system originated in a joint Honeywell-Air Force program called Project Guardian, which was an attempt to further enhance the security of Honeywell's Multics system. • The Honeywell Secure Communications Processor (SCOMP) was an early guard platform
  15. Goals of SCOMP • The SCOMP was designed to be

    simple, secure and efficient • The Scomp system is a unique implementation of a hardware/software general-purpose operating system based on the security kernel concept. • Scomp hardware supports a Multics-like, hardware-enforced ring mechanism, virtual memory, virtual I/O processing, page-fault recovery support, and performance mechanisms to aid in the implementation of an efficient operating system
  16. What happened to SCOMP? • An enhanced version of the

    Honeywell Level 6 minicomputer • First system to be ranked as a Class A1 in the Trusted Computer System Evaluation Criteria (TCSEC) ◦ Class A1- verified design under Division A- Verified protection
  17. It’s theoretical. Mathematical proofs don’t actually prove security. In fact,

    no system can be “provably secure” in the strongest sense, since we can’t be 100% certain that the system’s formal security requirements have been specified properly, and we can’t be 100% certain the security proof itself is without error.
  18. Minority Report doesn’t exist. Future vulnerabilities that the creator of

    the proof/OS are unaware of may not even exist. The operating system’s formal security requirements might fail to capture everything the attacker can do to break the system, and what information is available to the attacker. 1. Accidental Discovery 2. Deliberate Research
  19. Too Many Layers & Iterations The most secure OS is

    the one installed on a computer that has never been nor never will be connected to the internet and is in a secure locked room which is also a Faraday cage. It must comply with NATO SDIP-27 Level A standards.
  20. "The only secure computer is one that's unplugged, locked in

    a safe, and buried 20 feet under the ground in a secret location... and I'm not even too sure about that one." —Dennis Hughes, FBI
  21. Credits 1. http://csrc.nist.gov/publications/history/neum75.pdf 2. https://intelligence.org/2013/10/03/proofs/ 3. https://www.computer.org/csdl/proceedings/afips/1979/5087/00/50870345. pdf 4. https://www.quora.com/What-is-the-most-secure-computer-system-in-the-

    world 5. https://www.quora.com/What-is-the-most-secure-computer-operating-system 6. https://www.quora.com/Software-Quality-Assurance/How-do-people-find- loopholes-in-the-security-of-a-server-operating-system-networks-etc 7. https://www.wikiwand.com/en/Tempest_(codename)