Slide 1

Slide 1 text

Security Analysis of SFrame Takanori Isobe1,2,3, Ryoma Ito2, Kazuhiko Minematsu4 1 University of Hyogo, 2 NICT, 3 JST PRESTO, 4 NEC ESORICS 2021 October 7, 2021

Slide 2

Slide 2 text

Takanori Isobe, Ryoma Ito, Kazuhiko Minemastu ESORICS 2021, October 7, 2021. Security Analysis of SFrame Examples of messaging apps and video conference systems n Signal Protocol u adopted by WhatsApp, Facebook Messenger, Signal n SFrame (Secure Frame) u adopted by Google Duo, Cisco Webex, Jitsi Meet n Others u iMessage (Apple), LINE, Zoom End-to-End Encryption (E2EE) 2 A technology for a secure communication scheme n Only communicating parties can send and read the messages n Nobody except each communicating party, not even the service provider, has access to the encryption keys that are used to encrypt the messages n The Snowdenโ€™s revelation: even honest server may be compromised by a powerful intelligence organization, e.g., NSA Background

Slide 3

Slide 3 text

Takanori Isobe, Ryoma Ito, Kazuhiko Minemastu ESORICS 2021, October 7, 2021. Security Analysis of SFrame Examples of messaging apps and video conference systems n Signal Protocol u adopted by WhatsApp, Facebook Messenger, Signal n SFrame (Secure Frame) u adopted by Google Duo, Cisco Webex, Jitsi Meet n Others u iMessage (Apple), LINE, Zoom End-to-End Encryption (E2EE) 3 A technology for a secure communication scheme n Only communicating parties can send and read the messages n Nobody except each communicating party, not even the service provider, has access to the encryption keys that are used to encrypt the messages n The Snowdenโ€™s revelation: even honest server may be compromised by a powerful intelligence organization, e.g., NSA Background

Slide 4

Slide 4 text

Takanori Isobe, Ryoma Ito, Kazuhiko Minemastu ESORICS 2021, October 7, 2021. Security Analysis of SFrame SFrame 4 An E2EE mechanism for real-time communication traffic n proposed by a team of Google and CoSMo software n designed to suppress communication overheads by encrypting the entire media frame instead of per media packet n specified in the Internet draft u defines a cryptographic protocol (authenticated encryptions, hash functions, and signature algorithms), but not a key exchange protocol. u Our target: draft-omara-sframe-01* SFrame *Based on our security analysis, the SFrame designers updated the draft version to draft-omara-sframe-02.

Slide 5

Slide 5 text

Takanori Isobe, Ryoma Ito, Kazuhiko Minemastu ESORICS 2021, October 7, 2021. Security Analysis of SFrame SFrame 5 An E2EE mechanism for real-time communication traffic n proposed by a team of Google and CoSMo software n designed to suppress communication overheads by encrypting the entire media frame instead of per media packet n specified in the Internet draft u defines a cryptographic protocol (authenticated encryptions, hash functions, and signature algorithms), but not a key exchange protocol. u Our target: draft-omara-sframe-01* SFrame *Based on our security analysis, the SFrame designers updated the draft version to draft-omara-sframe-02.

Slide 6

Slide 6 text

Takanori Isobe, Ryoma Ito, Kazuhiko Minemastu ESORICS 2021, October 7, 2021. Security Analysis of SFrame Cryptographic Protocol 6 No. Name Key length Nonce length Tag length 1 AES_CM_128_HMAC_SHA256_8 16 bytes 12 bytes 8 bytes 2 AES_CM_128_HMAC_SHA256_4 16 bytes 12 bytes 4 bytes 3 AES_GCM_128_SHA256 16 bytes 12 bytes N/A 4 AES_GCM_256_SHA512 32 bytes 12 bytes N/A *CM: Counter Mode n An authenticated encryption with associated data (AEAD) u AES-GCM or AES-CM-HMAC (a generic composition of AES-CTR and HMAC) n A hash function u SHA256 or SHA512 n An optional signature algorithm u EdDSA over Ed25519 or ECDSA over P-521 u computed from a list of AEAD tags SFrame Ciphersuites

Slide 7

Slide 7 text

Takanori Isobe, Ryoma Ito, Kazuhiko Minemastu ESORICS 2021, October 7, 2021. Security Analysis of SFrame Cryptographic Protocol 7 No. Name Key length Nonce length Tag length 1 AES_CM_128_HMAC_SHA256_8 16 bytes 12 bytes 8 bytes 2 AES_CM_128_HMAC_SHA256_4 16 bytes 12 bytes 4 bytes 3 AES_GCM_128_SHA256 16 bytes 12 bytes N/A 4 AES_GCM_256_SHA512 32 bytes 12 bytes N/A *CM: Counter Mode n An authenticated encryption with associated data (AEAD) u AES-GCM or AES-CM-HMAC (a generic composition of AES-CTR and HMAC) n A hash function u SHA256 or SHA512 n An optional signature algorithm u EdDSA over Ed25519 or ECDSA over P-521 u computed from a list of AEAD tags SFrame Ciphersuites

Slide 8

Slide 8 text

Takanori Isobe, Ryoma Ito, Kazuhiko Minemastu ESORICS 2021, October 7, 2021. Security Analysis of SFrame Our Contributions 8 Security Analysis Result 1: Security of AEAD under SFrame n provably secure in the context of standard AEAD Result 2: Security of AES-CM-HMAC with short tags n an impersonation attack by a malicious group member n exploits a vulnerability of very short tag length Result 3: Security of AES-CM-HMAC with long tags n considered as the second-ciphertext unforgeability (SCU) secure AEAD Result 4: Security of AES-GCM with any long tags n an impersonation attack by a malicious group member n exploits a vulnerability of the linearity of GHASH in the known key setting Result 5: Security of AES-GCM with short tags n an authentication key recovery attack n exploits the fact that there is no restriction for the usage of GCM with short tags

Slide 9

Slide 9 text

Takanori Isobe, Ryoma Ito, Kazuhiko Minemastu ESORICS 2021, October 7, 2021. Security Analysis of SFrame Our Contributions 9 Security Analysis Result 1: Security of AEAD under SFrame n provably secure in the context of standard AEAD Result 2: Security of AES-CM-HMAC with short tags n an impersonation attack by a malicious group member n exploits a vulnerability of very short tag length Result 3: Security of AES-CM-HMAC with long tags n considered as the second-ciphertext unforgeability (SCU) secure AEAD Result 4: Security of AES-GCM with any long tags n an impersonation attack by a malicious group member n exploits a vulnerability of the linearity of GHASH in the known key setting Result 5: Security of AES-GCM with short tags n an authentication key recovery attack n exploits the fact that there is no restriction for the usage of GCM with short tags

Slide 10

Slide 10 text

Takanori Isobe, Ryoma Ito, Kazuhiko Minemastu ESORICS 2021, October 7, 2021. Security Analysis of SFrame Result 1: Security of AEAD under SFrame 10 Security Analysis Algorithm 2 AEAD encryption by AES-CM-HMAC Input: ๐‘€, aad, ๐พ! "#$, ๐พ% "#$, ๐‘ Output: ๐ถ, ๐‘‡ 1: procedure AEAD.Encryption(๐พ! "#$, ๐พ% "#$, ๐‘, aad, ๐‘€) 2: ๐ถ = AES-CTR.Encryption(๐พ! "#$, ๐‘, ๐‘€) 3: ๐‘‡ = Tag.Generation(๐พ% "#$, aad, ๐ถ) Tag.Generation(๐‘ฒ๐’‚ ๐‘ฒ๐‘ฐ๐‘ซ, ๐‘ต, ๐š๐š๐, ๐‘ช) 4: end procedure Secure under the standard assumptions n AES is a pseudorandom permutation n HMAC is a pseudorandom function AES-CM-HMAC n The lack of ๐‘ is not a problem since aad contains CTR as well as ๐‘ n Alg. 2 itself is not generally secure AEAD as it ignores ๐‘ in the tag generation

Slide 11

Slide 11 text

Takanori Isobe, Ryoma Ito, Kazuhiko Minemastu ESORICS 2021, October 7, 2021. Security Analysis of SFrame Result 1: Security of AEAD under SFrame 11 Security Analysis Algorithm 2 AEAD encryption by AES-CM-HMAC Input: ๐‘€, aad, ๐พ! "#$, ๐พ% "#$, ๐‘ Output: ๐ถ, ๐‘‡ 1: procedure AEAD.Encryption(๐พ! "#$, ๐พ% "#$, ๐‘, aad, ๐‘€) 2: ๐ถ = AES-CTR.Encryption(๐พ! "#$, ๐‘, ๐‘€) 3: ๐‘‡ = Tag.Generation(๐พ% "#$, aad, ๐ถ) Tag.Generation(๐‘ฒ๐’‚ ๐‘ฒ๐‘ฐ๐‘ซ, ๐‘ต, ๐š๐š๐, ๐‘ช) 4: end procedure Secure under the standard assumptions n AES is a pseudorandom permutation n HMAC is a pseudorandom function AES-CM-HMAC n The lack of ๐‘ is not a problem since aad contains CTR as well as ๐‘ n Alg. 2 itself is not generally secure AEAD as it ignores ๐‘ in the tag generation

Slide 12

Slide 12 text

Takanori Isobe, Ryoma Ito, Kazuhiko Minemastu ESORICS 2021, October 7, 2021. Security Analysis of SFrame Result 1: Security of AEAD under SFrame 12 Security Analysis Algorithm 2 AEAD encryption by AES-CM-HMAC Input: ๐‘€, aad, ๐พ! "#$, ๐พ% "#$, ๐‘ Output: ๐ถ, ๐‘‡ 1: procedure AEAD.Encryption(๐พ! "#$, ๐พ% "#$, ๐‘, aad, ๐‘€) 2: ๐ถ = AES-CTR.Encryption(๐พ! "#$, ๐‘, ๐‘€) 3: ๐‘‡ = Tag.Generation(๐พ% "#$, aad, ๐ถ) Tag.Generation(๐‘ฒ๐’‚ ๐‘ฒ๐‘ฐ๐‘ซ, ๐‘ต, ๐š๐š๐, ๐‘ช) 4: end procedure Secure under the standard assumptions n AES is a pseudorandom permutation n HMAC is a pseudorandom function AES-CM-HMAC n The lack of ๐‘ is not a problem since aad contains CTR as well as ๐‘ n Alg. 2 itself is not generally secure AEAD as it ignores ๐‘ in the tag generation

Slide 13

Slide 13 text

Takanori Isobe, Ryoma Ito, Kazuhiko Minemastu ESORICS 2021, October 7, 2021. Security Analysis of SFrame Result 2: Security of AES-CM-HMAC with Short Tags 13 An impersonation attack by a malicious group member n exploits a vulnerability of very short tag length n caused by the digital signature Sig computed only a list of AEAD tags Security Analysis Offline phase 1. chooses the encryption input tuple ๐‘, aad, ๐‘€ 2. computes a ciphertext ๐ถ and a ๐œ-bit tag ๐‘‡ for ๐‘, aad, ๐‘€ 3. stores a set of ๐‘€, ๐ถ, ๐‘‡ into the precomputation table 4. repeats Step 1-3 2* times with different messages Target member Other members Malicious member

Slide 14

Slide 14 text

Takanori Isobe, Ryoma Ito, Kazuhiko Minemastu ESORICS 2021, October 7, 2021. Security Analysis of SFrame Result 2: Security of AES-CM-HMAC with Short Tags 14 An impersonation attack by a malicious group member n exploits a vulnerability of very short tag length n caused by the digital signature Sig computed only a list of AEAD tags Security Analysis Offline phase 1. chooses the encryption input tuple ๐‘ต, ๐š๐š๐, ๐‘ด 2. computes a ciphertext ๐ถ and a ๐œ-bit tag ๐‘‡ for ๐‘, aad, ๐‘€ 3. stores a set of ๐‘€, ๐ถ, ๐‘‡ into the precomputation table 4. repeats Step 1-3 2* times with different messages Target member Other members Malicious member

Slide 15

Slide 15 text

Takanori Isobe, Ryoma Ito, Kazuhiko Minemastu ESORICS 2021, October 7, 2021. Security Analysis of SFrame Result 2: Security of AES-CM-HMAC with Short Tags 15 An impersonation attack by a malicious group member n exploits a vulnerability of very short tag length n caused by the digital signature Sig computed only a list of AEAD tags Security Analysis Offline phase 1. chooses the encryption input tuple ๐‘, aad, ๐‘€ 2. computes a ciphertext ๐‘ช and a ๐‰-bit tag ๐‘ป for ๐‘ต, ๐š๐š๐, ๐‘ด 3. stores a set of ๐‘€, ๐ถ, ๐‘‡ into the precomputation table 4. repeats Step 1-3 2* times with different messages Target member Other members Malicious member

Slide 16

Slide 16 text

Takanori Isobe, Ryoma Ito, Kazuhiko Minemastu ESORICS 2021, October 7, 2021. Security Analysis of SFrame Result 2: Security of AES-CM-HMAC with Short Tags 16 An impersonation attack by a malicious group member n exploits a vulnerability of very short tag length n caused by the digital signature Sig computed only a list of AEAD tags Security Analysis Offline phase 1. chooses the encryption input tuple ๐‘, aad, ๐‘€ 2. computes a ciphertext ๐ถ and a ๐œ-bit tag ๐‘‡ for ๐‘, aad, ๐‘€ 3. stores a set of ๐‘ด, ๐‘ช, ๐‘ป into the precomputation table 4. repeats Step 1-3 2* times with different messages Target member Other members Malicious member ๐ถ ๐‘‡ โ‹ฎ โ‹ฎ ๐ถโˆ— ๐‘‡โˆ— โ‹ฎ โ‹ฎ

Slide 17

Slide 17 text

Takanori Isobe, Ryoma Ito, Kazuhiko Minemastu ESORICS 2021, October 7, 2021. Security Analysis of SFrame Result 2: Security of AES-CM-HMAC with Short Tags 17 An impersonation attack by a malicious group member n exploits a vulnerability of very short tag length n caused by the digital signature Sig computed only a list of AEAD tags Security Analysis Offline phase 1. chooses the encryption input tuple ๐‘, aad, ๐‘€ 2. computes a ciphertext ๐ถ and a ๐œ-bit tag ๐‘‡ for ๐‘, aad, ๐‘€ 3. stores a set of ๐‘€, ๐ถ, ๐‘‡ into the precomputation table 4. repeats Step 1-3 ๐Ÿ๐‰ times with different messages Target member Other members Malicious member ๐ถ ๐‘‡ โ‹ฎ โ‹ฎ ๐ถโˆ— ๐‘‡โˆ— โ‹ฎ โ‹ฎ

Slide 18

Slide 18 text

Takanori Isobe, Ryoma Ito, Kazuhiko Minemastu ESORICS 2021, October 7, 2021. Security Analysis of SFrame Result 2: Security of AES-CM-HMAC with Short Tags 18 Target member An impersonation attack by a malicious group member n exploits a vulnerability of very short tag length n caused by the digital signature Sig computed only a list of AEAD tags ๐‘, aad, ๐‘ช!, ๐‘ป!, Sig Security Analysis Other members Malicious member Online phase 1. intercepts a target frame ๐‘ต, ๐š๐š๐, ๐‘ช,, ๐‘ป,, ๐’๐ข๐  sent by the target member 2. searches a tuple ๐‘€โˆ—, ๐ถโˆ—, ๐‘‡โˆ— in the table such that ๐‘‡โˆ— = ๐‘‡, and ๐ถโˆ— โ‰  ๐ถ, 3. finds such a tuple, replaces ๐ถ, with ๐ถโˆ— in the target frame, and sends ๐‘, aad, ๐ถโˆ—, ๐‘‡โ€ฒ, Sig to other group members ๐ถ ๐‘‡ โ‹ฎ โ‹ฎ ๐ถโˆ— ๐‘‡โˆ— โ‹ฎ โ‹ฎ

Slide 19

Slide 19 text

Takanori Isobe, Ryoma Ito, Kazuhiko Minemastu ESORICS 2021, October 7, 2021. Security Analysis of SFrame Result 2: Security of AES-CM-HMAC with Short Tags 19 Target member An impersonation attack by a malicious group member n exploits a vulnerability of very short tag length n caused by the digital signature Sig computed only a list of AEAD tags ๐‘, aad, ๐‘ช!, ๐‘ป!, Sig ๐ถ ๐‘‡ โ‹ฎ โ‹ฎ ๐‘ชโˆ— ๐‘ปโˆ— โ‹ฎ โ‹ฎ = ๐‘ปโ€ฒ Security Analysis Other members Malicious member Online phase 1. intercepts a target frame ๐‘, aad, ๐ถ,, ๐‘‡,, Sig sent by the target member 2. searches a tuple ๐‘ดโˆ—, ๐‘ชโˆ—, ๐‘ปโˆ— in the table such that ๐‘ปโˆ— = ๐‘ป, and ๐‘ชโˆ— โ‰  ๐‘ช, 3. finds such a tuple, replaces ๐ถ, with ๐ถโˆ— in the target frame, and sends ๐‘, aad, ๐ถโˆ—, ๐‘‡โ€ฒ, Sig to other group members

Slide 20

Slide 20 text

Takanori Isobe, Ryoma Ito, Kazuhiko Minemastu ESORICS 2021, October 7, 2021. Security Analysis of SFrame Result 2: Security of AES-CM-HMAC with Short Tags 20 Target member An impersonation attack by a malicious group member n exploits a vulnerability of very short tag length n caused by the digital signature Sig computed only a list of AEAD tags ๐‘, aad, ๐‘ช!, ๐‘ป!, Sig ๐‘, aad, ๐‘ชโˆ—, ๐‘ปโ€ฒ, Sig ๐ถ ๐‘‡ โ‹ฎ โ‹ฎ ๐ถโˆ— ๐‘‡โˆ— โ‹ฎ โ‹ฎ = ๐‘ปโ€ฒ Security Analysis Other members Malicious member Online phase 1. intercepts a target frame ๐‘, aad, ๐ถ,, ๐‘‡,, Sig sent by the target member 2. searches a tuple ๐‘€โˆ—, ๐ถโˆ—, ๐‘‡โˆ— in the table such that ๐‘‡โˆ— = ๐‘‡, and ๐ถโˆ— โ‰  ๐ถ, 3. finds such a tuple, replaces ๐‘ช, with ๐‘ชโˆ— in the target frame, and sends ๐‘ต, ๐š๐š๐, ๐‘ชโˆ—, ๐‘ปโ€ฒ, ๐’๐ข๐  to other group members

Slide 21

Slide 21 text

Takanori Isobe, Ryoma Ito, Kazuhiko Minemastu ESORICS 2021, October 7, 2021. Security Analysis of SFrame Result 2: Security of AES-CM-HMAC with Short Tags 21 Target member An impersonation attack by a malicious group member n exploits a vulnerability of very short tag length n caused by the digital signature Sig computed only a list of AEAD tags ๐‘, aad, ๐‘ช!, ๐‘ป!, Sig ๐‘, aad, ๐‘ชโˆ—, ๐‘ปโ€ฒ, Sig ๐ถ ๐‘‡ โ‹ฎ โ‹ฎ ๐ถโˆ— ๐‘‡โˆ— โ‹ฎ โ‹ฎ = ๐‘ปโ€ฒ Security Analysis Other members Malicious member Online phase 1. intercepts a target frame ๐‘, aad, ๐ถ,, ๐‘‡,, Sig sent by the target member 2. searches a tuple ๐‘€โˆ—, ๐ถโˆ—, ๐‘‡โˆ— in the table such that ๐‘‡โˆ— = ๐‘‡, and ๐ถโˆ— โ‰  ๐ถ, 3. finds such a tuple, replaces ๐ถ, with ๐ถโˆ— in the target frame, and sends ๐‘, ๐‘Ž๐‘Ž๐‘‘, ๐ถโˆ—, ๐‘‡โ€ฒ, Sig to other group members When the tag length is 4 bytes, if the adversary prepares 232 tuples in the table, the success probability is almost one.

Slide 22

Slide 22 text

Takanori Isobe, Ryoma Ito, Kazuhiko Minemastu ESORICS 2021, October 7, 2021. Security Analysis of SFrame Result 3: Security of AES-CM-HMAC with Long Tags 22 Security Analysis Theorem 1. Let ๐’œ be a SCU adversary against AES-CM-HMAC with the target encryption output being at most โ„“ bits. Then, SCU advantage of ๐’œ against AES-CM-HMAC is bounded as ๐€๐๐ฏ๐€๐„๐’.๐‚๐Œ.๐‡๐Œ๐€๐‚ ๐’๐‚๐” ๐“ < ๐Ÿ๐€๐๐ฏ ๐‘ฏ ๐ž๐’๐ž๐œ 6 โ„“! ๐“8 for some eSec adversary ๐’œ8 against ๐ป, which denotes the underlying SHA256 hash function, where โ„“8 = โ„“+512 (i.e., one block larger). SCU security [DGRW18] n security notion for an unforgeability goal in the known key setting Second-ciphertext Unforgeability (SCU) Secure AEAD [DGRW18] Y. Dodis et al. Fast Message Franking: From Invisible salamanders to encryptment. In CRYPTO 2018. [RS04] P. Rogaway and T. Shrimpton. Cryptographic Hash Function Basics. In FSE 2004. Everywhere Second-Preimage (eSec) Resistance [RS04] n a slight extension of a strong form of second-preimage resistance

Slide 23

Slide 23 text

Takanori Isobe, Ryoma Ito, Kazuhiko Minemastu ESORICS 2021, October 7, 2021. Security Analysis of SFrame Result 4: Security of AES-GCM with Any Long Tags 23 Security Analysis An impersonation attack by a malicious group member n exploits a vulnerability of the linearity of GHASH in the known key setting n caused by the digital signature computed only (a list of) AEAD tags Example of GCM encryption n 2-block ciphertext C = (C1 , C2 ) and 1-block aad = aad1 ๐‘ป = GHASH ๐ฟ, aad โˆฅ ๐ถ โˆฅ Len aad, ๐ถ โŠ• ๐ธ" ๐‘ โˆฅ 1 = ๐š๐š๐๐Ÿ J ๐‘ณ๐Ÿ’ โŠ• ๐‘ช๐Ÿ J ๐‘ณ๐Ÿ‘ โŠ• ๐‘ช๐Ÿ J ๐‘ณ๐Ÿ โŠ• ๐‹๐ž๐ง ๐š๐š๐๐Ÿ, ๐‘ช J ๐‘ณ โŠ• ๐‘ฌ๐‘ฒ ๐‘ต โˆฅ ๐Ÿ ๐ถ2 = ๐ธ" ๐‘ โˆฅ ๐‘– + 1 โŠ• ๐‘€2 *Authentication key: ๐ฟ = ๐ธ" 0345 ๐‘ช๐Ÿ , J ๐‘ณ๐Ÿ = ๐‘ป โŠ• ๐š๐š๐๐Ÿ , J ๐‘ณ๐Ÿ’ โŠ• ๐‘ช๐Ÿ , J ๐‘ณ๐Ÿ‘ โŠ• ๐‹๐ž๐ง ๐š๐š๐๐Ÿ , , ๐‘ช, J ๐‘ณ โŠ• ๐‘ฌ๐‘ฒ ๐‘ต, โˆฅ ๐Ÿ Attack procedure 1. arbitrary chooses ๐‘ต,, ๐š๐š๐๐Ÿ , , and the fake message block ๐‘ด๐Ÿ , to compute ๐‘ช๐Ÿ , 2. sets the final ciphertext block ๐‘ช๐Ÿ , so that the following equation holds

Slide 24

Slide 24 text

Takanori Isobe, Ryoma Ito, Kazuhiko Minemastu ESORICS 2021, October 7, 2021. Security Analysis of SFrame Result 4: Security of AES-GCM with Any Long Tags 24 Security Analysis An impersonation attack by a malicious group member n exploits a vulnerability of the linearity of GHASH in the known key setting n caused by the digital signature computed only (a list of) AEAD tags Example of GCM encryption n 2-block ciphertext C = (C1 , C2 ) and 1-block aad = aad1 ๐‘ป = GHASH ๐ฟ, aad โˆฅ ๐ถ โˆฅ Len aad, ๐ถ โŠ• ๐ธ" ๐‘ โˆฅ 1 = ๐š๐š๐๐Ÿ J ๐‘ณ๐Ÿ’ โŠ• ๐‘ช๐Ÿ J ๐‘ณ๐Ÿ‘ โŠ• ๐‘ช๐Ÿ J ๐‘ณ๐Ÿ โŠ• ๐‹๐ž๐ง ๐š๐š๐๐Ÿ, ๐‘ช J ๐‘ณ โŠ• ๐‘ฌ๐‘ฒ ๐‘ต โˆฅ ๐Ÿ ๐ถ2 = ๐ธ" ๐‘ โˆฅ ๐‘– + 1 โŠ• ๐‘€2 *Authentication key: ๐ฟ = ๐ธ" 0345 ๐‘ช๐Ÿ , J ๐‘ณ๐Ÿ = ๐‘ป โŠ• ๐š๐š๐๐Ÿ , J ๐‘ณ๐Ÿ’ โŠ• ๐‘ช๐Ÿ , J ๐‘ณ๐Ÿ‘ โŠ• ๐‹๐ž๐ง ๐š๐š๐๐Ÿ , , ๐‘ช, J ๐‘ณ โŠ• ๐‘ฌ๐‘ฒ ๐‘ต, โˆฅ ๐Ÿ Attack procedure 1. arbitrary chooses ๐‘ต,, ๐š๐š๐๐Ÿ , , and the fake message block ๐‘ด๐Ÿ , to compute ๐‘ช๐Ÿ , 2. sets the final ciphertext block ๐‘ช๐Ÿ , so that the following equation holds

Slide 25

Slide 25 text

Takanori Isobe, Ryoma Ito, Kazuhiko Minemastu ESORICS 2021, October 7, 2021. Security Analysis of SFrame Result 4: Security of AES-GCM with Any Long Tags 25 Security Analysis An impersonation attack by a malicious group member n exploits a vulnerability of the linearity of GHASH in the known key setting n caused by the digital signature computed only (a list of) AEAD tags Example of GCM encryption n 2-block ciphertext C = (C1 , C2 ) and 1-block aad = aad1 ๐‘ป = GHASH ๐ฟ, aad โˆฅ ๐ถ โˆฅ Len aad, ๐ถ โŠ• ๐ธ" ๐‘ โˆฅ 1 = ๐š๐š๐๐Ÿ J ๐‘ณ๐Ÿ’ โŠ• ๐‘ช๐Ÿ J ๐‘ณ๐Ÿ‘ โŠ• ๐‘ช๐Ÿ J ๐‘ณ๐Ÿ โŠ• ๐‹๐ž๐ง ๐š๐š๐๐Ÿ, ๐‘ช J ๐‘ณ โŠ• ๐‘ฌ๐‘ฒ ๐‘ต โˆฅ ๐Ÿ ๐ถ2 = ๐ธ" ๐‘ โˆฅ ๐‘– + 1 โŠ• ๐‘€2 *Authentication key: ๐ฟ = ๐ธ" 0345 ๐‘ช๐Ÿ , J ๐‘ณ๐Ÿ = ๐‘ป โŠ• ๐š๐š๐๐Ÿ , J ๐‘ณ๐Ÿ’ โŠ• ๐‘ช๐Ÿ , J ๐‘ณ๐Ÿ‘ โŠ• ๐‹๐ž๐ง ๐š๐š๐๐Ÿ , , ๐‘ช, J ๐‘ณ โŠ• ๐‘ฌ๐‘ฒ ๐‘ต, โˆฅ ๐Ÿ Attack procedure 1. arbitrary chooses ๐‘ต,, ๐š๐š๐๐Ÿ , , and the fake message block ๐‘ด๐Ÿ , to compute ๐‘ช๐Ÿ , 2. sets the final ciphertext block ๐‘ช๐Ÿ , so that the following equation holds

Slide 26

Slide 26 text

Takanori Isobe, Ryoma Ito, Kazuhiko Minemastu ESORICS 2021, October 7, 2021. Security Analysis of SFrame Result 4: Security of AES-GCM with Any Long Tags 26 Security Analysis An impersonation attack by a malicious group member n exploits a vulnerability of the linearity of GHASH in the known key setting n caused by the digital signature computed only (a list of) AEAD tags Example of GCM encryption n 2-block ciphertext C = (C1 , C2 ) and 1-block aad = aad1 ๐‘ป = GHASH ๐ฟ, aad โˆฅ ๐ถ โˆฅ Len aad, ๐ถ โŠ• ๐ธ" ๐‘ โˆฅ 1 = ๐š๐š๐๐Ÿ J ๐‘ณ๐Ÿ’ โŠ• ๐‘ช๐Ÿ J ๐‘ณ๐Ÿ‘ โŠ• ๐‘ช๐Ÿ J ๐‘ณ๐Ÿ โŠ• ๐‹๐ž๐ง ๐š๐š๐๐Ÿ, ๐‘ช J ๐‘ณ โŠ• ๐‘ฌ๐‘ฒ ๐‘ต โˆฅ ๐Ÿ ๐ถ2 = ๐ธ" ๐‘ โˆฅ ๐‘– + 1 โŠ• ๐‘€2 *Authentication key: ๐ฟ = ๐ธ" 0345 ๐‘ช๐Ÿ , J ๐‘ณ๐Ÿ = ๐‘ป โŠ• ๐š๐š๐๐Ÿ , J ๐‘ณ๐Ÿ’ โŠ• ๐‘ช๐Ÿ , J ๐‘ณ๐Ÿ‘ โŠ• ๐‹๐ž๐ง ๐š๐š๐๐Ÿ , , ๐‘ช, J ๐‘ณ โŠ• ๐‘ฌ๐‘ฒ ๐‘ต, โˆฅ ๐Ÿ Attack procedure 1. arbitrary chooses ๐‘ต,, ๐š๐š๐๐Ÿ , , and the fake message block ๐‘ด๐Ÿ , to compute ๐‘ช๐Ÿ , 2. sets the final ciphertext block ๐‘ช๐Ÿ , so that the following equation holds

Slide 27

Slide 27 text

Takanori Isobe, Ryoma Ito, Kazuhiko Minemastu ESORICS 2021, October 7, 2021. Security Analysis of SFrame Result 5: Security of AES-GCM with Short Tags 27 t 32 64 L q 21 222 22 220 23 218 24 215 25 213 26 211 211 232 213 229 215 226 217 223 219 220 221 217 c 262 262 261 265 266 267 275 274 273 272 271 270 [MW16] J. Mattson et al. Authentication key recovery on galois/counter mode (GCM). In AFRICACRYPT 2016. l t๏ผštag length (bits) l L๏ผšmaximum combined length of aad and C l q๏ผšmaximum number of invocations of the authentication decryption function l c๏ผšdata complexity for the authentication key recovery under each restriction of (L, q) Security Analysis An authentication key recovery attack n exploits the fact that there is no restriction for the usage of GCM with short tags NIST requirements for the use of GCM with short tags [MW16] The specification does not mention the restrictions of (L, q) n The attack is practically feasible with a data complexity of 26 (e.g., 4-byte tag).

Slide 28

Slide 28 text

Takanori Isobe, Ryoma Ito, Kazuhiko Minemastu ESORICS 2021, October 7, 2021. Security Analysis of SFrame Summary 28 Conclusion SFrame is not E2EE-secure when using the following ciphersuites n AES-CM-HMAC with short tags, especially 4-byte tag n AES-GCM with any long tags SFrame is E2EE-secure when using AES-CM-HMAC with long tags n The SCU security of it depends on the security of underlying hash function Communication with the SFrame designers n They acknowledged our findings and quickly revised its specification u remove the signature mechanism u extend tag calculation to cover nonces n draft-omara-sframe-01 โ†’ draft-omara-sframe-02 (current version)

Slide 29

Slide 29 text

Takanori Isobe, Ryoma Ito, Kazuhiko Minemastu ESORICS 2021, October 7, 2021. Security Analysis of SFrame Summary 29 Conclusion SFrame is not E2EE-secure when using the following ciphersuites n AES-CM-HMAC with short tags, especially 4-byte tag n AES-GCM with any long tags SFrame is E2EE-secure when using AES-CM-HMAC with long tags n The SCU security of it depends on the security of underlying hash function Communication with the SFrame designers n They acknowledged our findings and quickly revised its specification u remove the signature mechanism u extend tag calculation to cover nonces n draft-omara-sframe-01 โ†’ draft-omara-sframe-02 (current version) Thank you!

Slide 30

Slide 30 text

Takanori Isobe, Ryoma Ito, Kazuhiko Minemastu ESORICS 2021, October 7, 2021. Security Analysis of SFrame Recommendations 30 Appendix From the vulnerabilities shown in Results 2-5, we recommend the followings: 1. For AES-CM-HMAC, short tags, especially 4-byte tag, should not be used 2. For AES-GCM, a signature should be computed over a whole frame, not only tags 3. For AES-GCM, the specification should be clearly forbit short tags, or refer to the NIST requirements on the usage of GCM with short tags 4. Switch to other ciphersuite that works as a secure encryptment scheme, such as HFC [DGRW18], with a sufficiently long tag is another option [DGRW18] Dodis et al. Fast message franking: From invisible salamanders to encryptment. In CRYPTO 2018

Slide 31

Slide 31 text

Takanori Isobe, Ryoma Ito, Kazuhiko Minemastu ESORICS 2021, October 7, 2021. Security Analysis of SFrame Theorem 1: Security of AES-CM-HMAC with Long Tags 31 Theorem 1. Let ๐’œ be a SCU adversary against AES-CM-HMAC with the target encryption output being at most โ„“ bits. Then, SCU advantage of ๐’œ against AES-CM-HMAC is bounded as ๐€๐๐ฏ๐€๐„๐’.๐‚๐Œ.๐‡๐Œ๐€๐‚ ๐’๐‚๐” ๐“ < ๐Ÿ๐€๐๐ฏ ๐‘ฏ ๐ž๐’๐ž๐œ 6 โ„“! ๐“8 for some eSec adversary ๐’œ8 against ๐ป, which denotes the underlying SHA256 hash function, where โ„“8 = โ„“+512 (i.e., one block larger). SCU security [DGRW18] n security notion for an unforgeability goal in the known key setting Second-ciphertext Unforgeability (SCU) Secure AEAD [DGRW18] Y. Dodis et al. Fast Message Franking: From Invisible salamanders to encryptment. In CRYPTO 2018. [RS04] P. Rogaway and T. Shrimpton. Cryptographic Hash Function Basics. In FSE 2004. Everywhere Second-Preimage (eSec) Resistance [RS04] n a slight extension of a strong form of second-preimage resistance Appendix

Slide 32

Slide 32 text

Takanori Isobe, Ryoma Ito, Kazuhiko Minemastu ESORICS 2021, October 7, 2021. Security Analysis of SFrame Proof Sketch of Theorem 1 32 ๐‘“ ๐‘“ ๐‘“ โ‹ฏ ๐พ โŠ• ๐‘–๐‘๐‘Ž๐‘‘ IV ๐‘ซ๐ŸŽ ๐‘ซ๐’$๐Ÿ ๐‘ป ๐‘“ ๐‘“ ๐พ โŠ• ๐‘œ๐‘๐‘Ž๐‘‘ IV ๐‘บ ๐‘“ ๐‘“ ๐‘“ โ‹ฏ ๐พ โŠ• ๐‘–๐‘๐‘Ž๐‘‘ IV ๐‘ซ๐ŸŽ โˆ— ๐‘ซ๐’$๐Ÿ โˆ— ๐‘ปโˆ— ๐‘“ ๐‘“ ๐พ โŠ• ๐‘œ๐‘๐‘Ž๐‘‘ IV ๐‘บโˆ— ๐ท = aad๐ฟ๐‘’๐‘› โˆฅ aad โˆฅ ๐ถ Appendix ๐ทโˆ— = aad๐ฟ๐‘’๐‘› โˆฅ aad โˆฅ ๐ถโˆ—

Slide 33

Slide 33 text

Takanori Isobe, Ryoma Ito, Kazuhiko Minemastu ESORICS 2021, October 7, 2021. Security Analysis of SFrame Proof Sketch of Theorem 1 33 ๐‘“ ๐‘“ ๐‘“ โ‹ฏ ๐พ โŠ• ๐‘–๐‘๐‘Ž๐‘‘ IV ๐‘ซ๐ŸŽ ๐‘ซ๐’$๐Ÿ ๐‘ป ๐‘“ ๐‘“ ๐พ โŠ• ๐‘œ๐‘๐‘Ž๐‘‘ IV ๐‘บ ๐‘“ ๐‘“ ๐‘“ โ‹ฏ ๐พ โŠ• ๐‘–๐‘๐‘Ž๐‘‘ IV ๐‘ซ๐ŸŽ โˆ— ๐‘ซ๐’$๐Ÿ โˆ— ๐‘ปโˆ— ๐‘“ ๐‘“ ๐พ โŠ• ๐‘œ๐‘๐‘Ž๐‘‘ IV ๐‘บโˆ— ๐‘บ = ๐‘บโˆ— ? Case 1: ๐’œ finds ๐‘† = ๐‘†โˆ— Appendix

Slide 34

Slide 34 text

Takanori Isobe, Ryoma Ito, Kazuhiko Minemastu ESORICS 2021, October 7, 2021. Security Analysis of SFrame Proof Sketch of Theorem 1 34 ๐‘ป = ๐‘ปโˆ— ? ๐‘“ ๐‘“ ๐‘“ โ‹ฏ ๐พ โŠ• ๐‘–๐‘๐‘Ž๐‘‘ IV ๐‘ซ๐ŸŽ ๐‘ซ๐’$๐Ÿ ๐‘ป ๐‘“ ๐‘“ ๐พ โŠ• ๐‘œ๐‘๐‘Ž๐‘‘ IV ๐‘บ ๐‘“ ๐‘“ ๐‘“ โ‹ฏ ๐พ โŠ• ๐‘–๐‘๐‘Ž๐‘‘ IV ๐‘ซ๐ŸŽ โˆ— ๐‘ซ๐’$๐Ÿ โˆ— ๐‘ปโˆ— ๐‘“ ๐‘“ ๐พ โŠ• ๐‘œ๐‘๐‘Ž๐‘‘ IV ๐‘บโˆ— ๐‘บ โ‰  ๐‘บโˆ— Case 2: ๐’œ finds ๐‘† โ‰  ๐‘†โˆ— and ๐‘‡ = ๐‘‡โˆ— Appendix

Slide 35

Slide 35 text

Takanori Isobe, Ryoma Ito, Kazuhiko Minemastu ESORICS 2021, October 7, 2021. Security Analysis of SFrame Proof Sketch of Theorem 1 35 ๐‘ป = ๐‘ปโˆ— ? ๐‘“ ๐‘“ ๐‘“ โ‹ฏ ๐พ โŠ• ๐‘–๐‘๐‘Ž๐‘‘ IV ๐‘ซ๐ŸŽ ๐‘ซ๐’$๐Ÿ ๐‘ป ๐‘“ ๐‘“ ๐พ โŠ• ๐‘œ๐‘๐‘Ž๐‘‘ IV ๐‘บ ๐‘“ ๐‘“ ๐‘“ โ‹ฏ ๐พ โŠ• ๐‘–๐‘๐‘Ž๐‘‘ IV ๐‘ซ๐ŸŽ โˆ— ๐‘ซ๐’$๐Ÿ โˆ— ๐‘ปโˆ— ๐‘“ ๐‘“ ๐พ โŠ• ๐‘œ๐‘๐‘Ž๐‘‘ IV ๐‘บโˆ— ๐‘บ = ๐‘บโˆ— ? Case 1: ๐’œ finds ๐‘† = ๐‘†โˆ— Case 2: ๐’œ finds ๐‘† โ‰  ๐‘†โˆ— and ๐‘‡ = ๐‘‡โˆ— Appendix ๐€๐๐ฏ๐€๐„๐’$๐‚๐Œ$๐‡๐Œ๐€๐‚ ๐’๐‚๐” ๐“ โ‰ค ๐€๐๐ฏ ๐‘ฏ ๐ž๐’๐ž๐œ 0 โ„“! ๐“2 + ๐€๐๐ฏ๐‘ฏ ๐ž๐’๐ž๐œ 0๐Ÿ๐ŸŽ๐Ÿ๐Ÿ’ ๐“2 ๐€๐๐ฏ๐€๐„๐’$๐‚๐Œ$๐‡๐Œ๐€๐‚ ๐’๐‚๐” ๐“ < ๐Ÿ๐€๐๐ฏ ๐‘ฏ ๐ž๐’๐ž๐œ 0 โ„“! ๐“2 โ‘  โ‘ก