(Post-Quantum Forward Secure Onion Routing)Aniket Kate . The HybridOR Protocol: Security . Type-I...

40
Future Anonymity in Today’s Budget (Post-Quantum Forward Secure Onion Routing) Aniket Kate MMCI, Saarland University Germany Joint work with Satrajit Ghosh Appearing at ACNS 2015

Transcript of (Post-Quantum Forward Secure Onion Routing)Aniket Kate . The HybridOR Protocol: Security . Type-I...

Page 1: (Post-Quantum Forward Secure Onion Routing)Aniket Kate . The HybridOR Protocol: Security . Type-I adversary (Channel Secrecy) - The adversary cannot know a secret associated any public

Future Anonymity in Todayrsquos Budget (Post-Quantum Forward Secure Onion Routing)

Aniket Kate

MMCI Saarland University Germany

Joint work with Satrajit Ghosh

Appearing at ACNS 2015

Outline

Anonymity over the Internet and Tor

One-Way Authenticated Key Exchange (1W-AKE)

Towards a post-quantum forward secure 1W-AKE

Our HybridOR Protocol

Security and Performance Analyes

Future Anonymity in Todayrsquos Budget Aniket Kate 2

Anonymity

Ability to remain unnoticed or unidentified

Source httpweskenneynetp=232

Future Anonymity in Todayrsquos Budget Aniket Kate 3

Single Hop Circuits Anonymizercom

Drawbacks Traffic Analysis Trust on Anonymizercom

Anonymous Communication

Future Anonymity in Todayrsquos Budget Aniket Kate 4

Anonymous Communication

Single Hop Circuits Anonymizercom

Drawbacks Traffic Analysis Trust on Anonymizercom

Future Anonymity in Todayrsquos Budget Aniket Kate 4

Goal Making the attacker goal of linking multiplecommunication flows from a single user difficult

Onion Routing

Future Anonymity in Todayrsquos Budget Aniket Kate 5

Goal Making the attacker goal of linking multiplecommunication flows from a single user difficult

Onion Routing

Future Anonymity in Todayrsquos Budget Aniket Kate 5

Goal Making the attacker goal of linking multiplecommunication flows from a single user difficult

Onion Routing

Future Anonymity in Todayrsquos Budget Aniket Kate 5

Goal Making the attacker goal of linking multiplecommunication flows from a single user difficult

Onion Routing

Future Anonymity in Todayrsquos Budget Aniket Kate 5

Onion Routing

Goal Making the attacker goal of linking multiple communication flows from a single user difficult

Future Anonymity in Todayrsquos Budget Aniket Kate 5

Onion Routing Circuit Construction How Keys are Shared

This asks for one-way anonymous one-way authenticated key exchange (1W-AKE) which require a public-key infrastructure (PKI)

Future Anonymity in Todayrsquos Budget Aniket Kate 6

Protocol Correctness

1W-AKE SecurityAn attacker cannot learn anything about the session key of achallenge session even if it

compromises several other sessions and

introduces fake identities

compromise exactly one of two secrets from the node in thechallenge session

1W-AnonymityA node should not differentiate while communicating with two differentclients

1W-AKE Security [Goldberg Stebila and Ustaoglu DCC rsquo12]

Future Anonymity in Todayrsquos Budget Aniket Kate 7

1W-AKE Security [Goldberg Stebila and Ustaoglu DCC rsquo12]

Protocol Correctness

1W-AKE Security An attacker cannot learn anything about the session key of a challenge session even if it

compromises several other sessions and

introduces fake identities

compromise exactly one of two secrets from the node in the challenge session

1W-Anonymity A node should not differentiate while communicating with two different clients

Future Anonymity in Todayrsquos Budget Aniket Kate 7

SecondThird Generation Onion Routing Tor

Multi-Pass Construction (Telescoping Approach)

Future Anonymity in Todayrsquos Budget Aniket Kate 8

SecondThird Generation Onion Routing Tor

Multi-Pass Construction (Telescoping Approach)

Future Anonymity in Todayrsquos Budget Aniket Kate 8

SecondThird Generation Onion Routing Tor

Multi-Pass Construction (Telescoping Approach)

Future Anonymity in Todayrsquos Budget Aniket Kate 8

SecondThird Generation Onion Routing Tor

Multi-Pass Construction (Telescoping Approach)

Future Anonymity in Todayrsquos Budget Aniket Kate 8

SecondThird Generation Onion Routing Tor

Multi-Pass Construction (Telescoping Approach)

Future Anonymity in Todayrsquos Budget Aniket Kate 8

SecondThird Generation Onion Routing Tor

Multi-Pass Construction (Telescoping Approach)

Future Anonymity in Todayrsquos Budget Aniket Kate 8

SecondThird Generation Onion Routing Tor

Multi-Pass Construction (Telescoping Approach)

Future Anonymity in Todayrsquos Budget Aniket Kate 8

SecondThird Generation Onion Routing Tor

Multi-Pass Construction (Telescoping Approach)

Future Anonymity in Todayrsquos Budget Aniket Kate 8

The ntor 1W-AKE Protocol [Goldberg Stebila and Ustaoglu DCC rsquo12]

Let G be a multiplicative group with large prime order p Let g isin G be the generator of the group

Client Server (no public key) (long-term keys (b gb))

x g x larrR Zlowast minusminusminusminusminusminusminusminusminusminusrarr y larrR Zlowast

p p yg

larrminusminusminusminusminusminusminusminusminusminus H((gy )x (gb)x) H((gx)y (gx)b) =

yx bx) xy xb)= H(g g H(g g

xy(established session key H(g gxb))

Future Anonymity in Todayrsquos Budget Aniket Kate 9

The GDH ProblemLet G be a multiplicative group with large prime order p andg isin G be the generator of the group

Given a triple (g ga gb) for a b isinr Zlowastp the GDH problem is to find

the element gab with the help of a Decision Diffie-Hellman (DDH)oracle

The DDH oracle takes input as (G g ga gb z) for some z isin Gand tells whether z = gab

The ntor 1W-AKE Protocol Security

The 1W-AKE security of the ntor protocol is proven against the gap Diffie-Hellman (GDH) assumption

Future Anonymity in Todayrsquos Budget Aniket Kate 10

The ntor 1W-AKE Protocol Security

The 1W-AKE security of the ntor protocol is proven against the gap Diffie-Hellman (GDH) assumption

The GDH Problem Let G be a multiplicative group with large prime order p and g isin G be the generator of the group

aGiven a triple (g g gb) for a b isinr Zlowast the GDH problem is to find p

the element gab with the help of a Decision Diffie-Hellman (DDH) oracle

bThe DDH oracle takes input as (G g ga g z) for some z isin G aband tells whether z = g

Future Anonymity in Todayrsquos Budget Aniket Kate 10

So what

Security and anonymity of even todayrsquos onion routingcommunications can be violated

The Tor community

will be hesitant to completely changing the public keyinfrastructure (PKI)questions the performance penalty

ChallengeDesign a 1W-AKE scheme that offers forward security in thepost-quantum world without significantly affecting the currentinfrastructure and performance

When the Quantum computer arrives

This 1W-AKE scheme will no longer be secure

Future Anonymity in Todayrsquos Budget Aniket Kate 11

Security and anonymity of even todayrsquos onion routingcommunications can be violated

The Tor community

will be hesitant to completely changing the public keyinfrastructure (PKI)questions the performance penalty

ChallengeDesign a 1W-AKE scheme that offers forward security in thepost-quantum world without significantly affecting the currentinfrastructure and performance

When the Quantum computer arrives

This 1W-AKE scheme will no longer be secure

So what

Future Anonymity in Todayrsquos Budget Aniket Kate 11

The Tor community

will be hesitant to completely changing the public keyinfrastructure (PKI)questions the performance penalty

ChallengeDesign a 1W-AKE scheme that offers forward security in thepost-quantum world without significantly affecting the currentinfrastructure and performance

When the Quantum computer arrives

This 1W-AKE scheme will no longer be secure

So what

Security and anonymity of even todayrsquos onion routing communications can be violated

Future Anonymity in Todayrsquos Budget Aniket Kate 11

ChallengeDesign a 1W-AKE scheme that offers forward security in thepost-quantum world without significantly affecting the currentinfrastructure and performance

When the Quantum computer arrives

This 1W-AKE scheme will no longer be secure

So what

Security and anonymity of even todayrsquos onion routing communications can be violated

The Tor community

will be hesitant to completely changing the public key infrastructure (PKI) questions the performance penalty

Future Anonymity in Todayrsquos Budget Aniket Kate 11

When the Quantum computer arrives

This 1W-AKE scheme will no longer be secure

So what

Security and anonymity of even todayrsquos onion routing communications can be violated

The Tor community

will be hesitant to completely changing the public key infrastructure (PKI) questions the performance penalty

Challenge Design a 1W-AKE scheme that offers forward security in the post-quantum world without significantly affecting the current infrastructure and performance

Future Anonymity in Todayrsquos Budget Aniket Kate 11

Lattice-based CryptographyIn this work we use the LWE assumptions to provide forwardsecurityanonymity in the post-quantum world

Post-Quantum Crypto

Some Possibilities Multivariate cryptography

Code-based cryptography

Hash-based scheme eg Merkle signatures

Lattice-based cryptography eg NTRU learning with errors (LWE)

Future Anonymity in Todayrsquos Budget Aniket Kate 12

Post-Quantum Crypto

Some Possibilities Multivariate cryptography

Code-based cryptography

Hash-based scheme eg Merkle signatures

Lattice-based cryptography eg NTRU learning with errors (LWE)

Lattice-based Cryptography In this work we use the LWE assumptions to provide forward securityanonymity in the post-quantum world

Future Anonymity in Todayrsquos Budget Aniket Kate 12

Poly(η)-time quantum reduction from approximate-SVP toRing-LWE

Decision Ring-LWE

We consider a ring Rq = Zq[x](xη + 1)

Let χ is the error distribution (Gaussian) of small elements (symmetric around 0)

Given polynomial number of samples from R2q

(a1 b1)

(a2 b2)

middot middot middot (ak bk)

Does there exist an r and e1 middot middot middot ek isin χ 3 bi = ai middot r + ei

(or) Are all birsquos uniformly random in Rq

Future Anonymity in Todayrsquos Budget Aniket Kate 13

Decision Ring-LWE

We consider a ring Rq = Zq[x](xη + 1)

Let χ is the error distribution (Gaussian) of small elements (symmetric around 0)

Given polynomial number of samples from R2q

(a1 b1)

(a2 b2)

middot middot middot (ak bk)

Does there exist an r and e1 middot middot middot ek isin χ 3 bi = ai middot r + ei

(or) Are all birsquos uniformly random in Rq

Poly(η)-time quantum reduction from approximate-SVP to Ring-LWE

Future Anonymity in Todayrsquos Budget Aniket Kate 13

The HybridOR Protocol

Generate system parameters (R η q χ) and (G g p)

Client Node (no long-term key) (long-term keys (s gs))

rc ec e larrR χ x larrR Zlowast c p

x pc g pc = arc + ec minusminusminusminusminusminusminusminusminusminusrarr rn en e larrR χn

pn = arn + en

= pcrn + ek1n n α = hR(k1n)

pnα larrminusminusminusminusminusminusminusminusminusminus

k1C = pnrc + ec sx xsk1 = fR(k1n α) k2 = g k1 = fR(k1n α) k2 = g

(established session key sk = H1(k1) oplus H2(k2))

Future Anonymity in Todayrsquos Budget Aniket Kate 14

Type-II adversary (Authentication)- The adversary can only know the secret associated with thepseudonym from the node in the test session- HybridOR is secure under the GDH assumption

Type-III adversary(Forward Security)- The adversary can only know the secret associated with the longterm public key- HybridOR is secure under the ring-LWE assumption

The HybridOR Protocol Security

Type-I adversary (Channel Secrecy) - The adversary cannot know a secret associated any public values in the test session - HybridOR is secure under any of the GDH as well as ring-LWE assumptions

Future Anonymity in Todayrsquos Budget Aniket Kate 15

Type-III adversary(Forward Security)- The adversary can only know the secret associated with the longterm public key- HybridOR is secure under the ring-LWE assumption

The HybridOR Protocol Security

Type-I adversary (Channel Secrecy) - The adversary cannot know a secret associated any public values in the test session - HybridOR is secure under any of the GDH as well as ring-LWE assumptions

Type-II adversary (Authentication) - The adversary can only know the secret associated with the pseudonym from the node in the test session - HybridOR is secure under the GDH assumption

Future Anonymity in Todayrsquos Budget Aniket Kate 15

The HybridOR Protocol Security

Type-I adversary (Channel Secrecy) - The adversary cannot know a secret associated any public values in the test session - HybridOR is secure under any of the GDH as well as ring-LWE assumptions

Type-II adversary (Authentication) - The adversary can only know the secret associated with the pseudonym from the node in the test session - HybridOR is secure under the GDH assumption

Type-III adversary(Forward Security) - The adversary can only know the secret associated with the long term public key - HybridOR is secure under the ring-LWE assumption

Future Anonymity in Todayrsquos Budget Aniket Kate 15

The HybridOR Protocol Performance

Parameters degree of the irreducible polynomial η = 512 prime modulus q = 1051649 error distribution χ parameter β = 800

Computation Cost Our HybridOR implementation is nearly 15 times faster than the ntor protocol used in Tor

Communication Cost For HybridOR the client and the node each will have to communicate three cells (Each cell is of size 512-byte)

Future Anonymity in Todayrsquos Budget Aniket Kate 16

Take Away We present a novel hybrid 1W-AKE protocol HybridOR which extracts its security from both the classically secure GDH assumption and the post-quantum secure ring-LWE assumption

We base its forward secrecy on the quantum-secure ring-LWE assumption

We leverage the current Tor PKI in its current form

Our performance analysis demonstrates that post-quantum 1W-AKE can already be considered practical for use today

Online Version httpeprintiacrorg2015008

Future Anonymity in Todayrsquos Budget Aniket Kate 17

Take Away We present a novel hybrid 1W-AKE protocol HybridOR which extracts its security from both the classically secure GDH assumption and the post-quantum secure ring-LWE assumption

We base its forward secrecy on the quantum-secure ring-LWE assumption

We leverage the current Tor PKI in its current form

Our performance analysis demonstrates that post-quantum 1W-AKE can already be considered practical for use today

Online Version httpeprintiacrorg2015008

17 Future Anonymity in Todayrsquos Budget Aniket Kate

Page 2: (Post-Quantum Forward Secure Onion Routing)Aniket Kate . The HybridOR Protocol: Security . Type-I adversary (Channel Secrecy) - The adversary cannot know a secret associated any public

Outline

Anonymity over the Internet and Tor

One-Way Authenticated Key Exchange (1W-AKE)

Towards a post-quantum forward secure 1W-AKE

Our HybridOR Protocol

Security and Performance Analyes

Future Anonymity in Todayrsquos Budget Aniket Kate 2

Anonymity

Ability to remain unnoticed or unidentified

Source httpweskenneynetp=232

Future Anonymity in Todayrsquos Budget Aniket Kate 3

Single Hop Circuits Anonymizercom

Drawbacks Traffic Analysis Trust on Anonymizercom

Anonymous Communication

Future Anonymity in Todayrsquos Budget Aniket Kate 4

Anonymous Communication

Single Hop Circuits Anonymizercom

Drawbacks Traffic Analysis Trust on Anonymizercom

Future Anonymity in Todayrsquos Budget Aniket Kate 4

Goal Making the attacker goal of linking multiplecommunication flows from a single user difficult

Onion Routing

Future Anonymity in Todayrsquos Budget Aniket Kate 5

Goal Making the attacker goal of linking multiplecommunication flows from a single user difficult

Onion Routing

Future Anonymity in Todayrsquos Budget Aniket Kate 5

Goal Making the attacker goal of linking multiplecommunication flows from a single user difficult

Onion Routing

Future Anonymity in Todayrsquos Budget Aniket Kate 5

Goal Making the attacker goal of linking multiplecommunication flows from a single user difficult

Onion Routing

Future Anonymity in Todayrsquos Budget Aniket Kate 5

Onion Routing

Goal Making the attacker goal of linking multiple communication flows from a single user difficult

Future Anonymity in Todayrsquos Budget Aniket Kate 5

Onion Routing Circuit Construction How Keys are Shared

This asks for one-way anonymous one-way authenticated key exchange (1W-AKE) which require a public-key infrastructure (PKI)

Future Anonymity in Todayrsquos Budget Aniket Kate 6

Protocol Correctness

1W-AKE SecurityAn attacker cannot learn anything about the session key of achallenge session even if it

compromises several other sessions and

introduces fake identities

compromise exactly one of two secrets from the node in thechallenge session

1W-AnonymityA node should not differentiate while communicating with two differentclients

1W-AKE Security [Goldberg Stebila and Ustaoglu DCC rsquo12]

Future Anonymity in Todayrsquos Budget Aniket Kate 7

1W-AKE Security [Goldberg Stebila and Ustaoglu DCC rsquo12]

Protocol Correctness

1W-AKE Security An attacker cannot learn anything about the session key of a challenge session even if it

compromises several other sessions and

introduces fake identities

compromise exactly one of two secrets from the node in the challenge session

1W-Anonymity A node should not differentiate while communicating with two different clients

Future Anonymity in Todayrsquos Budget Aniket Kate 7

SecondThird Generation Onion Routing Tor

Multi-Pass Construction (Telescoping Approach)

Future Anonymity in Todayrsquos Budget Aniket Kate 8

SecondThird Generation Onion Routing Tor

Multi-Pass Construction (Telescoping Approach)

Future Anonymity in Todayrsquos Budget Aniket Kate 8

SecondThird Generation Onion Routing Tor

Multi-Pass Construction (Telescoping Approach)

Future Anonymity in Todayrsquos Budget Aniket Kate 8

SecondThird Generation Onion Routing Tor

Multi-Pass Construction (Telescoping Approach)

Future Anonymity in Todayrsquos Budget Aniket Kate 8

SecondThird Generation Onion Routing Tor

Multi-Pass Construction (Telescoping Approach)

Future Anonymity in Todayrsquos Budget Aniket Kate 8

SecondThird Generation Onion Routing Tor

Multi-Pass Construction (Telescoping Approach)

Future Anonymity in Todayrsquos Budget Aniket Kate 8

SecondThird Generation Onion Routing Tor

Multi-Pass Construction (Telescoping Approach)

Future Anonymity in Todayrsquos Budget Aniket Kate 8

SecondThird Generation Onion Routing Tor

Multi-Pass Construction (Telescoping Approach)

Future Anonymity in Todayrsquos Budget Aniket Kate 8

The ntor 1W-AKE Protocol [Goldberg Stebila and Ustaoglu DCC rsquo12]

Let G be a multiplicative group with large prime order p Let g isin G be the generator of the group

Client Server (no public key) (long-term keys (b gb))

x g x larrR Zlowast minusminusminusminusminusminusminusminusminusminusrarr y larrR Zlowast

p p yg

larrminusminusminusminusminusminusminusminusminusminus H((gy )x (gb)x) H((gx)y (gx)b) =

yx bx) xy xb)= H(g g H(g g

xy(established session key H(g gxb))

Future Anonymity in Todayrsquos Budget Aniket Kate 9

The GDH ProblemLet G be a multiplicative group with large prime order p andg isin G be the generator of the group

Given a triple (g ga gb) for a b isinr Zlowastp the GDH problem is to find

the element gab with the help of a Decision Diffie-Hellman (DDH)oracle

The DDH oracle takes input as (G g ga gb z) for some z isin Gand tells whether z = gab

The ntor 1W-AKE Protocol Security

The 1W-AKE security of the ntor protocol is proven against the gap Diffie-Hellman (GDH) assumption

Future Anonymity in Todayrsquos Budget Aniket Kate 10

The ntor 1W-AKE Protocol Security

The 1W-AKE security of the ntor protocol is proven against the gap Diffie-Hellman (GDH) assumption

The GDH Problem Let G be a multiplicative group with large prime order p and g isin G be the generator of the group

aGiven a triple (g g gb) for a b isinr Zlowast the GDH problem is to find p

the element gab with the help of a Decision Diffie-Hellman (DDH) oracle

bThe DDH oracle takes input as (G g ga g z) for some z isin G aband tells whether z = g

Future Anonymity in Todayrsquos Budget Aniket Kate 10

So what

Security and anonymity of even todayrsquos onion routingcommunications can be violated

The Tor community

will be hesitant to completely changing the public keyinfrastructure (PKI)questions the performance penalty

ChallengeDesign a 1W-AKE scheme that offers forward security in thepost-quantum world without significantly affecting the currentinfrastructure and performance

When the Quantum computer arrives

This 1W-AKE scheme will no longer be secure

Future Anonymity in Todayrsquos Budget Aniket Kate 11

Security and anonymity of even todayrsquos onion routingcommunications can be violated

The Tor community

will be hesitant to completely changing the public keyinfrastructure (PKI)questions the performance penalty

ChallengeDesign a 1W-AKE scheme that offers forward security in thepost-quantum world without significantly affecting the currentinfrastructure and performance

When the Quantum computer arrives

This 1W-AKE scheme will no longer be secure

So what

Future Anonymity in Todayrsquos Budget Aniket Kate 11

The Tor community

will be hesitant to completely changing the public keyinfrastructure (PKI)questions the performance penalty

ChallengeDesign a 1W-AKE scheme that offers forward security in thepost-quantum world without significantly affecting the currentinfrastructure and performance

When the Quantum computer arrives

This 1W-AKE scheme will no longer be secure

So what

Security and anonymity of even todayrsquos onion routing communications can be violated

Future Anonymity in Todayrsquos Budget Aniket Kate 11

ChallengeDesign a 1W-AKE scheme that offers forward security in thepost-quantum world without significantly affecting the currentinfrastructure and performance

When the Quantum computer arrives

This 1W-AKE scheme will no longer be secure

So what

Security and anonymity of even todayrsquos onion routing communications can be violated

The Tor community

will be hesitant to completely changing the public key infrastructure (PKI) questions the performance penalty

Future Anonymity in Todayrsquos Budget Aniket Kate 11

When the Quantum computer arrives

This 1W-AKE scheme will no longer be secure

So what

Security and anonymity of even todayrsquos onion routing communications can be violated

The Tor community

will be hesitant to completely changing the public key infrastructure (PKI) questions the performance penalty

Challenge Design a 1W-AKE scheme that offers forward security in the post-quantum world without significantly affecting the current infrastructure and performance

Future Anonymity in Todayrsquos Budget Aniket Kate 11

Lattice-based CryptographyIn this work we use the LWE assumptions to provide forwardsecurityanonymity in the post-quantum world

Post-Quantum Crypto

Some Possibilities Multivariate cryptography

Code-based cryptography

Hash-based scheme eg Merkle signatures

Lattice-based cryptography eg NTRU learning with errors (LWE)

Future Anonymity in Todayrsquos Budget Aniket Kate 12

Post-Quantum Crypto

Some Possibilities Multivariate cryptography

Code-based cryptography

Hash-based scheme eg Merkle signatures

Lattice-based cryptography eg NTRU learning with errors (LWE)

Lattice-based Cryptography In this work we use the LWE assumptions to provide forward securityanonymity in the post-quantum world

Future Anonymity in Todayrsquos Budget Aniket Kate 12

Poly(η)-time quantum reduction from approximate-SVP toRing-LWE

Decision Ring-LWE

We consider a ring Rq = Zq[x](xη + 1)

Let χ is the error distribution (Gaussian) of small elements (symmetric around 0)

Given polynomial number of samples from R2q

(a1 b1)

(a2 b2)

middot middot middot (ak bk)

Does there exist an r and e1 middot middot middot ek isin χ 3 bi = ai middot r + ei

(or) Are all birsquos uniformly random in Rq

Future Anonymity in Todayrsquos Budget Aniket Kate 13

Decision Ring-LWE

We consider a ring Rq = Zq[x](xη + 1)

Let χ is the error distribution (Gaussian) of small elements (symmetric around 0)

Given polynomial number of samples from R2q

(a1 b1)

(a2 b2)

middot middot middot (ak bk)

Does there exist an r and e1 middot middot middot ek isin χ 3 bi = ai middot r + ei

(or) Are all birsquos uniformly random in Rq

Poly(η)-time quantum reduction from approximate-SVP to Ring-LWE

Future Anonymity in Todayrsquos Budget Aniket Kate 13

The HybridOR Protocol

Generate system parameters (R η q χ) and (G g p)

Client Node (no long-term key) (long-term keys (s gs))

rc ec e larrR χ x larrR Zlowast c p

x pc g pc = arc + ec minusminusminusminusminusminusminusminusminusminusrarr rn en e larrR χn

pn = arn + en

= pcrn + ek1n n α = hR(k1n)

pnα larrminusminusminusminusminusminusminusminusminusminus

k1C = pnrc + ec sx xsk1 = fR(k1n α) k2 = g k1 = fR(k1n α) k2 = g

(established session key sk = H1(k1) oplus H2(k2))

Future Anonymity in Todayrsquos Budget Aniket Kate 14

Type-II adversary (Authentication)- The adversary can only know the secret associated with thepseudonym from the node in the test session- HybridOR is secure under the GDH assumption

Type-III adversary(Forward Security)- The adversary can only know the secret associated with the longterm public key- HybridOR is secure under the ring-LWE assumption

The HybridOR Protocol Security

Type-I adversary (Channel Secrecy) - The adversary cannot know a secret associated any public values in the test session - HybridOR is secure under any of the GDH as well as ring-LWE assumptions

Future Anonymity in Todayrsquos Budget Aniket Kate 15

Type-III adversary(Forward Security)- The adversary can only know the secret associated with the longterm public key- HybridOR is secure under the ring-LWE assumption

The HybridOR Protocol Security

Type-I adversary (Channel Secrecy) - The adversary cannot know a secret associated any public values in the test session - HybridOR is secure under any of the GDH as well as ring-LWE assumptions

Type-II adversary (Authentication) - The adversary can only know the secret associated with the pseudonym from the node in the test session - HybridOR is secure under the GDH assumption

Future Anonymity in Todayrsquos Budget Aniket Kate 15

The HybridOR Protocol Security

Type-I adversary (Channel Secrecy) - The adversary cannot know a secret associated any public values in the test session - HybridOR is secure under any of the GDH as well as ring-LWE assumptions

Type-II adversary (Authentication) - The adversary can only know the secret associated with the pseudonym from the node in the test session - HybridOR is secure under the GDH assumption

Type-III adversary(Forward Security) - The adversary can only know the secret associated with the long term public key - HybridOR is secure under the ring-LWE assumption

Future Anonymity in Todayrsquos Budget Aniket Kate 15

The HybridOR Protocol Performance

Parameters degree of the irreducible polynomial η = 512 prime modulus q = 1051649 error distribution χ parameter β = 800

Computation Cost Our HybridOR implementation is nearly 15 times faster than the ntor protocol used in Tor

Communication Cost For HybridOR the client and the node each will have to communicate three cells (Each cell is of size 512-byte)

Future Anonymity in Todayrsquos Budget Aniket Kate 16

Take Away We present a novel hybrid 1W-AKE protocol HybridOR which extracts its security from both the classically secure GDH assumption and the post-quantum secure ring-LWE assumption

We base its forward secrecy on the quantum-secure ring-LWE assumption

We leverage the current Tor PKI in its current form

Our performance analysis demonstrates that post-quantum 1W-AKE can already be considered practical for use today

Online Version httpeprintiacrorg2015008

Future Anonymity in Todayrsquos Budget Aniket Kate 17

Take Away We present a novel hybrid 1W-AKE protocol HybridOR which extracts its security from both the classically secure GDH assumption and the post-quantum secure ring-LWE assumption

We base its forward secrecy on the quantum-secure ring-LWE assumption

We leverage the current Tor PKI in its current form

Our performance analysis demonstrates that post-quantum 1W-AKE can already be considered practical for use today

Online Version httpeprintiacrorg2015008

17 Future Anonymity in Todayrsquos Budget Aniket Kate

Page 3: (Post-Quantum Forward Secure Onion Routing)Aniket Kate . The HybridOR Protocol: Security . Type-I adversary (Channel Secrecy) - The adversary cannot know a secret associated any public

Anonymity

Ability to remain unnoticed or unidentified

Source httpweskenneynetp=232

Future Anonymity in Todayrsquos Budget Aniket Kate 3

Single Hop Circuits Anonymizercom

Drawbacks Traffic Analysis Trust on Anonymizercom

Anonymous Communication

Future Anonymity in Todayrsquos Budget Aniket Kate 4

Anonymous Communication

Single Hop Circuits Anonymizercom

Drawbacks Traffic Analysis Trust on Anonymizercom

Future Anonymity in Todayrsquos Budget Aniket Kate 4

Goal Making the attacker goal of linking multiplecommunication flows from a single user difficult

Onion Routing

Future Anonymity in Todayrsquos Budget Aniket Kate 5

Goal Making the attacker goal of linking multiplecommunication flows from a single user difficult

Onion Routing

Future Anonymity in Todayrsquos Budget Aniket Kate 5

Goal Making the attacker goal of linking multiplecommunication flows from a single user difficult

Onion Routing

Future Anonymity in Todayrsquos Budget Aniket Kate 5

Goal Making the attacker goal of linking multiplecommunication flows from a single user difficult

Onion Routing

Future Anonymity in Todayrsquos Budget Aniket Kate 5

Onion Routing

Goal Making the attacker goal of linking multiple communication flows from a single user difficult

Future Anonymity in Todayrsquos Budget Aniket Kate 5

Onion Routing Circuit Construction How Keys are Shared

This asks for one-way anonymous one-way authenticated key exchange (1W-AKE) which require a public-key infrastructure (PKI)

Future Anonymity in Todayrsquos Budget Aniket Kate 6

Protocol Correctness

1W-AKE SecurityAn attacker cannot learn anything about the session key of achallenge session even if it

compromises several other sessions and

introduces fake identities

compromise exactly one of two secrets from the node in thechallenge session

1W-AnonymityA node should not differentiate while communicating with two differentclients

1W-AKE Security [Goldberg Stebila and Ustaoglu DCC rsquo12]

Future Anonymity in Todayrsquos Budget Aniket Kate 7

1W-AKE Security [Goldberg Stebila and Ustaoglu DCC rsquo12]

Protocol Correctness

1W-AKE Security An attacker cannot learn anything about the session key of a challenge session even if it

compromises several other sessions and

introduces fake identities

compromise exactly one of two secrets from the node in the challenge session

1W-Anonymity A node should not differentiate while communicating with two different clients

Future Anonymity in Todayrsquos Budget Aniket Kate 7

SecondThird Generation Onion Routing Tor

Multi-Pass Construction (Telescoping Approach)

Future Anonymity in Todayrsquos Budget Aniket Kate 8

SecondThird Generation Onion Routing Tor

Multi-Pass Construction (Telescoping Approach)

Future Anonymity in Todayrsquos Budget Aniket Kate 8

SecondThird Generation Onion Routing Tor

Multi-Pass Construction (Telescoping Approach)

Future Anonymity in Todayrsquos Budget Aniket Kate 8

SecondThird Generation Onion Routing Tor

Multi-Pass Construction (Telescoping Approach)

Future Anonymity in Todayrsquos Budget Aniket Kate 8

SecondThird Generation Onion Routing Tor

Multi-Pass Construction (Telescoping Approach)

Future Anonymity in Todayrsquos Budget Aniket Kate 8

SecondThird Generation Onion Routing Tor

Multi-Pass Construction (Telescoping Approach)

Future Anonymity in Todayrsquos Budget Aniket Kate 8

SecondThird Generation Onion Routing Tor

Multi-Pass Construction (Telescoping Approach)

Future Anonymity in Todayrsquos Budget Aniket Kate 8

SecondThird Generation Onion Routing Tor

Multi-Pass Construction (Telescoping Approach)

Future Anonymity in Todayrsquos Budget Aniket Kate 8

The ntor 1W-AKE Protocol [Goldberg Stebila and Ustaoglu DCC rsquo12]

Let G be a multiplicative group with large prime order p Let g isin G be the generator of the group

Client Server (no public key) (long-term keys (b gb))

x g x larrR Zlowast minusminusminusminusminusminusminusminusminusminusrarr y larrR Zlowast

p p yg

larrminusminusminusminusminusminusminusminusminusminus H((gy )x (gb)x) H((gx)y (gx)b) =

yx bx) xy xb)= H(g g H(g g

xy(established session key H(g gxb))

Future Anonymity in Todayrsquos Budget Aniket Kate 9

The GDH ProblemLet G be a multiplicative group with large prime order p andg isin G be the generator of the group

Given a triple (g ga gb) for a b isinr Zlowastp the GDH problem is to find

the element gab with the help of a Decision Diffie-Hellman (DDH)oracle

The DDH oracle takes input as (G g ga gb z) for some z isin Gand tells whether z = gab

The ntor 1W-AKE Protocol Security

The 1W-AKE security of the ntor protocol is proven against the gap Diffie-Hellman (GDH) assumption

Future Anonymity in Todayrsquos Budget Aniket Kate 10

The ntor 1W-AKE Protocol Security

The 1W-AKE security of the ntor protocol is proven against the gap Diffie-Hellman (GDH) assumption

The GDH Problem Let G be a multiplicative group with large prime order p and g isin G be the generator of the group

aGiven a triple (g g gb) for a b isinr Zlowast the GDH problem is to find p

the element gab with the help of a Decision Diffie-Hellman (DDH) oracle

bThe DDH oracle takes input as (G g ga g z) for some z isin G aband tells whether z = g

Future Anonymity in Todayrsquos Budget Aniket Kate 10

So what

Security and anonymity of even todayrsquos onion routingcommunications can be violated

The Tor community

will be hesitant to completely changing the public keyinfrastructure (PKI)questions the performance penalty

ChallengeDesign a 1W-AKE scheme that offers forward security in thepost-quantum world without significantly affecting the currentinfrastructure and performance

When the Quantum computer arrives

This 1W-AKE scheme will no longer be secure

Future Anonymity in Todayrsquos Budget Aniket Kate 11

Security and anonymity of even todayrsquos onion routingcommunications can be violated

The Tor community

will be hesitant to completely changing the public keyinfrastructure (PKI)questions the performance penalty

ChallengeDesign a 1W-AKE scheme that offers forward security in thepost-quantum world without significantly affecting the currentinfrastructure and performance

When the Quantum computer arrives

This 1W-AKE scheme will no longer be secure

So what

Future Anonymity in Todayrsquos Budget Aniket Kate 11

The Tor community

will be hesitant to completely changing the public keyinfrastructure (PKI)questions the performance penalty

ChallengeDesign a 1W-AKE scheme that offers forward security in thepost-quantum world without significantly affecting the currentinfrastructure and performance

When the Quantum computer arrives

This 1W-AKE scheme will no longer be secure

So what

Security and anonymity of even todayrsquos onion routing communications can be violated

Future Anonymity in Todayrsquos Budget Aniket Kate 11

ChallengeDesign a 1W-AKE scheme that offers forward security in thepost-quantum world without significantly affecting the currentinfrastructure and performance

When the Quantum computer arrives

This 1W-AKE scheme will no longer be secure

So what

Security and anonymity of even todayrsquos onion routing communications can be violated

The Tor community

will be hesitant to completely changing the public key infrastructure (PKI) questions the performance penalty

Future Anonymity in Todayrsquos Budget Aniket Kate 11

When the Quantum computer arrives

This 1W-AKE scheme will no longer be secure

So what

Security and anonymity of even todayrsquos onion routing communications can be violated

The Tor community

will be hesitant to completely changing the public key infrastructure (PKI) questions the performance penalty

Challenge Design a 1W-AKE scheme that offers forward security in the post-quantum world without significantly affecting the current infrastructure and performance

Future Anonymity in Todayrsquos Budget Aniket Kate 11

Lattice-based CryptographyIn this work we use the LWE assumptions to provide forwardsecurityanonymity in the post-quantum world

Post-Quantum Crypto

Some Possibilities Multivariate cryptography

Code-based cryptography

Hash-based scheme eg Merkle signatures

Lattice-based cryptography eg NTRU learning with errors (LWE)

Future Anonymity in Todayrsquos Budget Aniket Kate 12

Post-Quantum Crypto

Some Possibilities Multivariate cryptography

Code-based cryptography

Hash-based scheme eg Merkle signatures

Lattice-based cryptography eg NTRU learning with errors (LWE)

Lattice-based Cryptography In this work we use the LWE assumptions to provide forward securityanonymity in the post-quantum world

Future Anonymity in Todayrsquos Budget Aniket Kate 12

Poly(η)-time quantum reduction from approximate-SVP toRing-LWE

Decision Ring-LWE

We consider a ring Rq = Zq[x](xη + 1)

Let χ is the error distribution (Gaussian) of small elements (symmetric around 0)

Given polynomial number of samples from R2q

(a1 b1)

(a2 b2)

middot middot middot (ak bk)

Does there exist an r and e1 middot middot middot ek isin χ 3 bi = ai middot r + ei

(or) Are all birsquos uniformly random in Rq

Future Anonymity in Todayrsquos Budget Aniket Kate 13

Decision Ring-LWE

We consider a ring Rq = Zq[x](xη + 1)

Let χ is the error distribution (Gaussian) of small elements (symmetric around 0)

Given polynomial number of samples from R2q

(a1 b1)

(a2 b2)

middot middot middot (ak bk)

Does there exist an r and e1 middot middot middot ek isin χ 3 bi = ai middot r + ei

(or) Are all birsquos uniformly random in Rq

Poly(η)-time quantum reduction from approximate-SVP to Ring-LWE

Future Anonymity in Todayrsquos Budget Aniket Kate 13

The HybridOR Protocol

Generate system parameters (R η q χ) and (G g p)

Client Node (no long-term key) (long-term keys (s gs))

rc ec e larrR χ x larrR Zlowast c p

x pc g pc = arc + ec minusminusminusminusminusminusminusminusminusminusrarr rn en e larrR χn

pn = arn + en

= pcrn + ek1n n α = hR(k1n)

pnα larrminusminusminusminusminusminusminusminusminusminus

k1C = pnrc + ec sx xsk1 = fR(k1n α) k2 = g k1 = fR(k1n α) k2 = g

(established session key sk = H1(k1) oplus H2(k2))

Future Anonymity in Todayrsquos Budget Aniket Kate 14

Type-II adversary (Authentication)- The adversary can only know the secret associated with thepseudonym from the node in the test session- HybridOR is secure under the GDH assumption

Type-III adversary(Forward Security)- The adversary can only know the secret associated with the longterm public key- HybridOR is secure under the ring-LWE assumption

The HybridOR Protocol Security

Type-I adversary (Channel Secrecy) - The adversary cannot know a secret associated any public values in the test session - HybridOR is secure under any of the GDH as well as ring-LWE assumptions

Future Anonymity in Todayrsquos Budget Aniket Kate 15

Type-III adversary(Forward Security)- The adversary can only know the secret associated with the longterm public key- HybridOR is secure under the ring-LWE assumption

The HybridOR Protocol Security

Type-I adversary (Channel Secrecy) - The adversary cannot know a secret associated any public values in the test session - HybridOR is secure under any of the GDH as well as ring-LWE assumptions

Type-II adversary (Authentication) - The adversary can only know the secret associated with the pseudonym from the node in the test session - HybridOR is secure under the GDH assumption

Future Anonymity in Todayrsquos Budget Aniket Kate 15

The HybridOR Protocol Security

Type-I adversary (Channel Secrecy) - The adversary cannot know a secret associated any public values in the test session - HybridOR is secure under any of the GDH as well as ring-LWE assumptions

Type-II adversary (Authentication) - The adversary can only know the secret associated with the pseudonym from the node in the test session - HybridOR is secure under the GDH assumption

Type-III adversary(Forward Security) - The adversary can only know the secret associated with the long term public key - HybridOR is secure under the ring-LWE assumption

Future Anonymity in Todayrsquos Budget Aniket Kate 15

The HybridOR Protocol Performance

Parameters degree of the irreducible polynomial η = 512 prime modulus q = 1051649 error distribution χ parameter β = 800

Computation Cost Our HybridOR implementation is nearly 15 times faster than the ntor protocol used in Tor

Communication Cost For HybridOR the client and the node each will have to communicate three cells (Each cell is of size 512-byte)

Future Anonymity in Todayrsquos Budget Aniket Kate 16

Take Away We present a novel hybrid 1W-AKE protocol HybridOR which extracts its security from both the classically secure GDH assumption and the post-quantum secure ring-LWE assumption

We base its forward secrecy on the quantum-secure ring-LWE assumption

We leverage the current Tor PKI in its current form

Our performance analysis demonstrates that post-quantum 1W-AKE can already be considered practical for use today

Online Version httpeprintiacrorg2015008

Future Anonymity in Todayrsquos Budget Aniket Kate 17

Take Away We present a novel hybrid 1W-AKE protocol HybridOR which extracts its security from both the classically secure GDH assumption and the post-quantum secure ring-LWE assumption

We base its forward secrecy on the quantum-secure ring-LWE assumption

We leverage the current Tor PKI in its current form

Our performance analysis demonstrates that post-quantum 1W-AKE can already be considered practical for use today

Online Version httpeprintiacrorg2015008

17 Future Anonymity in Todayrsquos Budget Aniket Kate

Page 4: (Post-Quantum Forward Secure Onion Routing)Aniket Kate . The HybridOR Protocol: Security . Type-I adversary (Channel Secrecy) - The adversary cannot know a secret associated any public

Single Hop Circuits Anonymizercom

Drawbacks Traffic Analysis Trust on Anonymizercom

Anonymous Communication

Future Anonymity in Todayrsquos Budget Aniket Kate 4

Anonymous Communication

Single Hop Circuits Anonymizercom

Drawbacks Traffic Analysis Trust on Anonymizercom

Future Anonymity in Todayrsquos Budget Aniket Kate 4

Goal Making the attacker goal of linking multiplecommunication flows from a single user difficult

Onion Routing

Future Anonymity in Todayrsquos Budget Aniket Kate 5

Goal Making the attacker goal of linking multiplecommunication flows from a single user difficult

Onion Routing

Future Anonymity in Todayrsquos Budget Aniket Kate 5

Goal Making the attacker goal of linking multiplecommunication flows from a single user difficult

Onion Routing

Future Anonymity in Todayrsquos Budget Aniket Kate 5

Goal Making the attacker goal of linking multiplecommunication flows from a single user difficult

Onion Routing

Future Anonymity in Todayrsquos Budget Aniket Kate 5

Onion Routing

Goal Making the attacker goal of linking multiple communication flows from a single user difficult

Future Anonymity in Todayrsquos Budget Aniket Kate 5

Onion Routing Circuit Construction How Keys are Shared

This asks for one-way anonymous one-way authenticated key exchange (1W-AKE) which require a public-key infrastructure (PKI)

Future Anonymity in Todayrsquos Budget Aniket Kate 6

Protocol Correctness

1W-AKE SecurityAn attacker cannot learn anything about the session key of achallenge session even if it

compromises several other sessions and

introduces fake identities

compromise exactly one of two secrets from the node in thechallenge session

1W-AnonymityA node should not differentiate while communicating with two differentclients

1W-AKE Security [Goldberg Stebila and Ustaoglu DCC rsquo12]

Future Anonymity in Todayrsquos Budget Aniket Kate 7

1W-AKE Security [Goldberg Stebila and Ustaoglu DCC rsquo12]

Protocol Correctness

1W-AKE Security An attacker cannot learn anything about the session key of a challenge session even if it

compromises several other sessions and

introduces fake identities

compromise exactly one of two secrets from the node in the challenge session

1W-Anonymity A node should not differentiate while communicating with two different clients

Future Anonymity in Todayrsquos Budget Aniket Kate 7

SecondThird Generation Onion Routing Tor

Multi-Pass Construction (Telescoping Approach)

Future Anonymity in Todayrsquos Budget Aniket Kate 8

SecondThird Generation Onion Routing Tor

Multi-Pass Construction (Telescoping Approach)

Future Anonymity in Todayrsquos Budget Aniket Kate 8

SecondThird Generation Onion Routing Tor

Multi-Pass Construction (Telescoping Approach)

Future Anonymity in Todayrsquos Budget Aniket Kate 8

SecondThird Generation Onion Routing Tor

Multi-Pass Construction (Telescoping Approach)

Future Anonymity in Todayrsquos Budget Aniket Kate 8

SecondThird Generation Onion Routing Tor

Multi-Pass Construction (Telescoping Approach)

Future Anonymity in Todayrsquos Budget Aniket Kate 8

SecondThird Generation Onion Routing Tor

Multi-Pass Construction (Telescoping Approach)

Future Anonymity in Todayrsquos Budget Aniket Kate 8

SecondThird Generation Onion Routing Tor

Multi-Pass Construction (Telescoping Approach)

Future Anonymity in Todayrsquos Budget Aniket Kate 8

SecondThird Generation Onion Routing Tor

Multi-Pass Construction (Telescoping Approach)

Future Anonymity in Todayrsquos Budget Aniket Kate 8

The ntor 1W-AKE Protocol [Goldberg Stebila and Ustaoglu DCC rsquo12]

Let G be a multiplicative group with large prime order p Let g isin G be the generator of the group

Client Server (no public key) (long-term keys (b gb))

x g x larrR Zlowast minusminusminusminusminusminusminusminusminusminusrarr y larrR Zlowast

p p yg

larrminusminusminusminusminusminusminusminusminusminus H((gy )x (gb)x) H((gx)y (gx)b) =

yx bx) xy xb)= H(g g H(g g

xy(established session key H(g gxb))

Future Anonymity in Todayrsquos Budget Aniket Kate 9

The GDH ProblemLet G be a multiplicative group with large prime order p andg isin G be the generator of the group

Given a triple (g ga gb) for a b isinr Zlowastp the GDH problem is to find

the element gab with the help of a Decision Diffie-Hellman (DDH)oracle

The DDH oracle takes input as (G g ga gb z) for some z isin Gand tells whether z = gab

The ntor 1W-AKE Protocol Security

The 1W-AKE security of the ntor protocol is proven against the gap Diffie-Hellman (GDH) assumption

Future Anonymity in Todayrsquos Budget Aniket Kate 10

The ntor 1W-AKE Protocol Security

The 1W-AKE security of the ntor protocol is proven against the gap Diffie-Hellman (GDH) assumption

The GDH Problem Let G be a multiplicative group with large prime order p and g isin G be the generator of the group

aGiven a triple (g g gb) for a b isinr Zlowast the GDH problem is to find p

the element gab with the help of a Decision Diffie-Hellman (DDH) oracle

bThe DDH oracle takes input as (G g ga g z) for some z isin G aband tells whether z = g

Future Anonymity in Todayrsquos Budget Aniket Kate 10

So what

Security and anonymity of even todayrsquos onion routingcommunications can be violated

The Tor community

will be hesitant to completely changing the public keyinfrastructure (PKI)questions the performance penalty

ChallengeDesign a 1W-AKE scheme that offers forward security in thepost-quantum world without significantly affecting the currentinfrastructure and performance

When the Quantum computer arrives

This 1W-AKE scheme will no longer be secure

Future Anonymity in Todayrsquos Budget Aniket Kate 11

Security and anonymity of even todayrsquos onion routingcommunications can be violated

The Tor community

will be hesitant to completely changing the public keyinfrastructure (PKI)questions the performance penalty

ChallengeDesign a 1W-AKE scheme that offers forward security in thepost-quantum world without significantly affecting the currentinfrastructure and performance

When the Quantum computer arrives

This 1W-AKE scheme will no longer be secure

So what

Future Anonymity in Todayrsquos Budget Aniket Kate 11

The Tor community

will be hesitant to completely changing the public keyinfrastructure (PKI)questions the performance penalty

ChallengeDesign a 1W-AKE scheme that offers forward security in thepost-quantum world without significantly affecting the currentinfrastructure and performance

When the Quantum computer arrives

This 1W-AKE scheme will no longer be secure

So what

Security and anonymity of even todayrsquos onion routing communications can be violated

Future Anonymity in Todayrsquos Budget Aniket Kate 11

ChallengeDesign a 1W-AKE scheme that offers forward security in thepost-quantum world without significantly affecting the currentinfrastructure and performance

When the Quantum computer arrives

This 1W-AKE scheme will no longer be secure

So what

Security and anonymity of even todayrsquos onion routing communications can be violated

The Tor community

will be hesitant to completely changing the public key infrastructure (PKI) questions the performance penalty

Future Anonymity in Todayrsquos Budget Aniket Kate 11

When the Quantum computer arrives

This 1W-AKE scheme will no longer be secure

So what

Security and anonymity of even todayrsquos onion routing communications can be violated

The Tor community

will be hesitant to completely changing the public key infrastructure (PKI) questions the performance penalty

Challenge Design a 1W-AKE scheme that offers forward security in the post-quantum world without significantly affecting the current infrastructure and performance

Future Anonymity in Todayrsquos Budget Aniket Kate 11

Lattice-based CryptographyIn this work we use the LWE assumptions to provide forwardsecurityanonymity in the post-quantum world

Post-Quantum Crypto

Some Possibilities Multivariate cryptography

Code-based cryptography

Hash-based scheme eg Merkle signatures

Lattice-based cryptography eg NTRU learning with errors (LWE)

Future Anonymity in Todayrsquos Budget Aniket Kate 12

Post-Quantum Crypto

Some Possibilities Multivariate cryptography

Code-based cryptography

Hash-based scheme eg Merkle signatures

Lattice-based cryptography eg NTRU learning with errors (LWE)

Lattice-based Cryptography In this work we use the LWE assumptions to provide forward securityanonymity in the post-quantum world

Future Anonymity in Todayrsquos Budget Aniket Kate 12

Poly(η)-time quantum reduction from approximate-SVP toRing-LWE

Decision Ring-LWE

We consider a ring Rq = Zq[x](xη + 1)

Let χ is the error distribution (Gaussian) of small elements (symmetric around 0)

Given polynomial number of samples from R2q

(a1 b1)

(a2 b2)

middot middot middot (ak bk)

Does there exist an r and e1 middot middot middot ek isin χ 3 bi = ai middot r + ei

(or) Are all birsquos uniformly random in Rq

Future Anonymity in Todayrsquos Budget Aniket Kate 13

Decision Ring-LWE

We consider a ring Rq = Zq[x](xη + 1)

Let χ is the error distribution (Gaussian) of small elements (symmetric around 0)

Given polynomial number of samples from R2q

(a1 b1)

(a2 b2)

middot middot middot (ak bk)

Does there exist an r and e1 middot middot middot ek isin χ 3 bi = ai middot r + ei

(or) Are all birsquos uniformly random in Rq

Poly(η)-time quantum reduction from approximate-SVP to Ring-LWE

Future Anonymity in Todayrsquos Budget Aniket Kate 13

The HybridOR Protocol

Generate system parameters (R η q χ) and (G g p)

Client Node (no long-term key) (long-term keys (s gs))

rc ec e larrR χ x larrR Zlowast c p

x pc g pc = arc + ec minusminusminusminusminusminusminusminusminusminusrarr rn en e larrR χn

pn = arn + en

= pcrn + ek1n n α = hR(k1n)

pnα larrminusminusminusminusminusminusminusminusminusminus

k1C = pnrc + ec sx xsk1 = fR(k1n α) k2 = g k1 = fR(k1n α) k2 = g

(established session key sk = H1(k1) oplus H2(k2))

Future Anonymity in Todayrsquos Budget Aniket Kate 14

Type-II adversary (Authentication)- The adversary can only know the secret associated with thepseudonym from the node in the test session- HybridOR is secure under the GDH assumption

Type-III adversary(Forward Security)- The adversary can only know the secret associated with the longterm public key- HybridOR is secure under the ring-LWE assumption

The HybridOR Protocol Security

Type-I adversary (Channel Secrecy) - The adversary cannot know a secret associated any public values in the test session - HybridOR is secure under any of the GDH as well as ring-LWE assumptions

Future Anonymity in Todayrsquos Budget Aniket Kate 15

Type-III adversary(Forward Security)- The adversary can only know the secret associated with the longterm public key- HybridOR is secure under the ring-LWE assumption

The HybridOR Protocol Security

Type-I adversary (Channel Secrecy) - The adversary cannot know a secret associated any public values in the test session - HybridOR is secure under any of the GDH as well as ring-LWE assumptions

Type-II adversary (Authentication) - The adversary can only know the secret associated with the pseudonym from the node in the test session - HybridOR is secure under the GDH assumption

Future Anonymity in Todayrsquos Budget Aniket Kate 15

The HybridOR Protocol Security

Type-I adversary (Channel Secrecy) - The adversary cannot know a secret associated any public values in the test session - HybridOR is secure under any of the GDH as well as ring-LWE assumptions

Type-II adversary (Authentication) - The adversary can only know the secret associated with the pseudonym from the node in the test session - HybridOR is secure under the GDH assumption

Type-III adversary(Forward Security) - The adversary can only know the secret associated with the long term public key - HybridOR is secure under the ring-LWE assumption

Future Anonymity in Todayrsquos Budget Aniket Kate 15

The HybridOR Protocol Performance

Parameters degree of the irreducible polynomial η = 512 prime modulus q = 1051649 error distribution χ parameter β = 800

Computation Cost Our HybridOR implementation is nearly 15 times faster than the ntor protocol used in Tor

Communication Cost For HybridOR the client and the node each will have to communicate three cells (Each cell is of size 512-byte)

Future Anonymity in Todayrsquos Budget Aniket Kate 16

Take Away We present a novel hybrid 1W-AKE protocol HybridOR which extracts its security from both the classically secure GDH assumption and the post-quantum secure ring-LWE assumption

We base its forward secrecy on the quantum-secure ring-LWE assumption

We leverage the current Tor PKI in its current form

Our performance analysis demonstrates that post-quantum 1W-AKE can already be considered practical for use today

Online Version httpeprintiacrorg2015008

Future Anonymity in Todayrsquos Budget Aniket Kate 17

Take Away We present a novel hybrid 1W-AKE protocol HybridOR which extracts its security from both the classically secure GDH assumption and the post-quantum secure ring-LWE assumption

We base its forward secrecy on the quantum-secure ring-LWE assumption

We leverage the current Tor PKI in its current form

Our performance analysis demonstrates that post-quantum 1W-AKE can already be considered practical for use today

Online Version httpeprintiacrorg2015008

17 Future Anonymity in Todayrsquos Budget Aniket Kate

Page 5: (Post-Quantum Forward Secure Onion Routing)Aniket Kate . The HybridOR Protocol: Security . Type-I adversary (Channel Secrecy) - The adversary cannot know a secret associated any public

Anonymous Communication

Single Hop Circuits Anonymizercom

Drawbacks Traffic Analysis Trust on Anonymizercom

Future Anonymity in Todayrsquos Budget Aniket Kate 4

Goal Making the attacker goal of linking multiplecommunication flows from a single user difficult

Onion Routing

Future Anonymity in Todayrsquos Budget Aniket Kate 5

Goal Making the attacker goal of linking multiplecommunication flows from a single user difficult

Onion Routing

Future Anonymity in Todayrsquos Budget Aniket Kate 5

Goal Making the attacker goal of linking multiplecommunication flows from a single user difficult

Onion Routing

Future Anonymity in Todayrsquos Budget Aniket Kate 5

Goal Making the attacker goal of linking multiplecommunication flows from a single user difficult

Onion Routing

Future Anonymity in Todayrsquos Budget Aniket Kate 5

Onion Routing

Goal Making the attacker goal of linking multiple communication flows from a single user difficult

Future Anonymity in Todayrsquos Budget Aniket Kate 5

Onion Routing Circuit Construction How Keys are Shared

This asks for one-way anonymous one-way authenticated key exchange (1W-AKE) which require a public-key infrastructure (PKI)

Future Anonymity in Todayrsquos Budget Aniket Kate 6

Protocol Correctness

1W-AKE SecurityAn attacker cannot learn anything about the session key of achallenge session even if it

compromises several other sessions and

introduces fake identities

compromise exactly one of two secrets from the node in thechallenge session

1W-AnonymityA node should not differentiate while communicating with two differentclients

1W-AKE Security [Goldberg Stebila and Ustaoglu DCC rsquo12]

Future Anonymity in Todayrsquos Budget Aniket Kate 7

1W-AKE Security [Goldberg Stebila and Ustaoglu DCC rsquo12]

Protocol Correctness

1W-AKE Security An attacker cannot learn anything about the session key of a challenge session even if it

compromises several other sessions and

introduces fake identities

compromise exactly one of two secrets from the node in the challenge session

1W-Anonymity A node should not differentiate while communicating with two different clients

Future Anonymity in Todayrsquos Budget Aniket Kate 7

SecondThird Generation Onion Routing Tor

Multi-Pass Construction (Telescoping Approach)

Future Anonymity in Todayrsquos Budget Aniket Kate 8

SecondThird Generation Onion Routing Tor

Multi-Pass Construction (Telescoping Approach)

Future Anonymity in Todayrsquos Budget Aniket Kate 8

SecondThird Generation Onion Routing Tor

Multi-Pass Construction (Telescoping Approach)

Future Anonymity in Todayrsquos Budget Aniket Kate 8

SecondThird Generation Onion Routing Tor

Multi-Pass Construction (Telescoping Approach)

Future Anonymity in Todayrsquos Budget Aniket Kate 8

SecondThird Generation Onion Routing Tor

Multi-Pass Construction (Telescoping Approach)

Future Anonymity in Todayrsquos Budget Aniket Kate 8

SecondThird Generation Onion Routing Tor

Multi-Pass Construction (Telescoping Approach)

Future Anonymity in Todayrsquos Budget Aniket Kate 8

SecondThird Generation Onion Routing Tor

Multi-Pass Construction (Telescoping Approach)

Future Anonymity in Todayrsquos Budget Aniket Kate 8

SecondThird Generation Onion Routing Tor

Multi-Pass Construction (Telescoping Approach)

Future Anonymity in Todayrsquos Budget Aniket Kate 8

The ntor 1W-AKE Protocol [Goldberg Stebila and Ustaoglu DCC rsquo12]

Let G be a multiplicative group with large prime order p Let g isin G be the generator of the group

Client Server (no public key) (long-term keys (b gb))

x g x larrR Zlowast minusminusminusminusminusminusminusminusminusminusrarr y larrR Zlowast

p p yg

larrminusminusminusminusminusminusminusminusminusminus H((gy )x (gb)x) H((gx)y (gx)b) =

yx bx) xy xb)= H(g g H(g g

xy(established session key H(g gxb))

Future Anonymity in Todayrsquos Budget Aniket Kate 9

The GDH ProblemLet G be a multiplicative group with large prime order p andg isin G be the generator of the group

Given a triple (g ga gb) for a b isinr Zlowastp the GDH problem is to find

the element gab with the help of a Decision Diffie-Hellman (DDH)oracle

The DDH oracle takes input as (G g ga gb z) for some z isin Gand tells whether z = gab

The ntor 1W-AKE Protocol Security

The 1W-AKE security of the ntor protocol is proven against the gap Diffie-Hellman (GDH) assumption

Future Anonymity in Todayrsquos Budget Aniket Kate 10

The ntor 1W-AKE Protocol Security

The 1W-AKE security of the ntor protocol is proven against the gap Diffie-Hellman (GDH) assumption

The GDH Problem Let G be a multiplicative group with large prime order p and g isin G be the generator of the group

aGiven a triple (g g gb) for a b isinr Zlowast the GDH problem is to find p

the element gab with the help of a Decision Diffie-Hellman (DDH) oracle

bThe DDH oracle takes input as (G g ga g z) for some z isin G aband tells whether z = g

Future Anonymity in Todayrsquos Budget Aniket Kate 10

So what

Security and anonymity of even todayrsquos onion routingcommunications can be violated

The Tor community

will be hesitant to completely changing the public keyinfrastructure (PKI)questions the performance penalty

ChallengeDesign a 1W-AKE scheme that offers forward security in thepost-quantum world without significantly affecting the currentinfrastructure and performance

When the Quantum computer arrives

This 1W-AKE scheme will no longer be secure

Future Anonymity in Todayrsquos Budget Aniket Kate 11

Security and anonymity of even todayrsquos onion routingcommunications can be violated

The Tor community

will be hesitant to completely changing the public keyinfrastructure (PKI)questions the performance penalty

ChallengeDesign a 1W-AKE scheme that offers forward security in thepost-quantum world without significantly affecting the currentinfrastructure and performance

When the Quantum computer arrives

This 1W-AKE scheme will no longer be secure

So what

Future Anonymity in Todayrsquos Budget Aniket Kate 11

The Tor community

will be hesitant to completely changing the public keyinfrastructure (PKI)questions the performance penalty

ChallengeDesign a 1W-AKE scheme that offers forward security in thepost-quantum world without significantly affecting the currentinfrastructure and performance

When the Quantum computer arrives

This 1W-AKE scheme will no longer be secure

So what

Security and anonymity of even todayrsquos onion routing communications can be violated

Future Anonymity in Todayrsquos Budget Aniket Kate 11

ChallengeDesign a 1W-AKE scheme that offers forward security in thepost-quantum world without significantly affecting the currentinfrastructure and performance

When the Quantum computer arrives

This 1W-AKE scheme will no longer be secure

So what

Security and anonymity of even todayrsquos onion routing communications can be violated

The Tor community

will be hesitant to completely changing the public key infrastructure (PKI) questions the performance penalty

Future Anonymity in Todayrsquos Budget Aniket Kate 11

When the Quantum computer arrives

This 1W-AKE scheme will no longer be secure

So what

Security and anonymity of even todayrsquos onion routing communications can be violated

The Tor community

will be hesitant to completely changing the public key infrastructure (PKI) questions the performance penalty

Challenge Design a 1W-AKE scheme that offers forward security in the post-quantum world without significantly affecting the current infrastructure and performance

Future Anonymity in Todayrsquos Budget Aniket Kate 11

Lattice-based CryptographyIn this work we use the LWE assumptions to provide forwardsecurityanonymity in the post-quantum world

Post-Quantum Crypto

Some Possibilities Multivariate cryptography

Code-based cryptography

Hash-based scheme eg Merkle signatures

Lattice-based cryptography eg NTRU learning with errors (LWE)

Future Anonymity in Todayrsquos Budget Aniket Kate 12

Post-Quantum Crypto

Some Possibilities Multivariate cryptography

Code-based cryptography

Hash-based scheme eg Merkle signatures

Lattice-based cryptography eg NTRU learning with errors (LWE)

Lattice-based Cryptography In this work we use the LWE assumptions to provide forward securityanonymity in the post-quantum world

Future Anonymity in Todayrsquos Budget Aniket Kate 12

Poly(η)-time quantum reduction from approximate-SVP toRing-LWE

Decision Ring-LWE

We consider a ring Rq = Zq[x](xη + 1)

Let χ is the error distribution (Gaussian) of small elements (symmetric around 0)

Given polynomial number of samples from R2q

(a1 b1)

(a2 b2)

middot middot middot (ak bk)

Does there exist an r and e1 middot middot middot ek isin χ 3 bi = ai middot r + ei

(or) Are all birsquos uniformly random in Rq

Future Anonymity in Todayrsquos Budget Aniket Kate 13

Decision Ring-LWE

We consider a ring Rq = Zq[x](xη + 1)

Let χ is the error distribution (Gaussian) of small elements (symmetric around 0)

Given polynomial number of samples from R2q

(a1 b1)

(a2 b2)

middot middot middot (ak bk)

Does there exist an r and e1 middot middot middot ek isin χ 3 bi = ai middot r + ei

(or) Are all birsquos uniformly random in Rq

Poly(η)-time quantum reduction from approximate-SVP to Ring-LWE

Future Anonymity in Todayrsquos Budget Aniket Kate 13

The HybridOR Protocol

Generate system parameters (R η q χ) and (G g p)

Client Node (no long-term key) (long-term keys (s gs))

rc ec e larrR χ x larrR Zlowast c p

x pc g pc = arc + ec minusminusminusminusminusminusminusminusminusminusrarr rn en e larrR χn

pn = arn + en

= pcrn + ek1n n α = hR(k1n)

pnα larrminusminusminusminusminusminusminusminusminusminus

k1C = pnrc + ec sx xsk1 = fR(k1n α) k2 = g k1 = fR(k1n α) k2 = g

(established session key sk = H1(k1) oplus H2(k2))

Future Anonymity in Todayrsquos Budget Aniket Kate 14

Type-II adversary (Authentication)- The adversary can only know the secret associated with thepseudonym from the node in the test session- HybridOR is secure under the GDH assumption

Type-III adversary(Forward Security)- The adversary can only know the secret associated with the longterm public key- HybridOR is secure under the ring-LWE assumption

The HybridOR Protocol Security

Type-I adversary (Channel Secrecy) - The adversary cannot know a secret associated any public values in the test session - HybridOR is secure under any of the GDH as well as ring-LWE assumptions

Future Anonymity in Todayrsquos Budget Aniket Kate 15

Type-III adversary(Forward Security)- The adversary can only know the secret associated with the longterm public key- HybridOR is secure under the ring-LWE assumption

The HybridOR Protocol Security

Type-I adversary (Channel Secrecy) - The adversary cannot know a secret associated any public values in the test session - HybridOR is secure under any of the GDH as well as ring-LWE assumptions

Type-II adversary (Authentication) - The adversary can only know the secret associated with the pseudonym from the node in the test session - HybridOR is secure under the GDH assumption

Future Anonymity in Todayrsquos Budget Aniket Kate 15

The HybridOR Protocol Security

Type-I adversary (Channel Secrecy) - The adversary cannot know a secret associated any public values in the test session - HybridOR is secure under any of the GDH as well as ring-LWE assumptions

Type-II adversary (Authentication) - The adversary can only know the secret associated with the pseudonym from the node in the test session - HybridOR is secure under the GDH assumption

Type-III adversary(Forward Security) - The adversary can only know the secret associated with the long term public key - HybridOR is secure under the ring-LWE assumption

Future Anonymity in Todayrsquos Budget Aniket Kate 15

The HybridOR Protocol Performance

Parameters degree of the irreducible polynomial η = 512 prime modulus q = 1051649 error distribution χ parameter β = 800

Computation Cost Our HybridOR implementation is nearly 15 times faster than the ntor protocol used in Tor

Communication Cost For HybridOR the client and the node each will have to communicate three cells (Each cell is of size 512-byte)

Future Anonymity in Todayrsquos Budget Aniket Kate 16

Take Away We present a novel hybrid 1W-AKE protocol HybridOR which extracts its security from both the classically secure GDH assumption and the post-quantum secure ring-LWE assumption

We base its forward secrecy on the quantum-secure ring-LWE assumption

We leverage the current Tor PKI in its current form

Our performance analysis demonstrates that post-quantum 1W-AKE can already be considered practical for use today

Online Version httpeprintiacrorg2015008

Future Anonymity in Todayrsquos Budget Aniket Kate 17

Take Away We present a novel hybrid 1W-AKE protocol HybridOR which extracts its security from both the classically secure GDH assumption and the post-quantum secure ring-LWE assumption

We base its forward secrecy on the quantum-secure ring-LWE assumption

We leverage the current Tor PKI in its current form

Our performance analysis demonstrates that post-quantum 1W-AKE can already be considered practical for use today

Online Version httpeprintiacrorg2015008

17 Future Anonymity in Todayrsquos Budget Aniket Kate

Page 6: (Post-Quantum Forward Secure Onion Routing)Aniket Kate . The HybridOR Protocol: Security . Type-I adversary (Channel Secrecy) - The adversary cannot know a secret associated any public

Goal Making the attacker goal of linking multiplecommunication flows from a single user difficult

Onion Routing

Future Anonymity in Todayrsquos Budget Aniket Kate 5

Goal Making the attacker goal of linking multiplecommunication flows from a single user difficult

Onion Routing

Future Anonymity in Todayrsquos Budget Aniket Kate 5

Goal Making the attacker goal of linking multiplecommunication flows from a single user difficult

Onion Routing

Future Anonymity in Todayrsquos Budget Aniket Kate 5

Goal Making the attacker goal of linking multiplecommunication flows from a single user difficult

Onion Routing

Future Anonymity in Todayrsquos Budget Aniket Kate 5

Onion Routing

Goal Making the attacker goal of linking multiple communication flows from a single user difficult

Future Anonymity in Todayrsquos Budget Aniket Kate 5

Onion Routing Circuit Construction How Keys are Shared

This asks for one-way anonymous one-way authenticated key exchange (1W-AKE) which require a public-key infrastructure (PKI)

Future Anonymity in Todayrsquos Budget Aniket Kate 6

Protocol Correctness

1W-AKE SecurityAn attacker cannot learn anything about the session key of achallenge session even if it

compromises several other sessions and

introduces fake identities

compromise exactly one of two secrets from the node in thechallenge session

1W-AnonymityA node should not differentiate while communicating with two differentclients

1W-AKE Security [Goldberg Stebila and Ustaoglu DCC rsquo12]

Future Anonymity in Todayrsquos Budget Aniket Kate 7

1W-AKE Security [Goldberg Stebila and Ustaoglu DCC rsquo12]

Protocol Correctness

1W-AKE Security An attacker cannot learn anything about the session key of a challenge session even if it

compromises several other sessions and

introduces fake identities

compromise exactly one of two secrets from the node in the challenge session

1W-Anonymity A node should not differentiate while communicating with two different clients

Future Anonymity in Todayrsquos Budget Aniket Kate 7

SecondThird Generation Onion Routing Tor

Multi-Pass Construction (Telescoping Approach)

Future Anonymity in Todayrsquos Budget Aniket Kate 8

SecondThird Generation Onion Routing Tor

Multi-Pass Construction (Telescoping Approach)

Future Anonymity in Todayrsquos Budget Aniket Kate 8

SecondThird Generation Onion Routing Tor

Multi-Pass Construction (Telescoping Approach)

Future Anonymity in Todayrsquos Budget Aniket Kate 8

SecondThird Generation Onion Routing Tor

Multi-Pass Construction (Telescoping Approach)

Future Anonymity in Todayrsquos Budget Aniket Kate 8

SecondThird Generation Onion Routing Tor

Multi-Pass Construction (Telescoping Approach)

Future Anonymity in Todayrsquos Budget Aniket Kate 8

SecondThird Generation Onion Routing Tor

Multi-Pass Construction (Telescoping Approach)

Future Anonymity in Todayrsquos Budget Aniket Kate 8

SecondThird Generation Onion Routing Tor

Multi-Pass Construction (Telescoping Approach)

Future Anonymity in Todayrsquos Budget Aniket Kate 8

SecondThird Generation Onion Routing Tor

Multi-Pass Construction (Telescoping Approach)

Future Anonymity in Todayrsquos Budget Aniket Kate 8

The ntor 1W-AKE Protocol [Goldberg Stebila and Ustaoglu DCC rsquo12]

Let G be a multiplicative group with large prime order p Let g isin G be the generator of the group

Client Server (no public key) (long-term keys (b gb))

x g x larrR Zlowast minusminusminusminusminusminusminusminusminusminusrarr y larrR Zlowast

p p yg

larrminusminusminusminusminusminusminusminusminusminus H((gy )x (gb)x) H((gx)y (gx)b) =

yx bx) xy xb)= H(g g H(g g

xy(established session key H(g gxb))

Future Anonymity in Todayrsquos Budget Aniket Kate 9

The GDH ProblemLet G be a multiplicative group with large prime order p andg isin G be the generator of the group

Given a triple (g ga gb) for a b isinr Zlowastp the GDH problem is to find

the element gab with the help of a Decision Diffie-Hellman (DDH)oracle

The DDH oracle takes input as (G g ga gb z) for some z isin Gand tells whether z = gab

The ntor 1W-AKE Protocol Security

The 1W-AKE security of the ntor protocol is proven against the gap Diffie-Hellman (GDH) assumption

Future Anonymity in Todayrsquos Budget Aniket Kate 10

The ntor 1W-AKE Protocol Security

The 1W-AKE security of the ntor protocol is proven against the gap Diffie-Hellman (GDH) assumption

The GDH Problem Let G be a multiplicative group with large prime order p and g isin G be the generator of the group

aGiven a triple (g g gb) for a b isinr Zlowast the GDH problem is to find p

the element gab with the help of a Decision Diffie-Hellman (DDH) oracle

bThe DDH oracle takes input as (G g ga g z) for some z isin G aband tells whether z = g

Future Anonymity in Todayrsquos Budget Aniket Kate 10

So what

Security and anonymity of even todayrsquos onion routingcommunications can be violated

The Tor community

will be hesitant to completely changing the public keyinfrastructure (PKI)questions the performance penalty

ChallengeDesign a 1W-AKE scheme that offers forward security in thepost-quantum world without significantly affecting the currentinfrastructure and performance

When the Quantum computer arrives

This 1W-AKE scheme will no longer be secure

Future Anonymity in Todayrsquos Budget Aniket Kate 11

Security and anonymity of even todayrsquos onion routingcommunications can be violated

The Tor community

will be hesitant to completely changing the public keyinfrastructure (PKI)questions the performance penalty

ChallengeDesign a 1W-AKE scheme that offers forward security in thepost-quantum world without significantly affecting the currentinfrastructure and performance

When the Quantum computer arrives

This 1W-AKE scheme will no longer be secure

So what

Future Anonymity in Todayrsquos Budget Aniket Kate 11

The Tor community

will be hesitant to completely changing the public keyinfrastructure (PKI)questions the performance penalty

ChallengeDesign a 1W-AKE scheme that offers forward security in thepost-quantum world without significantly affecting the currentinfrastructure and performance

When the Quantum computer arrives

This 1W-AKE scheme will no longer be secure

So what

Security and anonymity of even todayrsquos onion routing communications can be violated

Future Anonymity in Todayrsquos Budget Aniket Kate 11

ChallengeDesign a 1W-AKE scheme that offers forward security in thepost-quantum world without significantly affecting the currentinfrastructure and performance

When the Quantum computer arrives

This 1W-AKE scheme will no longer be secure

So what

Security and anonymity of even todayrsquos onion routing communications can be violated

The Tor community

will be hesitant to completely changing the public key infrastructure (PKI) questions the performance penalty

Future Anonymity in Todayrsquos Budget Aniket Kate 11

When the Quantum computer arrives

This 1W-AKE scheme will no longer be secure

So what

Security and anonymity of even todayrsquos onion routing communications can be violated

The Tor community

will be hesitant to completely changing the public key infrastructure (PKI) questions the performance penalty

Challenge Design a 1W-AKE scheme that offers forward security in the post-quantum world without significantly affecting the current infrastructure and performance

Future Anonymity in Todayrsquos Budget Aniket Kate 11

Lattice-based CryptographyIn this work we use the LWE assumptions to provide forwardsecurityanonymity in the post-quantum world

Post-Quantum Crypto

Some Possibilities Multivariate cryptography

Code-based cryptography

Hash-based scheme eg Merkle signatures

Lattice-based cryptography eg NTRU learning with errors (LWE)

Future Anonymity in Todayrsquos Budget Aniket Kate 12

Post-Quantum Crypto

Some Possibilities Multivariate cryptography

Code-based cryptography

Hash-based scheme eg Merkle signatures

Lattice-based cryptography eg NTRU learning with errors (LWE)

Lattice-based Cryptography In this work we use the LWE assumptions to provide forward securityanonymity in the post-quantum world

Future Anonymity in Todayrsquos Budget Aniket Kate 12

Poly(η)-time quantum reduction from approximate-SVP toRing-LWE

Decision Ring-LWE

We consider a ring Rq = Zq[x](xη + 1)

Let χ is the error distribution (Gaussian) of small elements (symmetric around 0)

Given polynomial number of samples from R2q

(a1 b1)

(a2 b2)

middot middot middot (ak bk)

Does there exist an r and e1 middot middot middot ek isin χ 3 bi = ai middot r + ei

(or) Are all birsquos uniformly random in Rq

Future Anonymity in Todayrsquos Budget Aniket Kate 13

Decision Ring-LWE

We consider a ring Rq = Zq[x](xη + 1)

Let χ is the error distribution (Gaussian) of small elements (symmetric around 0)

Given polynomial number of samples from R2q

(a1 b1)

(a2 b2)

middot middot middot (ak bk)

Does there exist an r and e1 middot middot middot ek isin χ 3 bi = ai middot r + ei

(or) Are all birsquos uniformly random in Rq

Poly(η)-time quantum reduction from approximate-SVP to Ring-LWE

Future Anonymity in Todayrsquos Budget Aniket Kate 13

The HybridOR Protocol

Generate system parameters (R η q χ) and (G g p)

Client Node (no long-term key) (long-term keys (s gs))

rc ec e larrR χ x larrR Zlowast c p

x pc g pc = arc + ec minusminusminusminusminusminusminusminusminusminusrarr rn en e larrR χn

pn = arn + en

= pcrn + ek1n n α = hR(k1n)

pnα larrminusminusminusminusminusminusminusminusminusminus

k1C = pnrc + ec sx xsk1 = fR(k1n α) k2 = g k1 = fR(k1n α) k2 = g

(established session key sk = H1(k1) oplus H2(k2))

Future Anonymity in Todayrsquos Budget Aniket Kate 14

Type-II adversary (Authentication)- The adversary can only know the secret associated with thepseudonym from the node in the test session- HybridOR is secure under the GDH assumption

Type-III adversary(Forward Security)- The adversary can only know the secret associated with the longterm public key- HybridOR is secure under the ring-LWE assumption

The HybridOR Protocol Security

Type-I adversary (Channel Secrecy) - The adversary cannot know a secret associated any public values in the test session - HybridOR is secure under any of the GDH as well as ring-LWE assumptions

Future Anonymity in Todayrsquos Budget Aniket Kate 15

Type-III adversary(Forward Security)- The adversary can only know the secret associated with the longterm public key- HybridOR is secure under the ring-LWE assumption

The HybridOR Protocol Security

Type-I adversary (Channel Secrecy) - The adversary cannot know a secret associated any public values in the test session - HybridOR is secure under any of the GDH as well as ring-LWE assumptions

Type-II adversary (Authentication) - The adversary can only know the secret associated with the pseudonym from the node in the test session - HybridOR is secure under the GDH assumption

Future Anonymity in Todayrsquos Budget Aniket Kate 15

The HybridOR Protocol Security

Type-I adversary (Channel Secrecy) - The adversary cannot know a secret associated any public values in the test session - HybridOR is secure under any of the GDH as well as ring-LWE assumptions

Type-II adversary (Authentication) - The adversary can only know the secret associated with the pseudonym from the node in the test session - HybridOR is secure under the GDH assumption

Type-III adversary(Forward Security) - The adversary can only know the secret associated with the long term public key - HybridOR is secure under the ring-LWE assumption

Future Anonymity in Todayrsquos Budget Aniket Kate 15

The HybridOR Protocol Performance

Parameters degree of the irreducible polynomial η = 512 prime modulus q = 1051649 error distribution χ parameter β = 800

Computation Cost Our HybridOR implementation is nearly 15 times faster than the ntor protocol used in Tor

Communication Cost For HybridOR the client and the node each will have to communicate three cells (Each cell is of size 512-byte)

Future Anonymity in Todayrsquos Budget Aniket Kate 16

Take Away We present a novel hybrid 1W-AKE protocol HybridOR which extracts its security from both the classically secure GDH assumption and the post-quantum secure ring-LWE assumption

We base its forward secrecy on the quantum-secure ring-LWE assumption

We leverage the current Tor PKI in its current form

Our performance analysis demonstrates that post-quantum 1W-AKE can already be considered practical for use today

Online Version httpeprintiacrorg2015008

Future Anonymity in Todayrsquos Budget Aniket Kate 17

Take Away We present a novel hybrid 1W-AKE protocol HybridOR which extracts its security from both the classically secure GDH assumption and the post-quantum secure ring-LWE assumption

We base its forward secrecy on the quantum-secure ring-LWE assumption

We leverage the current Tor PKI in its current form

Our performance analysis demonstrates that post-quantum 1W-AKE can already be considered practical for use today

Online Version httpeprintiacrorg2015008

17 Future Anonymity in Todayrsquos Budget Aniket Kate

Page 7: (Post-Quantum Forward Secure Onion Routing)Aniket Kate . The HybridOR Protocol: Security . Type-I adversary (Channel Secrecy) - The adversary cannot know a secret associated any public

Goal Making the attacker goal of linking multiplecommunication flows from a single user difficult

Onion Routing

Future Anonymity in Todayrsquos Budget Aniket Kate 5

Goal Making the attacker goal of linking multiplecommunication flows from a single user difficult

Onion Routing

Future Anonymity in Todayrsquos Budget Aniket Kate 5

Goal Making the attacker goal of linking multiplecommunication flows from a single user difficult

Onion Routing

Future Anonymity in Todayrsquos Budget Aniket Kate 5

Onion Routing

Goal Making the attacker goal of linking multiple communication flows from a single user difficult

Future Anonymity in Todayrsquos Budget Aniket Kate 5

Onion Routing Circuit Construction How Keys are Shared

This asks for one-way anonymous one-way authenticated key exchange (1W-AKE) which require a public-key infrastructure (PKI)

Future Anonymity in Todayrsquos Budget Aniket Kate 6

Protocol Correctness

1W-AKE SecurityAn attacker cannot learn anything about the session key of achallenge session even if it

compromises several other sessions and

introduces fake identities

compromise exactly one of two secrets from the node in thechallenge session

1W-AnonymityA node should not differentiate while communicating with two differentclients

1W-AKE Security [Goldberg Stebila and Ustaoglu DCC rsquo12]

Future Anonymity in Todayrsquos Budget Aniket Kate 7

1W-AKE Security [Goldberg Stebila and Ustaoglu DCC rsquo12]

Protocol Correctness

1W-AKE Security An attacker cannot learn anything about the session key of a challenge session even if it

compromises several other sessions and

introduces fake identities

compromise exactly one of two secrets from the node in the challenge session

1W-Anonymity A node should not differentiate while communicating with two different clients

Future Anonymity in Todayrsquos Budget Aniket Kate 7

SecondThird Generation Onion Routing Tor

Multi-Pass Construction (Telescoping Approach)

Future Anonymity in Todayrsquos Budget Aniket Kate 8

SecondThird Generation Onion Routing Tor

Multi-Pass Construction (Telescoping Approach)

Future Anonymity in Todayrsquos Budget Aniket Kate 8

SecondThird Generation Onion Routing Tor

Multi-Pass Construction (Telescoping Approach)

Future Anonymity in Todayrsquos Budget Aniket Kate 8

SecondThird Generation Onion Routing Tor

Multi-Pass Construction (Telescoping Approach)

Future Anonymity in Todayrsquos Budget Aniket Kate 8

SecondThird Generation Onion Routing Tor

Multi-Pass Construction (Telescoping Approach)

Future Anonymity in Todayrsquos Budget Aniket Kate 8

SecondThird Generation Onion Routing Tor

Multi-Pass Construction (Telescoping Approach)

Future Anonymity in Todayrsquos Budget Aniket Kate 8

SecondThird Generation Onion Routing Tor

Multi-Pass Construction (Telescoping Approach)

Future Anonymity in Todayrsquos Budget Aniket Kate 8

SecondThird Generation Onion Routing Tor

Multi-Pass Construction (Telescoping Approach)

Future Anonymity in Todayrsquos Budget Aniket Kate 8

The ntor 1W-AKE Protocol [Goldberg Stebila and Ustaoglu DCC rsquo12]

Let G be a multiplicative group with large prime order p Let g isin G be the generator of the group

Client Server (no public key) (long-term keys (b gb))

x g x larrR Zlowast minusminusminusminusminusminusminusminusminusminusrarr y larrR Zlowast

p p yg

larrminusminusminusminusminusminusminusminusminusminus H((gy )x (gb)x) H((gx)y (gx)b) =

yx bx) xy xb)= H(g g H(g g

xy(established session key H(g gxb))

Future Anonymity in Todayrsquos Budget Aniket Kate 9

The GDH ProblemLet G be a multiplicative group with large prime order p andg isin G be the generator of the group

Given a triple (g ga gb) for a b isinr Zlowastp the GDH problem is to find

the element gab with the help of a Decision Diffie-Hellman (DDH)oracle

The DDH oracle takes input as (G g ga gb z) for some z isin Gand tells whether z = gab

The ntor 1W-AKE Protocol Security

The 1W-AKE security of the ntor protocol is proven against the gap Diffie-Hellman (GDH) assumption

Future Anonymity in Todayrsquos Budget Aniket Kate 10

The ntor 1W-AKE Protocol Security

The 1W-AKE security of the ntor protocol is proven against the gap Diffie-Hellman (GDH) assumption

The GDH Problem Let G be a multiplicative group with large prime order p and g isin G be the generator of the group

aGiven a triple (g g gb) for a b isinr Zlowast the GDH problem is to find p

the element gab with the help of a Decision Diffie-Hellman (DDH) oracle

bThe DDH oracle takes input as (G g ga g z) for some z isin G aband tells whether z = g

Future Anonymity in Todayrsquos Budget Aniket Kate 10

So what

Security and anonymity of even todayrsquos onion routingcommunications can be violated

The Tor community

will be hesitant to completely changing the public keyinfrastructure (PKI)questions the performance penalty

ChallengeDesign a 1W-AKE scheme that offers forward security in thepost-quantum world without significantly affecting the currentinfrastructure and performance

When the Quantum computer arrives

This 1W-AKE scheme will no longer be secure

Future Anonymity in Todayrsquos Budget Aniket Kate 11

Security and anonymity of even todayrsquos onion routingcommunications can be violated

The Tor community

will be hesitant to completely changing the public keyinfrastructure (PKI)questions the performance penalty

ChallengeDesign a 1W-AKE scheme that offers forward security in thepost-quantum world without significantly affecting the currentinfrastructure and performance

When the Quantum computer arrives

This 1W-AKE scheme will no longer be secure

So what

Future Anonymity in Todayrsquos Budget Aniket Kate 11

The Tor community

will be hesitant to completely changing the public keyinfrastructure (PKI)questions the performance penalty

ChallengeDesign a 1W-AKE scheme that offers forward security in thepost-quantum world without significantly affecting the currentinfrastructure and performance

When the Quantum computer arrives

This 1W-AKE scheme will no longer be secure

So what

Security and anonymity of even todayrsquos onion routing communications can be violated

Future Anonymity in Todayrsquos Budget Aniket Kate 11

ChallengeDesign a 1W-AKE scheme that offers forward security in thepost-quantum world without significantly affecting the currentinfrastructure and performance

When the Quantum computer arrives

This 1W-AKE scheme will no longer be secure

So what

Security and anonymity of even todayrsquos onion routing communications can be violated

The Tor community

will be hesitant to completely changing the public key infrastructure (PKI) questions the performance penalty

Future Anonymity in Todayrsquos Budget Aniket Kate 11

When the Quantum computer arrives

This 1W-AKE scheme will no longer be secure

So what

Security and anonymity of even todayrsquos onion routing communications can be violated

The Tor community

will be hesitant to completely changing the public key infrastructure (PKI) questions the performance penalty

Challenge Design a 1W-AKE scheme that offers forward security in the post-quantum world without significantly affecting the current infrastructure and performance

Future Anonymity in Todayrsquos Budget Aniket Kate 11

Lattice-based CryptographyIn this work we use the LWE assumptions to provide forwardsecurityanonymity in the post-quantum world

Post-Quantum Crypto

Some Possibilities Multivariate cryptography

Code-based cryptography

Hash-based scheme eg Merkle signatures

Lattice-based cryptography eg NTRU learning with errors (LWE)

Future Anonymity in Todayrsquos Budget Aniket Kate 12

Post-Quantum Crypto

Some Possibilities Multivariate cryptography

Code-based cryptography

Hash-based scheme eg Merkle signatures

Lattice-based cryptography eg NTRU learning with errors (LWE)

Lattice-based Cryptography In this work we use the LWE assumptions to provide forward securityanonymity in the post-quantum world

Future Anonymity in Todayrsquos Budget Aniket Kate 12

Poly(η)-time quantum reduction from approximate-SVP toRing-LWE

Decision Ring-LWE

We consider a ring Rq = Zq[x](xη + 1)

Let χ is the error distribution (Gaussian) of small elements (symmetric around 0)

Given polynomial number of samples from R2q

(a1 b1)

(a2 b2)

middot middot middot (ak bk)

Does there exist an r and e1 middot middot middot ek isin χ 3 bi = ai middot r + ei

(or) Are all birsquos uniformly random in Rq

Future Anonymity in Todayrsquos Budget Aniket Kate 13

Decision Ring-LWE

We consider a ring Rq = Zq[x](xη + 1)

Let χ is the error distribution (Gaussian) of small elements (symmetric around 0)

Given polynomial number of samples from R2q

(a1 b1)

(a2 b2)

middot middot middot (ak bk)

Does there exist an r and e1 middot middot middot ek isin χ 3 bi = ai middot r + ei

(or) Are all birsquos uniformly random in Rq

Poly(η)-time quantum reduction from approximate-SVP to Ring-LWE

Future Anonymity in Todayrsquos Budget Aniket Kate 13

The HybridOR Protocol

Generate system parameters (R η q χ) and (G g p)

Client Node (no long-term key) (long-term keys (s gs))

rc ec e larrR χ x larrR Zlowast c p

x pc g pc = arc + ec minusminusminusminusminusminusminusminusminusminusrarr rn en e larrR χn

pn = arn + en

= pcrn + ek1n n α = hR(k1n)

pnα larrminusminusminusminusminusminusminusminusminusminus

k1C = pnrc + ec sx xsk1 = fR(k1n α) k2 = g k1 = fR(k1n α) k2 = g

(established session key sk = H1(k1) oplus H2(k2))

Future Anonymity in Todayrsquos Budget Aniket Kate 14

Type-II adversary (Authentication)- The adversary can only know the secret associated with thepseudonym from the node in the test session- HybridOR is secure under the GDH assumption

Type-III adversary(Forward Security)- The adversary can only know the secret associated with the longterm public key- HybridOR is secure under the ring-LWE assumption

The HybridOR Protocol Security

Type-I adversary (Channel Secrecy) - The adversary cannot know a secret associated any public values in the test session - HybridOR is secure under any of the GDH as well as ring-LWE assumptions

Future Anonymity in Todayrsquos Budget Aniket Kate 15

Type-III adversary(Forward Security)- The adversary can only know the secret associated with the longterm public key- HybridOR is secure under the ring-LWE assumption

The HybridOR Protocol Security

Type-I adversary (Channel Secrecy) - The adversary cannot know a secret associated any public values in the test session - HybridOR is secure under any of the GDH as well as ring-LWE assumptions

Type-II adversary (Authentication) - The adversary can only know the secret associated with the pseudonym from the node in the test session - HybridOR is secure under the GDH assumption

Future Anonymity in Todayrsquos Budget Aniket Kate 15

The HybridOR Protocol Security

Type-I adversary (Channel Secrecy) - The adversary cannot know a secret associated any public values in the test session - HybridOR is secure under any of the GDH as well as ring-LWE assumptions

Type-II adversary (Authentication) - The adversary can only know the secret associated with the pseudonym from the node in the test session - HybridOR is secure under the GDH assumption

Type-III adversary(Forward Security) - The adversary can only know the secret associated with the long term public key - HybridOR is secure under the ring-LWE assumption

Future Anonymity in Todayrsquos Budget Aniket Kate 15

The HybridOR Protocol Performance

Parameters degree of the irreducible polynomial η = 512 prime modulus q = 1051649 error distribution χ parameter β = 800

Computation Cost Our HybridOR implementation is nearly 15 times faster than the ntor protocol used in Tor

Communication Cost For HybridOR the client and the node each will have to communicate three cells (Each cell is of size 512-byte)

Future Anonymity in Todayrsquos Budget Aniket Kate 16

Take Away We present a novel hybrid 1W-AKE protocol HybridOR which extracts its security from both the classically secure GDH assumption and the post-quantum secure ring-LWE assumption

We base its forward secrecy on the quantum-secure ring-LWE assumption

We leverage the current Tor PKI in its current form

Our performance analysis demonstrates that post-quantum 1W-AKE can already be considered practical for use today

Online Version httpeprintiacrorg2015008

Future Anonymity in Todayrsquos Budget Aniket Kate 17

Take Away We present a novel hybrid 1W-AKE protocol HybridOR which extracts its security from both the classically secure GDH assumption and the post-quantum secure ring-LWE assumption

We base its forward secrecy on the quantum-secure ring-LWE assumption

We leverage the current Tor PKI in its current form

Our performance analysis demonstrates that post-quantum 1W-AKE can already be considered practical for use today

Online Version httpeprintiacrorg2015008

17 Future Anonymity in Todayrsquos Budget Aniket Kate

Page 8: (Post-Quantum Forward Secure Onion Routing)Aniket Kate . The HybridOR Protocol: Security . Type-I adversary (Channel Secrecy) - The adversary cannot know a secret associated any public

Goal Making the attacker goal of linking multiplecommunication flows from a single user difficult

Onion Routing

Future Anonymity in Todayrsquos Budget Aniket Kate 5

Goal Making the attacker goal of linking multiplecommunication flows from a single user difficult

Onion Routing

Future Anonymity in Todayrsquos Budget Aniket Kate 5

Onion Routing

Goal Making the attacker goal of linking multiple communication flows from a single user difficult

Future Anonymity in Todayrsquos Budget Aniket Kate 5

Onion Routing Circuit Construction How Keys are Shared

This asks for one-way anonymous one-way authenticated key exchange (1W-AKE) which require a public-key infrastructure (PKI)

Future Anonymity in Todayrsquos Budget Aniket Kate 6

Protocol Correctness

1W-AKE SecurityAn attacker cannot learn anything about the session key of achallenge session even if it

compromises several other sessions and

introduces fake identities

compromise exactly one of two secrets from the node in thechallenge session

1W-AnonymityA node should not differentiate while communicating with two differentclients

1W-AKE Security [Goldberg Stebila and Ustaoglu DCC rsquo12]

Future Anonymity in Todayrsquos Budget Aniket Kate 7

1W-AKE Security [Goldberg Stebila and Ustaoglu DCC rsquo12]

Protocol Correctness

1W-AKE Security An attacker cannot learn anything about the session key of a challenge session even if it

compromises several other sessions and

introduces fake identities

compromise exactly one of two secrets from the node in the challenge session

1W-Anonymity A node should not differentiate while communicating with two different clients

Future Anonymity in Todayrsquos Budget Aniket Kate 7

SecondThird Generation Onion Routing Tor

Multi-Pass Construction (Telescoping Approach)

Future Anonymity in Todayrsquos Budget Aniket Kate 8

SecondThird Generation Onion Routing Tor

Multi-Pass Construction (Telescoping Approach)

Future Anonymity in Todayrsquos Budget Aniket Kate 8

SecondThird Generation Onion Routing Tor

Multi-Pass Construction (Telescoping Approach)

Future Anonymity in Todayrsquos Budget Aniket Kate 8

SecondThird Generation Onion Routing Tor

Multi-Pass Construction (Telescoping Approach)

Future Anonymity in Todayrsquos Budget Aniket Kate 8

SecondThird Generation Onion Routing Tor

Multi-Pass Construction (Telescoping Approach)

Future Anonymity in Todayrsquos Budget Aniket Kate 8

SecondThird Generation Onion Routing Tor

Multi-Pass Construction (Telescoping Approach)

Future Anonymity in Todayrsquos Budget Aniket Kate 8

SecondThird Generation Onion Routing Tor

Multi-Pass Construction (Telescoping Approach)

Future Anonymity in Todayrsquos Budget Aniket Kate 8

SecondThird Generation Onion Routing Tor

Multi-Pass Construction (Telescoping Approach)

Future Anonymity in Todayrsquos Budget Aniket Kate 8

The ntor 1W-AKE Protocol [Goldberg Stebila and Ustaoglu DCC rsquo12]

Let G be a multiplicative group with large prime order p Let g isin G be the generator of the group

Client Server (no public key) (long-term keys (b gb))

x g x larrR Zlowast minusminusminusminusminusminusminusminusminusminusrarr y larrR Zlowast

p p yg

larrminusminusminusminusminusminusminusminusminusminus H((gy )x (gb)x) H((gx)y (gx)b) =

yx bx) xy xb)= H(g g H(g g

xy(established session key H(g gxb))

Future Anonymity in Todayrsquos Budget Aniket Kate 9

The GDH ProblemLet G be a multiplicative group with large prime order p andg isin G be the generator of the group

Given a triple (g ga gb) for a b isinr Zlowastp the GDH problem is to find

the element gab with the help of a Decision Diffie-Hellman (DDH)oracle

The DDH oracle takes input as (G g ga gb z) for some z isin Gand tells whether z = gab

The ntor 1W-AKE Protocol Security

The 1W-AKE security of the ntor protocol is proven against the gap Diffie-Hellman (GDH) assumption

Future Anonymity in Todayrsquos Budget Aniket Kate 10

The ntor 1W-AKE Protocol Security

The 1W-AKE security of the ntor protocol is proven against the gap Diffie-Hellman (GDH) assumption

The GDH Problem Let G be a multiplicative group with large prime order p and g isin G be the generator of the group

aGiven a triple (g g gb) for a b isinr Zlowast the GDH problem is to find p

the element gab with the help of a Decision Diffie-Hellman (DDH) oracle

bThe DDH oracle takes input as (G g ga g z) for some z isin G aband tells whether z = g

Future Anonymity in Todayrsquos Budget Aniket Kate 10

So what

Security and anonymity of even todayrsquos onion routingcommunications can be violated

The Tor community

will be hesitant to completely changing the public keyinfrastructure (PKI)questions the performance penalty

ChallengeDesign a 1W-AKE scheme that offers forward security in thepost-quantum world without significantly affecting the currentinfrastructure and performance

When the Quantum computer arrives

This 1W-AKE scheme will no longer be secure

Future Anonymity in Todayrsquos Budget Aniket Kate 11

Security and anonymity of even todayrsquos onion routingcommunications can be violated

The Tor community

will be hesitant to completely changing the public keyinfrastructure (PKI)questions the performance penalty

ChallengeDesign a 1W-AKE scheme that offers forward security in thepost-quantum world without significantly affecting the currentinfrastructure and performance

When the Quantum computer arrives

This 1W-AKE scheme will no longer be secure

So what

Future Anonymity in Todayrsquos Budget Aniket Kate 11

The Tor community

will be hesitant to completely changing the public keyinfrastructure (PKI)questions the performance penalty

ChallengeDesign a 1W-AKE scheme that offers forward security in thepost-quantum world without significantly affecting the currentinfrastructure and performance

When the Quantum computer arrives

This 1W-AKE scheme will no longer be secure

So what

Security and anonymity of even todayrsquos onion routing communications can be violated

Future Anonymity in Todayrsquos Budget Aniket Kate 11

ChallengeDesign a 1W-AKE scheme that offers forward security in thepost-quantum world without significantly affecting the currentinfrastructure and performance

When the Quantum computer arrives

This 1W-AKE scheme will no longer be secure

So what

Security and anonymity of even todayrsquos onion routing communications can be violated

The Tor community

will be hesitant to completely changing the public key infrastructure (PKI) questions the performance penalty

Future Anonymity in Todayrsquos Budget Aniket Kate 11

When the Quantum computer arrives

This 1W-AKE scheme will no longer be secure

So what

Security and anonymity of even todayrsquos onion routing communications can be violated

The Tor community

will be hesitant to completely changing the public key infrastructure (PKI) questions the performance penalty

Challenge Design a 1W-AKE scheme that offers forward security in the post-quantum world without significantly affecting the current infrastructure and performance

Future Anonymity in Todayrsquos Budget Aniket Kate 11

Lattice-based CryptographyIn this work we use the LWE assumptions to provide forwardsecurityanonymity in the post-quantum world

Post-Quantum Crypto

Some Possibilities Multivariate cryptography

Code-based cryptography

Hash-based scheme eg Merkle signatures

Lattice-based cryptography eg NTRU learning with errors (LWE)

Future Anonymity in Todayrsquos Budget Aniket Kate 12

Post-Quantum Crypto

Some Possibilities Multivariate cryptography

Code-based cryptography

Hash-based scheme eg Merkle signatures

Lattice-based cryptography eg NTRU learning with errors (LWE)

Lattice-based Cryptography In this work we use the LWE assumptions to provide forward securityanonymity in the post-quantum world

Future Anonymity in Todayrsquos Budget Aniket Kate 12

Poly(η)-time quantum reduction from approximate-SVP toRing-LWE

Decision Ring-LWE

We consider a ring Rq = Zq[x](xη + 1)

Let χ is the error distribution (Gaussian) of small elements (symmetric around 0)

Given polynomial number of samples from R2q

(a1 b1)

(a2 b2)

middot middot middot (ak bk)

Does there exist an r and e1 middot middot middot ek isin χ 3 bi = ai middot r + ei

(or) Are all birsquos uniformly random in Rq

Future Anonymity in Todayrsquos Budget Aniket Kate 13

Decision Ring-LWE

We consider a ring Rq = Zq[x](xη + 1)

Let χ is the error distribution (Gaussian) of small elements (symmetric around 0)

Given polynomial number of samples from R2q

(a1 b1)

(a2 b2)

middot middot middot (ak bk)

Does there exist an r and e1 middot middot middot ek isin χ 3 bi = ai middot r + ei

(or) Are all birsquos uniformly random in Rq

Poly(η)-time quantum reduction from approximate-SVP to Ring-LWE

Future Anonymity in Todayrsquos Budget Aniket Kate 13

The HybridOR Protocol

Generate system parameters (R η q χ) and (G g p)

Client Node (no long-term key) (long-term keys (s gs))

rc ec e larrR χ x larrR Zlowast c p

x pc g pc = arc + ec minusminusminusminusminusminusminusminusminusminusrarr rn en e larrR χn

pn = arn + en

= pcrn + ek1n n α = hR(k1n)

pnα larrminusminusminusminusminusminusminusminusminusminus

k1C = pnrc + ec sx xsk1 = fR(k1n α) k2 = g k1 = fR(k1n α) k2 = g

(established session key sk = H1(k1) oplus H2(k2))

Future Anonymity in Todayrsquos Budget Aniket Kate 14

Type-II adversary (Authentication)- The adversary can only know the secret associated with thepseudonym from the node in the test session- HybridOR is secure under the GDH assumption

Type-III adversary(Forward Security)- The adversary can only know the secret associated with the longterm public key- HybridOR is secure under the ring-LWE assumption

The HybridOR Protocol Security

Type-I adversary (Channel Secrecy) - The adversary cannot know a secret associated any public values in the test session - HybridOR is secure under any of the GDH as well as ring-LWE assumptions

Future Anonymity in Todayrsquos Budget Aniket Kate 15

Type-III adversary(Forward Security)- The adversary can only know the secret associated with the longterm public key- HybridOR is secure under the ring-LWE assumption

The HybridOR Protocol Security

Type-I adversary (Channel Secrecy) - The adversary cannot know a secret associated any public values in the test session - HybridOR is secure under any of the GDH as well as ring-LWE assumptions

Type-II adversary (Authentication) - The adversary can only know the secret associated with the pseudonym from the node in the test session - HybridOR is secure under the GDH assumption

Future Anonymity in Todayrsquos Budget Aniket Kate 15

The HybridOR Protocol Security

Type-I adversary (Channel Secrecy) - The adversary cannot know a secret associated any public values in the test session - HybridOR is secure under any of the GDH as well as ring-LWE assumptions

Type-II adversary (Authentication) - The adversary can only know the secret associated with the pseudonym from the node in the test session - HybridOR is secure under the GDH assumption

Type-III adversary(Forward Security) - The adversary can only know the secret associated with the long term public key - HybridOR is secure under the ring-LWE assumption

Future Anonymity in Todayrsquos Budget Aniket Kate 15

The HybridOR Protocol Performance

Parameters degree of the irreducible polynomial η = 512 prime modulus q = 1051649 error distribution χ parameter β = 800

Computation Cost Our HybridOR implementation is nearly 15 times faster than the ntor protocol used in Tor

Communication Cost For HybridOR the client and the node each will have to communicate three cells (Each cell is of size 512-byte)

Future Anonymity in Todayrsquos Budget Aniket Kate 16

Take Away We present a novel hybrid 1W-AKE protocol HybridOR which extracts its security from both the classically secure GDH assumption and the post-quantum secure ring-LWE assumption

We base its forward secrecy on the quantum-secure ring-LWE assumption

We leverage the current Tor PKI in its current form

Our performance analysis demonstrates that post-quantum 1W-AKE can already be considered practical for use today

Online Version httpeprintiacrorg2015008

Future Anonymity in Todayrsquos Budget Aniket Kate 17

Take Away We present a novel hybrid 1W-AKE protocol HybridOR which extracts its security from both the classically secure GDH assumption and the post-quantum secure ring-LWE assumption

We base its forward secrecy on the quantum-secure ring-LWE assumption

We leverage the current Tor PKI in its current form

Our performance analysis demonstrates that post-quantum 1W-AKE can already be considered practical for use today

Online Version httpeprintiacrorg2015008

17 Future Anonymity in Todayrsquos Budget Aniket Kate

Page 9: (Post-Quantum Forward Secure Onion Routing)Aniket Kate . The HybridOR Protocol: Security . Type-I adversary (Channel Secrecy) - The adversary cannot know a secret associated any public

Goal Making the attacker goal of linking multiplecommunication flows from a single user difficult

Onion Routing

Future Anonymity in Todayrsquos Budget Aniket Kate 5

Onion Routing

Goal Making the attacker goal of linking multiple communication flows from a single user difficult

Future Anonymity in Todayrsquos Budget Aniket Kate 5

Onion Routing Circuit Construction How Keys are Shared

This asks for one-way anonymous one-way authenticated key exchange (1W-AKE) which require a public-key infrastructure (PKI)

Future Anonymity in Todayrsquos Budget Aniket Kate 6

Protocol Correctness

1W-AKE SecurityAn attacker cannot learn anything about the session key of achallenge session even if it

compromises several other sessions and

introduces fake identities

compromise exactly one of two secrets from the node in thechallenge session

1W-AnonymityA node should not differentiate while communicating with two differentclients

1W-AKE Security [Goldberg Stebila and Ustaoglu DCC rsquo12]

Future Anonymity in Todayrsquos Budget Aniket Kate 7

1W-AKE Security [Goldberg Stebila and Ustaoglu DCC rsquo12]

Protocol Correctness

1W-AKE Security An attacker cannot learn anything about the session key of a challenge session even if it

compromises several other sessions and

introduces fake identities

compromise exactly one of two secrets from the node in the challenge session

1W-Anonymity A node should not differentiate while communicating with two different clients

Future Anonymity in Todayrsquos Budget Aniket Kate 7

SecondThird Generation Onion Routing Tor

Multi-Pass Construction (Telescoping Approach)

Future Anonymity in Todayrsquos Budget Aniket Kate 8

SecondThird Generation Onion Routing Tor

Multi-Pass Construction (Telescoping Approach)

Future Anonymity in Todayrsquos Budget Aniket Kate 8

SecondThird Generation Onion Routing Tor

Multi-Pass Construction (Telescoping Approach)

Future Anonymity in Todayrsquos Budget Aniket Kate 8

SecondThird Generation Onion Routing Tor

Multi-Pass Construction (Telescoping Approach)

Future Anonymity in Todayrsquos Budget Aniket Kate 8

SecondThird Generation Onion Routing Tor

Multi-Pass Construction (Telescoping Approach)

Future Anonymity in Todayrsquos Budget Aniket Kate 8

SecondThird Generation Onion Routing Tor

Multi-Pass Construction (Telescoping Approach)

Future Anonymity in Todayrsquos Budget Aniket Kate 8

SecondThird Generation Onion Routing Tor

Multi-Pass Construction (Telescoping Approach)

Future Anonymity in Todayrsquos Budget Aniket Kate 8

SecondThird Generation Onion Routing Tor

Multi-Pass Construction (Telescoping Approach)

Future Anonymity in Todayrsquos Budget Aniket Kate 8

The ntor 1W-AKE Protocol [Goldberg Stebila and Ustaoglu DCC rsquo12]

Let G be a multiplicative group with large prime order p Let g isin G be the generator of the group

Client Server (no public key) (long-term keys (b gb))

x g x larrR Zlowast minusminusminusminusminusminusminusminusminusminusrarr y larrR Zlowast

p p yg

larrminusminusminusminusminusminusminusminusminusminus H((gy )x (gb)x) H((gx)y (gx)b) =

yx bx) xy xb)= H(g g H(g g

xy(established session key H(g gxb))

Future Anonymity in Todayrsquos Budget Aniket Kate 9

The GDH ProblemLet G be a multiplicative group with large prime order p andg isin G be the generator of the group

Given a triple (g ga gb) for a b isinr Zlowastp the GDH problem is to find

the element gab with the help of a Decision Diffie-Hellman (DDH)oracle

The DDH oracle takes input as (G g ga gb z) for some z isin Gand tells whether z = gab

The ntor 1W-AKE Protocol Security

The 1W-AKE security of the ntor protocol is proven against the gap Diffie-Hellman (GDH) assumption

Future Anonymity in Todayrsquos Budget Aniket Kate 10

The ntor 1W-AKE Protocol Security

The 1W-AKE security of the ntor protocol is proven against the gap Diffie-Hellman (GDH) assumption

The GDH Problem Let G be a multiplicative group with large prime order p and g isin G be the generator of the group

aGiven a triple (g g gb) for a b isinr Zlowast the GDH problem is to find p

the element gab with the help of a Decision Diffie-Hellman (DDH) oracle

bThe DDH oracle takes input as (G g ga g z) for some z isin G aband tells whether z = g

Future Anonymity in Todayrsquos Budget Aniket Kate 10

So what

Security and anonymity of even todayrsquos onion routingcommunications can be violated

The Tor community

will be hesitant to completely changing the public keyinfrastructure (PKI)questions the performance penalty

ChallengeDesign a 1W-AKE scheme that offers forward security in thepost-quantum world without significantly affecting the currentinfrastructure and performance

When the Quantum computer arrives

This 1W-AKE scheme will no longer be secure

Future Anonymity in Todayrsquos Budget Aniket Kate 11

Security and anonymity of even todayrsquos onion routingcommunications can be violated

The Tor community

will be hesitant to completely changing the public keyinfrastructure (PKI)questions the performance penalty

ChallengeDesign a 1W-AKE scheme that offers forward security in thepost-quantum world without significantly affecting the currentinfrastructure and performance

When the Quantum computer arrives

This 1W-AKE scheme will no longer be secure

So what

Future Anonymity in Todayrsquos Budget Aniket Kate 11

The Tor community

will be hesitant to completely changing the public keyinfrastructure (PKI)questions the performance penalty

ChallengeDesign a 1W-AKE scheme that offers forward security in thepost-quantum world without significantly affecting the currentinfrastructure and performance

When the Quantum computer arrives

This 1W-AKE scheme will no longer be secure

So what

Security and anonymity of even todayrsquos onion routing communications can be violated

Future Anonymity in Todayrsquos Budget Aniket Kate 11

ChallengeDesign a 1W-AKE scheme that offers forward security in thepost-quantum world without significantly affecting the currentinfrastructure and performance

When the Quantum computer arrives

This 1W-AKE scheme will no longer be secure

So what

Security and anonymity of even todayrsquos onion routing communications can be violated

The Tor community

will be hesitant to completely changing the public key infrastructure (PKI) questions the performance penalty

Future Anonymity in Todayrsquos Budget Aniket Kate 11

When the Quantum computer arrives

This 1W-AKE scheme will no longer be secure

So what

Security and anonymity of even todayrsquos onion routing communications can be violated

The Tor community

will be hesitant to completely changing the public key infrastructure (PKI) questions the performance penalty

Challenge Design a 1W-AKE scheme that offers forward security in the post-quantum world without significantly affecting the current infrastructure and performance

Future Anonymity in Todayrsquos Budget Aniket Kate 11

Lattice-based CryptographyIn this work we use the LWE assumptions to provide forwardsecurityanonymity in the post-quantum world

Post-Quantum Crypto

Some Possibilities Multivariate cryptography

Code-based cryptography

Hash-based scheme eg Merkle signatures

Lattice-based cryptography eg NTRU learning with errors (LWE)

Future Anonymity in Todayrsquos Budget Aniket Kate 12

Post-Quantum Crypto

Some Possibilities Multivariate cryptography

Code-based cryptography

Hash-based scheme eg Merkle signatures

Lattice-based cryptography eg NTRU learning with errors (LWE)

Lattice-based Cryptography In this work we use the LWE assumptions to provide forward securityanonymity in the post-quantum world

Future Anonymity in Todayrsquos Budget Aniket Kate 12

Poly(η)-time quantum reduction from approximate-SVP toRing-LWE

Decision Ring-LWE

We consider a ring Rq = Zq[x](xη + 1)

Let χ is the error distribution (Gaussian) of small elements (symmetric around 0)

Given polynomial number of samples from R2q

(a1 b1)

(a2 b2)

middot middot middot (ak bk)

Does there exist an r and e1 middot middot middot ek isin χ 3 bi = ai middot r + ei

(or) Are all birsquos uniformly random in Rq

Future Anonymity in Todayrsquos Budget Aniket Kate 13

Decision Ring-LWE

We consider a ring Rq = Zq[x](xη + 1)

Let χ is the error distribution (Gaussian) of small elements (symmetric around 0)

Given polynomial number of samples from R2q

(a1 b1)

(a2 b2)

middot middot middot (ak bk)

Does there exist an r and e1 middot middot middot ek isin χ 3 bi = ai middot r + ei

(or) Are all birsquos uniformly random in Rq

Poly(η)-time quantum reduction from approximate-SVP to Ring-LWE

Future Anonymity in Todayrsquos Budget Aniket Kate 13

The HybridOR Protocol

Generate system parameters (R η q χ) and (G g p)

Client Node (no long-term key) (long-term keys (s gs))

rc ec e larrR χ x larrR Zlowast c p

x pc g pc = arc + ec minusminusminusminusminusminusminusminusminusminusrarr rn en e larrR χn

pn = arn + en

= pcrn + ek1n n α = hR(k1n)

pnα larrminusminusminusminusminusminusminusminusminusminus

k1C = pnrc + ec sx xsk1 = fR(k1n α) k2 = g k1 = fR(k1n α) k2 = g

(established session key sk = H1(k1) oplus H2(k2))

Future Anonymity in Todayrsquos Budget Aniket Kate 14

Type-II adversary (Authentication)- The adversary can only know the secret associated with thepseudonym from the node in the test session- HybridOR is secure under the GDH assumption

Type-III adversary(Forward Security)- The adversary can only know the secret associated with the longterm public key- HybridOR is secure under the ring-LWE assumption

The HybridOR Protocol Security

Type-I adversary (Channel Secrecy) - The adversary cannot know a secret associated any public values in the test session - HybridOR is secure under any of the GDH as well as ring-LWE assumptions

Future Anonymity in Todayrsquos Budget Aniket Kate 15

Type-III adversary(Forward Security)- The adversary can only know the secret associated with the longterm public key- HybridOR is secure under the ring-LWE assumption

The HybridOR Protocol Security

Type-I adversary (Channel Secrecy) - The adversary cannot know a secret associated any public values in the test session - HybridOR is secure under any of the GDH as well as ring-LWE assumptions

Type-II adversary (Authentication) - The adversary can only know the secret associated with the pseudonym from the node in the test session - HybridOR is secure under the GDH assumption

Future Anonymity in Todayrsquos Budget Aniket Kate 15

The HybridOR Protocol Security

Type-I adversary (Channel Secrecy) - The adversary cannot know a secret associated any public values in the test session - HybridOR is secure under any of the GDH as well as ring-LWE assumptions

Type-II adversary (Authentication) - The adversary can only know the secret associated with the pseudonym from the node in the test session - HybridOR is secure under the GDH assumption

Type-III adversary(Forward Security) - The adversary can only know the secret associated with the long term public key - HybridOR is secure under the ring-LWE assumption

Future Anonymity in Todayrsquos Budget Aniket Kate 15

The HybridOR Protocol Performance

Parameters degree of the irreducible polynomial η = 512 prime modulus q = 1051649 error distribution χ parameter β = 800

Computation Cost Our HybridOR implementation is nearly 15 times faster than the ntor protocol used in Tor

Communication Cost For HybridOR the client and the node each will have to communicate three cells (Each cell is of size 512-byte)

Future Anonymity in Todayrsquos Budget Aniket Kate 16

Take Away We present a novel hybrid 1W-AKE protocol HybridOR which extracts its security from both the classically secure GDH assumption and the post-quantum secure ring-LWE assumption

We base its forward secrecy on the quantum-secure ring-LWE assumption

We leverage the current Tor PKI in its current form

Our performance analysis demonstrates that post-quantum 1W-AKE can already be considered practical for use today

Online Version httpeprintiacrorg2015008

Future Anonymity in Todayrsquos Budget Aniket Kate 17

Take Away We present a novel hybrid 1W-AKE protocol HybridOR which extracts its security from both the classically secure GDH assumption and the post-quantum secure ring-LWE assumption

We base its forward secrecy on the quantum-secure ring-LWE assumption

We leverage the current Tor PKI in its current form

Our performance analysis demonstrates that post-quantum 1W-AKE can already be considered practical for use today

Online Version httpeprintiacrorg2015008

17 Future Anonymity in Todayrsquos Budget Aniket Kate

Page 10: (Post-Quantum Forward Secure Onion Routing)Aniket Kate . The HybridOR Protocol: Security . Type-I adversary (Channel Secrecy) - The adversary cannot know a secret associated any public

Onion Routing

Goal Making the attacker goal of linking multiple communication flows from a single user difficult

Future Anonymity in Todayrsquos Budget Aniket Kate 5

Onion Routing Circuit Construction How Keys are Shared

This asks for one-way anonymous one-way authenticated key exchange (1W-AKE) which require a public-key infrastructure (PKI)

Future Anonymity in Todayrsquos Budget Aniket Kate 6

Protocol Correctness

1W-AKE SecurityAn attacker cannot learn anything about the session key of achallenge session even if it

compromises several other sessions and

introduces fake identities

compromise exactly one of two secrets from the node in thechallenge session

1W-AnonymityA node should not differentiate while communicating with two differentclients

1W-AKE Security [Goldberg Stebila and Ustaoglu DCC rsquo12]

Future Anonymity in Todayrsquos Budget Aniket Kate 7

1W-AKE Security [Goldberg Stebila and Ustaoglu DCC rsquo12]

Protocol Correctness

1W-AKE Security An attacker cannot learn anything about the session key of a challenge session even if it

compromises several other sessions and

introduces fake identities

compromise exactly one of two secrets from the node in the challenge session

1W-Anonymity A node should not differentiate while communicating with two different clients

Future Anonymity in Todayrsquos Budget Aniket Kate 7

SecondThird Generation Onion Routing Tor

Multi-Pass Construction (Telescoping Approach)

Future Anonymity in Todayrsquos Budget Aniket Kate 8

SecondThird Generation Onion Routing Tor

Multi-Pass Construction (Telescoping Approach)

Future Anonymity in Todayrsquos Budget Aniket Kate 8

SecondThird Generation Onion Routing Tor

Multi-Pass Construction (Telescoping Approach)

Future Anonymity in Todayrsquos Budget Aniket Kate 8

SecondThird Generation Onion Routing Tor

Multi-Pass Construction (Telescoping Approach)

Future Anonymity in Todayrsquos Budget Aniket Kate 8

SecondThird Generation Onion Routing Tor

Multi-Pass Construction (Telescoping Approach)

Future Anonymity in Todayrsquos Budget Aniket Kate 8

SecondThird Generation Onion Routing Tor

Multi-Pass Construction (Telescoping Approach)

Future Anonymity in Todayrsquos Budget Aniket Kate 8

SecondThird Generation Onion Routing Tor

Multi-Pass Construction (Telescoping Approach)

Future Anonymity in Todayrsquos Budget Aniket Kate 8

SecondThird Generation Onion Routing Tor

Multi-Pass Construction (Telescoping Approach)

Future Anonymity in Todayrsquos Budget Aniket Kate 8

The ntor 1W-AKE Protocol [Goldberg Stebila and Ustaoglu DCC rsquo12]

Let G be a multiplicative group with large prime order p Let g isin G be the generator of the group

Client Server (no public key) (long-term keys (b gb))

x g x larrR Zlowast minusminusminusminusminusminusminusminusminusminusrarr y larrR Zlowast

p p yg

larrminusminusminusminusminusminusminusminusminusminus H((gy )x (gb)x) H((gx)y (gx)b) =

yx bx) xy xb)= H(g g H(g g

xy(established session key H(g gxb))

Future Anonymity in Todayrsquos Budget Aniket Kate 9

The GDH ProblemLet G be a multiplicative group with large prime order p andg isin G be the generator of the group

Given a triple (g ga gb) for a b isinr Zlowastp the GDH problem is to find

the element gab with the help of a Decision Diffie-Hellman (DDH)oracle

The DDH oracle takes input as (G g ga gb z) for some z isin Gand tells whether z = gab

The ntor 1W-AKE Protocol Security

The 1W-AKE security of the ntor protocol is proven against the gap Diffie-Hellman (GDH) assumption

Future Anonymity in Todayrsquos Budget Aniket Kate 10

The ntor 1W-AKE Protocol Security

The 1W-AKE security of the ntor protocol is proven against the gap Diffie-Hellman (GDH) assumption

The GDH Problem Let G be a multiplicative group with large prime order p and g isin G be the generator of the group

aGiven a triple (g g gb) for a b isinr Zlowast the GDH problem is to find p

the element gab with the help of a Decision Diffie-Hellman (DDH) oracle

bThe DDH oracle takes input as (G g ga g z) for some z isin G aband tells whether z = g

Future Anonymity in Todayrsquos Budget Aniket Kate 10

So what

Security and anonymity of even todayrsquos onion routingcommunications can be violated

The Tor community

will be hesitant to completely changing the public keyinfrastructure (PKI)questions the performance penalty

ChallengeDesign a 1W-AKE scheme that offers forward security in thepost-quantum world without significantly affecting the currentinfrastructure and performance

When the Quantum computer arrives

This 1W-AKE scheme will no longer be secure

Future Anonymity in Todayrsquos Budget Aniket Kate 11

Security and anonymity of even todayrsquos onion routingcommunications can be violated

The Tor community

will be hesitant to completely changing the public keyinfrastructure (PKI)questions the performance penalty

ChallengeDesign a 1W-AKE scheme that offers forward security in thepost-quantum world without significantly affecting the currentinfrastructure and performance

When the Quantum computer arrives

This 1W-AKE scheme will no longer be secure

So what

Future Anonymity in Todayrsquos Budget Aniket Kate 11

The Tor community

will be hesitant to completely changing the public keyinfrastructure (PKI)questions the performance penalty

ChallengeDesign a 1W-AKE scheme that offers forward security in thepost-quantum world without significantly affecting the currentinfrastructure and performance

When the Quantum computer arrives

This 1W-AKE scheme will no longer be secure

So what

Security and anonymity of even todayrsquos onion routing communications can be violated

Future Anonymity in Todayrsquos Budget Aniket Kate 11

ChallengeDesign a 1W-AKE scheme that offers forward security in thepost-quantum world without significantly affecting the currentinfrastructure and performance

When the Quantum computer arrives

This 1W-AKE scheme will no longer be secure

So what

Security and anonymity of even todayrsquos onion routing communications can be violated

The Tor community

will be hesitant to completely changing the public key infrastructure (PKI) questions the performance penalty

Future Anonymity in Todayrsquos Budget Aniket Kate 11

When the Quantum computer arrives

This 1W-AKE scheme will no longer be secure

So what

Security and anonymity of even todayrsquos onion routing communications can be violated

The Tor community

will be hesitant to completely changing the public key infrastructure (PKI) questions the performance penalty

Challenge Design a 1W-AKE scheme that offers forward security in the post-quantum world without significantly affecting the current infrastructure and performance

Future Anonymity in Todayrsquos Budget Aniket Kate 11

Lattice-based CryptographyIn this work we use the LWE assumptions to provide forwardsecurityanonymity in the post-quantum world

Post-Quantum Crypto

Some Possibilities Multivariate cryptography

Code-based cryptography

Hash-based scheme eg Merkle signatures

Lattice-based cryptography eg NTRU learning with errors (LWE)

Future Anonymity in Todayrsquos Budget Aniket Kate 12

Post-Quantum Crypto

Some Possibilities Multivariate cryptography

Code-based cryptography

Hash-based scheme eg Merkle signatures

Lattice-based cryptography eg NTRU learning with errors (LWE)

Lattice-based Cryptography In this work we use the LWE assumptions to provide forward securityanonymity in the post-quantum world

Future Anonymity in Todayrsquos Budget Aniket Kate 12

Poly(η)-time quantum reduction from approximate-SVP toRing-LWE

Decision Ring-LWE

We consider a ring Rq = Zq[x](xη + 1)

Let χ is the error distribution (Gaussian) of small elements (symmetric around 0)

Given polynomial number of samples from R2q

(a1 b1)

(a2 b2)

middot middot middot (ak bk)

Does there exist an r and e1 middot middot middot ek isin χ 3 bi = ai middot r + ei

(or) Are all birsquos uniformly random in Rq

Future Anonymity in Todayrsquos Budget Aniket Kate 13

Decision Ring-LWE

We consider a ring Rq = Zq[x](xη + 1)

Let χ is the error distribution (Gaussian) of small elements (symmetric around 0)

Given polynomial number of samples from R2q

(a1 b1)

(a2 b2)

middot middot middot (ak bk)

Does there exist an r and e1 middot middot middot ek isin χ 3 bi = ai middot r + ei

(or) Are all birsquos uniformly random in Rq

Poly(η)-time quantum reduction from approximate-SVP to Ring-LWE

Future Anonymity in Todayrsquos Budget Aniket Kate 13

The HybridOR Protocol

Generate system parameters (R η q χ) and (G g p)

Client Node (no long-term key) (long-term keys (s gs))

rc ec e larrR χ x larrR Zlowast c p

x pc g pc = arc + ec minusminusminusminusminusminusminusminusminusminusrarr rn en e larrR χn

pn = arn + en

= pcrn + ek1n n α = hR(k1n)

pnα larrminusminusminusminusminusminusminusminusminusminus

k1C = pnrc + ec sx xsk1 = fR(k1n α) k2 = g k1 = fR(k1n α) k2 = g

(established session key sk = H1(k1) oplus H2(k2))

Future Anonymity in Todayrsquos Budget Aniket Kate 14

Type-II adversary (Authentication)- The adversary can only know the secret associated with thepseudonym from the node in the test session- HybridOR is secure under the GDH assumption

Type-III adversary(Forward Security)- The adversary can only know the secret associated with the longterm public key- HybridOR is secure under the ring-LWE assumption

The HybridOR Protocol Security

Type-I adversary (Channel Secrecy) - The adversary cannot know a secret associated any public values in the test session - HybridOR is secure under any of the GDH as well as ring-LWE assumptions

Future Anonymity in Todayrsquos Budget Aniket Kate 15

Type-III adversary(Forward Security)- The adversary can only know the secret associated with the longterm public key- HybridOR is secure under the ring-LWE assumption

The HybridOR Protocol Security

Type-I adversary (Channel Secrecy) - The adversary cannot know a secret associated any public values in the test session - HybridOR is secure under any of the GDH as well as ring-LWE assumptions

Type-II adversary (Authentication) - The adversary can only know the secret associated with the pseudonym from the node in the test session - HybridOR is secure under the GDH assumption

Future Anonymity in Todayrsquos Budget Aniket Kate 15

The HybridOR Protocol Security

Type-I adversary (Channel Secrecy) - The adversary cannot know a secret associated any public values in the test session - HybridOR is secure under any of the GDH as well as ring-LWE assumptions

Type-II adversary (Authentication) - The adversary can only know the secret associated with the pseudonym from the node in the test session - HybridOR is secure under the GDH assumption

Type-III adversary(Forward Security) - The adversary can only know the secret associated with the long term public key - HybridOR is secure under the ring-LWE assumption

Future Anonymity in Todayrsquos Budget Aniket Kate 15

The HybridOR Protocol Performance

Parameters degree of the irreducible polynomial η = 512 prime modulus q = 1051649 error distribution χ parameter β = 800

Computation Cost Our HybridOR implementation is nearly 15 times faster than the ntor protocol used in Tor

Communication Cost For HybridOR the client and the node each will have to communicate three cells (Each cell is of size 512-byte)

Future Anonymity in Todayrsquos Budget Aniket Kate 16

Take Away We present a novel hybrid 1W-AKE protocol HybridOR which extracts its security from both the classically secure GDH assumption and the post-quantum secure ring-LWE assumption

We base its forward secrecy on the quantum-secure ring-LWE assumption

We leverage the current Tor PKI in its current form

Our performance analysis demonstrates that post-quantum 1W-AKE can already be considered practical for use today

Online Version httpeprintiacrorg2015008

Future Anonymity in Todayrsquos Budget Aniket Kate 17

Take Away We present a novel hybrid 1W-AKE protocol HybridOR which extracts its security from both the classically secure GDH assumption and the post-quantum secure ring-LWE assumption

We base its forward secrecy on the quantum-secure ring-LWE assumption

We leverage the current Tor PKI in its current form

Our performance analysis demonstrates that post-quantum 1W-AKE can already be considered practical for use today

Online Version httpeprintiacrorg2015008

17 Future Anonymity in Todayrsquos Budget Aniket Kate

Page 11: (Post-Quantum Forward Secure Onion Routing)Aniket Kate . The HybridOR Protocol: Security . Type-I adversary (Channel Secrecy) - The adversary cannot know a secret associated any public

Onion Routing Circuit Construction How Keys are Shared

This asks for one-way anonymous one-way authenticated key exchange (1W-AKE) which require a public-key infrastructure (PKI)

Future Anonymity in Todayrsquos Budget Aniket Kate 6

Protocol Correctness

1W-AKE SecurityAn attacker cannot learn anything about the session key of achallenge session even if it

compromises several other sessions and

introduces fake identities

compromise exactly one of two secrets from the node in thechallenge session

1W-AnonymityA node should not differentiate while communicating with two differentclients

1W-AKE Security [Goldberg Stebila and Ustaoglu DCC rsquo12]

Future Anonymity in Todayrsquos Budget Aniket Kate 7

1W-AKE Security [Goldberg Stebila and Ustaoglu DCC rsquo12]

Protocol Correctness

1W-AKE Security An attacker cannot learn anything about the session key of a challenge session even if it

compromises several other sessions and

introduces fake identities

compromise exactly one of two secrets from the node in the challenge session

1W-Anonymity A node should not differentiate while communicating with two different clients

Future Anonymity in Todayrsquos Budget Aniket Kate 7

SecondThird Generation Onion Routing Tor

Multi-Pass Construction (Telescoping Approach)

Future Anonymity in Todayrsquos Budget Aniket Kate 8

SecondThird Generation Onion Routing Tor

Multi-Pass Construction (Telescoping Approach)

Future Anonymity in Todayrsquos Budget Aniket Kate 8

SecondThird Generation Onion Routing Tor

Multi-Pass Construction (Telescoping Approach)

Future Anonymity in Todayrsquos Budget Aniket Kate 8

SecondThird Generation Onion Routing Tor

Multi-Pass Construction (Telescoping Approach)

Future Anonymity in Todayrsquos Budget Aniket Kate 8

SecondThird Generation Onion Routing Tor

Multi-Pass Construction (Telescoping Approach)

Future Anonymity in Todayrsquos Budget Aniket Kate 8

SecondThird Generation Onion Routing Tor

Multi-Pass Construction (Telescoping Approach)

Future Anonymity in Todayrsquos Budget Aniket Kate 8

SecondThird Generation Onion Routing Tor

Multi-Pass Construction (Telescoping Approach)

Future Anonymity in Todayrsquos Budget Aniket Kate 8

SecondThird Generation Onion Routing Tor

Multi-Pass Construction (Telescoping Approach)

Future Anonymity in Todayrsquos Budget Aniket Kate 8

The ntor 1W-AKE Protocol [Goldberg Stebila and Ustaoglu DCC rsquo12]

Let G be a multiplicative group with large prime order p Let g isin G be the generator of the group

Client Server (no public key) (long-term keys (b gb))

x g x larrR Zlowast minusminusminusminusminusminusminusminusminusminusrarr y larrR Zlowast

p p yg

larrminusminusminusminusminusminusminusminusminusminus H((gy )x (gb)x) H((gx)y (gx)b) =

yx bx) xy xb)= H(g g H(g g

xy(established session key H(g gxb))

Future Anonymity in Todayrsquos Budget Aniket Kate 9

The GDH ProblemLet G be a multiplicative group with large prime order p andg isin G be the generator of the group

Given a triple (g ga gb) for a b isinr Zlowastp the GDH problem is to find

the element gab with the help of a Decision Diffie-Hellman (DDH)oracle

The DDH oracle takes input as (G g ga gb z) for some z isin Gand tells whether z = gab

The ntor 1W-AKE Protocol Security

The 1W-AKE security of the ntor protocol is proven against the gap Diffie-Hellman (GDH) assumption

Future Anonymity in Todayrsquos Budget Aniket Kate 10

The ntor 1W-AKE Protocol Security

The 1W-AKE security of the ntor protocol is proven against the gap Diffie-Hellman (GDH) assumption

The GDH Problem Let G be a multiplicative group with large prime order p and g isin G be the generator of the group

aGiven a triple (g g gb) for a b isinr Zlowast the GDH problem is to find p

the element gab with the help of a Decision Diffie-Hellman (DDH) oracle

bThe DDH oracle takes input as (G g ga g z) for some z isin G aband tells whether z = g

Future Anonymity in Todayrsquos Budget Aniket Kate 10

So what

Security and anonymity of even todayrsquos onion routingcommunications can be violated

The Tor community

will be hesitant to completely changing the public keyinfrastructure (PKI)questions the performance penalty

ChallengeDesign a 1W-AKE scheme that offers forward security in thepost-quantum world without significantly affecting the currentinfrastructure and performance

When the Quantum computer arrives

This 1W-AKE scheme will no longer be secure

Future Anonymity in Todayrsquos Budget Aniket Kate 11

Security and anonymity of even todayrsquos onion routingcommunications can be violated

The Tor community

will be hesitant to completely changing the public keyinfrastructure (PKI)questions the performance penalty

ChallengeDesign a 1W-AKE scheme that offers forward security in thepost-quantum world without significantly affecting the currentinfrastructure and performance

When the Quantum computer arrives

This 1W-AKE scheme will no longer be secure

So what

Future Anonymity in Todayrsquos Budget Aniket Kate 11

The Tor community

will be hesitant to completely changing the public keyinfrastructure (PKI)questions the performance penalty

ChallengeDesign a 1W-AKE scheme that offers forward security in thepost-quantum world without significantly affecting the currentinfrastructure and performance

When the Quantum computer arrives

This 1W-AKE scheme will no longer be secure

So what

Security and anonymity of even todayrsquos onion routing communications can be violated

Future Anonymity in Todayrsquos Budget Aniket Kate 11

ChallengeDesign a 1W-AKE scheme that offers forward security in thepost-quantum world without significantly affecting the currentinfrastructure and performance

When the Quantum computer arrives

This 1W-AKE scheme will no longer be secure

So what

Security and anonymity of even todayrsquos onion routing communications can be violated

The Tor community

will be hesitant to completely changing the public key infrastructure (PKI) questions the performance penalty

Future Anonymity in Todayrsquos Budget Aniket Kate 11

When the Quantum computer arrives

This 1W-AKE scheme will no longer be secure

So what

Security and anonymity of even todayrsquos onion routing communications can be violated

The Tor community

will be hesitant to completely changing the public key infrastructure (PKI) questions the performance penalty

Challenge Design a 1W-AKE scheme that offers forward security in the post-quantum world without significantly affecting the current infrastructure and performance

Future Anonymity in Todayrsquos Budget Aniket Kate 11

Lattice-based CryptographyIn this work we use the LWE assumptions to provide forwardsecurityanonymity in the post-quantum world

Post-Quantum Crypto

Some Possibilities Multivariate cryptography

Code-based cryptography

Hash-based scheme eg Merkle signatures

Lattice-based cryptography eg NTRU learning with errors (LWE)

Future Anonymity in Todayrsquos Budget Aniket Kate 12

Post-Quantum Crypto

Some Possibilities Multivariate cryptography

Code-based cryptography

Hash-based scheme eg Merkle signatures

Lattice-based cryptography eg NTRU learning with errors (LWE)

Lattice-based Cryptography In this work we use the LWE assumptions to provide forward securityanonymity in the post-quantum world

Future Anonymity in Todayrsquos Budget Aniket Kate 12

Poly(η)-time quantum reduction from approximate-SVP toRing-LWE

Decision Ring-LWE

We consider a ring Rq = Zq[x](xη + 1)

Let χ is the error distribution (Gaussian) of small elements (symmetric around 0)

Given polynomial number of samples from R2q

(a1 b1)

(a2 b2)

middot middot middot (ak bk)

Does there exist an r and e1 middot middot middot ek isin χ 3 bi = ai middot r + ei

(or) Are all birsquos uniformly random in Rq

Future Anonymity in Todayrsquos Budget Aniket Kate 13

Decision Ring-LWE

We consider a ring Rq = Zq[x](xη + 1)

Let χ is the error distribution (Gaussian) of small elements (symmetric around 0)

Given polynomial number of samples from R2q

(a1 b1)

(a2 b2)

middot middot middot (ak bk)

Does there exist an r and e1 middot middot middot ek isin χ 3 bi = ai middot r + ei

(or) Are all birsquos uniformly random in Rq

Poly(η)-time quantum reduction from approximate-SVP to Ring-LWE

Future Anonymity in Todayrsquos Budget Aniket Kate 13

The HybridOR Protocol

Generate system parameters (R η q χ) and (G g p)

Client Node (no long-term key) (long-term keys (s gs))

rc ec e larrR χ x larrR Zlowast c p

x pc g pc = arc + ec minusminusminusminusminusminusminusminusminusminusrarr rn en e larrR χn

pn = arn + en

= pcrn + ek1n n α = hR(k1n)

pnα larrminusminusminusminusminusminusminusminusminusminus

k1C = pnrc + ec sx xsk1 = fR(k1n α) k2 = g k1 = fR(k1n α) k2 = g

(established session key sk = H1(k1) oplus H2(k2))

Future Anonymity in Todayrsquos Budget Aniket Kate 14

Type-II adversary (Authentication)- The adversary can only know the secret associated with thepseudonym from the node in the test session- HybridOR is secure under the GDH assumption

Type-III adversary(Forward Security)- The adversary can only know the secret associated with the longterm public key- HybridOR is secure under the ring-LWE assumption

The HybridOR Protocol Security

Type-I adversary (Channel Secrecy) - The adversary cannot know a secret associated any public values in the test session - HybridOR is secure under any of the GDH as well as ring-LWE assumptions

Future Anonymity in Todayrsquos Budget Aniket Kate 15

Type-III adversary(Forward Security)- The adversary can only know the secret associated with the longterm public key- HybridOR is secure under the ring-LWE assumption

The HybridOR Protocol Security

Type-I adversary (Channel Secrecy) - The adversary cannot know a secret associated any public values in the test session - HybridOR is secure under any of the GDH as well as ring-LWE assumptions

Type-II adversary (Authentication) - The adversary can only know the secret associated with the pseudonym from the node in the test session - HybridOR is secure under the GDH assumption

Future Anonymity in Todayrsquos Budget Aniket Kate 15

The HybridOR Protocol Security

Type-I adversary (Channel Secrecy) - The adversary cannot know a secret associated any public values in the test session - HybridOR is secure under any of the GDH as well as ring-LWE assumptions

Type-II adversary (Authentication) - The adversary can only know the secret associated with the pseudonym from the node in the test session - HybridOR is secure under the GDH assumption

Type-III adversary(Forward Security) - The adversary can only know the secret associated with the long term public key - HybridOR is secure under the ring-LWE assumption

Future Anonymity in Todayrsquos Budget Aniket Kate 15

The HybridOR Protocol Performance

Parameters degree of the irreducible polynomial η = 512 prime modulus q = 1051649 error distribution χ parameter β = 800

Computation Cost Our HybridOR implementation is nearly 15 times faster than the ntor protocol used in Tor

Communication Cost For HybridOR the client and the node each will have to communicate three cells (Each cell is of size 512-byte)

Future Anonymity in Todayrsquos Budget Aniket Kate 16

Take Away We present a novel hybrid 1W-AKE protocol HybridOR which extracts its security from both the classically secure GDH assumption and the post-quantum secure ring-LWE assumption

We base its forward secrecy on the quantum-secure ring-LWE assumption

We leverage the current Tor PKI in its current form

Our performance analysis demonstrates that post-quantum 1W-AKE can already be considered practical for use today

Online Version httpeprintiacrorg2015008

Future Anonymity in Todayrsquos Budget Aniket Kate 17

Take Away We present a novel hybrid 1W-AKE protocol HybridOR which extracts its security from both the classically secure GDH assumption and the post-quantum secure ring-LWE assumption

We base its forward secrecy on the quantum-secure ring-LWE assumption

We leverage the current Tor PKI in its current form

Our performance analysis demonstrates that post-quantum 1W-AKE can already be considered practical for use today

Online Version httpeprintiacrorg2015008

17 Future Anonymity in Todayrsquos Budget Aniket Kate

Page 12: (Post-Quantum Forward Secure Onion Routing)Aniket Kate . The HybridOR Protocol: Security . Type-I adversary (Channel Secrecy) - The adversary cannot know a secret associated any public

Protocol Correctness

1W-AKE SecurityAn attacker cannot learn anything about the session key of achallenge session even if it

compromises several other sessions and

introduces fake identities

compromise exactly one of two secrets from the node in thechallenge session

1W-AnonymityA node should not differentiate while communicating with two differentclients

1W-AKE Security [Goldberg Stebila and Ustaoglu DCC rsquo12]

Future Anonymity in Todayrsquos Budget Aniket Kate 7

1W-AKE Security [Goldberg Stebila and Ustaoglu DCC rsquo12]

Protocol Correctness

1W-AKE Security An attacker cannot learn anything about the session key of a challenge session even if it

compromises several other sessions and

introduces fake identities

compromise exactly one of two secrets from the node in the challenge session

1W-Anonymity A node should not differentiate while communicating with two different clients

Future Anonymity in Todayrsquos Budget Aniket Kate 7

SecondThird Generation Onion Routing Tor

Multi-Pass Construction (Telescoping Approach)

Future Anonymity in Todayrsquos Budget Aniket Kate 8

SecondThird Generation Onion Routing Tor

Multi-Pass Construction (Telescoping Approach)

Future Anonymity in Todayrsquos Budget Aniket Kate 8

SecondThird Generation Onion Routing Tor

Multi-Pass Construction (Telescoping Approach)

Future Anonymity in Todayrsquos Budget Aniket Kate 8

SecondThird Generation Onion Routing Tor

Multi-Pass Construction (Telescoping Approach)

Future Anonymity in Todayrsquos Budget Aniket Kate 8

SecondThird Generation Onion Routing Tor

Multi-Pass Construction (Telescoping Approach)

Future Anonymity in Todayrsquos Budget Aniket Kate 8

SecondThird Generation Onion Routing Tor

Multi-Pass Construction (Telescoping Approach)

Future Anonymity in Todayrsquos Budget Aniket Kate 8

SecondThird Generation Onion Routing Tor

Multi-Pass Construction (Telescoping Approach)

Future Anonymity in Todayrsquos Budget Aniket Kate 8

SecondThird Generation Onion Routing Tor

Multi-Pass Construction (Telescoping Approach)

Future Anonymity in Todayrsquos Budget Aniket Kate 8

The ntor 1W-AKE Protocol [Goldberg Stebila and Ustaoglu DCC rsquo12]

Let G be a multiplicative group with large prime order p Let g isin G be the generator of the group

Client Server (no public key) (long-term keys (b gb))

x g x larrR Zlowast minusminusminusminusminusminusminusminusminusminusrarr y larrR Zlowast

p p yg

larrminusminusminusminusminusminusminusminusminusminus H((gy )x (gb)x) H((gx)y (gx)b) =

yx bx) xy xb)= H(g g H(g g

xy(established session key H(g gxb))

Future Anonymity in Todayrsquos Budget Aniket Kate 9

The GDH ProblemLet G be a multiplicative group with large prime order p andg isin G be the generator of the group

Given a triple (g ga gb) for a b isinr Zlowastp the GDH problem is to find

the element gab with the help of a Decision Diffie-Hellman (DDH)oracle

The DDH oracle takes input as (G g ga gb z) for some z isin Gand tells whether z = gab

The ntor 1W-AKE Protocol Security

The 1W-AKE security of the ntor protocol is proven against the gap Diffie-Hellman (GDH) assumption

Future Anonymity in Todayrsquos Budget Aniket Kate 10

The ntor 1W-AKE Protocol Security

The 1W-AKE security of the ntor protocol is proven against the gap Diffie-Hellman (GDH) assumption

The GDH Problem Let G be a multiplicative group with large prime order p and g isin G be the generator of the group

aGiven a triple (g g gb) for a b isinr Zlowast the GDH problem is to find p

the element gab with the help of a Decision Diffie-Hellman (DDH) oracle

bThe DDH oracle takes input as (G g ga g z) for some z isin G aband tells whether z = g

Future Anonymity in Todayrsquos Budget Aniket Kate 10

So what

Security and anonymity of even todayrsquos onion routingcommunications can be violated

The Tor community

will be hesitant to completely changing the public keyinfrastructure (PKI)questions the performance penalty

ChallengeDesign a 1W-AKE scheme that offers forward security in thepost-quantum world without significantly affecting the currentinfrastructure and performance

When the Quantum computer arrives

This 1W-AKE scheme will no longer be secure

Future Anonymity in Todayrsquos Budget Aniket Kate 11

Security and anonymity of even todayrsquos onion routingcommunications can be violated

The Tor community

will be hesitant to completely changing the public keyinfrastructure (PKI)questions the performance penalty

ChallengeDesign a 1W-AKE scheme that offers forward security in thepost-quantum world without significantly affecting the currentinfrastructure and performance

When the Quantum computer arrives

This 1W-AKE scheme will no longer be secure

So what

Future Anonymity in Todayrsquos Budget Aniket Kate 11

The Tor community

will be hesitant to completely changing the public keyinfrastructure (PKI)questions the performance penalty

ChallengeDesign a 1W-AKE scheme that offers forward security in thepost-quantum world without significantly affecting the currentinfrastructure and performance

When the Quantum computer arrives

This 1W-AKE scheme will no longer be secure

So what

Security and anonymity of even todayrsquos onion routing communications can be violated

Future Anonymity in Todayrsquos Budget Aniket Kate 11

ChallengeDesign a 1W-AKE scheme that offers forward security in thepost-quantum world without significantly affecting the currentinfrastructure and performance

When the Quantum computer arrives

This 1W-AKE scheme will no longer be secure

So what

Security and anonymity of even todayrsquos onion routing communications can be violated

The Tor community

will be hesitant to completely changing the public key infrastructure (PKI) questions the performance penalty

Future Anonymity in Todayrsquos Budget Aniket Kate 11

When the Quantum computer arrives

This 1W-AKE scheme will no longer be secure

So what

Security and anonymity of even todayrsquos onion routing communications can be violated

The Tor community

will be hesitant to completely changing the public key infrastructure (PKI) questions the performance penalty

Challenge Design a 1W-AKE scheme that offers forward security in the post-quantum world without significantly affecting the current infrastructure and performance

Future Anonymity in Todayrsquos Budget Aniket Kate 11

Lattice-based CryptographyIn this work we use the LWE assumptions to provide forwardsecurityanonymity in the post-quantum world

Post-Quantum Crypto

Some Possibilities Multivariate cryptography

Code-based cryptography

Hash-based scheme eg Merkle signatures

Lattice-based cryptography eg NTRU learning with errors (LWE)

Future Anonymity in Todayrsquos Budget Aniket Kate 12

Post-Quantum Crypto

Some Possibilities Multivariate cryptography

Code-based cryptography

Hash-based scheme eg Merkle signatures

Lattice-based cryptography eg NTRU learning with errors (LWE)

Lattice-based Cryptography In this work we use the LWE assumptions to provide forward securityanonymity in the post-quantum world

Future Anonymity in Todayrsquos Budget Aniket Kate 12

Poly(η)-time quantum reduction from approximate-SVP toRing-LWE

Decision Ring-LWE

We consider a ring Rq = Zq[x](xη + 1)

Let χ is the error distribution (Gaussian) of small elements (symmetric around 0)

Given polynomial number of samples from R2q

(a1 b1)

(a2 b2)

middot middot middot (ak bk)

Does there exist an r and e1 middot middot middot ek isin χ 3 bi = ai middot r + ei

(or) Are all birsquos uniformly random in Rq

Future Anonymity in Todayrsquos Budget Aniket Kate 13

Decision Ring-LWE

We consider a ring Rq = Zq[x](xη + 1)

Let χ is the error distribution (Gaussian) of small elements (symmetric around 0)

Given polynomial number of samples from R2q

(a1 b1)

(a2 b2)

middot middot middot (ak bk)

Does there exist an r and e1 middot middot middot ek isin χ 3 bi = ai middot r + ei

(or) Are all birsquos uniformly random in Rq

Poly(η)-time quantum reduction from approximate-SVP to Ring-LWE

Future Anonymity in Todayrsquos Budget Aniket Kate 13

The HybridOR Protocol

Generate system parameters (R η q χ) and (G g p)

Client Node (no long-term key) (long-term keys (s gs))

rc ec e larrR χ x larrR Zlowast c p

x pc g pc = arc + ec minusminusminusminusminusminusminusminusminusminusrarr rn en e larrR χn

pn = arn + en

= pcrn + ek1n n α = hR(k1n)

pnα larrminusminusminusminusminusminusminusminusminusminus

k1C = pnrc + ec sx xsk1 = fR(k1n α) k2 = g k1 = fR(k1n α) k2 = g

(established session key sk = H1(k1) oplus H2(k2))

Future Anonymity in Todayrsquos Budget Aniket Kate 14

Type-II adversary (Authentication)- The adversary can only know the secret associated with thepseudonym from the node in the test session- HybridOR is secure under the GDH assumption

Type-III adversary(Forward Security)- The adversary can only know the secret associated with the longterm public key- HybridOR is secure under the ring-LWE assumption

The HybridOR Protocol Security

Type-I adversary (Channel Secrecy) - The adversary cannot know a secret associated any public values in the test session - HybridOR is secure under any of the GDH as well as ring-LWE assumptions

Future Anonymity in Todayrsquos Budget Aniket Kate 15

Type-III adversary(Forward Security)- The adversary can only know the secret associated with the longterm public key- HybridOR is secure under the ring-LWE assumption

The HybridOR Protocol Security

Type-I adversary (Channel Secrecy) - The adversary cannot know a secret associated any public values in the test session - HybridOR is secure under any of the GDH as well as ring-LWE assumptions

Type-II adversary (Authentication) - The adversary can only know the secret associated with the pseudonym from the node in the test session - HybridOR is secure under the GDH assumption

Future Anonymity in Todayrsquos Budget Aniket Kate 15

The HybridOR Protocol Security

Type-I adversary (Channel Secrecy) - The adversary cannot know a secret associated any public values in the test session - HybridOR is secure under any of the GDH as well as ring-LWE assumptions

Type-II adversary (Authentication) - The adversary can only know the secret associated with the pseudonym from the node in the test session - HybridOR is secure under the GDH assumption

Type-III adversary(Forward Security) - The adversary can only know the secret associated with the long term public key - HybridOR is secure under the ring-LWE assumption

Future Anonymity in Todayrsquos Budget Aniket Kate 15

The HybridOR Protocol Performance

Parameters degree of the irreducible polynomial η = 512 prime modulus q = 1051649 error distribution χ parameter β = 800

Computation Cost Our HybridOR implementation is nearly 15 times faster than the ntor protocol used in Tor

Communication Cost For HybridOR the client and the node each will have to communicate three cells (Each cell is of size 512-byte)

Future Anonymity in Todayrsquos Budget Aniket Kate 16

Take Away We present a novel hybrid 1W-AKE protocol HybridOR which extracts its security from both the classically secure GDH assumption and the post-quantum secure ring-LWE assumption

We base its forward secrecy on the quantum-secure ring-LWE assumption

We leverage the current Tor PKI in its current form

Our performance analysis demonstrates that post-quantum 1W-AKE can already be considered practical for use today

Online Version httpeprintiacrorg2015008

Future Anonymity in Todayrsquos Budget Aniket Kate 17

Take Away We present a novel hybrid 1W-AKE protocol HybridOR which extracts its security from both the classically secure GDH assumption and the post-quantum secure ring-LWE assumption

We base its forward secrecy on the quantum-secure ring-LWE assumption

We leverage the current Tor PKI in its current form

Our performance analysis demonstrates that post-quantum 1W-AKE can already be considered practical for use today

Online Version httpeprintiacrorg2015008

17 Future Anonymity in Todayrsquos Budget Aniket Kate

Page 13: (Post-Quantum Forward Secure Onion Routing)Aniket Kate . The HybridOR Protocol: Security . Type-I adversary (Channel Secrecy) - The adversary cannot know a secret associated any public

1W-AKE Security [Goldberg Stebila and Ustaoglu DCC rsquo12]

Protocol Correctness

1W-AKE Security An attacker cannot learn anything about the session key of a challenge session even if it

compromises several other sessions and

introduces fake identities

compromise exactly one of two secrets from the node in the challenge session

1W-Anonymity A node should not differentiate while communicating with two different clients

Future Anonymity in Todayrsquos Budget Aniket Kate 7

SecondThird Generation Onion Routing Tor

Multi-Pass Construction (Telescoping Approach)

Future Anonymity in Todayrsquos Budget Aniket Kate 8

SecondThird Generation Onion Routing Tor

Multi-Pass Construction (Telescoping Approach)

Future Anonymity in Todayrsquos Budget Aniket Kate 8

SecondThird Generation Onion Routing Tor

Multi-Pass Construction (Telescoping Approach)

Future Anonymity in Todayrsquos Budget Aniket Kate 8

SecondThird Generation Onion Routing Tor

Multi-Pass Construction (Telescoping Approach)

Future Anonymity in Todayrsquos Budget Aniket Kate 8

SecondThird Generation Onion Routing Tor

Multi-Pass Construction (Telescoping Approach)

Future Anonymity in Todayrsquos Budget Aniket Kate 8

SecondThird Generation Onion Routing Tor

Multi-Pass Construction (Telescoping Approach)

Future Anonymity in Todayrsquos Budget Aniket Kate 8

SecondThird Generation Onion Routing Tor

Multi-Pass Construction (Telescoping Approach)

Future Anonymity in Todayrsquos Budget Aniket Kate 8

SecondThird Generation Onion Routing Tor

Multi-Pass Construction (Telescoping Approach)

Future Anonymity in Todayrsquos Budget Aniket Kate 8

The ntor 1W-AKE Protocol [Goldberg Stebila and Ustaoglu DCC rsquo12]

Let G be a multiplicative group with large prime order p Let g isin G be the generator of the group

Client Server (no public key) (long-term keys (b gb))

x g x larrR Zlowast minusminusminusminusminusminusminusminusminusminusrarr y larrR Zlowast

p p yg

larrminusminusminusminusminusminusminusminusminusminus H((gy )x (gb)x) H((gx)y (gx)b) =

yx bx) xy xb)= H(g g H(g g

xy(established session key H(g gxb))

Future Anonymity in Todayrsquos Budget Aniket Kate 9

The GDH ProblemLet G be a multiplicative group with large prime order p andg isin G be the generator of the group

Given a triple (g ga gb) for a b isinr Zlowastp the GDH problem is to find

the element gab with the help of a Decision Diffie-Hellman (DDH)oracle

The DDH oracle takes input as (G g ga gb z) for some z isin Gand tells whether z = gab

The ntor 1W-AKE Protocol Security

The 1W-AKE security of the ntor protocol is proven against the gap Diffie-Hellman (GDH) assumption

Future Anonymity in Todayrsquos Budget Aniket Kate 10

The ntor 1W-AKE Protocol Security

The 1W-AKE security of the ntor protocol is proven against the gap Diffie-Hellman (GDH) assumption

The GDH Problem Let G be a multiplicative group with large prime order p and g isin G be the generator of the group

aGiven a triple (g g gb) for a b isinr Zlowast the GDH problem is to find p

the element gab with the help of a Decision Diffie-Hellman (DDH) oracle

bThe DDH oracle takes input as (G g ga g z) for some z isin G aband tells whether z = g

Future Anonymity in Todayrsquos Budget Aniket Kate 10

So what

Security and anonymity of even todayrsquos onion routingcommunications can be violated

The Tor community

will be hesitant to completely changing the public keyinfrastructure (PKI)questions the performance penalty

ChallengeDesign a 1W-AKE scheme that offers forward security in thepost-quantum world without significantly affecting the currentinfrastructure and performance

When the Quantum computer arrives

This 1W-AKE scheme will no longer be secure

Future Anonymity in Todayrsquos Budget Aniket Kate 11

Security and anonymity of even todayrsquos onion routingcommunications can be violated

The Tor community

will be hesitant to completely changing the public keyinfrastructure (PKI)questions the performance penalty

ChallengeDesign a 1W-AKE scheme that offers forward security in thepost-quantum world without significantly affecting the currentinfrastructure and performance

When the Quantum computer arrives

This 1W-AKE scheme will no longer be secure

So what

Future Anonymity in Todayrsquos Budget Aniket Kate 11

The Tor community

will be hesitant to completely changing the public keyinfrastructure (PKI)questions the performance penalty

ChallengeDesign a 1W-AKE scheme that offers forward security in thepost-quantum world without significantly affecting the currentinfrastructure and performance

When the Quantum computer arrives

This 1W-AKE scheme will no longer be secure

So what

Security and anonymity of even todayrsquos onion routing communications can be violated

Future Anonymity in Todayrsquos Budget Aniket Kate 11

ChallengeDesign a 1W-AKE scheme that offers forward security in thepost-quantum world without significantly affecting the currentinfrastructure and performance

When the Quantum computer arrives

This 1W-AKE scheme will no longer be secure

So what

Security and anonymity of even todayrsquos onion routing communications can be violated

The Tor community

will be hesitant to completely changing the public key infrastructure (PKI) questions the performance penalty

Future Anonymity in Todayrsquos Budget Aniket Kate 11

When the Quantum computer arrives

This 1W-AKE scheme will no longer be secure

So what

Security and anonymity of even todayrsquos onion routing communications can be violated

The Tor community

will be hesitant to completely changing the public key infrastructure (PKI) questions the performance penalty

Challenge Design a 1W-AKE scheme that offers forward security in the post-quantum world without significantly affecting the current infrastructure and performance

Future Anonymity in Todayrsquos Budget Aniket Kate 11

Lattice-based CryptographyIn this work we use the LWE assumptions to provide forwardsecurityanonymity in the post-quantum world

Post-Quantum Crypto

Some Possibilities Multivariate cryptography

Code-based cryptography

Hash-based scheme eg Merkle signatures

Lattice-based cryptography eg NTRU learning with errors (LWE)

Future Anonymity in Todayrsquos Budget Aniket Kate 12

Post-Quantum Crypto

Some Possibilities Multivariate cryptography

Code-based cryptography

Hash-based scheme eg Merkle signatures

Lattice-based cryptography eg NTRU learning with errors (LWE)

Lattice-based Cryptography In this work we use the LWE assumptions to provide forward securityanonymity in the post-quantum world

Future Anonymity in Todayrsquos Budget Aniket Kate 12

Poly(η)-time quantum reduction from approximate-SVP toRing-LWE

Decision Ring-LWE

We consider a ring Rq = Zq[x](xη + 1)

Let χ is the error distribution (Gaussian) of small elements (symmetric around 0)

Given polynomial number of samples from R2q

(a1 b1)

(a2 b2)

middot middot middot (ak bk)

Does there exist an r and e1 middot middot middot ek isin χ 3 bi = ai middot r + ei

(or) Are all birsquos uniformly random in Rq

Future Anonymity in Todayrsquos Budget Aniket Kate 13

Decision Ring-LWE

We consider a ring Rq = Zq[x](xη + 1)

Let χ is the error distribution (Gaussian) of small elements (symmetric around 0)

Given polynomial number of samples from R2q

(a1 b1)

(a2 b2)

middot middot middot (ak bk)

Does there exist an r and e1 middot middot middot ek isin χ 3 bi = ai middot r + ei

(or) Are all birsquos uniformly random in Rq

Poly(η)-time quantum reduction from approximate-SVP to Ring-LWE

Future Anonymity in Todayrsquos Budget Aniket Kate 13

The HybridOR Protocol

Generate system parameters (R η q χ) and (G g p)

Client Node (no long-term key) (long-term keys (s gs))

rc ec e larrR χ x larrR Zlowast c p

x pc g pc = arc + ec minusminusminusminusminusminusminusminusminusminusrarr rn en e larrR χn

pn = arn + en

= pcrn + ek1n n α = hR(k1n)

pnα larrminusminusminusminusminusminusminusminusminusminus

k1C = pnrc + ec sx xsk1 = fR(k1n α) k2 = g k1 = fR(k1n α) k2 = g

(established session key sk = H1(k1) oplus H2(k2))

Future Anonymity in Todayrsquos Budget Aniket Kate 14

Type-II adversary (Authentication)- The adversary can only know the secret associated with thepseudonym from the node in the test session- HybridOR is secure under the GDH assumption

Type-III adversary(Forward Security)- The adversary can only know the secret associated with the longterm public key- HybridOR is secure under the ring-LWE assumption

The HybridOR Protocol Security

Type-I adversary (Channel Secrecy) - The adversary cannot know a secret associated any public values in the test session - HybridOR is secure under any of the GDH as well as ring-LWE assumptions

Future Anonymity in Todayrsquos Budget Aniket Kate 15

Type-III adversary(Forward Security)- The adversary can only know the secret associated with the longterm public key- HybridOR is secure under the ring-LWE assumption

The HybridOR Protocol Security

Type-I adversary (Channel Secrecy) - The adversary cannot know a secret associated any public values in the test session - HybridOR is secure under any of the GDH as well as ring-LWE assumptions

Type-II adversary (Authentication) - The adversary can only know the secret associated with the pseudonym from the node in the test session - HybridOR is secure under the GDH assumption

Future Anonymity in Todayrsquos Budget Aniket Kate 15

The HybridOR Protocol Security

Type-I adversary (Channel Secrecy) - The adversary cannot know a secret associated any public values in the test session - HybridOR is secure under any of the GDH as well as ring-LWE assumptions

Type-II adversary (Authentication) - The adversary can only know the secret associated with the pseudonym from the node in the test session - HybridOR is secure under the GDH assumption

Type-III adversary(Forward Security) - The adversary can only know the secret associated with the long term public key - HybridOR is secure under the ring-LWE assumption

Future Anonymity in Todayrsquos Budget Aniket Kate 15

The HybridOR Protocol Performance

Parameters degree of the irreducible polynomial η = 512 prime modulus q = 1051649 error distribution χ parameter β = 800

Computation Cost Our HybridOR implementation is nearly 15 times faster than the ntor protocol used in Tor

Communication Cost For HybridOR the client and the node each will have to communicate three cells (Each cell is of size 512-byte)

Future Anonymity in Todayrsquos Budget Aniket Kate 16

Take Away We present a novel hybrid 1W-AKE protocol HybridOR which extracts its security from both the classically secure GDH assumption and the post-quantum secure ring-LWE assumption

We base its forward secrecy on the quantum-secure ring-LWE assumption

We leverage the current Tor PKI in its current form

Our performance analysis demonstrates that post-quantum 1W-AKE can already be considered practical for use today

Online Version httpeprintiacrorg2015008

Future Anonymity in Todayrsquos Budget Aniket Kate 17

Take Away We present a novel hybrid 1W-AKE protocol HybridOR which extracts its security from both the classically secure GDH assumption and the post-quantum secure ring-LWE assumption

We base its forward secrecy on the quantum-secure ring-LWE assumption

We leverage the current Tor PKI in its current form

Our performance analysis demonstrates that post-quantum 1W-AKE can already be considered practical for use today

Online Version httpeprintiacrorg2015008

17 Future Anonymity in Todayrsquos Budget Aniket Kate

Page 14: (Post-Quantum Forward Secure Onion Routing)Aniket Kate . The HybridOR Protocol: Security . Type-I adversary (Channel Secrecy) - The adversary cannot know a secret associated any public

SecondThird Generation Onion Routing Tor

Multi-Pass Construction (Telescoping Approach)

Future Anonymity in Todayrsquos Budget Aniket Kate 8

SecondThird Generation Onion Routing Tor

Multi-Pass Construction (Telescoping Approach)

Future Anonymity in Todayrsquos Budget Aniket Kate 8

SecondThird Generation Onion Routing Tor

Multi-Pass Construction (Telescoping Approach)

Future Anonymity in Todayrsquos Budget Aniket Kate 8

SecondThird Generation Onion Routing Tor

Multi-Pass Construction (Telescoping Approach)

Future Anonymity in Todayrsquos Budget Aniket Kate 8

SecondThird Generation Onion Routing Tor

Multi-Pass Construction (Telescoping Approach)

Future Anonymity in Todayrsquos Budget Aniket Kate 8

SecondThird Generation Onion Routing Tor

Multi-Pass Construction (Telescoping Approach)

Future Anonymity in Todayrsquos Budget Aniket Kate 8

SecondThird Generation Onion Routing Tor

Multi-Pass Construction (Telescoping Approach)

Future Anonymity in Todayrsquos Budget Aniket Kate 8

SecondThird Generation Onion Routing Tor

Multi-Pass Construction (Telescoping Approach)

Future Anonymity in Todayrsquos Budget Aniket Kate 8

The ntor 1W-AKE Protocol [Goldberg Stebila and Ustaoglu DCC rsquo12]

Let G be a multiplicative group with large prime order p Let g isin G be the generator of the group

Client Server (no public key) (long-term keys (b gb))

x g x larrR Zlowast minusminusminusminusminusminusminusminusminusminusrarr y larrR Zlowast

p p yg

larrminusminusminusminusminusminusminusminusminusminus H((gy )x (gb)x) H((gx)y (gx)b) =

yx bx) xy xb)= H(g g H(g g

xy(established session key H(g gxb))

Future Anonymity in Todayrsquos Budget Aniket Kate 9

The GDH ProblemLet G be a multiplicative group with large prime order p andg isin G be the generator of the group

Given a triple (g ga gb) for a b isinr Zlowastp the GDH problem is to find

the element gab with the help of a Decision Diffie-Hellman (DDH)oracle

The DDH oracle takes input as (G g ga gb z) for some z isin Gand tells whether z = gab

The ntor 1W-AKE Protocol Security

The 1W-AKE security of the ntor protocol is proven against the gap Diffie-Hellman (GDH) assumption

Future Anonymity in Todayrsquos Budget Aniket Kate 10

The ntor 1W-AKE Protocol Security

The 1W-AKE security of the ntor protocol is proven against the gap Diffie-Hellman (GDH) assumption

The GDH Problem Let G be a multiplicative group with large prime order p and g isin G be the generator of the group

aGiven a triple (g g gb) for a b isinr Zlowast the GDH problem is to find p

the element gab with the help of a Decision Diffie-Hellman (DDH) oracle

bThe DDH oracle takes input as (G g ga g z) for some z isin G aband tells whether z = g

Future Anonymity in Todayrsquos Budget Aniket Kate 10

So what

Security and anonymity of even todayrsquos onion routingcommunications can be violated

The Tor community

will be hesitant to completely changing the public keyinfrastructure (PKI)questions the performance penalty

ChallengeDesign a 1W-AKE scheme that offers forward security in thepost-quantum world without significantly affecting the currentinfrastructure and performance

When the Quantum computer arrives

This 1W-AKE scheme will no longer be secure

Future Anonymity in Todayrsquos Budget Aniket Kate 11

Security and anonymity of even todayrsquos onion routingcommunications can be violated

The Tor community

will be hesitant to completely changing the public keyinfrastructure (PKI)questions the performance penalty

ChallengeDesign a 1W-AKE scheme that offers forward security in thepost-quantum world without significantly affecting the currentinfrastructure and performance

When the Quantum computer arrives

This 1W-AKE scheme will no longer be secure

So what

Future Anonymity in Todayrsquos Budget Aniket Kate 11

The Tor community

will be hesitant to completely changing the public keyinfrastructure (PKI)questions the performance penalty

ChallengeDesign a 1W-AKE scheme that offers forward security in thepost-quantum world without significantly affecting the currentinfrastructure and performance

When the Quantum computer arrives

This 1W-AKE scheme will no longer be secure

So what

Security and anonymity of even todayrsquos onion routing communications can be violated

Future Anonymity in Todayrsquos Budget Aniket Kate 11

ChallengeDesign a 1W-AKE scheme that offers forward security in thepost-quantum world without significantly affecting the currentinfrastructure and performance

When the Quantum computer arrives

This 1W-AKE scheme will no longer be secure

So what

Security and anonymity of even todayrsquos onion routing communications can be violated

The Tor community

will be hesitant to completely changing the public key infrastructure (PKI) questions the performance penalty

Future Anonymity in Todayrsquos Budget Aniket Kate 11

When the Quantum computer arrives

This 1W-AKE scheme will no longer be secure

So what

Security and anonymity of even todayrsquos onion routing communications can be violated

The Tor community

will be hesitant to completely changing the public key infrastructure (PKI) questions the performance penalty

Challenge Design a 1W-AKE scheme that offers forward security in the post-quantum world without significantly affecting the current infrastructure and performance

Future Anonymity in Todayrsquos Budget Aniket Kate 11

Lattice-based CryptographyIn this work we use the LWE assumptions to provide forwardsecurityanonymity in the post-quantum world

Post-Quantum Crypto

Some Possibilities Multivariate cryptography

Code-based cryptography

Hash-based scheme eg Merkle signatures

Lattice-based cryptography eg NTRU learning with errors (LWE)

Future Anonymity in Todayrsquos Budget Aniket Kate 12

Post-Quantum Crypto

Some Possibilities Multivariate cryptography

Code-based cryptography

Hash-based scheme eg Merkle signatures

Lattice-based cryptography eg NTRU learning with errors (LWE)

Lattice-based Cryptography In this work we use the LWE assumptions to provide forward securityanonymity in the post-quantum world

Future Anonymity in Todayrsquos Budget Aniket Kate 12

Poly(η)-time quantum reduction from approximate-SVP toRing-LWE

Decision Ring-LWE

We consider a ring Rq = Zq[x](xη + 1)

Let χ is the error distribution (Gaussian) of small elements (symmetric around 0)

Given polynomial number of samples from R2q

(a1 b1)

(a2 b2)

middot middot middot (ak bk)

Does there exist an r and e1 middot middot middot ek isin χ 3 bi = ai middot r + ei

(or) Are all birsquos uniformly random in Rq

Future Anonymity in Todayrsquos Budget Aniket Kate 13

Decision Ring-LWE

We consider a ring Rq = Zq[x](xη + 1)

Let χ is the error distribution (Gaussian) of small elements (symmetric around 0)

Given polynomial number of samples from R2q

(a1 b1)

(a2 b2)

middot middot middot (ak bk)

Does there exist an r and e1 middot middot middot ek isin χ 3 bi = ai middot r + ei

(or) Are all birsquos uniformly random in Rq

Poly(η)-time quantum reduction from approximate-SVP to Ring-LWE

Future Anonymity in Todayrsquos Budget Aniket Kate 13

The HybridOR Protocol

Generate system parameters (R η q χ) and (G g p)

Client Node (no long-term key) (long-term keys (s gs))

rc ec e larrR χ x larrR Zlowast c p

x pc g pc = arc + ec minusminusminusminusminusminusminusminusminusminusrarr rn en e larrR χn

pn = arn + en

= pcrn + ek1n n α = hR(k1n)

pnα larrminusminusminusminusminusminusminusminusminusminus

k1C = pnrc + ec sx xsk1 = fR(k1n α) k2 = g k1 = fR(k1n α) k2 = g

(established session key sk = H1(k1) oplus H2(k2))

Future Anonymity in Todayrsquos Budget Aniket Kate 14

Type-II adversary (Authentication)- The adversary can only know the secret associated with thepseudonym from the node in the test session- HybridOR is secure under the GDH assumption

Type-III adversary(Forward Security)- The adversary can only know the secret associated with the longterm public key- HybridOR is secure under the ring-LWE assumption

The HybridOR Protocol Security

Type-I adversary (Channel Secrecy) - The adversary cannot know a secret associated any public values in the test session - HybridOR is secure under any of the GDH as well as ring-LWE assumptions

Future Anonymity in Todayrsquos Budget Aniket Kate 15

Type-III adversary(Forward Security)- The adversary can only know the secret associated with the longterm public key- HybridOR is secure under the ring-LWE assumption

The HybridOR Protocol Security

Type-I adversary (Channel Secrecy) - The adversary cannot know a secret associated any public values in the test session - HybridOR is secure under any of the GDH as well as ring-LWE assumptions

Type-II adversary (Authentication) - The adversary can only know the secret associated with the pseudonym from the node in the test session - HybridOR is secure under the GDH assumption

Future Anonymity in Todayrsquos Budget Aniket Kate 15

The HybridOR Protocol Security

Type-I adversary (Channel Secrecy) - The adversary cannot know a secret associated any public values in the test session - HybridOR is secure under any of the GDH as well as ring-LWE assumptions

Type-II adversary (Authentication) - The adversary can only know the secret associated with the pseudonym from the node in the test session - HybridOR is secure under the GDH assumption

Type-III adversary(Forward Security) - The adversary can only know the secret associated with the long term public key - HybridOR is secure under the ring-LWE assumption

Future Anonymity in Todayrsquos Budget Aniket Kate 15

The HybridOR Protocol Performance

Parameters degree of the irreducible polynomial η = 512 prime modulus q = 1051649 error distribution χ parameter β = 800

Computation Cost Our HybridOR implementation is nearly 15 times faster than the ntor protocol used in Tor

Communication Cost For HybridOR the client and the node each will have to communicate three cells (Each cell is of size 512-byte)

Future Anonymity in Todayrsquos Budget Aniket Kate 16

Take Away We present a novel hybrid 1W-AKE protocol HybridOR which extracts its security from both the classically secure GDH assumption and the post-quantum secure ring-LWE assumption

We base its forward secrecy on the quantum-secure ring-LWE assumption

We leverage the current Tor PKI in its current form

Our performance analysis demonstrates that post-quantum 1W-AKE can already be considered practical for use today

Online Version httpeprintiacrorg2015008

Future Anonymity in Todayrsquos Budget Aniket Kate 17

Take Away We present a novel hybrid 1W-AKE protocol HybridOR which extracts its security from both the classically secure GDH assumption and the post-quantum secure ring-LWE assumption

We base its forward secrecy on the quantum-secure ring-LWE assumption

We leverage the current Tor PKI in its current form

Our performance analysis demonstrates that post-quantum 1W-AKE can already be considered practical for use today

Online Version httpeprintiacrorg2015008

17 Future Anonymity in Todayrsquos Budget Aniket Kate

Page 15: (Post-Quantum Forward Secure Onion Routing)Aniket Kate . The HybridOR Protocol: Security . Type-I adversary (Channel Secrecy) - The adversary cannot know a secret associated any public

SecondThird Generation Onion Routing Tor

Multi-Pass Construction (Telescoping Approach)

Future Anonymity in Todayrsquos Budget Aniket Kate 8

SecondThird Generation Onion Routing Tor

Multi-Pass Construction (Telescoping Approach)

Future Anonymity in Todayrsquos Budget Aniket Kate 8

SecondThird Generation Onion Routing Tor

Multi-Pass Construction (Telescoping Approach)

Future Anonymity in Todayrsquos Budget Aniket Kate 8

SecondThird Generation Onion Routing Tor

Multi-Pass Construction (Telescoping Approach)

Future Anonymity in Todayrsquos Budget Aniket Kate 8

SecondThird Generation Onion Routing Tor

Multi-Pass Construction (Telescoping Approach)

Future Anonymity in Todayrsquos Budget Aniket Kate 8

SecondThird Generation Onion Routing Tor

Multi-Pass Construction (Telescoping Approach)

Future Anonymity in Todayrsquos Budget Aniket Kate 8

SecondThird Generation Onion Routing Tor

Multi-Pass Construction (Telescoping Approach)

Future Anonymity in Todayrsquos Budget Aniket Kate 8

The ntor 1W-AKE Protocol [Goldberg Stebila and Ustaoglu DCC rsquo12]

Let G be a multiplicative group with large prime order p Let g isin G be the generator of the group

Client Server (no public key) (long-term keys (b gb))

x g x larrR Zlowast minusminusminusminusminusminusminusminusminusminusrarr y larrR Zlowast

p p yg

larrminusminusminusminusminusminusminusminusminusminus H((gy )x (gb)x) H((gx)y (gx)b) =

yx bx) xy xb)= H(g g H(g g

xy(established session key H(g gxb))

Future Anonymity in Todayrsquos Budget Aniket Kate 9

The GDH ProblemLet G be a multiplicative group with large prime order p andg isin G be the generator of the group

Given a triple (g ga gb) for a b isinr Zlowastp the GDH problem is to find

the element gab with the help of a Decision Diffie-Hellman (DDH)oracle

The DDH oracle takes input as (G g ga gb z) for some z isin Gand tells whether z = gab

The ntor 1W-AKE Protocol Security

The 1W-AKE security of the ntor protocol is proven against the gap Diffie-Hellman (GDH) assumption

Future Anonymity in Todayrsquos Budget Aniket Kate 10

The ntor 1W-AKE Protocol Security

The 1W-AKE security of the ntor protocol is proven against the gap Diffie-Hellman (GDH) assumption

The GDH Problem Let G be a multiplicative group with large prime order p and g isin G be the generator of the group

aGiven a triple (g g gb) for a b isinr Zlowast the GDH problem is to find p

the element gab with the help of a Decision Diffie-Hellman (DDH) oracle

bThe DDH oracle takes input as (G g ga g z) for some z isin G aband tells whether z = g

Future Anonymity in Todayrsquos Budget Aniket Kate 10

So what

Security and anonymity of even todayrsquos onion routingcommunications can be violated

The Tor community

will be hesitant to completely changing the public keyinfrastructure (PKI)questions the performance penalty

ChallengeDesign a 1W-AKE scheme that offers forward security in thepost-quantum world without significantly affecting the currentinfrastructure and performance

When the Quantum computer arrives

This 1W-AKE scheme will no longer be secure

Future Anonymity in Todayrsquos Budget Aniket Kate 11

Security and anonymity of even todayrsquos onion routingcommunications can be violated

The Tor community

will be hesitant to completely changing the public keyinfrastructure (PKI)questions the performance penalty

ChallengeDesign a 1W-AKE scheme that offers forward security in thepost-quantum world without significantly affecting the currentinfrastructure and performance

When the Quantum computer arrives

This 1W-AKE scheme will no longer be secure

So what

Future Anonymity in Todayrsquos Budget Aniket Kate 11

The Tor community

will be hesitant to completely changing the public keyinfrastructure (PKI)questions the performance penalty

ChallengeDesign a 1W-AKE scheme that offers forward security in thepost-quantum world without significantly affecting the currentinfrastructure and performance

When the Quantum computer arrives

This 1W-AKE scheme will no longer be secure

So what

Security and anonymity of even todayrsquos onion routing communications can be violated

Future Anonymity in Todayrsquos Budget Aniket Kate 11

ChallengeDesign a 1W-AKE scheme that offers forward security in thepost-quantum world without significantly affecting the currentinfrastructure and performance

When the Quantum computer arrives

This 1W-AKE scheme will no longer be secure

So what

Security and anonymity of even todayrsquos onion routing communications can be violated

The Tor community

will be hesitant to completely changing the public key infrastructure (PKI) questions the performance penalty

Future Anonymity in Todayrsquos Budget Aniket Kate 11

When the Quantum computer arrives

This 1W-AKE scheme will no longer be secure

So what

Security and anonymity of even todayrsquos onion routing communications can be violated

The Tor community

will be hesitant to completely changing the public key infrastructure (PKI) questions the performance penalty

Challenge Design a 1W-AKE scheme that offers forward security in the post-quantum world without significantly affecting the current infrastructure and performance

Future Anonymity in Todayrsquos Budget Aniket Kate 11

Lattice-based CryptographyIn this work we use the LWE assumptions to provide forwardsecurityanonymity in the post-quantum world

Post-Quantum Crypto

Some Possibilities Multivariate cryptography

Code-based cryptography

Hash-based scheme eg Merkle signatures

Lattice-based cryptography eg NTRU learning with errors (LWE)

Future Anonymity in Todayrsquos Budget Aniket Kate 12

Post-Quantum Crypto

Some Possibilities Multivariate cryptography

Code-based cryptography

Hash-based scheme eg Merkle signatures

Lattice-based cryptography eg NTRU learning with errors (LWE)

Lattice-based Cryptography In this work we use the LWE assumptions to provide forward securityanonymity in the post-quantum world

Future Anonymity in Todayrsquos Budget Aniket Kate 12

Poly(η)-time quantum reduction from approximate-SVP toRing-LWE

Decision Ring-LWE

We consider a ring Rq = Zq[x](xη + 1)

Let χ is the error distribution (Gaussian) of small elements (symmetric around 0)

Given polynomial number of samples from R2q

(a1 b1)

(a2 b2)

middot middot middot (ak bk)

Does there exist an r and e1 middot middot middot ek isin χ 3 bi = ai middot r + ei

(or) Are all birsquos uniformly random in Rq

Future Anonymity in Todayrsquos Budget Aniket Kate 13

Decision Ring-LWE

We consider a ring Rq = Zq[x](xη + 1)

Let χ is the error distribution (Gaussian) of small elements (symmetric around 0)

Given polynomial number of samples from R2q

(a1 b1)

(a2 b2)

middot middot middot (ak bk)

Does there exist an r and e1 middot middot middot ek isin χ 3 bi = ai middot r + ei

(or) Are all birsquos uniformly random in Rq

Poly(η)-time quantum reduction from approximate-SVP to Ring-LWE

Future Anonymity in Todayrsquos Budget Aniket Kate 13

The HybridOR Protocol

Generate system parameters (R η q χ) and (G g p)

Client Node (no long-term key) (long-term keys (s gs))

rc ec e larrR χ x larrR Zlowast c p

x pc g pc = arc + ec minusminusminusminusminusminusminusminusminusminusrarr rn en e larrR χn

pn = arn + en

= pcrn + ek1n n α = hR(k1n)

pnα larrminusminusminusminusminusminusminusminusminusminus

k1C = pnrc + ec sx xsk1 = fR(k1n α) k2 = g k1 = fR(k1n α) k2 = g

(established session key sk = H1(k1) oplus H2(k2))

Future Anonymity in Todayrsquos Budget Aniket Kate 14

Type-II adversary (Authentication)- The adversary can only know the secret associated with thepseudonym from the node in the test session- HybridOR is secure under the GDH assumption

Type-III adversary(Forward Security)- The adversary can only know the secret associated with the longterm public key- HybridOR is secure under the ring-LWE assumption

The HybridOR Protocol Security

Type-I adversary (Channel Secrecy) - The adversary cannot know a secret associated any public values in the test session - HybridOR is secure under any of the GDH as well as ring-LWE assumptions

Future Anonymity in Todayrsquos Budget Aniket Kate 15

Type-III adversary(Forward Security)- The adversary can only know the secret associated with the longterm public key- HybridOR is secure under the ring-LWE assumption

The HybridOR Protocol Security

Type-I adversary (Channel Secrecy) - The adversary cannot know a secret associated any public values in the test session - HybridOR is secure under any of the GDH as well as ring-LWE assumptions

Type-II adversary (Authentication) - The adversary can only know the secret associated with the pseudonym from the node in the test session - HybridOR is secure under the GDH assumption

Future Anonymity in Todayrsquos Budget Aniket Kate 15

The HybridOR Protocol Security

Type-I adversary (Channel Secrecy) - The adversary cannot know a secret associated any public values in the test session - HybridOR is secure under any of the GDH as well as ring-LWE assumptions

Type-II adversary (Authentication) - The adversary can only know the secret associated with the pseudonym from the node in the test session - HybridOR is secure under the GDH assumption

Type-III adversary(Forward Security) - The adversary can only know the secret associated with the long term public key - HybridOR is secure under the ring-LWE assumption

Future Anonymity in Todayrsquos Budget Aniket Kate 15

The HybridOR Protocol Performance

Parameters degree of the irreducible polynomial η = 512 prime modulus q = 1051649 error distribution χ parameter β = 800

Computation Cost Our HybridOR implementation is nearly 15 times faster than the ntor protocol used in Tor

Communication Cost For HybridOR the client and the node each will have to communicate three cells (Each cell is of size 512-byte)

Future Anonymity in Todayrsquos Budget Aniket Kate 16

Take Away We present a novel hybrid 1W-AKE protocol HybridOR which extracts its security from both the classically secure GDH assumption and the post-quantum secure ring-LWE assumption

We base its forward secrecy on the quantum-secure ring-LWE assumption

We leverage the current Tor PKI in its current form

Our performance analysis demonstrates that post-quantum 1W-AKE can already be considered practical for use today

Online Version httpeprintiacrorg2015008

Future Anonymity in Todayrsquos Budget Aniket Kate 17

Take Away We present a novel hybrid 1W-AKE protocol HybridOR which extracts its security from both the classically secure GDH assumption and the post-quantum secure ring-LWE assumption

We base its forward secrecy on the quantum-secure ring-LWE assumption

We leverage the current Tor PKI in its current form

Our performance analysis demonstrates that post-quantum 1W-AKE can already be considered practical for use today

Online Version httpeprintiacrorg2015008

17 Future Anonymity in Todayrsquos Budget Aniket Kate

Page 16: (Post-Quantum Forward Secure Onion Routing)Aniket Kate . The HybridOR Protocol: Security . Type-I adversary (Channel Secrecy) - The adversary cannot know a secret associated any public

SecondThird Generation Onion Routing Tor

Multi-Pass Construction (Telescoping Approach)

Future Anonymity in Todayrsquos Budget Aniket Kate 8

SecondThird Generation Onion Routing Tor

Multi-Pass Construction (Telescoping Approach)

Future Anonymity in Todayrsquos Budget Aniket Kate 8

SecondThird Generation Onion Routing Tor

Multi-Pass Construction (Telescoping Approach)

Future Anonymity in Todayrsquos Budget Aniket Kate 8

SecondThird Generation Onion Routing Tor

Multi-Pass Construction (Telescoping Approach)

Future Anonymity in Todayrsquos Budget Aniket Kate 8

SecondThird Generation Onion Routing Tor

Multi-Pass Construction (Telescoping Approach)

Future Anonymity in Todayrsquos Budget Aniket Kate 8

SecondThird Generation Onion Routing Tor

Multi-Pass Construction (Telescoping Approach)

Future Anonymity in Todayrsquos Budget Aniket Kate 8

The ntor 1W-AKE Protocol [Goldberg Stebila and Ustaoglu DCC rsquo12]

Let G be a multiplicative group with large prime order p Let g isin G be the generator of the group

Client Server (no public key) (long-term keys (b gb))

x g x larrR Zlowast minusminusminusminusminusminusminusminusminusminusrarr y larrR Zlowast

p p yg

larrminusminusminusminusminusminusminusminusminusminus H((gy )x (gb)x) H((gx)y (gx)b) =

yx bx) xy xb)= H(g g H(g g

xy(established session key H(g gxb))

Future Anonymity in Todayrsquos Budget Aniket Kate 9

The GDH ProblemLet G be a multiplicative group with large prime order p andg isin G be the generator of the group

Given a triple (g ga gb) for a b isinr Zlowastp the GDH problem is to find

the element gab with the help of a Decision Diffie-Hellman (DDH)oracle

The DDH oracle takes input as (G g ga gb z) for some z isin Gand tells whether z = gab

The ntor 1W-AKE Protocol Security

The 1W-AKE security of the ntor protocol is proven against the gap Diffie-Hellman (GDH) assumption

Future Anonymity in Todayrsquos Budget Aniket Kate 10

The ntor 1W-AKE Protocol Security

The 1W-AKE security of the ntor protocol is proven against the gap Diffie-Hellman (GDH) assumption

The GDH Problem Let G be a multiplicative group with large prime order p and g isin G be the generator of the group

aGiven a triple (g g gb) for a b isinr Zlowast the GDH problem is to find p

the element gab with the help of a Decision Diffie-Hellman (DDH) oracle

bThe DDH oracle takes input as (G g ga g z) for some z isin G aband tells whether z = g

Future Anonymity in Todayrsquos Budget Aniket Kate 10

So what

Security and anonymity of even todayrsquos onion routingcommunications can be violated

The Tor community

will be hesitant to completely changing the public keyinfrastructure (PKI)questions the performance penalty

ChallengeDesign a 1W-AKE scheme that offers forward security in thepost-quantum world without significantly affecting the currentinfrastructure and performance

When the Quantum computer arrives

This 1W-AKE scheme will no longer be secure

Future Anonymity in Todayrsquos Budget Aniket Kate 11

Security and anonymity of even todayrsquos onion routingcommunications can be violated

The Tor community

will be hesitant to completely changing the public keyinfrastructure (PKI)questions the performance penalty

ChallengeDesign a 1W-AKE scheme that offers forward security in thepost-quantum world without significantly affecting the currentinfrastructure and performance

When the Quantum computer arrives

This 1W-AKE scheme will no longer be secure

So what

Future Anonymity in Todayrsquos Budget Aniket Kate 11

The Tor community

will be hesitant to completely changing the public keyinfrastructure (PKI)questions the performance penalty

ChallengeDesign a 1W-AKE scheme that offers forward security in thepost-quantum world without significantly affecting the currentinfrastructure and performance

When the Quantum computer arrives

This 1W-AKE scheme will no longer be secure

So what

Security and anonymity of even todayrsquos onion routing communications can be violated

Future Anonymity in Todayrsquos Budget Aniket Kate 11

ChallengeDesign a 1W-AKE scheme that offers forward security in thepost-quantum world without significantly affecting the currentinfrastructure and performance

When the Quantum computer arrives

This 1W-AKE scheme will no longer be secure

So what

Security and anonymity of even todayrsquos onion routing communications can be violated

The Tor community

will be hesitant to completely changing the public key infrastructure (PKI) questions the performance penalty

Future Anonymity in Todayrsquos Budget Aniket Kate 11

When the Quantum computer arrives

This 1W-AKE scheme will no longer be secure

So what

Security and anonymity of even todayrsquos onion routing communications can be violated

The Tor community

will be hesitant to completely changing the public key infrastructure (PKI) questions the performance penalty

Challenge Design a 1W-AKE scheme that offers forward security in the post-quantum world without significantly affecting the current infrastructure and performance

Future Anonymity in Todayrsquos Budget Aniket Kate 11

Lattice-based CryptographyIn this work we use the LWE assumptions to provide forwardsecurityanonymity in the post-quantum world

Post-Quantum Crypto

Some Possibilities Multivariate cryptography

Code-based cryptography

Hash-based scheme eg Merkle signatures

Lattice-based cryptography eg NTRU learning with errors (LWE)

Future Anonymity in Todayrsquos Budget Aniket Kate 12

Post-Quantum Crypto

Some Possibilities Multivariate cryptography

Code-based cryptography

Hash-based scheme eg Merkle signatures

Lattice-based cryptography eg NTRU learning with errors (LWE)

Lattice-based Cryptography In this work we use the LWE assumptions to provide forward securityanonymity in the post-quantum world

Future Anonymity in Todayrsquos Budget Aniket Kate 12

Poly(η)-time quantum reduction from approximate-SVP toRing-LWE

Decision Ring-LWE

We consider a ring Rq = Zq[x](xη + 1)

Let χ is the error distribution (Gaussian) of small elements (symmetric around 0)

Given polynomial number of samples from R2q

(a1 b1)

(a2 b2)

middot middot middot (ak bk)

Does there exist an r and e1 middot middot middot ek isin χ 3 bi = ai middot r + ei

(or) Are all birsquos uniformly random in Rq

Future Anonymity in Todayrsquos Budget Aniket Kate 13

Decision Ring-LWE

We consider a ring Rq = Zq[x](xη + 1)

Let χ is the error distribution (Gaussian) of small elements (symmetric around 0)

Given polynomial number of samples from R2q

(a1 b1)

(a2 b2)

middot middot middot (ak bk)

Does there exist an r and e1 middot middot middot ek isin χ 3 bi = ai middot r + ei

(or) Are all birsquos uniformly random in Rq

Poly(η)-time quantum reduction from approximate-SVP to Ring-LWE

Future Anonymity in Todayrsquos Budget Aniket Kate 13

The HybridOR Protocol

Generate system parameters (R η q χ) and (G g p)

Client Node (no long-term key) (long-term keys (s gs))

rc ec e larrR χ x larrR Zlowast c p

x pc g pc = arc + ec minusminusminusminusminusminusminusminusminusminusrarr rn en e larrR χn

pn = arn + en

= pcrn + ek1n n α = hR(k1n)

pnα larrminusminusminusminusminusminusminusminusminusminus

k1C = pnrc + ec sx xsk1 = fR(k1n α) k2 = g k1 = fR(k1n α) k2 = g

(established session key sk = H1(k1) oplus H2(k2))

Future Anonymity in Todayrsquos Budget Aniket Kate 14

Type-II adversary (Authentication)- The adversary can only know the secret associated with thepseudonym from the node in the test session- HybridOR is secure under the GDH assumption

Type-III adversary(Forward Security)- The adversary can only know the secret associated with the longterm public key- HybridOR is secure under the ring-LWE assumption

The HybridOR Protocol Security

Type-I adversary (Channel Secrecy) - The adversary cannot know a secret associated any public values in the test session - HybridOR is secure under any of the GDH as well as ring-LWE assumptions

Future Anonymity in Todayrsquos Budget Aniket Kate 15

Type-III adversary(Forward Security)- The adversary can only know the secret associated with the longterm public key- HybridOR is secure under the ring-LWE assumption

The HybridOR Protocol Security

Type-I adversary (Channel Secrecy) - The adversary cannot know a secret associated any public values in the test session - HybridOR is secure under any of the GDH as well as ring-LWE assumptions

Type-II adversary (Authentication) - The adversary can only know the secret associated with the pseudonym from the node in the test session - HybridOR is secure under the GDH assumption

Future Anonymity in Todayrsquos Budget Aniket Kate 15

The HybridOR Protocol Security

Type-I adversary (Channel Secrecy) - The adversary cannot know a secret associated any public values in the test session - HybridOR is secure under any of the GDH as well as ring-LWE assumptions

Type-II adversary (Authentication) - The adversary can only know the secret associated with the pseudonym from the node in the test session - HybridOR is secure under the GDH assumption

Type-III adversary(Forward Security) - The adversary can only know the secret associated with the long term public key - HybridOR is secure under the ring-LWE assumption

Future Anonymity in Todayrsquos Budget Aniket Kate 15

The HybridOR Protocol Performance

Parameters degree of the irreducible polynomial η = 512 prime modulus q = 1051649 error distribution χ parameter β = 800

Computation Cost Our HybridOR implementation is nearly 15 times faster than the ntor protocol used in Tor

Communication Cost For HybridOR the client and the node each will have to communicate three cells (Each cell is of size 512-byte)

Future Anonymity in Todayrsquos Budget Aniket Kate 16

Take Away We present a novel hybrid 1W-AKE protocol HybridOR which extracts its security from both the classically secure GDH assumption and the post-quantum secure ring-LWE assumption

We base its forward secrecy on the quantum-secure ring-LWE assumption

We leverage the current Tor PKI in its current form

Our performance analysis demonstrates that post-quantum 1W-AKE can already be considered practical for use today

Online Version httpeprintiacrorg2015008

Future Anonymity in Todayrsquos Budget Aniket Kate 17

Take Away We present a novel hybrid 1W-AKE protocol HybridOR which extracts its security from both the classically secure GDH assumption and the post-quantum secure ring-LWE assumption

We base its forward secrecy on the quantum-secure ring-LWE assumption

We leverage the current Tor PKI in its current form

Our performance analysis demonstrates that post-quantum 1W-AKE can already be considered practical for use today

Online Version httpeprintiacrorg2015008

17 Future Anonymity in Todayrsquos Budget Aniket Kate

Page 17: (Post-Quantum Forward Secure Onion Routing)Aniket Kate . The HybridOR Protocol: Security . Type-I adversary (Channel Secrecy) - The adversary cannot know a secret associated any public

SecondThird Generation Onion Routing Tor

Multi-Pass Construction (Telescoping Approach)

Future Anonymity in Todayrsquos Budget Aniket Kate 8

SecondThird Generation Onion Routing Tor

Multi-Pass Construction (Telescoping Approach)

Future Anonymity in Todayrsquos Budget Aniket Kate 8

SecondThird Generation Onion Routing Tor

Multi-Pass Construction (Telescoping Approach)

Future Anonymity in Todayrsquos Budget Aniket Kate 8

SecondThird Generation Onion Routing Tor

Multi-Pass Construction (Telescoping Approach)

Future Anonymity in Todayrsquos Budget Aniket Kate 8

SecondThird Generation Onion Routing Tor

Multi-Pass Construction (Telescoping Approach)

Future Anonymity in Todayrsquos Budget Aniket Kate 8

The ntor 1W-AKE Protocol [Goldberg Stebila and Ustaoglu DCC rsquo12]

Let G be a multiplicative group with large prime order p Let g isin G be the generator of the group

Client Server (no public key) (long-term keys (b gb))

x g x larrR Zlowast minusminusminusminusminusminusminusminusminusminusrarr y larrR Zlowast

p p yg

larrminusminusminusminusminusminusminusminusminusminus H((gy )x (gb)x) H((gx)y (gx)b) =

yx bx) xy xb)= H(g g H(g g

xy(established session key H(g gxb))

Future Anonymity in Todayrsquos Budget Aniket Kate 9

The GDH ProblemLet G be a multiplicative group with large prime order p andg isin G be the generator of the group

Given a triple (g ga gb) for a b isinr Zlowastp the GDH problem is to find

the element gab with the help of a Decision Diffie-Hellman (DDH)oracle

The DDH oracle takes input as (G g ga gb z) for some z isin Gand tells whether z = gab

The ntor 1W-AKE Protocol Security

The 1W-AKE security of the ntor protocol is proven against the gap Diffie-Hellman (GDH) assumption

Future Anonymity in Todayrsquos Budget Aniket Kate 10

The ntor 1W-AKE Protocol Security

The 1W-AKE security of the ntor protocol is proven against the gap Diffie-Hellman (GDH) assumption

The GDH Problem Let G be a multiplicative group with large prime order p and g isin G be the generator of the group

aGiven a triple (g g gb) for a b isinr Zlowast the GDH problem is to find p

the element gab with the help of a Decision Diffie-Hellman (DDH) oracle

bThe DDH oracle takes input as (G g ga g z) for some z isin G aband tells whether z = g

Future Anonymity in Todayrsquos Budget Aniket Kate 10

So what

Security and anonymity of even todayrsquos onion routingcommunications can be violated

The Tor community

will be hesitant to completely changing the public keyinfrastructure (PKI)questions the performance penalty

ChallengeDesign a 1W-AKE scheme that offers forward security in thepost-quantum world without significantly affecting the currentinfrastructure and performance

When the Quantum computer arrives

This 1W-AKE scheme will no longer be secure

Future Anonymity in Todayrsquos Budget Aniket Kate 11

Security and anonymity of even todayrsquos onion routingcommunications can be violated

The Tor community

will be hesitant to completely changing the public keyinfrastructure (PKI)questions the performance penalty

ChallengeDesign a 1W-AKE scheme that offers forward security in thepost-quantum world without significantly affecting the currentinfrastructure and performance

When the Quantum computer arrives

This 1W-AKE scheme will no longer be secure

So what

Future Anonymity in Todayrsquos Budget Aniket Kate 11

The Tor community

will be hesitant to completely changing the public keyinfrastructure (PKI)questions the performance penalty

ChallengeDesign a 1W-AKE scheme that offers forward security in thepost-quantum world without significantly affecting the currentinfrastructure and performance

When the Quantum computer arrives

This 1W-AKE scheme will no longer be secure

So what

Security and anonymity of even todayrsquos onion routing communications can be violated

Future Anonymity in Todayrsquos Budget Aniket Kate 11

ChallengeDesign a 1W-AKE scheme that offers forward security in thepost-quantum world without significantly affecting the currentinfrastructure and performance

When the Quantum computer arrives

This 1W-AKE scheme will no longer be secure

So what

Security and anonymity of even todayrsquos onion routing communications can be violated

The Tor community

will be hesitant to completely changing the public key infrastructure (PKI) questions the performance penalty

Future Anonymity in Todayrsquos Budget Aniket Kate 11

When the Quantum computer arrives

This 1W-AKE scheme will no longer be secure

So what

Security and anonymity of even todayrsquos onion routing communications can be violated

The Tor community

will be hesitant to completely changing the public key infrastructure (PKI) questions the performance penalty

Challenge Design a 1W-AKE scheme that offers forward security in the post-quantum world without significantly affecting the current infrastructure and performance

Future Anonymity in Todayrsquos Budget Aniket Kate 11

Lattice-based CryptographyIn this work we use the LWE assumptions to provide forwardsecurityanonymity in the post-quantum world

Post-Quantum Crypto

Some Possibilities Multivariate cryptography

Code-based cryptography

Hash-based scheme eg Merkle signatures

Lattice-based cryptography eg NTRU learning with errors (LWE)

Future Anonymity in Todayrsquos Budget Aniket Kate 12

Post-Quantum Crypto

Some Possibilities Multivariate cryptography

Code-based cryptography

Hash-based scheme eg Merkle signatures

Lattice-based cryptography eg NTRU learning with errors (LWE)

Lattice-based Cryptography In this work we use the LWE assumptions to provide forward securityanonymity in the post-quantum world

Future Anonymity in Todayrsquos Budget Aniket Kate 12

Poly(η)-time quantum reduction from approximate-SVP toRing-LWE

Decision Ring-LWE

We consider a ring Rq = Zq[x](xη + 1)

Let χ is the error distribution (Gaussian) of small elements (symmetric around 0)

Given polynomial number of samples from R2q

(a1 b1)

(a2 b2)

middot middot middot (ak bk)

Does there exist an r and e1 middot middot middot ek isin χ 3 bi = ai middot r + ei

(or) Are all birsquos uniformly random in Rq

Future Anonymity in Todayrsquos Budget Aniket Kate 13

Decision Ring-LWE

We consider a ring Rq = Zq[x](xη + 1)

Let χ is the error distribution (Gaussian) of small elements (symmetric around 0)

Given polynomial number of samples from R2q

(a1 b1)

(a2 b2)

middot middot middot (ak bk)

Does there exist an r and e1 middot middot middot ek isin χ 3 bi = ai middot r + ei

(or) Are all birsquos uniformly random in Rq

Poly(η)-time quantum reduction from approximate-SVP to Ring-LWE

Future Anonymity in Todayrsquos Budget Aniket Kate 13

The HybridOR Protocol

Generate system parameters (R η q χ) and (G g p)

Client Node (no long-term key) (long-term keys (s gs))

rc ec e larrR χ x larrR Zlowast c p

x pc g pc = arc + ec minusminusminusminusminusminusminusminusminusminusrarr rn en e larrR χn

pn = arn + en

= pcrn + ek1n n α = hR(k1n)

pnα larrminusminusminusminusminusminusminusminusminusminus

k1C = pnrc + ec sx xsk1 = fR(k1n α) k2 = g k1 = fR(k1n α) k2 = g

(established session key sk = H1(k1) oplus H2(k2))

Future Anonymity in Todayrsquos Budget Aniket Kate 14

Type-II adversary (Authentication)- The adversary can only know the secret associated with thepseudonym from the node in the test session- HybridOR is secure under the GDH assumption

Type-III adversary(Forward Security)- The adversary can only know the secret associated with the longterm public key- HybridOR is secure under the ring-LWE assumption

The HybridOR Protocol Security

Type-I adversary (Channel Secrecy) - The adversary cannot know a secret associated any public values in the test session - HybridOR is secure under any of the GDH as well as ring-LWE assumptions

Future Anonymity in Todayrsquos Budget Aniket Kate 15

Type-III adversary(Forward Security)- The adversary can only know the secret associated with the longterm public key- HybridOR is secure under the ring-LWE assumption

The HybridOR Protocol Security

Type-I adversary (Channel Secrecy) - The adversary cannot know a secret associated any public values in the test session - HybridOR is secure under any of the GDH as well as ring-LWE assumptions

Type-II adversary (Authentication) - The adversary can only know the secret associated with the pseudonym from the node in the test session - HybridOR is secure under the GDH assumption

Future Anonymity in Todayrsquos Budget Aniket Kate 15

The HybridOR Protocol Security

Type-I adversary (Channel Secrecy) - The adversary cannot know a secret associated any public values in the test session - HybridOR is secure under any of the GDH as well as ring-LWE assumptions

Type-II adversary (Authentication) - The adversary can only know the secret associated with the pseudonym from the node in the test session - HybridOR is secure under the GDH assumption

Type-III adversary(Forward Security) - The adversary can only know the secret associated with the long term public key - HybridOR is secure under the ring-LWE assumption

Future Anonymity in Todayrsquos Budget Aniket Kate 15

The HybridOR Protocol Performance

Parameters degree of the irreducible polynomial η = 512 prime modulus q = 1051649 error distribution χ parameter β = 800

Computation Cost Our HybridOR implementation is nearly 15 times faster than the ntor protocol used in Tor

Communication Cost For HybridOR the client and the node each will have to communicate three cells (Each cell is of size 512-byte)

Future Anonymity in Todayrsquos Budget Aniket Kate 16

Take Away We present a novel hybrid 1W-AKE protocol HybridOR which extracts its security from both the classically secure GDH assumption and the post-quantum secure ring-LWE assumption

We base its forward secrecy on the quantum-secure ring-LWE assumption

We leverage the current Tor PKI in its current form

Our performance analysis demonstrates that post-quantum 1W-AKE can already be considered practical for use today

Online Version httpeprintiacrorg2015008

Future Anonymity in Todayrsquos Budget Aniket Kate 17

Take Away We present a novel hybrid 1W-AKE protocol HybridOR which extracts its security from both the classically secure GDH assumption and the post-quantum secure ring-LWE assumption

We base its forward secrecy on the quantum-secure ring-LWE assumption

We leverage the current Tor PKI in its current form

Our performance analysis demonstrates that post-quantum 1W-AKE can already be considered practical for use today

Online Version httpeprintiacrorg2015008

17 Future Anonymity in Todayrsquos Budget Aniket Kate

Page 18: (Post-Quantum Forward Secure Onion Routing)Aniket Kate . The HybridOR Protocol: Security . Type-I adversary (Channel Secrecy) - The adversary cannot know a secret associated any public

SecondThird Generation Onion Routing Tor

Multi-Pass Construction (Telescoping Approach)

Future Anonymity in Todayrsquos Budget Aniket Kate 8

SecondThird Generation Onion Routing Tor

Multi-Pass Construction (Telescoping Approach)

Future Anonymity in Todayrsquos Budget Aniket Kate 8

SecondThird Generation Onion Routing Tor

Multi-Pass Construction (Telescoping Approach)

Future Anonymity in Todayrsquos Budget Aniket Kate 8

SecondThird Generation Onion Routing Tor

Multi-Pass Construction (Telescoping Approach)

Future Anonymity in Todayrsquos Budget Aniket Kate 8

The ntor 1W-AKE Protocol [Goldberg Stebila and Ustaoglu DCC rsquo12]

Let G be a multiplicative group with large prime order p Let g isin G be the generator of the group

Client Server (no public key) (long-term keys (b gb))

x g x larrR Zlowast minusminusminusminusminusminusminusminusminusminusrarr y larrR Zlowast

p p yg

larrminusminusminusminusminusminusminusminusminusminus H((gy )x (gb)x) H((gx)y (gx)b) =

yx bx) xy xb)= H(g g H(g g

xy(established session key H(g gxb))

Future Anonymity in Todayrsquos Budget Aniket Kate 9

The GDH ProblemLet G be a multiplicative group with large prime order p andg isin G be the generator of the group

Given a triple (g ga gb) for a b isinr Zlowastp the GDH problem is to find

the element gab with the help of a Decision Diffie-Hellman (DDH)oracle

The DDH oracle takes input as (G g ga gb z) for some z isin Gand tells whether z = gab

The ntor 1W-AKE Protocol Security

The 1W-AKE security of the ntor protocol is proven against the gap Diffie-Hellman (GDH) assumption

Future Anonymity in Todayrsquos Budget Aniket Kate 10

The ntor 1W-AKE Protocol Security

The 1W-AKE security of the ntor protocol is proven against the gap Diffie-Hellman (GDH) assumption

The GDH Problem Let G be a multiplicative group with large prime order p and g isin G be the generator of the group

aGiven a triple (g g gb) for a b isinr Zlowast the GDH problem is to find p

the element gab with the help of a Decision Diffie-Hellman (DDH) oracle

bThe DDH oracle takes input as (G g ga g z) for some z isin G aband tells whether z = g

Future Anonymity in Todayrsquos Budget Aniket Kate 10

So what

Security and anonymity of even todayrsquos onion routingcommunications can be violated

The Tor community

will be hesitant to completely changing the public keyinfrastructure (PKI)questions the performance penalty

ChallengeDesign a 1W-AKE scheme that offers forward security in thepost-quantum world without significantly affecting the currentinfrastructure and performance

When the Quantum computer arrives

This 1W-AKE scheme will no longer be secure

Future Anonymity in Todayrsquos Budget Aniket Kate 11

Security and anonymity of even todayrsquos onion routingcommunications can be violated

The Tor community

will be hesitant to completely changing the public keyinfrastructure (PKI)questions the performance penalty

ChallengeDesign a 1W-AKE scheme that offers forward security in thepost-quantum world without significantly affecting the currentinfrastructure and performance

When the Quantum computer arrives

This 1W-AKE scheme will no longer be secure

So what

Future Anonymity in Todayrsquos Budget Aniket Kate 11

The Tor community

will be hesitant to completely changing the public keyinfrastructure (PKI)questions the performance penalty

ChallengeDesign a 1W-AKE scheme that offers forward security in thepost-quantum world without significantly affecting the currentinfrastructure and performance

When the Quantum computer arrives

This 1W-AKE scheme will no longer be secure

So what

Security and anonymity of even todayrsquos onion routing communications can be violated

Future Anonymity in Todayrsquos Budget Aniket Kate 11

ChallengeDesign a 1W-AKE scheme that offers forward security in thepost-quantum world without significantly affecting the currentinfrastructure and performance

When the Quantum computer arrives

This 1W-AKE scheme will no longer be secure

So what

Security and anonymity of even todayrsquos onion routing communications can be violated

The Tor community

will be hesitant to completely changing the public key infrastructure (PKI) questions the performance penalty

Future Anonymity in Todayrsquos Budget Aniket Kate 11

When the Quantum computer arrives

This 1W-AKE scheme will no longer be secure

So what

Security and anonymity of even todayrsquos onion routing communications can be violated

The Tor community

will be hesitant to completely changing the public key infrastructure (PKI) questions the performance penalty

Challenge Design a 1W-AKE scheme that offers forward security in the post-quantum world without significantly affecting the current infrastructure and performance

Future Anonymity in Todayrsquos Budget Aniket Kate 11

Lattice-based CryptographyIn this work we use the LWE assumptions to provide forwardsecurityanonymity in the post-quantum world

Post-Quantum Crypto

Some Possibilities Multivariate cryptography

Code-based cryptography

Hash-based scheme eg Merkle signatures

Lattice-based cryptography eg NTRU learning with errors (LWE)

Future Anonymity in Todayrsquos Budget Aniket Kate 12

Post-Quantum Crypto

Some Possibilities Multivariate cryptography

Code-based cryptography

Hash-based scheme eg Merkle signatures

Lattice-based cryptography eg NTRU learning with errors (LWE)

Lattice-based Cryptography In this work we use the LWE assumptions to provide forward securityanonymity in the post-quantum world

Future Anonymity in Todayrsquos Budget Aniket Kate 12

Poly(η)-time quantum reduction from approximate-SVP toRing-LWE

Decision Ring-LWE

We consider a ring Rq = Zq[x](xη + 1)

Let χ is the error distribution (Gaussian) of small elements (symmetric around 0)

Given polynomial number of samples from R2q

(a1 b1)

(a2 b2)

middot middot middot (ak bk)

Does there exist an r and e1 middot middot middot ek isin χ 3 bi = ai middot r + ei

(or) Are all birsquos uniformly random in Rq

Future Anonymity in Todayrsquos Budget Aniket Kate 13

Decision Ring-LWE

We consider a ring Rq = Zq[x](xη + 1)

Let χ is the error distribution (Gaussian) of small elements (symmetric around 0)

Given polynomial number of samples from R2q

(a1 b1)

(a2 b2)

middot middot middot (ak bk)

Does there exist an r and e1 middot middot middot ek isin χ 3 bi = ai middot r + ei

(or) Are all birsquos uniformly random in Rq

Poly(η)-time quantum reduction from approximate-SVP to Ring-LWE

Future Anonymity in Todayrsquos Budget Aniket Kate 13

The HybridOR Protocol

Generate system parameters (R η q χ) and (G g p)

Client Node (no long-term key) (long-term keys (s gs))

rc ec e larrR χ x larrR Zlowast c p

x pc g pc = arc + ec minusminusminusminusminusminusminusminusminusminusrarr rn en e larrR χn

pn = arn + en

= pcrn + ek1n n α = hR(k1n)

pnα larrminusminusminusminusminusminusminusminusminusminus

k1C = pnrc + ec sx xsk1 = fR(k1n α) k2 = g k1 = fR(k1n α) k2 = g

(established session key sk = H1(k1) oplus H2(k2))

Future Anonymity in Todayrsquos Budget Aniket Kate 14

Type-II adversary (Authentication)- The adversary can only know the secret associated with thepseudonym from the node in the test session- HybridOR is secure under the GDH assumption

Type-III adversary(Forward Security)- The adversary can only know the secret associated with the longterm public key- HybridOR is secure under the ring-LWE assumption

The HybridOR Protocol Security

Type-I adversary (Channel Secrecy) - The adversary cannot know a secret associated any public values in the test session - HybridOR is secure under any of the GDH as well as ring-LWE assumptions

Future Anonymity in Todayrsquos Budget Aniket Kate 15

Type-III adversary(Forward Security)- The adversary can only know the secret associated with the longterm public key- HybridOR is secure under the ring-LWE assumption

The HybridOR Protocol Security

Type-I adversary (Channel Secrecy) - The adversary cannot know a secret associated any public values in the test session - HybridOR is secure under any of the GDH as well as ring-LWE assumptions

Type-II adversary (Authentication) - The adversary can only know the secret associated with the pseudonym from the node in the test session - HybridOR is secure under the GDH assumption

Future Anonymity in Todayrsquos Budget Aniket Kate 15

The HybridOR Protocol Security

Type-I adversary (Channel Secrecy) - The adversary cannot know a secret associated any public values in the test session - HybridOR is secure under any of the GDH as well as ring-LWE assumptions

Type-II adversary (Authentication) - The adversary can only know the secret associated with the pseudonym from the node in the test session - HybridOR is secure under the GDH assumption

Type-III adversary(Forward Security) - The adversary can only know the secret associated with the long term public key - HybridOR is secure under the ring-LWE assumption

Future Anonymity in Todayrsquos Budget Aniket Kate 15

The HybridOR Protocol Performance

Parameters degree of the irreducible polynomial η = 512 prime modulus q = 1051649 error distribution χ parameter β = 800

Computation Cost Our HybridOR implementation is nearly 15 times faster than the ntor protocol used in Tor

Communication Cost For HybridOR the client and the node each will have to communicate three cells (Each cell is of size 512-byte)

Future Anonymity in Todayrsquos Budget Aniket Kate 16

Take Away We present a novel hybrid 1W-AKE protocol HybridOR which extracts its security from both the classically secure GDH assumption and the post-quantum secure ring-LWE assumption

We base its forward secrecy on the quantum-secure ring-LWE assumption

We leverage the current Tor PKI in its current form

Our performance analysis demonstrates that post-quantum 1W-AKE can already be considered practical for use today

Online Version httpeprintiacrorg2015008

Future Anonymity in Todayrsquos Budget Aniket Kate 17

Take Away We present a novel hybrid 1W-AKE protocol HybridOR which extracts its security from both the classically secure GDH assumption and the post-quantum secure ring-LWE assumption

We base its forward secrecy on the quantum-secure ring-LWE assumption

We leverage the current Tor PKI in its current form

Our performance analysis demonstrates that post-quantum 1W-AKE can already be considered practical for use today

Online Version httpeprintiacrorg2015008

17 Future Anonymity in Todayrsquos Budget Aniket Kate

Page 19: (Post-Quantum Forward Secure Onion Routing)Aniket Kate . The HybridOR Protocol: Security . Type-I adversary (Channel Secrecy) - The adversary cannot know a secret associated any public

SecondThird Generation Onion Routing Tor

Multi-Pass Construction (Telescoping Approach)

Future Anonymity in Todayrsquos Budget Aniket Kate 8

SecondThird Generation Onion Routing Tor

Multi-Pass Construction (Telescoping Approach)

Future Anonymity in Todayrsquos Budget Aniket Kate 8

SecondThird Generation Onion Routing Tor

Multi-Pass Construction (Telescoping Approach)

Future Anonymity in Todayrsquos Budget Aniket Kate 8

The ntor 1W-AKE Protocol [Goldberg Stebila and Ustaoglu DCC rsquo12]

Let G be a multiplicative group with large prime order p Let g isin G be the generator of the group

Client Server (no public key) (long-term keys (b gb))

x g x larrR Zlowast minusminusminusminusminusminusminusminusminusminusrarr y larrR Zlowast

p p yg

larrminusminusminusminusminusminusminusminusminusminus H((gy )x (gb)x) H((gx)y (gx)b) =

yx bx) xy xb)= H(g g H(g g

xy(established session key H(g gxb))

Future Anonymity in Todayrsquos Budget Aniket Kate 9

The GDH ProblemLet G be a multiplicative group with large prime order p andg isin G be the generator of the group

Given a triple (g ga gb) for a b isinr Zlowastp the GDH problem is to find

the element gab with the help of a Decision Diffie-Hellman (DDH)oracle

The DDH oracle takes input as (G g ga gb z) for some z isin Gand tells whether z = gab

The ntor 1W-AKE Protocol Security

The 1W-AKE security of the ntor protocol is proven against the gap Diffie-Hellman (GDH) assumption

Future Anonymity in Todayrsquos Budget Aniket Kate 10

The ntor 1W-AKE Protocol Security

The 1W-AKE security of the ntor protocol is proven against the gap Diffie-Hellman (GDH) assumption

The GDH Problem Let G be a multiplicative group with large prime order p and g isin G be the generator of the group

aGiven a triple (g g gb) for a b isinr Zlowast the GDH problem is to find p

the element gab with the help of a Decision Diffie-Hellman (DDH) oracle

bThe DDH oracle takes input as (G g ga g z) for some z isin G aband tells whether z = g

Future Anonymity in Todayrsquos Budget Aniket Kate 10

So what

Security and anonymity of even todayrsquos onion routingcommunications can be violated

The Tor community

will be hesitant to completely changing the public keyinfrastructure (PKI)questions the performance penalty

ChallengeDesign a 1W-AKE scheme that offers forward security in thepost-quantum world without significantly affecting the currentinfrastructure and performance

When the Quantum computer arrives

This 1W-AKE scheme will no longer be secure

Future Anonymity in Todayrsquos Budget Aniket Kate 11

Security and anonymity of even todayrsquos onion routingcommunications can be violated

The Tor community

will be hesitant to completely changing the public keyinfrastructure (PKI)questions the performance penalty

ChallengeDesign a 1W-AKE scheme that offers forward security in thepost-quantum world without significantly affecting the currentinfrastructure and performance

When the Quantum computer arrives

This 1W-AKE scheme will no longer be secure

So what

Future Anonymity in Todayrsquos Budget Aniket Kate 11

The Tor community

will be hesitant to completely changing the public keyinfrastructure (PKI)questions the performance penalty

ChallengeDesign a 1W-AKE scheme that offers forward security in thepost-quantum world without significantly affecting the currentinfrastructure and performance

When the Quantum computer arrives

This 1W-AKE scheme will no longer be secure

So what

Security and anonymity of even todayrsquos onion routing communications can be violated

Future Anonymity in Todayrsquos Budget Aniket Kate 11

ChallengeDesign a 1W-AKE scheme that offers forward security in thepost-quantum world without significantly affecting the currentinfrastructure and performance

When the Quantum computer arrives

This 1W-AKE scheme will no longer be secure

So what

Security and anonymity of even todayrsquos onion routing communications can be violated

The Tor community

will be hesitant to completely changing the public key infrastructure (PKI) questions the performance penalty

Future Anonymity in Todayrsquos Budget Aniket Kate 11

When the Quantum computer arrives

This 1W-AKE scheme will no longer be secure

So what

Security and anonymity of even todayrsquos onion routing communications can be violated

The Tor community

will be hesitant to completely changing the public key infrastructure (PKI) questions the performance penalty

Challenge Design a 1W-AKE scheme that offers forward security in the post-quantum world without significantly affecting the current infrastructure and performance

Future Anonymity in Todayrsquos Budget Aniket Kate 11

Lattice-based CryptographyIn this work we use the LWE assumptions to provide forwardsecurityanonymity in the post-quantum world

Post-Quantum Crypto

Some Possibilities Multivariate cryptography

Code-based cryptography

Hash-based scheme eg Merkle signatures

Lattice-based cryptography eg NTRU learning with errors (LWE)

Future Anonymity in Todayrsquos Budget Aniket Kate 12

Post-Quantum Crypto

Some Possibilities Multivariate cryptography

Code-based cryptography

Hash-based scheme eg Merkle signatures

Lattice-based cryptography eg NTRU learning with errors (LWE)

Lattice-based Cryptography In this work we use the LWE assumptions to provide forward securityanonymity in the post-quantum world

Future Anonymity in Todayrsquos Budget Aniket Kate 12

Poly(η)-time quantum reduction from approximate-SVP toRing-LWE

Decision Ring-LWE

We consider a ring Rq = Zq[x](xη + 1)

Let χ is the error distribution (Gaussian) of small elements (symmetric around 0)

Given polynomial number of samples from R2q

(a1 b1)

(a2 b2)

middot middot middot (ak bk)

Does there exist an r and e1 middot middot middot ek isin χ 3 bi = ai middot r + ei

(or) Are all birsquos uniformly random in Rq

Future Anonymity in Todayrsquos Budget Aniket Kate 13

Decision Ring-LWE

We consider a ring Rq = Zq[x](xη + 1)

Let χ is the error distribution (Gaussian) of small elements (symmetric around 0)

Given polynomial number of samples from R2q

(a1 b1)

(a2 b2)

middot middot middot (ak bk)

Does there exist an r and e1 middot middot middot ek isin χ 3 bi = ai middot r + ei

(or) Are all birsquos uniformly random in Rq

Poly(η)-time quantum reduction from approximate-SVP to Ring-LWE

Future Anonymity in Todayrsquos Budget Aniket Kate 13

The HybridOR Protocol

Generate system parameters (R η q χ) and (G g p)

Client Node (no long-term key) (long-term keys (s gs))

rc ec e larrR χ x larrR Zlowast c p

x pc g pc = arc + ec minusminusminusminusminusminusminusminusminusminusrarr rn en e larrR χn

pn = arn + en

= pcrn + ek1n n α = hR(k1n)

pnα larrminusminusminusminusminusminusminusminusminusminus

k1C = pnrc + ec sx xsk1 = fR(k1n α) k2 = g k1 = fR(k1n α) k2 = g

(established session key sk = H1(k1) oplus H2(k2))

Future Anonymity in Todayrsquos Budget Aniket Kate 14

Type-II adversary (Authentication)- The adversary can only know the secret associated with thepseudonym from the node in the test session- HybridOR is secure under the GDH assumption

Type-III adversary(Forward Security)- The adversary can only know the secret associated with the longterm public key- HybridOR is secure under the ring-LWE assumption

The HybridOR Protocol Security

Type-I adversary (Channel Secrecy) - The adversary cannot know a secret associated any public values in the test session - HybridOR is secure under any of the GDH as well as ring-LWE assumptions

Future Anonymity in Todayrsquos Budget Aniket Kate 15

Type-III adversary(Forward Security)- The adversary can only know the secret associated with the longterm public key- HybridOR is secure under the ring-LWE assumption

The HybridOR Protocol Security

Type-I adversary (Channel Secrecy) - The adversary cannot know a secret associated any public values in the test session - HybridOR is secure under any of the GDH as well as ring-LWE assumptions

Type-II adversary (Authentication) - The adversary can only know the secret associated with the pseudonym from the node in the test session - HybridOR is secure under the GDH assumption

Future Anonymity in Todayrsquos Budget Aniket Kate 15

The HybridOR Protocol Security

Type-I adversary (Channel Secrecy) - The adversary cannot know a secret associated any public values in the test session - HybridOR is secure under any of the GDH as well as ring-LWE assumptions

Type-II adversary (Authentication) - The adversary can only know the secret associated with the pseudonym from the node in the test session - HybridOR is secure under the GDH assumption

Type-III adversary(Forward Security) - The adversary can only know the secret associated with the long term public key - HybridOR is secure under the ring-LWE assumption

Future Anonymity in Todayrsquos Budget Aniket Kate 15

The HybridOR Protocol Performance

Parameters degree of the irreducible polynomial η = 512 prime modulus q = 1051649 error distribution χ parameter β = 800

Computation Cost Our HybridOR implementation is nearly 15 times faster than the ntor protocol used in Tor

Communication Cost For HybridOR the client and the node each will have to communicate three cells (Each cell is of size 512-byte)

Future Anonymity in Todayrsquos Budget Aniket Kate 16

Take Away We present a novel hybrid 1W-AKE protocol HybridOR which extracts its security from both the classically secure GDH assumption and the post-quantum secure ring-LWE assumption

We base its forward secrecy on the quantum-secure ring-LWE assumption

We leverage the current Tor PKI in its current form

Our performance analysis demonstrates that post-quantum 1W-AKE can already be considered practical for use today

Online Version httpeprintiacrorg2015008

Future Anonymity in Todayrsquos Budget Aniket Kate 17

Take Away We present a novel hybrid 1W-AKE protocol HybridOR which extracts its security from both the classically secure GDH assumption and the post-quantum secure ring-LWE assumption

We base its forward secrecy on the quantum-secure ring-LWE assumption

We leverage the current Tor PKI in its current form

Our performance analysis demonstrates that post-quantum 1W-AKE can already be considered practical for use today

Online Version httpeprintiacrorg2015008

17 Future Anonymity in Todayrsquos Budget Aniket Kate

Page 20: (Post-Quantum Forward Secure Onion Routing)Aniket Kate . The HybridOR Protocol: Security . Type-I adversary (Channel Secrecy) - The adversary cannot know a secret associated any public

SecondThird Generation Onion Routing Tor

Multi-Pass Construction (Telescoping Approach)

Future Anonymity in Todayrsquos Budget Aniket Kate 8

SecondThird Generation Onion Routing Tor

Multi-Pass Construction (Telescoping Approach)

Future Anonymity in Todayrsquos Budget Aniket Kate 8

The ntor 1W-AKE Protocol [Goldberg Stebila and Ustaoglu DCC rsquo12]

Let G be a multiplicative group with large prime order p Let g isin G be the generator of the group

Client Server (no public key) (long-term keys (b gb))

x g x larrR Zlowast minusminusminusminusminusminusminusminusminusminusrarr y larrR Zlowast

p p yg

larrminusminusminusminusminusminusminusminusminusminus H((gy )x (gb)x) H((gx)y (gx)b) =

yx bx) xy xb)= H(g g H(g g

xy(established session key H(g gxb))

Future Anonymity in Todayrsquos Budget Aniket Kate 9

The GDH ProblemLet G be a multiplicative group with large prime order p andg isin G be the generator of the group

Given a triple (g ga gb) for a b isinr Zlowastp the GDH problem is to find

the element gab with the help of a Decision Diffie-Hellman (DDH)oracle

The DDH oracle takes input as (G g ga gb z) for some z isin Gand tells whether z = gab

The ntor 1W-AKE Protocol Security

The 1W-AKE security of the ntor protocol is proven against the gap Diffie-Hellman (GDH) assumption

Future Anonymity in Todayrsquos Budget Aniket Kate 10

The ntor 1W-AKE Protocol Security

The 1W-AKE security of the ntor protocol is proven against the gap Diffie-Hellman (GDH) assumption

The GDH Problem Let G be a multiplicative group with large prime order p and g isin G be the generator of the group

aGiven a triple (g g gb) for a b isinr Zlowast the GDH problem is to find p

the element gab with the help of a Decision Diffie-Hellman (DDH) oracle

bThe DDH oracle takes input as (G g ga g z) for some z isin G aband tells whether z = g

Future Anonymity in Todayrsquos Budget Aniket Kate 10

So what

Security and anonymity of even todayrsquos onion routingcommunications can be violated

The Tor community

will be hesitant to completely changing the public keyinfrastructure (PKI)questions the performance penalty

ChallengeDesign a 1W-AKE scheme that offers forward security in thepost-quantum world without significantly affecting the currentinfrastructure and performance

When the Quantum computer arrives

This 1W-AKE scheme will no longer be secure

Future Anonymity in Todayrsquos Budget Aniket Kate 11

Security and anonymity of even todayrsquos onion routingcommunications can be violated

The Tor community

will be hesitant to completely changing the public keyinfrastructure (PKI)questions the performance penalty

ChallengeDesign a 1W-AKE scheme that offers forward security in thepost-quantum world without significantly affecting the currentinfrastructure and performance

When the Quantum computer arrives

This 1W-AKE scheme will no longer be secure

So what

Future Anonymity in Todayrsquos Budget Aniket Kate 11

The Tor community

will be hesitant to completely changing the public keyinfrastructure (PKI)questions the performance penalty

ChallengeDesign a 1W-AKE scheme that offers forward security in thepost-quantum world without significantly affecting the currentinfrastructure and performance

When the Quantum computer arrives

This 1W-AKE scheme will no longer be secure

So what

Security and anonymity of even todayrsquos onion routing communications can be violated

Future Anonymity in Todayrsquos Budget Aniket Kate 11

ChallengeDesign a 1W-AKE scheme that offers forward security in thepost-quantum world without significantly affecting the currentinfrastructure and performance

When the Quantum computer arrives

This 1W-AKE scheme will no longer be secure

So what

Security and anonymity of even todayrsquos onion routing communications can be violated

The Tor community

will be hesitant to completely changing the public key infrastructure (PKI) questions the performance penalty

Future Anonymity in Todayrsquos Budget Aniket Kate 11

When the Quantum computer arrives

This 1W-AKE scheme will no longer be secure

So what

Security and anonymity of even todayrsquos onion routing communications can be violated

The Tor community

will be hesitant to completely changing the public key infrastructure (PKI) questions the performance penalty

Challenge Design a 1W-AKE scheme that offers forward security in the post-quantum world without significantly affecting the current infrastructure and performance

Future Anonymity in Todayrsquos Budget Aniket Kate 11

Lattice-based CryptographyIn this work we use the LWE assumptions to provide forwardsecurityanonymity in the post-quantum world

Post-Quantum Crypto

Some Possibilities Multivariate cryptography

Code-based cryptography

Hash-based scheme eg Merkle signatures

Lattice-based cryptography eg NTRU learning with errors (LWE)

Future Anonymity in Todayrsquos Budget Aniket Kate 12

Post-Quantum Crypto

Some Possibilities Multivariate cryptography

Code-based cryptography

Hash-based scheme eg Merkle signatures

Lattice-based cryptography eg NTRU learning with errors (LWE)

Lattice-based Cryptography In this work we use the LWE assumptions to provide forward securityanonymity in the post-quantum world

Future Anonymity in Todayrsquos Budget Aniket Kate 12

Poly(η)-time quantum reduction from approximate-SVP toRing-LWE

Decision Ring-LWE

We consider a ring Rq = Zq[x](xη + 1)

Let χ is the error distribution (Gaussian) of small elements (symmetric around 0)

Given polynomial number of samples from R2q

(a1 b1)

(a2 b2)

middot middot middot (ak bk)

Does there exist an r and e1 middot middot middot ek isin χ 3 bi = ai middot r + ei

(or) Are all birsquos uniformly random in Rq

Future Anonymity in Todayrsquos Budget Aniket Kate 13

Decision Ring-LWE

We consider a ring Rq = Zq[x](xη + 1)

Let χ is the error distribution (Gaussian) of small elements (symmetric around 0)

Given polynomial number of samples from R2q

(a1 b1)

(a2 b2)

middot middot middot (ak bk)

Does there exist an r and e1 middot middot middot ek isin χ 3 bi = ai middot r + ei

(or) Are all birsquos uniformly random in Rq

Poly(η)-time quantum reduction from approximate-SVP to Ring-LWE

Future Anonymity in Todayrsquos Budget Aniket Kate 13

The HybridOR Protocol

Generate system parameters (R η q χ) and (G g p)

Client Node (no long-term key) (long-term keys (s gs))

rc ec e larrR χ x larrR Zlowast c p

x pc g pc = arc + ec minusminusminusminusminusminusminusminusminusminusrarr rn en e larrR χn

pn = arn + en

= pcrn + ek1n n α = hR(k1n)

pnα larrminusminusminusminusminusminusminusminusminusminus

k1C = pnrc + ec sx xsk1 = fR(k1n α) k2 = g k1 = fR(k1n α) k2 = g

(established session key sk = H1(k1) oplus H2(k2))

Future Anonymity in Todayrsquos Budget Aniket Kate 14

Type-II adversary (Authentication)- The adversary can only know the secret associated with thepseudonym from the node in the test session- HybridOR is secure under the GDH assumption

Type-III adversary(Forward Security)- The adversary can only know the secret associated with the longterm public key- HybridOR is secure under the ring-LWE assumption

The HybridOR Protocol Security

Type-I adversary (Channel Secrecy) - The adversary cannot know a secret associated any public values in the test session - HybridOR is secure under any of the GDH as well as ring-LWE assumptions

Future Anonymity in Todayrsquos Budget Aniket Kate 15

Type-III adversary(Forward Security)- The adversary can only know the secret associated with the longterm public key- HybridOR is secure under the ring-LWE assumption

The HybridOR Protocol Security

Type-I adversary (Channel Secrecy) - The adversary cannot know a secret associated any public values in the test session - HybridOR is secure under any of the GDH as well as ring-LWE assumptions

Type-II adversary (Authentication) - The adversary can only know the secret associated with the pseudonym from the node in the test session - HybridOR is secure under the GDH assumption

Future Anonymity in Todayrsquos Budget Aniket Kate 15

The HybridOR Protocol Security

Type-I adversary (Channel Secrecy) - The adversary cannot know a secret associated any public values in the test session - HybridOR is secure under any of the GDH as well as ring-LWE assumptions

Type-II adversary (Authentication) - The adversary can only know the secret associated with the pseudonym from the node in the test session - HybridOR is secure under the GDH assumption

Type-III adversary(Forward Security) - The adversary can only know the secret associated with the long term public key - HybridOR is secure under the ring-LWE assumption

Future Anonymity in Todayrsquos Budget Aniket Kate 15

The HybridOR Protocol Performance

Parameters degree of the irreducible polynomial η = 512 prime modulus q = 1051649 error distribution χ parameter β = 800

Computation Cost Our HybridOR implementation is nearly 15 times faster than the ntor protocol used in Tor

Communication Cost For HybridOR the client and the node each will have to communicate three cells (Each cell is of size 512-byte)

Future Anonymity in Todayrsquos Budget Aniket Kate 16

Take Away We present a novel hybrid 1W-AKE protocol HybridOR which extracts its security from both the classically secure GDH assumption and the post-quantum secure ring-LWE assumption

We base its forward secrecy on the quantum-secure ring-LWE assumption

We leverage the current Tor PKI in its current form

Our performance analysis demonstrates that post-quantum 1W-AKE can already be considered practical for use today

Online Version httpeprintiacrorg2015008

Future Anonymity in Todayrsquos Budget Aniket Kate 17

Take Away We present a novel hybrid 1W-AKE protocol HybridOR which extracts its security from both the classically secure GDH assumption and the post-quantum secure ring-LWE assumption

We base its forward secrecy on the quantum-secure ring-LWE assumption

We leverage the current Tor PKI in its current form

Our performance analysis demonstrates that post-quantum 1W-AKE can already be considered practical for use today

Online Version httpeprintiacrorg2015008

17 Future Anonymity in Todayrsquos Budget Aniket Kate

Page 21: (Post-Quantum Forward Secure Onion Routing)Aniket Kate . The HybridOR Protocol: Security . Type-I adversary (Channel Secrecy) - The adversary cannot know a secret associated any public

SecondThird Generation Onion Routing Tor

Multi-Pass Construction (Telescoping Approach)

Future Anonymity in Todayrsquos Budget Aniket Kate 8

The ntor 1W-AKE Protocol [Goldberg Stebila and Ustaoglu DCC rsquo12]

Let G be a multiplicative group with large prime order p Let g isin G be the generator of the group

Client Server (no public key) (long-term keys (b gb))

x g x larrR Zlowast minusminusminusminusminusminusminusminusminusminusrarr y larrR Zlowast

p p yg

larrminusminusminusminusminusminusminusminusminusminus H((gy )x (gb)x) H((gx)y (gx)b) =

yx bx) xy xb)= H(g g H(g g

xy(established session key H(g gxb))

Future Anonymity in Todayrsquos Budget Aniket Kate 9

The GDH ProblemLet G be a multiplicative group with large prime order p andg isin G be the generator of the group

Given a triple (g ga gb) for a b isinr Zlowastp the GDH problem is to find

the element gab with the help of a Decision Diffie-Hellman (DDH)oracle

The DDH oracle takes input as (G g ga gb z) for some z isin Gand tells whether z = gab

The ntor 1W-AKE Protocol Security

The 1W-AKE security of the ntor protocol is proven against the gap Diffie-Hellman (GDH) assumption

Future Anonymity in Todayrsquos Budget Aniket Kate 10

The ntor 1W-AKE Protocol Security

The 1W-AKE security of the ntor protocol is proven against the gap Diffie-Hellman (GDH) assumption

The GDH Problem Let G be a multiplicative group with large prime order p and g isin G be the generator of the group

aGiven a triple (g g gb) for a b isinr Zlowast the GDH problem is to find p

the element gab with the help of a Decision Diffie-Hellman (DDH) oracle

bThe DDH oracle takes input as (G g ga g z) for some z isin G aband tells whether z = g

Future Anonymity in Todayrsquos Budget Aniket Kate 10

So what

Security and anonymity of even todayrsquos onion routingcommunications can be violated

The Tor community

will be hesitant to completely changing the public keyinfrastructure (PKI)questions the performance penalty

ChallengeDesign a 1W-AKE scheme that offers forward security in thepost-quantum world without significantly affecting the currentinfrastructure and performance

When the Quantum computer arrives

This 1W-AKE scheme will no longer be secure

Future Anonymity in Todayrsquos Budget Aniket Kate 11

Security and anonymity of even todayrsquos onion routingcommunications can be violated

The Tor community

will be hesitant to completely changing the public keyinfrastructure (PKI)questions the performance penalty

ChallengeDesign a 1W-AKE scheme that offers forward security in thepost-quantum world without significantly affecting the currentinfrastructure and performance

When the Quantum computer arrives

This 1W-AKE scheme will no longer be secure

So what

Future Anonymity in Todayrsquos Budget Aniket Kate 11

The Tor community

will be hesitant to completely changing the public keyinfrastructure (PKI)questions the performance penalty

ChallengeDesign a 1W-AKE scheme that offers forward security in thepost-quantum world without significantly affecting the currentinfrastructure and performance

When the Quantum computer arrives

This 1W-AKE scheme will no longer be secure

So what

Security and anonymity of even todayrsquos onion routing communications can be violated

Future Anonymity in Todayrsquos Budget Aniket Kate 11

ChallengeDesign a 1W-AKE scheme that offers forward security in thepost-quantum world without significantly affecting the currentinfrastructure and performance

When the Quantum computer arrives

This 1W-AKE scheme will no longer be secure

So what

Security and anonymity of even todayrsquos onion routing communications can be violated

The Tor community

will be hesitant to completely changing the public key infrastructure (PKI) questions the performance penalty

Future Anonymity in Todayrsquos Budget Aniket Kate 11

When the Quantum computer arrives

This 1W-AKE scheme will no longer be secure

So what

Security and anonymity of even todayrsquos onion routing communications can be violated

The Tor community

will be hesitant to completely changing the public key infrastructure (PKI) questions the performance penalty

Challenge Design a 1W-AKE scheme that offers forward security in the post-quantum world without significantly affecting the current infrastructure and performance

Future Anonymity in Todayrsquos Budget Aniket Kate 11

Lattice-based CryptographyIn this work we use the LWE assumptions to provide forwardsecurityanonymity in the post-quantum world

Post-Quantum Crypto

Some Possibilities Multivariate cryptography

Code-based cryptography

Hash-based scheme eg Merkle signatures

Lattice-based cryptography eg NTRU learning with errors (LWE)

Future Anonymity in Todayrsquos Budget Aniket Kate 12

Post-Quantum Crypto

Some Possibilities Multivariate cryptography

Code-based cryptography

Hash-based scheme eg Merkle signatures

Lattice-based cryptography eg NTRU learning with errors (LWE)

Lattice-based Cryptography In this work we use the LWE assumptions to provide forward securityanonymity in the post-quantum world

Future Anonymity in Todayrsquos Budget Aniket Kate 12

Poly(η)-time quantum reduction from approximate-SVP toRing-LWE

Decision Ring-LWE

We consider a ring Rq = Zq[x](xη + 1)

Let χ is the error distribution (Gaussian) of small elements (symmetric around 0)

Given polynomial number of samples from R2q

(a1 b1)

(a2 b2)

middot middot middot (ak bk)

Does there exist an r and e1 middot middot middot ek isin χ 3 bi = ai middot r + ei

(or) Are all birsquos uniformly random in Rq

Future Anonymity in Todayrsquos Budget Aniket Kate 13

Decision Ring-LWE

We consider a ring Rq = Zq[x](xη + 1)

Let χ is the error distribution (Gaussian) of small elements (symmetric around 0)

Given polynomial number of samples from R2q

(a1 b1)

(a2 b2)

middot middot middot (ak bk)

Does there exist an r and e1 middot middot middot ek isin χ 3 bi = ai middot r + ei

(or) Are all birsquos uniformly random in Rq

Poly(η)-time quantum reduction from approximate-SVP to Ring-LWE

Future Anonymity in Todayrsquos Budget Aniket Kate 13

The HybridOR Protocol

Generate system parameters (R η q χ) and (G g p)

Client Node (no long-term key) (long-term keys (s gs))

rc ec e larrR χ x larrR Zlowast c p

x pc g pc = arc + ec minusminusminusminusminusminusminusminusminusminusrarr rn en e larrR χn

pn = arn + en

= pcrn + ek1n n α = hR(k1n)

pnα larrminusminusminusminusminusminusminusminusminusminus

k1C = pnrc + ec sx xsk1 = fR(k1n α) k2 = g k1 = fR(k1n α) k2 = g

(established session key sk = H1(k1) oplus H2(k2))

Future Anonymity in Todayrsquos Budget Aniket Kate 14

Type-II adversary (Authentication)- The adversary can only know the secret associated with thepseudonym from the node in the test session- HybridOR is secure under the GDH assumption

Type-III adversary(Forward Security)- The adversary can only know the secret associated with the longterm public key- HybridOR is secure under the ring-LWE assumption

The HybridOR Protocol Security

Type-I adversary (Channel Secrecy) - The adversary cannot know a secret associated any public values in the test session - HybridOR is secure under any of the GDH as well as ring-LWE assumptions

Future Anonymity in Todayrsquos Budget Aniket Kate 15

Type-III adversary(Forward Security)- The adversary can only know the secret associated with the longterm public key- HybridOR is secure under the ring-LWE assumption

The HybridOR Protocol Security

Type-I adversary (Channel Secrecy) - The adversary cannot know a secret associated any public values in the test session - HybridOR is secure under any of the GDH as well as ring-LWE assumptions

Type-II adversary (Authentication) - The adversary can only know the secret associated with the pseudonym from the node in the test session - HybridOR is secure under the GDH assumption

Future Anonymity in Todayrsquos Budget Aniket Kate 15

The HybridOR Protocol Security

Type-I adversary (Channel Secrecy) - The adversary cannot know a secret associated any public values in the test session - HybridOR is secure under any of the GDH as well as ring-LWE assumptions

Type-II adversary (Authentication) - The adversary can only know the secret associated with the pseudonym from the node in the test session - HybridOR is secure under the GDH assumption

Type-III adversary(Forward Security) - The adversary can only know the secret associated with the long term public key - HybridOR is secure under the ring-LWE assumption

Future Anonymity in Todayrsquos Budget Aniket Kate 15

The HybridOR Protocol Performance

Parameters degree of the irreducible polynomial η = 512 prime modulus q = 1051649 error distribution χ parameter β = 800

Computation Cost Our HybridOR implementation is nearly 15 times faster than the ntor protocol used in Tor

Communication Cost For HybridOR the client and the node each will have to communicate three cells (Each cell is of size 512-byte)

Future Anonymity in Todayrsquos Budget Aniket Kate 16

Take Away We present a novel hybrid 1W-AKE protocol HybridOR which extracts its security from both the classically secure GDH assumption and the post-quantum secure ring-LWE assumption

We base its forward secrecy on the quantum-secure ring-LWE assumption

We leverage the current Tor PKI in its current form

Our performance analysis demonstrates that post-quantum 1W-AKE can already be considered practical for use today

Online Version httpeprintiacrorg2015008

Future Anonymity in Todayrsquos Budget Aniket Kate 17

Take Away We present a novel hybrid 1W-AKE protocol HybridOR which extracts its security from both the classically secure GDH assumption and the post-quantum secure ring-LWE assumption

We base its forward secrecy on the quantum-secure ring-LWE assumption

We leverage the current Tor PKI in its current form

Our performance analysis demonstrates that post-quantum 1W-AKE can already be considered practical for use today

Online Version httpeprintiacrorg2015008

17 Future Anonymity in Todayrsquos Budget Aniket Kate

Page 22: (Post-Quantum Forward Secure Onion Routing)Aniket Kate . The HybridOR Protocol: Security . Type-I adversary (Channel Secrecy) - The adversary cannot know a secret associated any public

The ntor 1W-AKE Protocol [Goldberg Stebila and Ustaoglu DCC rsquo12]

Let G be a multiplicative group with large prime order p Let g isin G be the generator of the group

Client Server (no public key) (long-term keys (b gb))

x g x larrR Zlowast minusminusminusminusminusminusminusminusminusminusrarr y larrR Zlowast

p p yg

larrminusminusminusminusminusminusminusminusminusminus H((gy )x (gb)x) H((gx)y (gx)b) =

yx bx) xy xb)= H(g g H(g g

xy(established session key H(g gxb))

Future Anonymity in Todayrsquos Budget Aniket Kate 9

The GDH ProblemLet G be a multiplicative group with large prime order p andg isin G be the generator of the group

Given a triple (g ga gb) for a b isinr Zlowastp the GDH problem is to find

the element gab with the help of a Decision Diffie-Hellman (DDH)oracle

The DDH oracle takes input as (G g ga gb z) for some z isin Gand tells whether z = gab

The ntor 1W-AKE Protocol Security

The 1W-AKE security of the ntor protocol is proven against the gap Diffie-Hellman (GDH) assumption

Future Anonymity in Todayrsquos Budget Aniket Kate 10

The ntor 1W-AKE Protocol Security

The 1W-AKE security of the ntor protocol is proven against the gap Diffie-Hellman (GDH) assumption

The GDH Problem Let G be a multiplicative group with large prime order p and g isin G be the generator of the group

aGiven a triple (g g gb) for a b isinr Zlowast the GDH problem is to find p

the element gab with the help of a Decision Diffie-Hellman (DDH) oracle

bThe DDH oracle takes input as (G g ga g z) for some z isin G aband tells whether z = g

Future Anonymity in Todayrsquos Budget Aniket Kate 10

So what

Security and anonymity of even todayrsquos onion routingcommunications can be violated

The Tor community

will be hesitant to completely changing the public keyinfrastructure (PKI)questions the performance penalty

ChallengeDesign a 1W-AKE scheme that offers forward security in thepost-quantum world without significantly affecting the currentinfrastructure and performance

When the Quantum computer arrives

This 1W-AKE scheme will no longer be secure

Future Anonymity in Todayrsquos Budget Aniket Kate 11

Security and anonymity of even todayrsquos onion routingcommunications can be violated

The Tor community

will be hesitant to completely changing the public keyinfrastructure (PKI)questions the performance penalty

ChallengeDesign a 1W-AKE scheme that offers forward security in thepost-quantum world without significantly affecting the currentinfrastructure and performance

When the Quantum computer arrives

This 1W-AKE scheme will no longer be secure

So what

Future Anonymity in Todayrsquos Budget Aniket Kate 11

The Tor community

will be hesitant to completely changing the public keyinfrastructure (PKI)questions the performance penalty

ChallengeDesign a 1W-AKE scheme that offers forward security in thepost-quantum world without significantly affecting the currentinfrastructure and performance

When the Quantum computer arrives

This 1W-AKE scheme will no longer be secure

So what

Security and anonymity of even todayrsquos onion routing communications can be violated

Future Anonymity in Todayrsquos Budget Aniket Kate 11

ChallengeDesign a 1W-AKE scheme that offers forward security in thepost-quantum world without significantly affecting the currentinfrastructure and performance

When the Quantum computer arrives

This 1W-AKE scheme will no longer be secure

So what

Security and anonymity of even todayrsquos onion routing communications can be violated

The Tor community

will be hesitant to completely changing the public key infrastructure (PKI) questions the performance penalty

Future Anonymity in Todayrsquos Budget Aniket Kate 11

When the Quantum computer arrives

This 1W-AKE scheme will no longer be secure

So what

Security and anonymity of even todayrsquos onion routing communications can be violated

The Tor community

will be hesitant to completely changing the public key infrastructure (PKI) questions the performance penalty

Challenge Design a 1W-AKE scheme that offers forward security in the post-quantum world without significantly affecting the current infrastructure and performance

Future Anonymity in Todayrsquos Budget Aniket Kate 11

Lattice-based CryptographyIn this work we use the LWE assumptions to provide forwardsecurityanonymity in the post-quantum world

Post-Quantum Crypto

Some Possibilities Multivariate cryptography

Code-based cryptography

Hash-based scheme eg Merkle signatures

Lattice-based cryptography eg NTRU learning with errors (LWE)

Future Anonymity in Todayrsquos Budget Aniket Kate 12

Post-Quantum Crypto

Some Possibilities Multivariate cryptography

Code-based cryptography

Hash-based scheme eg Merkle signatures

Lattice-based cryptography eg NTRU learning with errors (LWE)

Lattice-based Cryptography In this work we use the LWE assumptions to provide forward securityanonymity in the post-quantum world

Future Anonymity in Todayrsquos Budget Aniket Kate 12

Poly(η)-time quantum reduction from approximate-SVP toRing-LWE

Decision Ring-LWE

We consider a ring Rq = Zq[x](xη + 1)

Let χ is the error distribution (Gaussian) of small elements (symmetric around 0)

Given polynomial number of samples from R2q

(a1 b1)

(a2 b2)

middot middot middot (ak bk)

Does there exist an r and e1 middot middot middot ek isin χ 3 bi = ai middot r + ei

(or) Are all birsquos uniformly random in Rq

Future Anonymity in Todayrsquos Budget Aniket Kate 13

Decision Ring-LWE

We consider a ring Rq = Zq[x](xη + 1)

Let χ is the error distribution (Gaussian) of small elements (symmetric around 0)

Given polynomial number of samples from R2q

(a1 b1)

(a2 b2)

middot middot middot (ak bk)

Does there exist an r and e1 middot middot middot ek isin χ 3 bi = ai middot r + ei

(or) Are all birsquos uniformly random in Rq

Poly(η)-time quantum reduction from approximate-SVP to Ring-LWE

Future Anonymity in Todayrsquos Budget Aniket Kate 13

The HybridOR Protocol

Generate system parameters (R η q χ) and (G g p)

Client Node (no long-term key) (long-term keys (s gs))

rc ec e larrR χ x larrR Zlowast c p

x pc g pc = arc + ec minusminusminusminusminusminusminusminusminusminusrarr rn en e larrR χn

pn = arn + en

= pcrn + ek1n n α = hR(k1n)

pnα larrminusminusminusminusminusminusminusminusminusminus

k1C = pnrc + ec sx xsk1 = fR(k1n α) k2 = g k1 = fR(k1n α) k2 = g

(established session key sk = H1(k1) oplus H2(k2))

Future Anonymity in Todayrsquos Budget Aniket Kate 14

Type-II adversary (Authentication)- The adversary can only know the secret associated with thepseudonym from the node in the test session- HybridOR is secure under the GDH assumption

Type-III adversary(Forward Security)- The adversary can only know the secret associated with the longterm public key- HybridOR is secure under the ring-LWE assumption

The HybridOR Protocol Security

Type-I adversary (Channel Secrecy) - The adversary cannot know a secret associated any public values in the test session - HybridOR is secure under any of the GDH as well as ring-LWE assumptions

Future Anonymity in Todayrsquos Budget Aniket Kate 15

Type-III adversary(Forward Security)- The adversary can only know the secret associated with the longterm public key- HybridOR is secure under the ring-LWE assumption

The HybridOR Protocol Security

Type-I adversary (Channel Secrecy) - The adversary cannot know a secret associated any public values in the test session - HybridOR is secure under any of the GDH as well as ring-LWE assumptions

Type-II adversary (Authentication) - The adversary can only know the secret associated with the pseudonym from the node in the test session - HybridOR is secure under the GDH assumption

Future Anonymity in Todayrsquos Budget Aniket Kate 15

The HybridOR Protocol Security

Type-I adversary (Channel Secrecy) - The adversary cannot know a secret associated any public values in the test session - HybridOR is secure under any of the GDH as well as ring-LWE assumptions

Type-II adversary (Authentication) - The adversary can only know the secret associated with the pseudonym from the node in the test session - HybridOR is secure under the GDH assumption

Type-III adversary(Forward Security) - The adversary can only know the secret associated with the long term public key - HybridOR is secure under the ring-LWE assumption

Future Anonymity in Todayrsquos Budget Aniket Kate 15

The HybridOR Protocol Performance

Parameters degree of the irreducible polynomial η = 512 prime modulus q = 1051649 error distribution χ parameter β = 800

Computation Cost Our HybridOR implementation is nearly 15 times faster than the ntor protocol used in Tor

Communication Cost For HybridOR the client and the node each will have to communicate three cells (Each cell is of size 512-byte)

Future Anonymity in Todayrsquos Budget Aniket Kate 16

Take Away We present a novel hybrid 1W-AKE protocol HybridOR which extracts its security from both the classically secure GDH assumption and the post-quantum secure ring-LWE assumption

We base its forward secrecy on the quantum-secure ring-LWE assumption

We leverage the current Tor PKI in its current form

Our performance analysis demonstrates that post-quantum 1W-AKE can already be considered practical for use today

Online Version httpeprintiacrorg2015008

Future Anonymity in Todayrsquos Budget Aniket Kate 17

Take Away We present a novel hybrid 1W-AKE protocol HybridOR which extracts its security from both the classically secure GDH assumption and the post-quantum secure ring-LWE assumption

We base its forward secrecy on the quantum-secure ring-LWE assumption

We leverage the current Tor PKI in its current form

Our performance analysis demonstrates that post-quantum 1W-AKE can already be considered practical for use today

Online Version httpeprintiacrorg2015008

17 Future Anonymity in Todayrsquos Budget Aniket Kate

Page 23: (Post-Quantum Forward Secure Onion Routing)Aniket Kate . The HybridOR Protocol: Security . Type-I adversary (Channel Secrecy) - The adversary cannot know a secret associated any public

The GDH ProblemLet G be a multiplicative group with large prime order p andg isin G be the generator of the group

Given a triple (g ga gb) for a b isinr Zlowastp the GDH problem is to find

the element gab with the help of a Decision Diffie-Hellman (DDH)oracle

The DDH oracle takes input as (G g ga gb z) for some z isin Gand tells whether z = gab

The ntor 1W-AKE Protocol Security

The 1W-AKE security of the ntor protocol is proven against the gap Diffie-Hellman (GDH) assumption

Future Anonymity in Todayrsquos Budget Aniket Kate 10

The ntor 1W-AKE Protocol Security

The 1W-AKE security of the ntor protocol is proven against the gap Diffie-Hellman (GDH) assumption

The GDH Problem Let G be a multiplicative group with large prime order p and g isin G be the generator of the group

aGiven a triple (g g gb) for a b isinr Zlowast the GDH problem is to find p

the element gab with the help of a Decision Diffie-Hellman (DDH) oracle

bThe DDH oracle takes input as (G g ga g z) for some z isin G aband tells whether z = g

Future Anonymity in Todayrsquos Budget Aniket Kate 10

So what

Security and anonymity of even todayrsquos onion routingcommunications can be violated

The Tor community

will be hesitant to completely changing the public keyinfrastructure (PKI)questions the performance penalty

ChallengeDesign a 1W-AKE scheme that offers forward security in thepost-quantum world without significantly affecting the currentinfrastructure and performance

When the Quantum computer arrives

This 1W-AKE scheme will no longer be secure

Future Anonymity in Todayrsquos Budget Aniket Kate 11

Security and anonymity of even todayrsquos onion routingcommunications can be violated

The Tor community

will be hesitant to completely changing the public keyinfrastructure (PKI)questions the performance penalty

ChallengeDesign a 1W-AKE scheme that offers forward security in thepost-quantum world without significantly affecting the currentinfrastructure and performance

When the Quantum computer arrives

This 1W-AKE scheme will no longer be secure

So what

Future Anonymity in Todayrsquos Budget Aniket Kate 11

The Tor community

will be hesitant to completely changing the public keyinfrastructure (PKI)questions the performance penalty

ChallengeDesign a 1W-AKE scheme that offers forward security in thepost-quantum world without significantly affecting the currentinfrastructure and performance

When the Quantum computer arrives

This 1W-AKE scheme will no longer be secure

So what

Security and anonymity of even todayrsquos onion routing communications can be violated

Future Anonymity in Todayrsquos Budget Aniket Kate 11

ChallengeDesign a 1W-AKE scheme that offers forward security in thepost-quantum world without significantly affecting the currentinfrastructure and performance

When the Quantum computer arrives

This 1W-AKE scheme will no longer be secure

So what

Security and anonymity of even todayrsquos onion routing communications can be violated

The Tor community

will be hesitant to completely changing the public key infrastructure (PKI) questions the performance penalty

Future Anonymity in Todayrsquos Budget Aniket Kate 11

When the Quantum computer arrives

This 1W-AKE scheme will no longer be secure

So what

Security and anonymity of even todayrsquos onion routing communications can be violated

The Tor community

will be hesitant to completely changing the public key infrastructure (PKI) questions the performance penalty

Challenge Design a 1W-AKE scheme that offers forward security in the post-quantum world without significantly affecting the current infrastructure and performance

Future Anonymity in Todayrsquos Budget Aniket Kate 11

Lattice-based CryptographyIn this work we use the LWE assumptions to provide forwardsecurityanonymity in the post-quantum world

Post-Quantum Crypto

Some Possibilities Multivariate cryptography

Code-based cryptography

Hash-based scheme eg Merkle signatures

Lattice-based cryptography eg NTRU learning with errors (LWE)

Future Anonymity in Todayrsquos Budget Aniket Kate 12

Post-Quantum Crypto

Some Possibilities Multivariate cryptography

Code-based cryptography

Hash-based scheme eg Merkle signatures

Lattice-based cryptography eg NTRU learning with errors (LWE)

Lattice-based Cryptography In this work we use the LWE assumptions to provide forward securityanonymity in the post-quantum world

Future Anonymity in Todayrsquos Budget Aniket Kate 12

Poly(η)-time quantum reduction from approximate-SVP toRing-LWE

Decision Ring-LWE

We consider a ring Rq = Zq[x](xη + 1)

Let χ is the error distribution (Gaussian) of small elements (symmetric around 0)

Given polynomial number of samples from R2q

(a1 b1)

(a2 b2)

middot middot middot (ak bk)

Does there exist an r and e1 middot middot middot ek isin χ 3 bi = ai middot r + ei

(or) Are all birsquos uniformly random in Rq

Future Anonymity in Todayrsquos Budget Aniket Kate 13

Decision Ring-LWE

We consider a ring Rq = Zq[x](xη + 1)

Let χ is the error distribution (Gaussian) of small elements (symmetric around 0)

Given polynomial number of samples from R2q

(a1 b1)

(a2 b2)

middot middot middot (ak bk)

Does there exist an r and e1 middot middot middot ek isin χ 3 bi = ai middot r + ei

(or) Are all birsquos uniformly random in Rq

Poly(η)-time quantum reduction from approximate-SVP to Ring-LWE

Future Anonymity in Todayrsquos Budget Aniket Kate 13

The HybridOR Protocol

Generate system parameters (R η q χ) and (G g p)

Client Node (no long-term key) (long-term keys (s gs))

rc ec e larrR χ x larrR Zlowast c p

x pc g pc = arc + ec minusminusminusminusminusminusminusminusminusminusrarr rn en e larrR χn

pn = arn + en

= pcrn + ek1n n α = hR(k1n)

pnα larrminusminusminusminusminusminusminusminusminusminus

k1C = pnrc + ec sx xsk1 = fR(k1n α) k2 = g k1 = fR(k1n α) k2 = g

(established session key sk = H1(k1) oplus H2(k2))

Future Anonymity in Todayrsquos Budget Aniket Kate 14

Type-II adversary (Authentication)- The adversary can only know the secret associated with thepseudonym from the node in the test session- HybridOR is secure under the GDH assumption

Type-III adversary(Forward Security)- The adversary can only know the secret associated with the longterm public key- HybridOR is secure under the ring-LWE assumption

The HybridOR Protocol Security

Type-I adversary (Channel Secrecy) - The adversary cannot know a secret associated any public values in the test session - HybridOR is secure under any of the GDH as well as ring-LWE assumptions

Future Anonymity in Todayrsquos Budget Aniket Kate 15

Type-III adversary(Forward Security)- The adversary can only know the secret associated with the longterm public key- HybridOR is secure under the ring-LWE assumption

The HybridOR Protocol Security

Type-I adversary (Channel Secrecy) - The adversary cannot know a secret associated any public values in the test session - HybridOR is secure under any of the GDH as well as ring-LWE assumptions

Type-II adversary (Authentication) - The adversary can only know the secret associated with the pseudonym from the node in the test session - HybridOR is secure under the GDH assumption

Future Anonymity in Todayrsquos Budget Aniket Kate 15

The HybridOR Protocol Security

Type-I adversary (Channel Secrecy) - The adversary cannot know a secret associated any public values in the test session - HybridOR is secure under any of the GDH as well as ring-LWE assumptions

Type-II adversary (Authentication) - The adversary can only know the secret associated with the pseudonym from the node in the test session - HybridOR is secure under the GDH assumption

Type-III adversary(Forward Security) - The adversary can only know the secret associated with the long term public key - HybridOR is secure under the ring-LWE assumption

Future Anonymity in Todayrsquos Budget Aniket Kate 15

The HybridOR Protocol Performance

Parameters degree of the irreducible polynomial η = 512 prime modulus q = 1051649 error distribution χ parameter β = 800

Computation Cost Our HybridOR implementation is nearly 15 times faster than the ntor protocol used in Tor

Communication Cost For HybridOR the client and the node each will have to communicate three cells (Each cell is of size 512-byte)

Future Anonymity in Todayrsquos Budget Aniket Kate 16

Take Away We present a novel hybrid 1W-AKE protocol HybridOR which extracts its security from both the classically secure GDH assumption and the post-quantum secure ring-LWE assumption

We base its forward secrecy on the quantum-secure ring-LWE assumption

We leverage the current Tor PKI in its current form

Our performance analysis demonstrates that post-quantum 1W-AKE can already be considered practical for use today

Online Version httpeprintiacrorg2015008

Future Anonymity in Todayrsquos Budget Aniket Kate 17

Take Away We present a novel hybrid 1W-AKE protocol HybridOR which extracts its security from both the classically secure GDH assumption and the post-quantum secure ring-LWE assumption

We base its forward secrecy on the quantum-secure ring-LWE assumption

We leverage the current Tor PKI in its current form

Our performance analysis demonstrates that post-quantum 1W-AKE can already be considered practical for use today

Online Version httpeprintiacrorg2015008

17 Future Anonymity in Todayrsquos Budget Aniket Kate

Page 24: (Post-Quantum Forward Secure Onion Routing)Aniket Kate . The HybridOR Protocol: Security . Type-I adversary (Channel Secrecy) - The adversary cannot know a secret associated any public

The ntor 1W-AKE Protocol Security

The 1W-AKE security of the ntor protocol is proven against the gap Diffie-Hellman (GDH) assumption

The GDH Problem Let G be a multiplicative group with large prime order p and g isin G be the generator of the group

aGiven a triple (g g gb) for a b isinr Zlowast the GDH problem is to find p

the element gab with the help of a Decision Diffie-Hellman (DDH) oracle

bThe DDH oracle takes input as (G g ga g z) for some z isin G aband tells whether z = g

Future Anonymity in Todayrsquos Budget Aniket Kate 10

So what

Security and anonymity of even todayrsquos onion routingcommunications can be violated

The Tor community

will be hesitant to completely changing the public keyinfrastructure (PKI)questions the performance penalty

ChallengeDesign a 1W-AKE scheme that offers forward security in thepost-quantum world without significantly affecting the currentinfrastructure and performance

When the Quantum computer arrives

This 1W-AKE scheme will no longer be secure

Future Anonymity in Todayrsquos Budget Aniket Kate 11

Security and anonymity of even todayrsquos onion routingcommunications can be violated

The Tor community

will be hesitant to completely changing the public keyinfrastructure (PKI)questions the performance penalty

ChallengeDesign a 1W-AKE scheme that offers forward security in thepost-quantum world without significantly affecting the currentinfrastructure and performance

When the Quantum computer arrives

This 1W-AKE scheme will no longer be secure

So what

Future Anonymity in Todayrsquos Budget Aniket Kate 11

The Tor community

will be hesitant to completely changing the public keyinfrastructure (PKI)questions the performance penalty

ChallengeDesign a 1W-AKE scheme that offers forward security in thepost-quantum world without significantly affecting the currentinfrastructure and performance

When the Quantum computer arrives

This 1W-AKE scheme will no longer be secure

So what

Security and anonymity of even todayrsquos onion routing communications can be violated

Future Anonymity in Todayrsquos Budget Aniket Kate 11

ChallengeDesign a 1W-AKE scheme that offers forward security in thepost-quantum world without significantly affecting the currentinfrastructure and performance

When the Quantum computer arrives

This 1W-AKE scheme will no longer be secure

So what

Security and anonymity of even todayrsquos onion routing communications can be violated

The Tor community

will be hesitant to completely changing the public key infrastructure (PKI) questions the performance penalty

Future Anonymity in Todayrsquos Budget Aniket Kate 11

When the Quantum computer arrives

This 1W-AKE scheme will no longer be secure

So what

Security and anonymity of even todayrsquos onion routing communications can be violated

The Tor community

will be hesitant to completely changing the public key infrastructure (PKI) questions the performance penalty

Challenge Design a 1W-AKE scheme that offers forward security in the post-quantum world without significantly affecting the current infrastructure and performance

Future Anonymity in Todayrsquos Budget Aniket Kate 11

Lattice-based CryptographyIn this work we use the LWE assumptions to provide forwardsecurityanonymity in the post-quantum world

Post-Quantum Crypto

Some Possibilities Multivariate cryptography

Code-based cryptography

Hash-based scheme eg Merkle signatures

Lattice-based cryptography eg NTRU learning with errors (LWE)

Future Anonymity in Todayrsquos Budget Aniket Kate 12

Post-Quantum Crypto

Some Possibilities Multivariate cryptography

Code-based cryptography

Hash-based scheme eg Merkle signatures

Lattice-based cryptography eg NTRU learning with errors (LWE)

Lattice-based Cryptography In this work we use the LWE assumptions to provide forward securityanonymity in the post-quantum world

Future Anonymity in Todayrsquos Budget Aniket Kate 12

Poly(η)-time quantum reduction from approximate-SVP toRing-LWE

Decision Ring-LWE

We consider a ring Rq = Zq[x](xη + 1)

Let χ is the error distribution (Gaussian) of small elements (symmetric around 0)

Given polynomial number of samples from R2q

(a1 b1)

(a2 b2)

middot middot middot (ak bk)

Does there exist an r and e1 middot middot middot ek isin χ 3 bi = ai middot r + ei

(or) Are all birsquos uniformly random in Rq

Future Anonymity in Todayrsquos Budget Aniket Kate 13

Decision Ring-LWE

We consider a ring Rq = Zq[x](xη + 1)

Let χ is the error distribution (Gaussian) of small elements (symmetric around 0)

Given polynomial number of samples from R2q

(a1 b1)

(a2 b2)

middot middot middot (ak bk)

Does there exist an r and e1 middot middot middot ek isin χ 3 bi = ai middot r + ei

(or) Are all birsquos uniformly random in Rq

Poly(η)-time quantum reduction from approximate-SVP to Ring-LWE

Future Anonymity in Todayrsquos Budget Aniket Kate 13

The HybridOR Protocol

Generate system parameters (R η q χ) and (G g p)

Client Node (no long-term key) (long-term keys (s gs))

rc ec e larrR χ x larrR Zlowast c p

x pc g pc = arc + ec minusminusminusminusminusminusminusminusminusminusrarr rn en e larrR χn

pn = arn + en

= pcrn + ek1n n α = hR(k1n)

pnα larrminusminusminusminusminusminusminusminusminusminus

k1C = pnrc + ec sx xsk1 = fR(k1n α) k2 = g k1 = fR(k1n α) k2 = g

(established session key sk = H1(k1) oplus H2(k2))

Future Anonymity in Todayrsquos Budget Aniket Kate 14

Type-II adversary (Authentication)- The adversary can only know the secret associated with thepseudonym from the node in the test session- HybridOR is secure under the GDH assumption

Type-III adversary(Forward Security)- The adversary can only know the secret associated with the longterm public key- HybridOR is secure under the ring-LWE assumption

The HybridOR Protocol Security

Type-I adversary (Channel Secrecy) - The adversary cannot know a secret associated any public values in the test session - HybridOR is secure under any of the GDH as well as ring-LWE assumptions

Future Anonymity in Todayrsquos Budget Aniket Kate 15

Type-III adversary(Forward Security)- The adversary can only know the secret associated with the longterm public key- HybridOR is secure under the ring-LWE assumption

The HybridOR Protocol Security

Type-I adversary (Channel Secrecy) - The adversary cannot know a secret associated any public values in the test session - HybridOR is secure under any of the GDH as well as ring-LWE assumptions

Type-II adversary (Authentication) - The adversary can only know the secret associated with the pseudonym from the node in the test session - HybridOR is secure under the GDH assumption

Future Anonymity in Todayrsquos Budget Aniket Kate 15

The HybridOR Protocol Security

Type-I adversary (Channel Secrecy) - The adversary cannot know a secret associated any public values in the test session - HybridOR is secure under any of the GDH as well as ring-LWE assumptions

Type-II adversary (Authentication) - The adversary can only know the secret associated with the pseudonym from the node in the test session - HybridOR is secure under the GDH assumption

Type-III adversary(Forward Security) - The adversary can only know the secret associated with the long term public key - HybridOR is secure under the ring-LWE assumption

Future Anonymity in Todayrsquos Budget Aniket Kate 15

The HybridOR Protocol Performance

Parameters degree of the irreducible polynomial η = 512 prime modulus q = 1051649 error distribution χ parameter β = 800

Computation Cost Our HybridOR implementation is nearly 15 times faster than the ntor protocol used in Tor

Communication Cost For HybridOR the client and the node each will have to communicate three cells (Each cell is of size 512-byte)

Future Anonymity in Todayrsquos Budget Aniket Kate 16

Take Away We present a novel hybrid 1W-AKE protocol HybridOR which extracts its security from both the classically secure GDH assumption and the post-quantum secure ring-LWE assumption

We base its forward secrecy on the quantum-secure ring-LWE assumption

We leverage the current Tor PKI in its current form

Our performance analysis demonstrates that post-quantum 1W-AKE can already be considered practical for use today

Online Version httpeprintiacrorg2015008

Future Anonymity in Todayrsquos Budget Aniket Kate 17

Take Away We present a novel hybrid 1W-AKE protocol HybridOR which extracts its security from both the classically secure GDH assumption and the post-quantum secure ring-LWE assumption

We base its forward secrecy on the quantum-secure ring-LWE assumption

We leverage the current Tor PKI in its current form

Our performance analysis demonstrates that post-quantum 1W-AKE can already be considered practical for use today

Online Version httpeprintiacrorg2015008

17 Future Anonymity in Todayrsquos Budget Aniket Kate

Page 25: (Post-Quantum Forward Secure Onion Routing)Aniket Kate . The HybridOR Protocol: Security . Type-I adversary (Channel Secrecy) - The adversary cannot know a secret associated any public

So what

Security and anonymity of even todayrsquos onion routingcommunications can be violated

The Tor community

will be hesitant to completely changing the public keyinfrastructure (PKI)questions the performance penalty

ChallengeDesign a 1W-AKE scheme that offers forward security in thepost-quantum world without significantly affecting the currentinfrastructure and performance

When the Quantum computer arrives

This 1W-AKE scheme will no longer be secure

Future Anonymity in Todayrsquos Budget Aniket Kate 11

Security and anonymity of even todayrsquos onion routingcommunications can be violated

The Tor community

will be hesitant to completely changing the public keyinfrastructure (PKI)questions the performance penalty

ChallengeDesign a 1W-AKE scheme that offers forward security in thepost-quantum world without significantly affecting the currentinfrastructure and performance

When the Quantum computer arrives

This 1W-AKE scheme will no longer be secure

So what

Future Anonymity in Todayrsquos Budget Aniket Kate 11

The Tor community

will be hesitant to completely changing the public keyinfrastructure (PKI)questions the performance penalty

ChallengeDesign a 1W-AKE scheme that offers forward security in thepost-quantum world without significantly affecting the currentinfrastructure and performance

When the Quantum computer arrives

This 1W-AKE scheme will no longer be secure

So what

Security and anonymity of even todayrsquos onion routing communications can be violated

Future Anonymity in Todayrsquos Budget Aniket Kate 11

ChallengeDesign a 1W-AKE scheme that offers forward security in thepost-quantum world without significantly affecting the currentinfrastructure and performance

When the Quantum computer arrives

This 1W-AKE scheme will no longer be secure

So what

Security and anonymity of even todayrsquos onion routing communications can be violated

The Tor community

will be hesitant to completely changing the public key infrastructure (PKI) questions the performance penalty

Future Anonymity in Todayrsquos Budget Aniket Kate 11

When the Quantum computer arrives

This 1W-AKE scheme will no longer be secure

So what

Security and anonymity of even todayrsquos onion routing communications can be violated

The Tor community

will be hesitant to completely changing the public key infrastructure (PKI) questions the performance penalty

Challenge Design a 1W-AKE scheme that offers forward security in the post-quantum world without significantly affecting the current infrastructure and performance

Future Anonymity in Todayrsquos Budget Aniket Kate 11

Lattice-based CryptographyIn this work we use the LWE assumptions to provide forwardsecurityanonymity in the post-quantum world

Post-Quantum Crypto

Some Possibilities Multivariate cryptography

Code-based cryptography

Hash-based scheme eg Merkle signatures

Lattice-based cryptography eg NTRU learning with errors (LWE)

Future Anonymity in Todayrsquos Budget Aniket Kate 12

Post-Quantum Crypto

Some Possibilities Multivariate cryptography

Code-based cryptography

Hash-based scheme eg Merkle signatures

Lattice-based cryptography eg NTRU learning with errors (LWE)

Lattice-based Cryptography In this work we use the LWE assumptions to provide forward securityanonymity in the post-quantum world

Future Anonymity in Todayrsquos Budget Aniket Kate 12

Poly(η)-time quantum reduction from approximate-SVP toRing-LWE

Decision Ring-LWE

We consider a ring Rq = Zq[x](xη + 1)

Let χ is the error distribution (Gaussian) of small elements (symmetric around 0)

Given polynomial number of samples from R2q

(a1 b1)

(a2 b2)

middot middot middot (ak bk)

Does there exist an r and e1 middot middot middot ek isin χ 3 bi = ai middot r + ei

(or) Are all birsquos uniformly random in Rq

Future Anonymity in Todayrsquos Budget Aniket Kate 13

Decision Ring-LWE

We consider a ring Rq = Zq[x](xη + 1)

Let χ is the error distribution (Gaussian) of small elements (symmetric around 0)

Given polynomial number of samples from R2q

(a1 b1)

(a2 b2)

middot middot middot (ak bk)

Does there exist an r and e1 middot middot middot ek isin χ 3 bi = ai middot r + ei

(or) Are all birsquos uniformly random in Rq

Poly(η)-time quantum reduction from approximate-SVP to Ring-LWE

Future Anonymity in Todayrsquos Budget Aniket Kate 13

The HybridOR Protocol

Generate system parameters (R η q χ) and (G g p)

Client Node (no long-term key) (long-term keys (s gs))

rc ec e larrR χ x larrR Zlowast c p

x pc g pc = arc + ec minusminusminusminusminusminusminusminusminusminusrarr rn en e larrR χn

pn = arn + en

= pcrn + ek1n n α = hR(k1n)

pnα larrminusminusminusminusminusminusminusminusminusminus

k1C = pnrc + ec sx xsk1 = fR(k1n α) k2 = g k1 = fR(k1n α) k2 = g

(established session key sk = H1(k1) oplus H2(k2))

Future Anonymity in Todayrsquos Budget Aniket Kate 14

Type-II adversary (Authentication)- The adversary can only know the secret associated with thepseudonym from the node in the test session- HybridOR is secure under the GDH assumption

Type-III adversary(Forward Security)- The adversary can only know the secret associated with the longterm public key- HybridOR is secure under the ring-LWE assumption

The HybridOR Protocol Security

Type-I adversary (Channel Secrecy) - The adversary cannot know a secret associated any public values in the test session - HybridOR is secure under any of the GDH as well as ring-LWE assumptions

Future Anonymity in Todayrsquos Budget Aniket Kate 15

Type-III adversary(Forward Security)- The adversary can only know the secret associated with the longterm public key- HybridOR is secure under the ring-LWE assumption

The HybridOR Protocol Security

Type-I adversary (Channel Secrecy) - The adversary cannot know a secret associated any public values in the test session - HybridOR is secure under any of the GDH as well as ring-LWE assumptions

Type-II adversary (Authentication) - The adversary can only know the secret associated with the pseudonym from the node in the test session - HybridOR is secure under the GDH assumption

Future Anonymity in Todayrsquos Budget Aniket Kate 15

The HybridOR Protocol Security

Type-I adversary (Channel Secrecy) - The adversary cannot know a secret associated any public values in the test session - HybridOR is secure under any of the GDH as well as ring-LWE assumptions

Type-II adversary (Authentication) - The adversary can only know the secret associated with the pseudonym from the node in the test session - HybridOR is secure under the GDH assumption

Type-III adversary(Forward Security) - The adversary can only know the secret associated with the long term public key - HybridOR is secure under the ring-LWE assumption

Future Anonymity in Todayrsquos Budget Aniket Kate 15

The HybridOR Protocol Performance

Parameters degree of the irreducible polynomial η = 512 prime modulus q = 1051649 error distribution χ parameter β = 800

Computation Cost Our HybridOR implementation is nearly 15 times faster than the ntor protocol used in Tor

Communication Cost For HybridOR the client and the node each will have to communicate three cells (Each cell is of size 512-byte)

Future Anonymity in Todayrsquos Budget Aniket Kate 16

Take Away We present a novel hybrid 1W-AKE protocol HybridOR which extracts its security from both the classically secure GDH assumption and the post-quantum secure ring-LWE assumption

We base its forward secrecy on the quantum-secure ring-LWE assumption

We leverage the current Tor PKI in its current form

Our performance analysis demonstrates that post-quantum 1W-AKE can already be considered practical for use today

Online Version httpeprintiacrorg2015008

Future Anonymity in Todayrsquos Budget Aniket Kate 17

Take Away We present a novel hybrid 1W-AKE protocol HybridOR which extracts its security from both the classically secure GDH assumption and the post-quantum secure ring-LWE assumption

We base its forward secrecy on the quantum-secure ring-LWE assumption

We leverage the current Tor PKI in its current form

Our performance analysis demonstrates that post-quantum 1W-AKE can already be considered practical for use today

Online Version httpeprintiacrorg2015008

17 Future Anonymity in Todayrsquos Budget Aniket Kate

Page 26: (Post-Quantum Forward Secure Onion Routing)Aniket Kate . The HybridOR Protocol: Security . Type-I adversary (Channel Secrecy) - The adversary cannot know a secret associated any public

Security and anonymity of even todayrsquos onion routingcommunications can be violated

The Tor community

will be hesitant to completely changing the public keyinfrastructure (PKI)questions the performance penalty

ChallengeDesign a 1W-AKE scheme that offers forward security in thepost-quantum world without significantly affecting the currentinfrastructure and performance

When the Quantum computer arrives

This 1W-AKE scheme will no longer be secure

So what

Future Anonymity in Todayrsquos Budget Aniket Kate 11

The Tor community

will be hesitant to completely changing the public keyinfrastructure (PKI)questions the performance penalty

ChallengeDesign a 1W-AKE scheme that offers forward security in thepost-quantum world without significantly affecting the currentinfrastructure and performance

When the Quantum computer arrives

This 1W-AKE scheme will no longer be secure

So what

Security and anonymity of even todayrsquos onion routing communications can be violated

Future Anonymity in Todayrsquos Budget Aniket Kate 11

ChallengeDesign a 1W-AKE scheme that offers forward security in thepost-quantum world without significantly affecting the currentinfrastructure and performance

When the Quantum computer arrives

This 1W-AKE scheme will no longer be secure

So what

Security and anonymity of even todayrsquos onion routing communications can be violated

The Tor community

will be hesitant to completely changing the public key infrastructure (PKI) questions the performance penalty

Future Anonymity in Todayrsquos Budget Aniket Kate 11

When the Quantum computer arrives

This 1W-AKE scheme will no longer be secure

So what

Security and anonymity of even todayrsquos onion routing communications can be violated

The Tor community

will be hesitant to completely changing the public key infrastructure (PKI) questions the performance penalty

Challenge Design a 1W-AKE scheme that offers forward security in the post-quantum world without significantly affecting the current infrastructure and performance

Future Anonymity in Todayrsquos Budget Aniket Kate 11

Lattice-based CryptographyIn this work we use the LWE assumptions to provide forwardsecurityanonymity in the post-quantum world

Post-Quantum Crypto

Some Possibilities Multivariate cryptography

Code-based cryptography

Hash-based scheme eg Merkle signatures

Lattice-based cryptography eg NTRU learning with errors (LWE)

Future Anonymity in Todayrsquos Budget Aniket Kate 12

Post-Quantum Crypto

Some Possibilities Multivariate cryptography

Code-based cryptography

Hash-based scheme eg Merkle signatures

Lattice-based cryptography eg NTRU learning with errors (LWE)

Lattice-based Cryptography In this work we use the LWE assumptions to provide forward securityanonymity in the post-quantum world

Future Anonymity in Todayrsquos Budget Aniket Kate 12

Poly(η)-time quantum reduction from approximate-SVP toRing-LWE

Decision Ring-LWE

We consider a ring Rq = Zq[x](xη + 1)

Let χ is the error distribution (Gaussian) of small elements (symmetric around 0)

Given polynomial number of samples from R2q

(a1 b1)

(a2 b2)

middot middot middot (ak bk)

Does there exist an r and e1 middot middot middot ek isin χ 3 bi = ai middot r + ei

(or) Are all birsquos uniformly random in Rq

Future Anonymity in Todayrsquos Budget Aniket Kate 13

Decision Ring-LWE

We consider a ring Rq = Zq[x](xη + 1)

Let χ is the error distribution (Gaussian) of small elements (symmetric around 0)

Given polynomial number of samples from R2q

(a1 b1)

(a2 b2)

middot middot middot (ak bk)

Does there exist an r and e1 middot middot middot ek isin χ 3 bi = ai middot r + ei

(or) Are all birsquos uniformly random in Rq

Poly(η)-time quantum reduction from approximate-SVP to Ring-LWE

Future Anonymity in Todayrsquos Budget Aniket Kate 13

The HybridOR Protocol

Generate system parameters (R η q χ) and (G g p)

Client Node (no long-term key) (long-term keys (s gs))

rc ec e larrR χ x larrR Zlowast c p

x pc g pc = arc + ec minusminusminusminusminusminusminusminusminusminusrarr rn en e larrR χn

pn = arn + en

= pcrn + ek1n n α = hR(k1n)

pnα larrminusminusminusminusminusminusminusminusminusminus

k1C = pnrc + ec sx xsk1 = fR(k1n α) k2 = g k1 = fR(k1n α) k2 = g

(established session key sk = H1(k1) oplus H2(k2))

Future Anonymity in Todayrsquos Budget Aniket Kate 14

Type-II adversary (Authentication)- The adversary can only know the secret associated with thepseudonym from the node in the test session- HybridOR is secure under the GDH assumption

Type-III adversary(Forward Security)- The adversary can only know the secret associated with the longterm public key- HybridOR is secure under the ring-LWE assumption

The HybridOR Protocol Security

Type-I adversary (Channel Secrecy) - The adversary cannot know a secret associated any public values in the test session - HybridOR is secure under any of the GDH as well as ring-LWE assumptions

Future Anonymity in Todayrsquos Budget Aniket Kate 15

Type-III adversary(Forward Security)- The adversary can only know the secret associated with the longterm public key- HybridOR is secure under the ring-LWE assumption

The HybridOR Protocol Security

Type-I adversary (Channel Secrecy) - The adversary cannot know a secret associated any public values in the test session - HybridOR is secure under any of the GDH as well as ring-LWE assumptions

Type-II adversary (Authentication) - The adversary can only know the secret associated with the pseudonym from the node in the test session - HybridOR is secure under the GDH assumption

Future Anonymity in Todayrsquos Budget Aniket Kate 15

The HybridOR Protocol Security

Type-I adversary (Channel Secrecy) - The adversary cannot know a secret associated any public values in the test session - HybridOR is secure under any of the GDH as well as ring-LWE assumptions

Type-II adversary (Authentication) - The adversary can only know the secret associated with the pseudonym from the node in the test session - HybridOR is secure under the GDH assumption

Type-III adversary(Forward Security) - The adversary can only know the secret associated with the long term public key - HybridOR is secure under the ring-LWE assumption

Future Anonymity in Todayrsquos Budget Aniket Kate 15

The HybridOR Protocol Performance

Parameters degree of the irreducible polynomial η = 512 prime modulus q = 1051649 error distribution χ parameter β = 800

Computation Cost Our HybridOR implementation is nearly 15 times faster than the ntor protocol used in Tor

Communication Cost For HybridOR the client and the node each will have to communicate three cells (Each cell is of size 512-byte)

Future Anonymity in Todayrsquos Budget Aniket Kate 16

Take Away We present a novel hybrid 1W-AKE protocol HybridOR which extracts its security from both the classically secure GDH assumption and the post-quantum secure ring-LWE assumption

We base its forward secrecy on the quantum-secure ring-LWE assumption

We leverage the current Tor PKI in its current form

Our performance analysis demonstrates that post-quantum 1W-AKE can already be considered practical for use today

Online Version httpeprintiacrorg2015008

Future Anonymity in Todayrsquos Budget Aniket Kate 17

Take Away We present a novel hybrid 1W-AKE protocol HybridOR which extracts its security from both the classically secure GDH assumption and the post-quantum secure ring-LWE assumption

We base its forward secrecy on the quantum-secure ring-LWE assumption

We leverage the current Tor PKI in its current form

Our performance analysis demonstrates that post-quantum 1W-AKE can already be considered practical for use today

Online Version httpeprintiacrorg2015008

17 Future Anonymity in Todayrsquos Budget Aniket Kate

Page 27: (Post-Quantum Forward Secure Onion Routing)Aniket Kate . The HybridOR Protocol: Security . Type-I adversary (Channel Secrecy) - The adversary cannot know a secret associated any public

The Tor community

will be hesitant to completely changing the public keyinfrastructure (PKI)questions the performance penalty

ChallengeDesign a 1W-AKE scheme that offers forward security in thepost-quantum world without significantly affecting the currentinfrastructure and performance

When the Quantum computer arrives

This 1W-AKE scheme will no longer be secure

So what

Security and anonymity of even todayrsquos onion routing communications can be violated

Future Anonymity in Todayrsquos Budget Aniket Kate 11

ChallengeDesign a 1W-AKE scheme that offers forward security in thepost-quantum world without significantly affecting the currentinfrastructure and performance

When the Quantum computer arrives

This 1W-AKE scheme will no longer be secure

So what

Security and anonymity of even todayrsquos onion routing communications can be violated

The Tor community

will be hesitant to completely changing the public key infrastructure (PKI) questions the performance penalty

Future Anonymity in Todayrsquos Budget Aniket Kate 11

When the Quantum computer arrives

This 1W-AKE scheme will no longer be secure

So what

Security and anonymity of even todayrsquos onion routing communications can be violated

The Tor community

will be hesitant to completely changing the public key infrastructure (PKI) questions the performance penalty

Challenge Design a 1W-AKE scheme that offers forward security in the post-quantum world without significantly affecting the current infrastructure and performance

Future Anonymity in Todayrsquos Budget Aniket Kate 11

Lattice-based CryptographyIn this work we use the LWE assumptions to provide forwardsecurityanonymity in the post-quantum world

Post-Quantum Crypto

Some Possibilities Multivariate cryptography

Code-based cryptography

Hash-based scheme eg Merkle signatures

Lattice-based cryptography eg NTRU learning with errors (LWE)

Future Anonymity in Todayrsquos Budget Aniket Kate 12

Post-Quantum Crypto

Some Possibilities Multivariate cryptography

Code-based cryptography

Hash-based scheme eg Merkle signatures

Lattice-based cryptography eg NTRU learning with errors (LWE)

Lattice-based Cryptography In this work we use the LWE assumptions to provide forward securityanonymity in the post-quantum world

Future Anonymity in Todayrsquos Budget Aniket Kate 12

Poly(η)-time quantum reduction from approximate-SVP toRing-LWE

Decision Ring-LWE

We consider a ring Rq = Zq[x](xη + 1)

Let χ is the error distribution (Gaussian) of small elements (symmetric around 0)

Given polynomial number of samples from R2q

(a1 b1)

(a2 b2)

middot middot middot (ak bk)

Does there exist an r and e1 middot middot middot ek isin χ 3 bi = ai middot r + ei

(or) Are all birsquos uniformly random in Rq

Future Anonymity in Todayrsquos Budget Aniket Kate 13

Decision Ring-LWE

We consider a ring Rq = Zq[x](xη + 1)

Let χ is the error distribution (Gaussian) of small elements (symmetric around 0)

Given polynomial number of samples from R2q

(a1 b1)

(a2 b2)

middot middot middot (ak bk)

Does there exist an r and e1 middot middot middot ek isin χ 3 bi = ai middot r + ei

(or) Are all birsquos uniformly random in Rq

Poly(η)-time quantum reduction from approximate-SVP to Ring-LWE

Future Anonymity in Todayrsquos Budget Aniket Kate 13

The HybridOR Protocol

Generate system parameters (R η q χ) and (G g p)

Client Node (no long-term key) (long-term keys (s gs))

rc ec e larrR χ x larrR Zlowast c p

x pc g pc = arc + ec minusminusminusminusminusminusminusminusminusminusrarr rn en e larrR χn

pn = arn + en

= pcrn + ek1n n α = hR(k1n)

pnα larrminusminusminusminusminusminusminusminusminusminus

k1C = pnrc + ec sx xsk1 = fR(k1n α) k2 = g k1 = fR(k1n α) k2 = g

(established session key sk = H1(k1) oplus H2(k2))

Future Anonymity in Todayrsquos Budget Aniket Kate 14

Type-II adversary (Authentication)- The adversary can only know the secret associated with thepseudonym from the node in the test session- HybridOR is secure under the GDH assumption

Type-III adversary(Forward Security)- The adversary can only know the secret associated with the longterm public key- HybridOR is secure under the ring-LWE assumption

The HybridOR Protocol Security

Type-I adversary (Channel Secrecy) - The adversary cannot know a secret associated any public values in the test session - HybridOR is secure under any of the GDH as well as ring-LWE assumptions

Future Anonymity in Todayrsquos Budget Aniket Kate 15

Type-III adversary(Forward Security)- The adversary can only know the secret associated with the longterm public key- HybridOR is secure under the ring-LWE assumption

The HybridOR Protocol Security

Type-I adversary (Channel Secrecy) - The adversary cannot know a secret associated any public values in the test session - HybridOR is secure under any of the GDH as well as ring-LWE assumptions

Type-II adversary (Authentication) - The adversary can only know the secret associated with the pseudonym from the node in the test session - HybridOR is secure under the GDH assumption

Future Anonymity in Todayrsquos Budget Aniket Kate 15

The HybridOR Protocol Security

Type-I adversary (Channel Secrecy) - The adversary cannot know a secret associated any public values in the test session - HybridOR is secure under any of the GDH as well as ring-LWE assumptions

Type-II adversary (Authentication) - The adversary can only know the secret associated with the pseudonym from the node in the test session - HybridOR is secure under the GDH assumption

Type-III adversary(Forward Security) - The adversary can only know the secret associated with the long term public key - HybridOR is secure under the ring-LWE assumption

Future Anonymity in Todayrsquos Budget Aniket Kate 15

The HybridOR Protocol Performance

Parameters degree of the irreducible polynomial η = 512 prime modulus q = 1051649 error distribution χ parameter β = 800

Computation Cost Our HybridOR implementation is nearly 15 times faster than the ntor protocol used in Tor

Communication Cost For HybridOR the client and the node each will have to communicate three cells (Each cell is of size 512-byte)

Future Anonymity in Todayrsquos Budget Aniket Kate 16

Take Away We present a novel hybrid 1W-AKE protocol HybridOR which extracts its security from both the classically secure GDH assumption and the post-quantum secure ring-LWE assumption

We base its forward secrecy on the quantum-secure ring-LWE assumption

We leverage the current Tor PKI in its current form

Our performance analysis demonstrates that post-quantum 1W-AKE can already be considered practical for use today

Online Version httpeprintiacrorg2015008

Future Anonymity in Todayrsquos Budget Aniket Kate 17

Take Away We present a novel hybrid 1W-AKE protocol HybridOR which extracts its security from both the classically secure GDH assumption and the post-quantum secure ring-LWE assumption

We base its forward secrecy on the quantum-secure ring-LWE assumption

We leverage the current Tor PKI in its current form

Our performance analysis demonstrates that post-quantum 1W-AKE can already be considered practical for use today

Online Version httpeprintiacrorg2015008

17 Future Anonymity in Todayrsquos Budget Aniket Kate

Page 28: (Post-Quantum Forward Secure Onion Routing)Aniket Kate . The HybridOR Protocol: Security . Type-I adversary (Channel Secrecy) - The adversary cannot know a secret associated any public

ChallengeDesign a 1W-AKE scheme that offers forward security in thepost-quantum world without significantly affecting the currentinfrastructure and performance

When the Quantum computer arrives

This 1W-AKE scheme will no longer be secure

So what

Security and anonymity of even todayrsquos onion routing communications can be violated

The Tor community

will be hesitant to completely changing the public key infrastructure (PKI) questions the performance penalty

Future Anonymity in Todayrsquos Budget Aniket Kate 11

When the Quantum computer arrives

This 1W-AKE scheme will no longer be secure

So what

Security and anonymity of even todayrsquos onion routing communications can be violated

The Tor community

will be hesitant to completely changing the public key infrastructure (PKI) questions the performance penalty

Challenge Design a 1W-AKE scheme that offers forward security in the post-quantum world without significantly affecting the current infrastructure and performance

Future Anonymity in Todayrsquos Budget Aniket Kate 11

Lattice-based CryptographyIn this work we use the LWE assumptions to provide forwardsecurityanonymity in the post-quantum world

Post-Quantum Crypto

Some Possibilities Multivariate cryptography

Code-based cryptography

Hash-based scheme eg Merkle signatures

Lattice-based cryptography eg NTRU learning with errors (LWE)

Future Anonymity in Todayrsquos Budget Aniket Kate 12

Post-Quantum Crypto

Some Possibilities Multivariate cryptography

Code-based cryptography

Hash-based scheme eg Merkle signatures

Lattice-based cryptography eg NTRU learning with errors (LWE)

Lattice-based Cryptography In this work we use the LWE assumptions to provide forward securityanonymity in the post-quantum world

Future Anonymity in Todayrsquos Budget Aniket Kate 12

Poly(η)-time quantum reduction from approximate-SVP toRing-LWE

Decision Ring-LWE

We consider a ring Rq = Zq[x](xη + 1)

Let χ is the error distribution (Gaussian) of small elements (symmetric around 0)

Given polynomial number of samples from R2q

(a1 b1)

(a2 b2)

middot middot middot (ak bk)

Does there exist an r and e1 middot middot middot ek isin χ 3 bi = ai middot r + ei

(or) Are all birsquos uniformly random in Rq

Future Anonymity in Todayrsquos Budget Aniket Kate 13

Decision Ring-LWE

We consider a ring Rq = Zq[x](xη + 1)

Let χ is the error distribution (Gaussian) of small elements (symmetric around 0)

Given polynomial number of samples from R2q

(a1 b1)

(a2 b2)

middot middot middot (ak bk)

Does there exist an r and e1 middot middot middot ek isin χ 3 bi = ai middot r + ei

(or) Are all birsquos uniformly random in Rq

Poly(η)-time quantum reduction from approximate-SVP to Ring-LWE

Future Anonymity in Todayrsquos Budget Aniket Kate 13

The HybridOR Protocol

Generate system parameters (R η q χ) and (G g p)

Client Node (no long-term key) (long-term keys (s gs))

rc ec e larrR χ x larrR Zlowast c p

x pc g pc = arc + ec minusminusminusminusminusminusminusminusminusminusrarr rn en e larrR χn

pn = arn + en

= pcrn + ek1n n α = hR(k1n)

pnα larrminusminusminusminusminusminusminusminusminusminus

k1C = pnrc + ec sx xsk1 = fR(k1n α) k2 = g k1 = fR(k1n α) k2 = g

(established session key sk = H1(k1) oplus H2(k2))

Future Anonymity in Todayrsquos Budget Aniket Kate 14

Type-II adversary (Authentication)- The adversary can only know the secret associated with thepseudonym from the node in the test session- HybridOR is secure under the GDH assumption

Type-III adversary(Forward Security)- The adversary can only know the secret associated with the longterm public key- HybridOR is secure under the ring-LWE assumption

The HybridOR Protocol Security

Type-I adversary (Channel Secrecy) - The adversary cannot know a secret associated any public values in the test session - HybridOR is secure under any of the GDH as well as ring-LWE assumptions

Future Anonymity in Todayrsquos Budget Aniket Kate 15

Type-III adversary(Forward Security)- The adversary can only know the secret associated with the longterm public key- HybridOR is secure under the ring-LWE assumption

The HybridOR Protocol Security

Type-I adversary (Channel Secrecy) - The adversary cannot know a secret associated any public values in the test session - HybridOR is secure under any of the GDH as well as ring-LWE assumptions

Type-II adversary (Authentication) - The adversary can only know the secret associated with the pseudonym from the node in the test session - HybridOR is secure under the GDH assumption

Future Anonymity in Todayrsquos Budget Aniket Kate 15

The HybridOR Protocol Security

Type-I adversary (Channel Secrecy) - The adversary cannot know a secret associated any public values in the test session - HybridOR is secure under any of the GDH as well as ring-LWE assumptions

Type-II adversary (Authentication) - The adversary can only know the secret associated with the pseudonym from the node in the test session - HybridOR is secure under the GDH assumption

Type-III adversary(Forward Security) - The adversary can only know the secret associated with the long term public key - HybridOR is secure under the ring-LWE assumption

Future Anonymity in Todayrsquos Budget Aniket Kate 15

The HybridOR Protocol Performance

Parameters degree of the irreducible polynomial η = 512 prime modulus q = 1051649 error distribution χ parameter β = 800

Computation Cost Our HybridOR implementation is nearly 15 times faster than the ntor protocol used in Tor

Communication Cost For HybridOR the client and the node each will have to communicate three cells (Each cell is of size 512-byte)

Future Anonymity in Todayrsquos Budget Aniket Kate 16

Take Away We present a novel hybrid 1W-AKE protocol HybridOR which extracts its security from both the classically secure GDH assumption and the post-quantum secure ring-LWE assumption

We base its forward secrecy on the quantum-secure ring-LWE assumption

We leverage the current Tor PKI in its current form

Our performance analysis demonstrates that post-quantum 1W-AKE can already be considered practical for use today

Online Version httpeprintiacrorg2015008

Future Anonymity in Todayrsquos Budget Aniket Kate 17

Take Away We present a novel hybrid 1W-AKE protocol HybridOR which extracts its security from both the classically secure GDH assumption and the post-quantum secure ring-LWE assumption

We base its forward secrecy on the quantum-secure ring-LWE assumption

We leverage the current Tor PKI in its current form

Our performance analysis demonstrates that post-quantum 1W-AKE can already be considered practical for use today

Online Version httpeprintiacrorg2015008

17 Future Anonymity in Todayrsquos Budget Aniket Kate

Page 29: (Post-Quantum Forward Secure Onion Routing)Aniket Kate . The HybridOR Protocol: Security . Type-I adversary (Channel Secrecy) - The adversary cannot know a secret associated any public

When the Quantum computer arrives

This 1W-AKE scheme will no longer be secure

So what

Security and anonymity of even todayrsquos onion routing communications can be violated

The Tor community

will be hesitant to completely changing the public key infrastructure (PKI) questions the performance penalty

Challenge Design a 1W-AKE scheme that offers forward security in the post-quantum world without significantly affecting the current infrastructure and performance

Future Anonymity in Todayrsquos Budget Aniket Kate 11

Lattice-based CryptographyIn this work we use the LWE assumptions to provide forwardsecurityanonymity in the post-quantum world

Post-Quantum Crypto

Some Possibilities Multivariate cryptography

Code-based cryptography

Hash-based scheme eg Merkle signatures

Lattice-based cryptography eg NTRU learning with errors (LWE)

Future Anonymity in Todayrsquos Budget Aniket Kate 12

Post-Quantum Crypto

Some Possibilities Multivariate cryptography

Code-based cryptography

Hash-based scheme eg Merkle signatures

Lattice-based cryptography eg NTRU learning with errors (LWE)

Lattice-based Cryptography In this work we use the LWE assumptions to provide forward securityanonymity in the post-quantum world

Future Anonymity in Todayrsquos Budget Aniket Kate 12

Poly(η)-time quantum reduction from approximate-SVP toRing-LWE

Decision Ring-LWE

We consider a ring Rq = Zq[x](xη + 1)

Let χ is the error distribution (Gaussian) of small elements (symmetric around 0)

Given polynomial number of samples from R2q

(a1 b1)

(a2 b2)

middot middot middot (ak bk)

Does there exist an r and e1 middot middot middot ek isin χ 3 bi = ai middot r + ei

(or) Are all birsquos uniformly random in Rq

Future Anonymity in Todayrsquos Budget Aniket Kate 13

Decision Ring-LWE

We consider a ring Rq = Zq[x](xη + 1)

Let χ is the error distribution (Gaussian) of small elements (symmetric around 0)

Given polynomial number of samples from R2q

(a1 b1)

(a2 b2)

middot middot middot (ak bk)

Does there exist an r and e1 middot middot middot ek isin χ 3 bi = ai middot r + ei

(or) Are all birsquos uniformly random in Rq

Poly(η)-time quantum reduction from approximate-SVP to Ring-LWE

Future Anonymity in Todayrsquos Budget Aniket Kate 13

The HybridOR Protocol

Generate system parameters (R η q χ) and (G g p)

Client Node (no long-term key) (long-term keys (s gs))

rc ec e larrR χ x larrR Zlowast c p

x pc g pc = arc + ec minusminusminusminusminusminusminusminusminusminusrarr rn en e larrR χn

pn = arn + en

= pcrn + ek1n n α = hR(k1n)

pnα larrminusminusminusminusminusminusminusminusminusminus

k1C = pnrc + ec sx xsk1 = fR(k1n α) k2 = g k1 = fR(k1n α) k2 = g

(established session key sk = H1(k1) oplus H2(k2))

Future Anonymity in Todayrsquos Budget Aniket Kate 14

Type-II adversary (Authentication)- The adversary can only know the secret associated with thepseudonym from the node in the test session- HybridOR is secure under the GDH assumption

Type-III adversary(Forward Security)- The adversary can only know the secret associated with the longterm public key- HybridOR is secure under the ring-LWE assumption

The HybridOR Protocol Security

Type-I adversary (Channel Secrecy) - The adversary cannot know a secret associated any public values in the test session - HybridOR is secure under any of the GDH as well as ring-LWE assumptions

Future Anonymity in Todayrsquos Budget Aniket Kate 15

Type-III adversary(Forward Security)- The adversary can only know the secret associated with the longterm public key- HybridOR is secure under the ring-LWE assumption

The HybridOR Protocol Security

Type-I adversary (Channel Secrecy) - The adversary cannot know a secret associated any public values in the test session - HybridOR is secure under any of the GDH as well as ring-LWE assumptions

Type-II adversary (Authentication) - The adversary can only know the secret associated with the pseudonym from the node in the test session - HybridOR is secure under the GDH assumption

Future Anonymity in Todayrsquos Budget Aniket Kate 15

The HybridOR Protocol Security

Type-I adversary (Channel Secrecy) - The adversary cannot know a secret associated any public values in the test session - HybridOR is secure under any of the GDH as well as ring-LWE assumptions

Type-II adversary (Authentication) - The adversary can only know the secret associated with the pseudonym from the node in the test session - HybridOR is secure under the GDH assumption

Type-III adversary(Forward Security) - The adversary can only know the secret associated with the long term public key - HybridOR is secure under the ring-LWE assumption

Future Anonymity in Todayrsquos Budget Aniket Kate 15

The HybridOR Protocol Performance

Parameters degree of the irreducible polynomial η = 512 prime modulus q = 1051649 error distribution χ parameter β = 800

Computation Cost Our HybridOR implementation is nearly 15 times faster than the ntor protocol used in Tor

Communication Cost For HybridOR the client and the node each will have to communicate three cells (Each cell is of size 512-byte)

Future Anonymity in Todayrsquos Budget Aniket Kate 16

Take Away We present a novel hybrid 1W-AKE protocol HybridOR which extracts its security from both the classically secure GDH assumption and the post-quantum secure ring-LWE assumption

We base its forward secrecy on the quantum-secure ring-LWE assumption

We leverage the current Tor PKI in its current form

Our performance analysis demonstrates that post-quantum 1W-AKE can already be considered practical for use today

Online Version httpeprintiacrorg2015008

Future Anonymity in Todayrsquos Budget Aniket Kate 17

Take Away We present a novel hybrid 1W-AKE protocol HybridOR which extracts its security from both the classically secure GDH assumption and the post-quantum secure ring-LWE assumption

We base its forward secrecy on the quantum-secure ring-LWE assumption

We leverage the current Tor PKI in its current form

Our performance analysis demonstrates that post-quantum 1W-AKE can already be considered practical for use today

Online Version httpeprintiacrorg2015008

17 Future Anonymity in Todayrsquos Budget Aniket Kate

Page 30: (Post-Quantum Forward Secure Onion Routing)Aniket Kate . The HybridOR Protocol: Security . Type-I adversary (Channel Secrecy) - The adversary cannot know a secret associated any public

Lattice-based CryptographyIn this work we use the LWE assumptions to provide forwardsecurityanonymity in the post-quantum world

Post-Quantum Crypto

Some Possibilities Multivariate cryptography

Code-based cryptography

Hash-based scheme eg Merkle signatures

Lattice-based cryptography eg NTRU learning with errors (LWE)

Future Anonymity in Todayrsquos Budget Aniket Kate 12

Post-Quantum Crypto

Some Possibilities Multivariate cryptography

Code-based cryptography

Hash-based scheme eg Merkle signatures

Lattice-based cryptography eg NTRU learning with errors (LWE)

Lattice-based Cryptography In this work we use the LWE assumptions to provide forward securityanonymity in the post-quantum world

Future Anonymity in Todayrsquos Budget Aniket Kate 12

Poly(η)-time quantum reduction from approximate-SVP toRing-LWE

Decision Ring-LWE

We consider a ring Rq = Zq[x](xη + 1)

Let χ is the error distribution (Gaussian) of small elements (symmetric around 0)

Given polynomial number of samples from R2q

(a1 b1)

(a2 b2)

middot middot middot (ak bk)

Does there exist an r and e1 middot middot middot ek isin χ 3 bi = ai middot r + ei

(or) Are all birsquos uniformly random in Rq

Future Anonymity in Todayrsquos Budget Aniket Kate 13

Decision Ring-LWE

We consider a ring Rq = Zq[x](xη + 1)

Let χ is the error distribution (Gaussian) of small elements (symmetric around 0)

Given polynomial number of samples from R2q

(a1 b1)

(a2 b2)

middot middot middot (ak bk)

Does there exist an r and e1 middot middot middot ek isin χ 3 bi = ai middot r + ei

(or) Are all birsquos uniformly random in Rq

Poly(η)-time quantum reduction from approximate-SVP to Ring-LWE

Future Anonymity in Todayrsquos Budget Aniket Kate 13

The HybridOR Protocol

Generate system parameters (R η q χ) and (G g p)

Client Node (no long-term key) (long-term keys (s gs))

rc ec e larrR χ x larrR Zlowast c p

x pc g pc = arc + ec minusminusminusminusminusminusminusminusminusminusrarr rn en e larrR χn

pn = arn + en

= pcrn + ek1n n α = hR(k1n)

pnα larrminusminusminusminusminusminusminusminusminusminus

k1C = pnrc + ec sx xsk1 = fR(k1n α) k2 = g k1 = fR(k1n α) k2 = g

(established session key sk = H1(k1) oplus H2(k2))

Future Anonymity in Todayrsquos Budget Aniket Kate 14

Type-II adversary (Authentication)- The adversary can only know the secret associated with thepseudonym from the node in the test session- HybridOR is secure under the GDH assumption

Type-III adversary(Forward Security)- The adversary can only know the secret associated with the longterm public key- HybridOR is secure under the ring-LWE assumption

The HybridOR Protocol Security

Type-I adversary (Channel Secrecy) - The adversary cannot know a secret associated any public values in the test session - HybridOR is secure under any of the GDH as well as ring-LWE assumptions

Future Anonymity in Todayrsquos Budget Aniket Kate 15

Type-III adversary(Forward Security)- The adversary can only know the secret associated with the longterm public key- HybridOR is secure under the ring-LWE assumption

The HybridOR Protocol Security

Type-I adversary (Channel Secrecy) - The adversary cannot know a secret associated any public values in the test session - HybridOR is secure under any of the GDH as well as ring-LWE assumptions

Type-II adversary (Authentication) - The adversary can only know the secret associated with the pseudonym from the node in the test session - HybridOR is secure under the GDH assumption

Future Anonymity in Todayrsquos Budget Aniket Kate 15

The HybridOR Protocol Security

Type-I adversary (Channel Secrecy) - The adversary cannot know a secret associated any public values in the test session - HybridOR is secure under any of the GDH as well as ring-LWE assumptions

Type-II adversary (Authentication) - The adversary can only know the secret associated with the pseudonym from the node in the test session - HybridOR is secure under the GDH assumption

Type-III adversary(Forward Security) - The adversary can only know the secret associated with the long term public key - HybridOR is secure under the ring-LWE assumption

Future Anonymity in Todayrsquos Budget Aniket Kate 15

The HybridOR Protocol Performance

Parameters degree of the irreducible polynomial η = 512 prime modulus q = 1051649 error distribution χ parameter β = 800

Computation Cost Our HybridOR implementation is nearly 15 times faster than the ntor protocol used in Tor

Communication Cost For HybridOR the client and the node each will have to communicate three cells (Each cell is of size 512-byte)

Future Anonymity in Todayrsquos Budget Aniket Kate 16

Take Away We present a novel hybrid 1W-AKE protocol HybridOR which extracts its security from both the classically secure GDH assumption and the post-quantum secure ring-LWE assumption

We base its forward secrecy on the quantum-secure ring-LWE assumption

We leverage the current Tor PKI in its current form

Our performance analysis demonstrates that post-quantum 1W-AKE can already be considered practical for use today

Online Version httpeprintiacrorg2015008

Future Anonymity in Todayrsquos Budget Aniket Kate 17

Take Away We present a novel hybrid 1W-AKE protocol HybridOR which extracts its security from both the classically secure GDH assumption and the post-quantum secure ring-LWE assumption

We base its forward secrecy on the quantum-secure ring-LWE assumption

We leverage the current Tor PKI in its current form

Our performance analysis demonstrates that post-quantum 1W-AKE can already be considered practical for use today

Online Version httpeprintiacrorg2015008

17 Future Anonymity in Todayrsquos Budget Aniket Kate

Page 31: (Post-Quantum Forward Secure Onion Routing)Aniket Kate . The HybridOR Protocol: Security . Type-I adversary (Channel Secrecy) - The adversary cannot know a secret associated any public

Post-Quantum Crypto

Some Possibilities Multivariate cryptography

Code-based cryptography

Hash-based scheme eg Merkle signatures

Lattice-based cryptography eg NTRU learning with errors (LWE)

Lattice-based Cryptography In this work we use the LWE assumptions to provide forward securityanonymity in the post-quantum world

Future Anonymity in Todayrsquos Budget Aniket Kate 12

Poly(η)-time quantum reduction from approximate-SVP toRing-LWE

Decision Ring-LWE

We consider a ring Rq = Zq[x](xη + 1)

Let χ is the error distribution (Gaussian) of small elements (symmetric around 0)

Given polynomial number of samples from R2q

(a1 b1)

(a2 b2)

middot middot middot (ak bk)

Does there exist an r and e1 middot middot middot ek isin χ 3 bi = ai middot r + ei

(or) Are all birsquos uniformly random in Rq

Future Anonymity in Todayrsquos Budget Aniket Kate 13

Decision Ring-LWE

We consider a ring Rq = Zq[x](xη + 1)

Let χ is the error distribution (Gaussian) of small elements (symmetric around 0)

Given polynomial number of samples from R2q

(a1 b1)

(a2 b2)

middot middot middot (ak bk)

Does there exist an r and e1 middot middot middot ek isin χ 3 bi = ai middot r + ei

(or) Are all birsquos uniformly random in Rq

Poly(η)-time quantum reduction from approximate-SVP to Ring-LWE

Future Anonymity in Todayrsquos Budget Aniket Kate 13

The HybridOR Protocol

Generate system parameters (R η q χ) and (G g p)

Client Node (no long-term key) (long-term keys (s gs))

rc ec e larrR χ x larrR Zlowast c p

x pc g pc = arc + ec minusminusminusminusminusminusminusminusminusminusrarr rn en e larrR χn

pn = arn + en

= pcrn + ek1n n α = hR(k1n)

pnα larrminusminusminusminusminusminusminusminusminusminus

k1C = pnrc + ec sx xsk1 = fR(k1n α) k2 = g k1 = fR(k1n α) k2 = g

(established session key sk = H1(k1) oplus H2(k2))

Future Anonymity in Todayrsquos Budget Aniket Kate 14

Type-II adversary (Authentication)- The adversary can only know the secret associated with thepseudonym from the node in the test session- HybridOR is secure under the GDH assumption

Type-III adversary(Forward Security)- The adversary can only know the secret associated with the longterm public key- HybridOR is secure under the ring-LWE assumption

The HybridOR Protocol Security

Type-I adversary (Channel Secrecy) - The adversary cannot know a secret associated any public values in the test session - HybridOR is secure under any of the GDH as well as ring-LWE assumptions

Future Anonymity in Todayrsquos Budget Aniket Kate 15

Type-III adversary(Forward Security)- The adversary can only know the secret associated with the longterm public key- HybridOR is secure under the ring-LWE assumption

The HybridOR Protocol Security

Type-I adversary (Channel Secrecy) - The adversary cannot know a secret associated any public values in the test session - HybridOR is secure under any of the GDH as well as ring-LWE assumptions

Type-II adversary (Authentication) - The adversary can only know the secret associated with the pseudonym from the node in the test session - HybridOR is secure under the GDH assumption

Future Anonymity in Todayrsquos Budget Aniket Kate 15

The HybridOR Protocol Security

Type-I adversary (Channel Secrecy) - The adversary cannot know a secret associated any public values in the test session - HybridOR is secure under any of the GDH as well as ring-LWE assumptions

Type-II adversary (Authentication) - The adversary can only know the secret associated with the pseudonym from the node in the test session - HybridOR is secure under the GDH assumption

Type-III adversary(Forward Security) - The adversary can only know the secret associated with the long term public key - HybridOR is secure under the ring-LWE assumption

Future Anonymity in Todayrsquos Budget Aniket Kate 15

The HybridOR Protocol Performance

Parameters degree of the irreducible polynomial η = 512 prime modulus q = 1051649 error distribution χ parameter β = 800

Computation Cost Our HybridOR implementation is nearly 15 times faster than the ntor protocol used in Tor

Communication Cost For HybridOR the client and the node each will have to communicate three cells (Each cell is of size 512-byte)

Future Anonymity in Todayrsquos Budget Aniket Kate 16

Take Away We present a novel hybrid 1W-AKE protocol HybridOR which extracts its security from both the classically secure GDH assumption and the post-quantum secure ring-LWE assumption

We base its forward secrecy on the quantum-secure ring-LWE assumption

We leverage the current Tor PKI in its current form

Our performance analysis demonstrates that post-quantum 1W-AKE can already be considered practical for use today

Online Version httpeprintiacrorg2015008

Future Anonymity in Todayrsquos Budget Aniket Kate 17

Take Away We present a novel hybrid 1W-AKE protocol HybridOR which extracts its security from both the classically secure GDH assumption and the post-quantum secure ring-LWE assumption

We base its forward secrecy on the quantum-secure ring-LWE assumption

We leverage the current Tor PKI in its current form

Our performance analysis demonstrates that post-quantum 1W-AKE can already be considered practical for use today

Online Version httpeprintiacrorg2015008

17 Future Anonymity in Todayrsquos Budget Aniket Kate

Page 32: (Post-Quantum Forward Secure Onion Routing)Aniket Kate . The HybridOR Protocol: Security . Type-I adversary (Channel Secrecy) - The adversary cannot know a secret associated any public

Poly(η)-time quantum reduction from approximate-SVP toRing-LWE

Decision Ring-LWE

We consider a ring Rq = Zq[x](xη + 1)

Let χ is the error distribution (Gaussian) of small elements (symmetric around 0)

Given polynomial number of samples from R2q

(a1 b1)

(a2 b2)

middot middot middot (ak bk)

Does there exist an r and e1 middot middot middot ek isin χ 3 bi = ai middot r + ei

(or) Are all birsquos uniformly random in Rq

Future Anonymity in Todayrsquos Budget Aniket Kate 13

Decision Ring-LWE

We consider a ring Rq = Zq[x](xη + 1)

Let χ is the error distribution (Gaussian) of small elements (symmetric around 0)

Given polynomial number of samples from R2q

(a1 b1)

(a2 b2)

middot middot middot (ak bk)

Does there exist an r and e1 middot middot middot ek isin χ 3 bi = ai middot r + ei

(or) Are all birsquos uniformly random in Rq

Poly(η)-time quantum reduction from approximate-SVP to Ring-LWE

Future Anonymity in Todayrsquos Budget Aniket Kate 13

The HybridOR Protocol

Generate system parameters (R η q χ) and (G g p)

Client Node (no long-term key) (long-term keys (s gs))

rc ec e larrR χ x larrR Zlowast c p

x pc g pc = arc + ec minusminusminusminusminusminusminusminusminusminusrarr rn en e larrR χn

pn = arn + en

= pcrn + ek1n n α = hR(k1n)

pnα larrminusminusminusminusminusminusminusminusminusminus

k1C = pnrc + ec sx xsk1 = fR(k1n α) k2 = g k1 = fR(k1n α) k2 = g

(established session key sk = H1(k1) oplus H2(k2))

Future Anonymity in Todayrsquos Budget Aniket Kate 14

Type-II adversary (Authentication)- The adversary can only know the secret associated with thepseudonym from the node in the test session- HybridOR is secure under the GDH assumption

Type-III adversary(Forward Security)- The adversary can only know the secret associated with the longterm public key- HybridOR is secure under the ring-LWE assumption

The HybridOR Protocol Security

Type-I adversary (Channel Secrecy) - The adversary cannot know a secret associated any public values in the test session - HybridOR is secure under any of the GDH as well as ring-LWE assumptions

Future Anonymity in Todayrsquos Budget Aniket Kate 15

Type-III adversary(Forward Security)- The adversary can only know the secret associated with the longterm public key- HybridOR is secure under the ring-LWE assumption

The HybridOR Protocol Security

Type-I adversary (Channel Secrecy) - The adversary cannot know a secret associated any public values in the test session - HybridOR is secure under any of the GDH as well as ring-LWE assumptions

Type-II adversary (Authentication) - The adversary can only know the secret associated with the pseudonym from the node in the test session - HybridOR is secure under the GDH assumption

Future Anonymity in Todayrsquos Budget Aniket Kate 15

The HybridOR Protocol Security

Type-I adversary (Channel Secrecy) - The adversary cannot know a secret associated any public values in the test session - HybridOR is secure under any of the GDH as well as ring-LWE assumptions

Type-II adversary (Authentication) - The adversary can only know the secret associated with the pseudonym from the node in the test session - HybridOR is secure under the GDH assumption

Type-III adversary(Forward Security) - The adversary can only know the secret associated with the long term public key - HybridOR is secure under the ring-LWE assumption

Future Anonymity in Todayrsquos Budget Aniket Kate 15

The HybridOR Protocol Performance

Parameters degree of the irreducible polynomial η = 512 prime modulus q = 1051649 error distribution χ parameter β = 800

Computation Cost Our HybridOR implementation is nearly 15 times faster than the ntor protocol used in Tor

Communication Cost For HybridOR the client and the node each will have to communicate three cells (Each cell is of size 512-byte)

Future Anonymity in Todayrsquos Budget Aniket Kate 16

Take Away We present a novel hybrid 1W-AKE protocol HybridOR which extracts its security from both the classically secure GDH assumption and the post-quantum secure ring-LWE assumption

We base its forward secrecy on the quantum-secure ring-LWE assumption

We leverage the current Tor PKI in its current form

Our performance analysis demonstrates that post-quantum 1W-AKE can already be considered practical for use today

Online Version httpeprintiacrorg2015008

Future Anonymity in Todayrsquos Budget Aniket Kate 17

Take Away We present a novel hybrid 1W-AKE protocol HybridOR which extracts its security from both the classically secure GDH assumption and the post-quantum secure ring-LWE assumption

We base its forward secrecy on the quantum-secure ring-LWE assumption

We leverage the current Tor PKI in its current form

Our performance analysis demonstrates that post-quantum 1W-AKE can already be considered practical for use today

Online Version httpeprintiacrorg2015008

17 Future Anonymity in Todayrsquos Budget Aniket Kate

Page 33: (Post-Quantum Forward Secure Onion Routing)Aniket Kate . The HybridOR Protocol: Security . Type-I adversary (Channel Secrecy) - The adversary cannot know a secret associated any public

Decision Ring-LWE

We consider a ring Rq = Zq[x](xη + 1)

Let χ is the error distribution (Gaussian) of small elements (symmetric around 0)

Given polynomial number of samples from R2q

(a1 b1)

(a2 b2)

middot middot middot (ak bk)

Does there exist an r and e1 middot middot middot ek isin χ 3 bi = ai middot r + ei

(or) Are all birsquos uniformly random in Rq

Poly(η)-time quantum reduction from approximate-SVP to Ring-LWE

Future Anonymity in Todayrsquos Budget Aniket Kate 13

The HybridOR Protocol

Generate system parameters (R η q χ) and (G g p)

Client Node (no long-term key) (long-term keys (s gs))

rc ec e larrR χ x larrR Zlowast c p

x pc g pc = arc + ec minusminusminusminusminusminusminusminusminusminusrarr rn en e larrR χn

pn = arn + en

= pcrn + ek1n n α = hR(k1n)

pnα larrminusminusminusminusminusminusminusminusminusminus

k1C = pnrc + ec sx xsk1 = fR(k1n α) k2 = g k1 = fR(k1n α) k2 = g

(established session key sk = H1(k1) oplus H2(k2))

Future Anonymity in Todayrsquos Budget Aniket Kate 14

Type-II adversary (Authentication)- The adversary can only know the secret associated with thepseudonym from the node in the test session- HybridOR is secure under the GDH assumption

Type-III adversary(Forward Security)- The adversary can only know the secret associated with the longterm public key- HybridOR is secure under the ring-LWE assumption

The HybridOR Protocol Security

Type-I adversary (Channel Secrecy) - The adversary cannot know a secret associated any public values in the test session - HybridOR is secure under any of the GDH as well as ring-LWE assumptions

Future Anonymity in Todayrsquos Budget Aniket Kate 15

Type-III adversary(Forward Security)- The adversary can only know the secret associated with the longterm public key- HybridOR is secure under the ring-LWE assumption

The HybridOR Protocol Security

Type-I adversary (Channel Secrecy) - The adversary cannot know a secret associated any public values in the test session - HybridOR is secure under any of the GDH as well as ring-LWE assumptions

Type-II adversary (Authentication) - The adversary can only know the secret associated with the pseudonym from the node in the test session - HybridOR is secure under the GDH assumption

Future Anonymity in Todayrsquos Budget Aniket Kate 15

The HybridOR Protocol Security

Type-I adversary (Channel Secrecy) - The adversary cannot know a secret associated any public values in the test session - HybridOR is secure under any of the GDH as well as ring-LWE assumptions

Type-II adversary (Authentication) - The adversary can only know the secret associated with the pseudonym from the node in the test session - HybridOR is secure under the GDH assumption

Type-III adversary(Forward Security) - The adversary can only know the secret associated with the long term public key - HybridOR is secure under the ring-LWE assumption

Future Anonymity in Todayrsquos Budget Aniket Kate 15

The HybridOR Protocol Performance

Parameters degree of the irreducible polynomial η = 512 prime modulus q = 1051649 error distribution χ parameter β = 800

Computation Cost Our HybridOR implementation is nearly 15 times faster than the ntor protocol used in Tor

Communication Cost For HybridOR the client and the node each will have to communicate three cells (Each cell is of size 512-byte)

Future Anonymity in Todayrsquos Budget Aniket Kate 16

Take Away We present a novel hybrid 1W-AKE protocol HybridOR which extracts its security from both the classically secure GDH assumption and the post-quantum secure ring-LWE assumption

We base its forward secrecy on the quantum-secure ring-LWE assumption

We leverage the current Tor PKI in its current form

Our performance analysis demonstrates that post-quantum 1W-AKE can already be considered practical for use today

Online Version httpeprintiacrorg2015008

Future Anonymity in Todayrsquos Budget Aniket Kate 17

Take Away We present a novel hybrid 1W-AKE protocol HybridOR which extracts its security from both the classically secure GDH assumption and the post-quantum secure ring-LWE assumption

We base its forward secrecy on the quantum-secure ring-LWE assumption

We leverage the current Tor PKI in its current form

Our performance analysis demonstrates that post-quantum 1W-AKE can already be considered practical for use today

Online Version httpeprintiacrorg2015008

17 Future Anonymity in Todayrsquos Budget Aniket Kate

Page 34: (Post-Quantum Forward Secure Onion Routing)Aniket Kate . The HybridOR Protocol: Security . Type-I adversary (Channel Secrecy) - The adversary cannot know a secret associated any public

The HybridOR Protocol

Generate system parameters (R η q χ) and (G g p)

Client Node (no long-term key) (long-term keys (s gs))

rc ec e larrR χ x larrR Zlowast c p

x pc g pc = arc + ec minusminusminusminusminusminusminusminusminusminusrarr rn en e larrR χn

pn = arn + en

= pcrn + ek1n n α = hR(k1n)

pnα larrminusminusminusminusminusminusminusminusminusminus

k1C = pnrc + ec sx xsk1 = fR(k1n α) k2 = g k1 = fR(k1n α) k2 = g

(established session key sk = H1(k1) oplus H2(k2))

Future Anonymity in Todayrsquos Budget Aniket Kate 14

Type-II adversary (Authentication)- The adversary can only know the secret associated with thepseudonym from the node in the test session- HybridOR is secure under the GDH assumption

Type-III adversary(Forward Security)- The adversary can only know the secret associated with the longterm public key- HybridOR is secure under the ring-LWE assumption

The HybridOR Protocol Security

Type-I adversary (Channel Secrecy) - The adversary cannot know a secret associated any public values in the test session - HybridOR is secure under any of the GDH as well as ring-LWE assumptions

Future Anonymity in Todayrsquos Budget Aniket Kate 15

Type-III adversary(Forward Security)- The adversary can only know the secret associated with the longterm public key- HybridOR is secure under the ring-LWE assumption

The HybridOR Protocol Security

Type-I adversary (Channel Secrecy) - The adversary cannot know a secret associated any public values in the test session - HybridOR is secure under any of the GDH as well as ring-LWE assumptions

Type-II adversary (Authentication) - The adversary can only know the secret associated with the pseudonym from the node in the test session - HybridOR is secure under the GDH assumption

Future Anonymity in Todayrsquos Budget Aniket Kate 15

The HybridOR Protocol Security

Type-I adversary (Channel Secrecy) - The adversary cannot know a secret associated any public values in the test session - HybridOR is secure under any of the GDH as well as ring-LWE assumptions

Type-II adversary (Authentication) - The adversary can only know the secret associated with the pseudonym from the node in the test session - HybridOR is secure under the GDH assumption

Type-III adversary(Forward Security) - The adversary can only know the secret associated with the long term public key - HybridOR is secure under the ring-LWE assumption

Future Anonymity in Todayrsquos Budget Aniket Kate 15

The HybridOR Protocol Performance

Parameters degree of the irreducible polynomial η = 512 prime modulus q = 1051649 error distribution χ parameter β = 800

Computation Cost Our HybridOR implementation is nearly 15 times faster than the ntor protocol used in Tor

Communication Cost For HybridOR the client and the node each will have to communicate three cells (Each cell is of size 512-byte)

Future Anonymity in Todayrsquos Budget Aniket Kate 16

Take Away We present a novel hybrid 1W-AKE protocol HybridOR which extracts its security from both the classically secure GDH assumption and the post-quantum secure ring-LWE assumption

We base its forward secrecy on the quantum-secure ring-LWE assumption

We leverage the current Tor PKI in its current form

Our performance analysis demonstrates that post-quantum 1W-AKE can already be considered practical for use today

Online Version httpeprintiacrorg2015008

Future Anonymity in Todayrsquos Budget Aniket Kate 17

Take Away We present a novel hybrid 1W-AKE protocol HybridOR which extracts its security from both the classically secure GDH assumption and the post-quantum secure ring-LWE assumption

We base its forward secrecy on the quantum-secure ring-LWE assumption

We leverage the current Tor PKI in its current form

Our performance analysis demonstrates that post-quantum 1W-AKE can already be considered practical for use today

Online Version httpeprintiacrorg2015008

17 Future Anonymity in Todayrsquos Budget Aniket Kate

Page 35: (Post-Quantum Forward Secure Onion Routing)Aniket Kate . The HybridOR Protocol: Security . Type-I adversary (Channel Secrecy) - The adversary cannot know a secret associated any public

Type-II adversary (Authentication)- The adversary can only know the secret associated with thepseudonym from the node in the test session- HybridOR is secure under the GDH assumption

Type-III adversary(Forward Security)- The adversary can only know the secret associated with the longterm public key- HybridOR is secure under the ring-LWE assumption

The HybridOR Protocol Security

Type-I adversary (Channel Secrecy) - The adversary cannot know a secret associated any public values in the test session - HybridOR is secure under any of the GDH as well as ring-LWE assumptions

Future Anonymity in Todayrsquos Budget Aniket Kate 15

Type-III adversary(Forward Security)- The adversary can only know the secret associated with the longterm public key- HybridOR is secure under the ring-LWE assumption

The HybridOR Protocol Security

Type-I adversary (Channel Secrecy) - The adversary cannot know a secret associated any public values in the test session - HybridOR is secure under any of the GDH as well as ring-LWE assumptions

Type-II adversary (Authentication) - The adversary can only know the secret associated with the pseudonym from the node in the test session - HybridOR is secure under the GDH assumption

Future Anonymity in Todayrsquos Budget Aniket Kate 15

The HybridOR Protocol Security

Type-I adversary (Channel Secrecy) - The adversary cannot know a secret associated any public values in the test session - HybridOR is secure under any of the GDH as well as ring-LWE assumptions

Type-II adversary (Authentication) - The adversary can only know the secret associated with the pseudonym from the node in the test session - HybridOR is secure under the GDH assumption

Type-III adversary(Forward Security) - The adversary can only know the secret associated with the long term public key - HybridOR is secure under the ring-LWE assumption

Future Anonymity in Todayrsquos Budget Aniket Kate 15

The HybridOR Protocol Performance

Parameters degree of the irreducible polynomial η = 512 prime modulus q = 1051649 error distribution χ parameter β = 800

Computation Cost Our HybridOR implementation is nearly 15 times faster than the ntor protocol used in Tor

Communication Cost For HybridOR the client and the node each will have to communicate three cells (Each cell is of size 512-byte)

Future Anonymity in Todayrsquos Budget Aniket Kate 16

Take Away We present a novel hybrid 1W-AKE protocol HybridOR which extracts its security from both the classically secure GDH assumption and the post-quantum secure ring-LWE assumption

We base its forward secrecy on the quantum-secure ring-LWE assumption

We leverage the current Tor PKI in its current form

Our performance analysis demonstrates that post-quantum 1W-AKE can already be considered practical for use today

Online Version httpeprintiacrorg2015008

Future Anonymity in Todayrsquos Budget Aniket Kate 17

Take Away We present a novel hybrid 1W-AKE protocol HybridOR which extracts its security from both the classically secure GDH assumption and the post-quantum secure ring-LWE assumption

We base its forward secrecy on the quantum-secure ring-LWE assumption

We leverage the current Tor PKI in its current form

Our performance analysis demonstrates that post-quantum 1W-AKE can already be considered practical for use today

Online Version httpeprintiacrorg2015008

17 Future Anonymity in Todayrsquos Budget Aniket Kate

Page 36: (Post-Quantum Forward Secure Onion Routing)Aniket Kate . The HybridOR Protocol: Security . Type-I adversary (Channel Secrecy) - The adversary cannot know a secret associated any public

Type-III adversary(Forward Security)- The adversary can only know the secret associated with the longterm public key- HybridOR is secure under the ring-LWE assumption

The HybridOR Protocol Security

Type-I adversary (Channel Secrecy) - The adversary cannot know a secret associated any public values in the test session - HybridOR is secure under any of the GDH as well as ring-LWE assumptions

Type-II adversary (Authentication) - The adversary can only know the secret associated with the pseudonym from the node in the test session - HybridOR is secure under the GDH assumption

Future Anonymity in Todayrsquos Budget Aniket Kate 15

The HybridOR Protocol Security

Type-I adversary (Channel Secrecy) - The adversary cannot know a secret associated any public values in the test session - HybridOR is secure under any of the GDH as well as ring-LWE assumptions

Type-II adversary (Authentication) - The adversary can only know the secret associated with the pseudonym from the node in the test session - HybridOR is secure under the GDH assumption

Type-III adversary(Forward Security) - The adversary can only know the secret associated with the long term public key - HybridOR is secure under the ring-LWE assumption

Future Anonymity in Todayrsquos Budget Aniket Kate 15

The HybridOR Protocol Performance

Parameters degree of the irreducible polynomial η = 512 prime modulus q = 1051649 error distribution χ parameter β = 800

Computation Cost Our HybridOR implementation is nearly 15 times faster than the ntor protocol used in Tor

Communication Cost For HybridOR the client and the node each will have to communicate three cells (Each cell is of size 512-byte)

Future Anonymity in Todayrsquos Budget Aniket Kate 16

Take Away We present a novel hybrid 1W-AKE protocol HybridOR which extracts its security from both the classically secure GDH assumption and the post-quantum secure ring-LWE assumption

We base its forward secrecy on the quantum-secure ring-LWE assumption

We leverage the current Tor PKI in its current form

Our performance analysis demonstrates that post-quantum 1W-AKE can already be considered practical for use today

Online Version httpeprintiacrorg2015008

Future Anonymity in Todayrsquos Budget Aniket Kate 17

Take Away We present a novel hybrid 1W-AKE protocol HybridOR which extracts its security from both the classically secure GDH assumption and the post-quantum secure ring-LWE assumption

We base its forward secrecy on the quantum-secure ring-LWE assumption

We leverage the current Tor PKI in its current form

Our performance analysis demonstrates that post-quantum 1W-AKE can already be considered practical for use today

Online Version httpeprintiacrorg2015008

17 Future Anonymity in Todayrsquos Budget Aniket Kate

Page 37: (Post-Quantum Forward Secure Onion Routing)Aniket Kate . The HybridOR Protocol: Security . Type-I adversary (Channel Secrecy) - The adversary cannot know a secret associated any public

The HybridOR Protocol Security

Type-I adversary (Channel Secrecy) - The adversary cannot know a secret associated any public values in the test session - HybridOR is secure under any of the GDH as well as ring-LWE assumptions

Type-II adversary (Authentication) - The adversary can only know the secret associated with the pseudonym from the node in the test session - HybridOR is secure under the GDH assumption

Type-III adversary(Forward Security) - The adversary can only know the secret associated with the long term public key - HybridOR is secure under the ring-LWE assumption

Future Anonymity in Todayrsquos Budget Aniket Kate 15

The HybridOR Protocol Performance

Parameters degree of the irreducible polynomial η = 512 prime modulus q = 1051649 error distribution χ parameter β = 800

Computation Cost Our HybridOR implementation is nearly 15 times faster than the ntor protocol used in Tor

Communication Cost For HybridOR the client and the node each will have to communicate three cells (Each cell is of size 512-byte)

Future Anonymity in Todayrsquos Budget Aniket Kate 16

Take Away We present a novel hybrid 1W-AKE protocol HybridOR which extracts its security from both the classically secure GDH assumption and the post-quantum secure ring-LWE assumption

We base its forward secrecy on the quantum-secure ring-LWE assumption

We leverage the current Tor PKI in its current form

Our performance analysis demonstrates that post-quantum 1W-AKE can already be considered practical for use today

Online Version httpeprintiacrorg2015008

Future Anonymity in Todayrsquos Budget Aniket Kate 17

Take Away We present a novel hybrid 1W-AKE protocol HybridOR which extracts its security from both the classically secure GDH assumption and the post-quantum secure ring-LWE assumption

We base its forward secrecy on the quantum-secure ring-LWE assumption

We leverage the current Tor PKI in its current form

Our performance analysis demonstrates that post-quantum 1W-AKE can already be considered practical for use today

Online Version httpeprintiacrorg2015008

17 Future Anonymity in Todayrsquos Budget Aniket Kate

Page 38: (Post-Quantum Forward Secure Onion Routing)Aniket Kate . The HybridOR Protocol: Security . Type-I adversary (Channel Secrecy) - The adversary cannot know a secret associated any public

The HybridOR Protocol Performance

Parameters degree of the irreducible polynomial η = 512 prime modulus q = 1051649 error distribution χ parameter β = 800

Computation Cost Our HybridOR implementation is nearly 15 times faster than the ntor protocol used in Tor

Communication Cost For HybridOR the client and the node each will have to communicate three cells (Each cell is of size 512-byte)

Future Anonymity in Todayrsquos Budget Aniket Kate 16

Take Away We present a novel hybrid 1W-AKE protocol HybridOR which extracts its security from both the classically secure GDH assumption and the post-quantum secure ring-LWE assumption

We base its forward secrecy on the quantum-secure ring-LWE assumption

We leverage the current Tor PKI in its current form

Our performance analysis demonstrates that post-quantum 1W-AKE can already be considered practical for use today

Online Version httpeprintiacrorg2015008

Future Anonymity in Todayrsquos Budget Aniket Kate 17

Take Away We present a novel hybrid 1W-AKE protocol HybridOR which extracts its security from both the classically secure GDH assumption and the post-quantum secure ring-LWE assumption

We base its forward secrecy on the quantum-secure ring-LWE assumption

We leverage the current Tor PKI in its current form

Our performance analysis demonstrates that post-quantum 1W-AKE can already be considered practical for use today

Online Version httpeprintiacrorg2015008

17 Future Anonymity in Todayrsquos Budget Aniket Kate

Page 39: (Post-Quantum Forward Secure Onion Routing)Aniket Kate . The HybridOR Protocol: Security . Type-I adversary (Channel Secrecy) - The adversary cannot know a secret associated any public

Take Away We present a novel hybrid 1W-AKE protocol HybridOR which extracts its security from both the classically secure GDH assumption and the post-quantum secure ring-LWE assumption

We base its forward secrecy on the quantum-secure ring-LWE assumption

We leverage the current Tor PKI in its current form

Our performance analysis demonstrates that post-quantum 1W-AKE can already be considered practical for use today

Online Version httpeprintiacrorg2015008

Future Anonymity in Todayrsquos Budget Aniket Kate 17

Take Away We present a novel hybrid 1W-AKE protocol HybridOR which extracts its security from both the classically secure GDH assumption and the post-quantum secure ring-LWE assumption

We base its forward secrecy on the quantum-secure ring-LWE assumption

We leverage the current Tor PKI in its current form

Our performance analysis demonstrates that post-quantum 1W-AKE can already be considered practical for use today

Online Version httpeprintiacrorg2015008

17 Future Anonymity in Todayrsquos Budget Aniket Kate

Page 40: (Post-Quantum Forward Secure Onion Routing)Aniket Kate . The HybridOR Protocol: Security . Type-I adversary (Channel Secrecy) - The adversary cannot know a secret associated any public

Take Away We present a novel hybrid 1W-AKE protocol HybridOR which extracts its security from both the classically secure GDH assumption and the post-quantum secure ring-LWE assumption

We base its forward secrecy on the quantum-secure ring-LWE assumption

We leverage the current Tor PKI in its current form

Our performance analysis demonstrates that post-quantum 1W-AKE can already be considered practical for use today

Online Version httpeprintiacrorg2015008

17 Future Anonymity in Todayrsquos Budget Aniket Kate