Research on anonymous communication in German(y) 1983-1990

26
1 Research on anonymous communication in German(y) 1983- 1990 Andreas Pfitzmann TU Dresden, Fakultät Informatik, D-01062 Dresden hone +49 351 463-38277, e-mail: pfitza @inf.tu- dresden .de , http://dud.inf.tu-dresden.de Site to download the original papers and reports: http://dud.inf.tu-dresden.de/sireneLit.shtml

description

Research on anonymous communication in German(y) 1983-1990. Andreas Pfitzmann TU Dresden, Fakultät Informatik, D-01062 Dresden Phone +49 351 463-38277, e-mail: [email protected] , http://dud.inf.tu-dresden.de/ Site to download the original papers and reports: - PowerPoint PPT Presentation

Transcript of Research on anonymous communication in German(y) 1983-1990

Page 1: Research on  anonymous communication  in German(y) 1983-1990

1

Research on anonymous communication in German(y) 1983-1990

Andreas PfitzmannTU Dresden, Fakultät Informatik, D-01062 Dresden

Phone +49 351 463-38277, e-mail: [email protected], http://dud.inf.tu-dresden.de/

Site to download the original papers and reports:

http://dud.inf.tu-dresden.de/sireneLit.shtml

Page 2: Research on  anonymous communication  in German(y) 1983-1990

2

Aims of my talk

• Make historic knowledge (pre WWW, originally written mostly in German) available

• Give a tutorial on basic techniques mostly forgotten, but – in my opinion – terribly useful and terribly needed in designing today’s and tomorrow’s (IP v6) communication systems

• Learn from 20+ years history to re-focus PET research and development

Page 3: Research on  anonymous communication  in German(y) 1983-1990

3

for services tolerating longer delays

Switched/broadcast network (1983 - 1985)

• i.e. taking anonymity and unobservability into account when building networks physically

• statically fixed structure (or dynamically adaptable subset/superset construction) is well suited to counter intersection attacks

Vermittlungs-

zentrale

Verteilnetz-

zentrale

Teilnehmer-

station

globales Vermittlungsnetz

(explizite Adressierung)

lokales Verteilnetz

(implizite Adressierung) lokales Verteilnetz

(implizite Adressierung)

lokales Verteilnetz

(implizite Adressierung)

lokales Verteilnetz

(implizite Adressierung)

Switched WAN(possibly including MIXes)

connecting broadcast LANs

(RING-net, DC-net)

N4N3N1 N2

Verteilnetz Verteilnetz

Verteilnetz Verteilnetz

Vermittlungsnetz

Netzgrenzen bei kleinen Verteilnetzen

Netzgrenzen bei großen Verteilnetzen

Station, die nicht alsProtokollumsetzer fungieren kann

Station, die alsProtokollumsetzer fungieren kann

Page 4: Research on  anonymous communication  in German(y) 1983-1990

4

RING-net (1983-1985)

attacker attackerstation 1 station 2

.........................................................

Digital signal regeneration:

The analogue characteristics of bits are independent of their true sender.

alternatives: 123... n+1

empty

M. 1

M. n

M. 2

empty M. 1

M. 1 empty

M. n

M. 2

M. 2

M. 3

M. 1

empty

empty

M. 2

M. 3

empty

...

...

...

...

...

...............

time

.......

............

The ideaof physical unobservability

and digital signal regenerationcan be adapted to other topologies,

i.e. tree-shaped CATV networks;It reappears in another context in Crowds

Page 5: Research on  anonymous communication  in German(y) 1983-1990

5

Braided RING (1985-1987)

Two RINGs operating if no faults

Si+1

L ii+1

L i-1i+1

L i-1i SiSi-1

Reconfiguration of the outer RING if a station fails

SiSi-1

Si+1

L i-1i

L i-1i+1

L ii+1

Reconfiguration of the inner RING if an outer line fails

Reconfiguration of the outer RING if an outer line fails

Line used

Line not used

Line used to transmit half of the messages

SiSi-1

Si+1

L i-1i

L ii+1

L i-1i+1

Si+1

Si

L i-1i+1

L i-1i+1

L ii+1

Si-1

Page 6: Research on  anonymous communication  in German(y) 1983-1990

6

Addressing in broadcast networks (1985)

Addressing Addressing explicit addresses: routingexplicit addresses: routing implicit addresses: attribute recognizable by the station of the recipientimplicit addresses: attribute recognizable by the station of the recipient

invisible <==> encryption systeminvisible <==> encryption system visible pseudo random number, associative memory to detectvisible pseudo random number, associative memory to detect

address distribution

public address private address

implicit address

invisiblevery costly, but

necessary to establish contact

costly

visible should not be used change after use

invisible invisible public address <==> asymmetric cryptosysteminvisible invisible private address <==> symmetric cryptosystem

Page 7: Research on  anonymous communication  in German(y) 1983-1990

7

DC-net

+

+++

........

+

........

Station 1M1 3A781

M2 00000

M3 00000

+

........

Station 2

+

........

Station 3

K23 67CD3

K12 2DE92

K13 4265B

-K12 E327E

-K13 CEAB5

-K23 A943D

67EE2

4AE41

99B6E

anonymous access= M1 M2 M3+ +

User station

Bitstreamgenerator

Modulo- 16-Adder

Anonymity of the senderIf stations are connected by keys the value of which is completely unknown to the attacker, tapping all lines does not give him any information about the sender.

D. Chaum 1985 for finite fields

A. Pfitzmann 1990 for abelian groups

3A781

Page 8: Research on  anonymous communication  in German(y) 1983-1990

8

Anonymity of the recipient: Fail-stop key generation (1989-91)

• DC-net provides recipient anonymity only against a passive attacker – an active attacker might manipulate the consistency of the broadcast.

• Fail-stop key generation (use the locally received result of round r as one input to calculate the keys for all rounds to come) guarantees consistency unconditionally, which yields unconditional recipient anonymity even against computationally unrestricted active attackers.

Michael Waidner, Birgit Pfitzmann: Unconditional Sender and Recipient Untraceability in spite of Active Attacks - Some Remarks; Fakultät für Informatik, Universität Karlsruhe, Interner Bericht 5/89, March 1989.

Michael Waidner: Unconditional Sender and Recipient Untraceability in spite of Active Attacks; Eurocrypt '89, LNCS 434, Springer-Verlag, Berlin 1990, 302-319.

Jörg Lukat, Andreas Pfitzmann, Michael Waidner: Effizientere fail-stop Schlüsselerzeugung für das DC-Netz; Datenschutz und Datensicherung DuD 15/2 (1991) 71-75.

Page 9: Research on  anonymous communication  in German(y) 1983-1990

9

Superposed receiving (1988-1990)

counter

Overflow area for addition of messages Overflow area for addition of counters

Whoever knows the sum of n characters and n-1 of these n characters,

can calculate the n-th character.pairwise superposed receiving (reservation scheme: n=2)Two stations send simultaneously.Each subtracts their character from the sum to receive the character sent by the other station.==> Duplex channel in the bandwidth of a simplex channel

global superposed receiving (direct transmission: n≥2 )

Result of a collision is stored, so that if n messages collide, only n-1 of them have to be sent again.

Collision resolution algorithm using the mean of messages:

≤ 2T –1 stations addition mod 2L

T T-10 ... 0 message 0 ... 0 1 L

Page 10: Research on  anonymous communication  in German(y) 1983-1990

10

X Y

X+Y

S1 S2

S1

(X+Y)-X = Y

S2

(X+Y)-Y = X

Without superposed receiving

With pairwise superposed receiving

Pairwise superposed receiving (1988-1990)

Andreas Pfitzmann: Diensteintegrierende Kommunikationsnetze mit teilnehmerüberprüfbarem Datenschutz; IFB 234, Springer-Verlag, Heidelberg 1990. ISBN 3-540-52327-8, p. 99

Page 11: Research on  anonymous communication  in German(y) 1983-1990

11

7 115 14 11 15 1

4 11 15 1

1 14 1

5 1

4 1

5 1

7 115 1

7 115 1

S1

S2

S3

S4

S5

32 5

10 3

1 1

4 1 5 1

7 1 15 1

Collision resolution algorithm with mean calculation and superposed receiving

Global superposed receiving (1988-1990)

= 6

= 3

= 4

= 11

9 2

22 2

Andreas Pfitzmann: Diensteintegrierende Kommunikationsnetze mit teilnehmerüberprüfbarem Datenschutz; IFB 234, Springer-Verlag, Heidelberg 1990. ISBN 3-540-52327-8, p. 134

Page 12: Research on  anonymous communication  in German(y) 1983-1990

12

DC-net with dynamically partitioned broadcast (1985)

Time division partitioning of the tree and appropriately chosen dynamic key graphs:

In the first time partition (potentially) global (e.g. international) traffic takes place: all messages travel to the root and are broadcast world-wide. Keys for this time partition can (and should be) shared with other user stations all over the world.

In the n+1st time partition, all messages travel only to the nth sons of the root (representing e.g. continentals, states, districts, ...). Keys for these time partitions are only shared between user stations which are sons of the same nth son of the root.A. Pfitzmann: How to implement ISDNs without user observability - Some remarks; Interner Bericht 14/85, Univ. Karlsruhe, Fak. Informatik, p. 67

431 2M M M M

Page 13: Research on  anonymous communication  in German(y) 1983-1990

13

...by station 5

Possible propagation of errors by station 3

Station 2

Station 1Station 1

Station 3

Station 4

Station 5

Station 6

Station 7

Station 8

Station 9

Station 10

DC-net 1

DC-net 2

DC-net 3

DC-net 4

Write and read access to DC-net

Read access to DC-net

DC-net 5

Fault tolerance: sender-partitioned DC-net (1990)

Page 14: Research on  anonymous communication  in German(y) 1983-1990

14

Enhancements of MIXes (1985-1990)

Channels: reduce delay (and storage), but must start and end at the same time

--> time-slice channels

Symmetric crypto for first and last MIX

Constant rate dummy traffic end-to-end having 3 advantages: 1. real-time behavior of batch MIXes 2. unobservable sending and receiving of messages3. when combined with cascade,

• MIXes may substitute traffic for users to hide their presence/absence or failures of their machines or counter active attacks

• linkability of some messages does not change the anonymity more than absolutely unavoidable

Page 15: Research on  anonymous communication  in German(y) 1983-1990

15

Design optimized for ISDN: Real-Time MIXes (1989-1991)

Requirements: ISDN services using the ISDN transmission system 2 independent 64-kbit/s duplex channels using 144-kbit/s subscriber lines nearly no delay on established channels establishment of channels within 3 seconds no additional load to the long-distance network

network structure

MIX1 MIXm MIX‘m MIX‘1A B

A’s local exchange B’s local exchange

long-distance network

64+64+16 = 144 kbit/s duplex

network terminations

• • • • • • • • •

• • •

• • •

• • •

Page 16: Research on  anonymous communication  in German(y) 1983-1990

16

Time-Slice Channels (1989)

Station A Station BMIXes (A) MIXes (B)l. ex.(A) l. ex.(B)

tsc-s setup: x

tsc-r setup: x

t0 tsc-s setup: y

tsc-r setup: y

tsc-s setup: PRG(sB,1)

tsc-r setup: PRG(sA,1)

t1

tsc-s setup: PRG(sA,1)

tsc-r setup: PRG(sB,1)

y tcs-r

tcs-s

call request: k, sA und sB

x

broadcast

tcs-r

tcs-s

Page 17: Research on  anonymous communication  in German(y) 1983-1990

17

Time-Slice Channels (cont.)

PRG(sB,2)

PRG(sA,2) k(data)

t2

PRG(sB,1)

PRG(sA,1) k(call accept, data)

tsc-s setup: PRG(sB,2)

tsc-r setup: PRG(sA,2)

tsc-s setup: PRG(sA,2)

tsc-r setup: PRG(sB,2)

t3

Page 18: Research on  anonymous communication  in German(y) 1983-1990

18

Delayed acceptance of call

tsc-s setup: x

tsc-r setup: x

t0 tsc-s setup: PRG(sP,0)

tsc-r setup: PRG(sQ,0)

tsc-s setup: PRG(sB,1)

tsc-r setup: PRG(sA,1)

t1

tsc-s setup: PRG(sP,1)

tsc-r setup: PRG(sQ,1)

from P

to P

PRG(sQ,0) tcs-r

tcs-s

call request: k, sA und sB

x

tcs-s

tcs-r

Station A Station BMIXes (A) MIXes (B)l. ex.(A) l. ex.(B)

Page 19: Research on  anonymous communication  in German(y) 1983-1990

19

Delayed acceptance of call (cont.)

tsc-s setup: PRG(sB,2)

tsc-r setup: PRG(sA,2)

t2tsc-s setup: PRG(sP,2)

tsc-r setup: PRG(sQ,2)

from P

to P

PRG(sQ,1)

PZG(sA,1)

discard

fill up

tt

PRG(sB,t-1)

PRG(sA,t-1)

tsc-s setup: PRG(sB,t-1)

tsc-r setup: PRG(sA,t-1)

tt-1 tsc-s setup: PRG(sA,t-1)

tsc-r setup: PRG(sB,t-1)

k(call accept, data)

Page 20: Research on  anonymous communication  in German(y) 1983-1990

20

Advantages of Real-Time MIXes

• recipient anonymity without untraceable return addresses with long validity (good for fault tolerance)

• cascade: pipelining -> even distribution of processing of traffic without any stochastic assumptions

• together: avoiding any need of long term storage of (hashes of) messages

Andreas Pfitzmann, Birgit Pfitzmann, Michael Waidner: Telefon-MIXe: Schutz der Vermittlungsdaten für zwei 64-kbit/s-Duplexkanäle über den (2*64 + 16)-kbit/s-Teilnehmeranschluß; Datenschutz und Datensicherung DuD /12 (1989) 605-622.Andreas Pfitzmann, Birgit Pfitzmann, Michael Waidner: ISDN-MIXes - Untraceable Communication with very small Bandwidth Overhead; Information Security, Proc. IFIP/Sec'91, May 1991, Brighton, D. T. Lindsay, W. L. Price (eds.), North-Holland, Amsterdam 1991, 245-258.Anja Jerichow, Jan Müller, Andreas Pfitzmann, Birgit Pfitzmann, Michael Waidner: Real-Time Mixes: A Bandwidth-Efficient Anonymity Protocol; IEEE Journal on Selected Areas in Communications 16/4 (1998) 495-509.

Page 21: Research on  anonymous communication  in German(y) 1983-1990

21

“Proof” of MIX cascade (1990)Maximum anonymity means (possibilistic setting):• all other senders or recipients of the messages of a particular time interval or• all MIXes have to cooperate to trace a message against the wish of its sender or recipient.

Assuming that each message is mixed by each MIX only once, to achieve maximum anonymity, all these messages have to pass each MIX simultaneously and therefore all the MIXes in the same order (-> MIX cascade). (Remark: In a probabilistic setting, this would hold as well.)

Proof (ind.): Assume not all these messages pass each MIX simultaneously, then there exist a MIX i and two messages m1 and m2 which do not pass MIX i simultaneously. If all other MIXes except i cooperate, they can trace m1 and m2 before and after MIX i. If all other senders and recipients than those of m1 and m2 cooperate, this means that both m1 and m2 are completely traceable, if no other senders or recipients cooperate, it means that the anonymity set of both m1 and m2 is decreased.

Andreas Pfitzmann: Diensteintegrierende Kommunikationsnetze mit teilnehmerüberprüfbarem Datenschutz; IFB 234, Springer-Verlag, Heidelberg 1990. ISBN 3-540-52327-8, p. 69

Page 22: Research on  anonymous communication  in German(y) 1983-1990

22

“Proof” of MIX cascade (cont.)

MIX 1

MIX i

MIX n

...

...

m2

m2

m1

m1

Page 23: Research on  anonymous communication  in German(y) 1983-1990

23

Fault-tolerance within the MIX-net (1985-1990)

MIX6 MIX7 MIX8 MIX9 MIX10

MIX1 MIX2 MIX3 MIX4 MIX5

MIX11 MIX12 MIX13 MIX14 MIX15

S R

2 alternate paths through disjunct MIXes

S R

MIXi‘ or MIXi‘‘ can replace MIXi

MIX1 MIX2 MIX3 MIX4 MIX5

MIX5‘MIX1‘ MIX2‘ MIX3‘ MIX4‘

MIX5‘‘MIX1‘‘ MIX2‘‘ MIX3‘‘ MIX4‘‘

coordination protocol

Page 24: Research on  anonymous communication  in German(y) 1983-1990

24

Fault-tolerance within the MIX-net (cont.)

MIX1 MIX2 MIX3 MIX4 MIX5S R

d4 k4

d5 k5

d2 k2

d3 k3

d1 k1

c5 k5

c4 k4

c3 k3

c2 k2

c1 k1

cE

coordination protocol

dE

k2

k3

k5

k4

Single MIXes can be skipped

ciphering

transfer

deciphering

Page 25: Research on  anonymous communication  in German(y) 1983-1990

25

At which layer? (1985-1990)

OSI layers Broadcast MIX-net DC-net RING-net

7 application

6 presentation

5 session

4 transportimplicit

addressing

3 network broadcast

batch and change

encoding

2 data link anonymous access

anonymous access

1 physical channel selection

superpose messages and keys digital signal

regeneration

0 medium ring

has to preserve anonymity against the communication partner

has to preserve anonymity

end-to-end encryption

can be built without regard to anonymity

Page 26: Research on  anonymous communication  in German(y) 1983-1990

26

Lessons I learned

1. strong (but completely hypothetical in 1985) attacker models got reality in the meantime, cf. interfaces for law enforcement in all communication networks; nevertheless, the research community mainly addresses weaker attacker models in the last 10 years than David Chaum and my group did 1983-1990

2. Quality of Service (QoS): delay very low + throughput high, otherwise anonymity and unobservability will never get a service to the masses, but the PET research community considers mainly P2P, i.e. ignores QoS, when the Internet community finally starts to get QoS aware (e.g. IP v6)

3. anonymity and unobservability work well with isochronous traffic (common in channel switched networks)

4. 2. and 3. suggest that the PET community will finally rediscover isochronous (dummy) traffic in future

5. the interface between anonymous communication and applications has to have as less assumptions as possible, cf. dummy traffic, static networks ...