On the security of Wu and Yeh's conference key distribution system

On the security of Wu and Yeh's conference key distribution system

Research notes On the security of Wu and Yeh’s conference key distribution system Tzonelih Hwang, Narn-Yih Lee, Chih-Hung In 1993, Wu and Yeh prop...

346KB Sizes 10 Downloads 43 Views

Research notes

On the security of Wu and Yeh’s conference key distribution system Tzonelih

Hwang, Narn-Yih

Lee, Chih-Hung

In 1993, Wu and Yeh proposed a conference key distribution system based on cross-product operation on row vectors over the Galois Field GF(P). In this research note, we show that an opponent who knows the ID of a member in the conference can compute the conference key without knowing any secret from the system. Furthermore, we suggest a modified scheme to avoid this attack. Keywords: conference key distribution system, cross-product, ID-based, Lagrange interpolating polynomial, public key

In modern computer networks, solutions to distributing common keys between pairs of individuals for the purpose of secure communication are currently inadequate. With the holding of large conferences using networks, the secure distribution of a conference key among a group of intended principals has now become more and more important. Any principal inside the conference needs to get a correct conference key so that he can communicate with other legal principals securely. On the other hand, principals not in the conference are not allowed to compute the conference key. In 1982, Ingemarson et al.’ proposed a conference key distribution system (CKDS) based on the DiffieHellman scheme. In 1988, Lu et aL2 proposed a CKDS

based on the Lagrange interpolating polynomial. Recently, Koyama and 0hta3 and Okamoto and Tanaka4 constructed a CKDS by using the concept of an identity-based public key system. However, their systems involve large computations to reconstruct the conference keys from each principal’s secret key. In 1993, Wu and Yeh5 proposed a new scheme using crossproduct. They claimed that their scheme requires less storage space and is more secure and efficient in computing conference keys than previous work. In this paper, we show that Wu and Yeh’s scheme is not secure enough, and also propose ways to construct a more secure CKDS. Institute of Information Engineering, National Cheng-Kung University, Tainan, Taiwan, ROC Paper received: 23 September 1993: revised paper received: 17 June I994

978

Wang and Ming-Yung

Ko

WU AND YEH’S CKDS In this section, we review Wu and Yeh’s scheme. First,, we review the mathematical background of crossproduct.

Definitions and propositions Definition 1 The cross-product of m - 1 linearly independent m-dimensional row vectors VI, v2,...,vm-1 over GF(P) is defined as follows..

VI x V2 x . . . x V,_l(modP)

VI3

v14

...

Vim

VII

V23

V24

...

V2m

V21

,.-., 1 Vminl,3

Vm-I,4

...

Vm - 1,m

VII

V]2

...

VI,,-1

V21

v22

...

V2,m-I

Vm-I,1

I

(mod p>

VPI,1

Vm-I,2

...

Vm-l,m-I

2 Let A be an m x 2 matrix, m B 2, such that any two row vectors of A form a nonsingular matrix. VI, V2 are two three-dimensional row vectors. I$

Proposition

=A

VI v2

ModPI

(>

then Ki x VI (or V2) = c( VI x VI), for i = 1,2, . . . , m, where c is a constant.

0140-3664/95/$09.50 0 199%Elsevief Science B.V. All rights reserved computer communications volume 18 number 12 december 1995

Wu and Yeh’s conference

Proposition 3 Let V1 vectors and VI x V2 dl # 0. Let Ki x VI (or i= 1,2,. . . , m, where Ki the inverse qf dl (i.e. d,‘)

and

V2 be three-dimensional (mod P) = (dl, dz, dj), where V2) (mod P) = (eii, ei2, eis) for is as defined in Proposition 2. If over GF(P) exists, then.

1. The inverse of eil (i.e. e;‘) over GF(P) exists. (mod P), 2. (dzdi ’ , djd,‘) = (e;ze,‘, ei3e;‘) i= 1,2 ,..., m.

for

Wu and Yeh’s CKDS Assume there are n users in the system. Without loss of generality, let IDo be the chairman of a group of m + 1 intended principals IDo, IDI, ID2, . . . , ID,,,, who want to have a secure conference. Let P be a large prime and a be a primitive element over GF(P). Both P and c( are known to all principals. Let xi and y; be the secret key and public key, respectively, owned by the IDi, where yi = ax’ (mod P). The key distribution process of the chairman IDo is as follows. Algorithm 1 Step 1: Randomly

choose two three-dimensional row vectors V1 and V2 over GF(P), which are linearly independent, e.g.: VI =

(VII, h2rV13)

and

v2 =

key distribution

system: T Hwang et al.

Algorithm 2 Step 1: Compute Wit= F,(ZDi) (mod P) for t = 1,2,3. Step 2:

If ~1;~= 0, for all t, then stop. This implies that ZDi is an illegal principal for the conference.

Step 3: Compute zi = yg’ (mod P). Step 4:

Compute ki, = wil z;’ (mod P), fort = 1,2,3, where zi’ is the inverse of zi over GF(P).

Step 5:

and Let & = (k,i 3ki2, ki3) (eii, e;l, e,3) = Ki x V; (mod P).

Step 6:

Reconstruct

the conference

compute CK

key

by

CK = (ei2 . e,‘, ei3 e; ‘) (mod P).

ATTACK ON WU AND YEH’S SCHEME Proposition 4 Let K = (kl, k2, k3) be a three-dimensional vector, K’ = cK (mod P), where c is a constant and W = (w,, ~2, w3) is another three-dimensional vector. Let (al, a?, a3) = K x Wand (bl, b2,bJ) = K’ x W, where both a,’ and br’ exist. Then (azay’, a3a;‘) = (b2b;‘, b3b;‘) (mod P). Proof

According to Definition 1:

K’ x W = (/I,, !I?, h3)

= (1::

(V21rV22, v23)

(mod P)

~~~.~~

~~l,~~i

iiI>(modP)

such that: vl2v23 #

vl3v22 (mod

p)

Step 2: Compute

VI x V, (mod P) = (dl, d2, d3).

Step 3:

a conference key CK such that (mod P).

Compute

= c(K x l+‘)(modP) = c(~I, ~2,~3)(mod f’)

CK = (d2d11, d3d;‘) Step 4:

Randomly choose a secret m x 2 matrix A, where any two row vectors of A form a nonsingular matrix. Then, compute the key matrix K as:

= (cq, ~72,cu3)mod P) so: (b&l,

bib;‘)

= ((CQ)

(CL2,)m', (CQ)

(CO,)-') (mod

= ((~a*). (a;‘~-‘), (ca3) (a;‘~‘))

(mod P)

= (~2 a;‘, u3 a;‘) (mod P)

0

Theorem 5 The conference key of Wu and Yeh ‘s scheme can be computed by anyone who knows the ID of a legal principal in the conference.

where K; = (kil, ki2, ki3). Step 5:

P)

Construct the interpolation polynomials F,(x), for t = 1,2,3, over GF(P) by interpolating on the points:

Proof If the opponent knows conference, then he can compute:

that

ZD; is in the

UJ,,= Ft(lQ) (mod P) for t = 1, 2, 3, according to Algorithm 2. So he obtains:

where Yi, = y’” . kit (mod P) (i = 1,2,. . . , m; t = 1,2,3), and: (IDi, 0) wherej=mf Step 6:

Ki = (wii, wi2,wi3) = (k:, 1k:p k:,) = (kil

l,m+2

,..., n-

1.

z,, kr3

z;) (mod P)

= z, (k;i, k2, kd (mod PI

Publish VI and F,(x), for t = 1,2,3.

= ch,

The conference key derivation process of the legal principal IDi is described in the following algorithm:

computer

z,,ki2

k2, kid (mod PI

= CKi(mod P) where c = zi is a constant.

communications

volume

18 number

12 december

1995

979

Wu and Yeh’s conference

key distribution

system: T Hwang et al.

Then, he computes K: x V, = cKi x V, (mod P). Let (e’, , eh, &;) = Ki x V, and (e,,ez,ej) = K; x V,. By proposition 4, an intruder can compute the conference key as: CK=(ez.e,

-I, ej .e;‘)

= (ek cl,- ’ , e; e;- ’

The attack proposed in Theorem illustrated by the following example.

5 can also be

Example Let P = 31 and CI= 7. Assume that there are four users IDo, ID,, ID2, ID3 in the system, and IDo, ID, and ID1 want to have a secret conference. For simplicity, we assume that ID, = 1, IDI = 2 and ID3 = 3. The pairs of secret and public keys kept by IDo, ID,, ID1 and ID3 are (XO,YO)

=

(3,2),

(XI,YI)

=

(9,8),

(x~,Yz) = (11,201

and

respectively. Following Wu and Yeh’s scheme, the chairman ID0 randomly selects two vectors VI = (2,4,7) and V, = (1,3,5), and computes: @3,Y3)

=

(lO,-w,

VI x V2(mod31) = (2,4,7) x (1,3,5)(mod31)

MODIFIED SCHEME Knowing the weak point of Wu and Yeh’s scheme, in this section we propose a modified scheme that aims to avoid the proposed attack. Let n be the smallest integer such that 2” > P, and Q be a prime such that Q > 2”. Following Steps (lt(4) of Wu and Yeh’s scheme, the chairman IDo, in Step 5, constructs the polynomials F,(x), for t = 1,2,3 over GF(Q), by interpolating on the points (IDi, Yir), where Yi,=(y;‘“modP)$k;, and i=1,2 ,..., m,t= 1,2,3. The symbol ‘$’ denotes the bit-by-bit Exclusive OR operation. Step 6 is the same as in Wu and Yeh’s scheme. The fact that the opponent cannot compute the conference key of the modified scheme by using the attack in Theorem 5 should be clear. It should be noted here that the degree of F,(x) in the newly modified scheme is m - 1, whereas the degree of F((x) in Wu and Yeh’s scheme is n - 2, where m denotes the number of users in the conference and n is the total number of users in the system. Thus, the new scheme is more efficient than Wu and Yeh’s scheme in broadcasting messages. We use the following example to illustrate the newly modified scheme.

= (30,28,2) (mod 31) Then, ID0 computes CK as:

Example

CK = (28 x 30-l, 2 x 30-l) (mod 3 1) = (3,29)

Following

Next, chairman ID0 computes a key matrix K containing two row vectors K, and KZ for ID, and ID2 by using a randomly selected matrix A =

K=(tl)=(i

:) (f

as:

and

K2 = (8,20,3)

F,(x)=9xZ+x+9 Fz(x) = 18x2 + 25x + 11

3mod31)$26=(l [::g,,,,,,,,,,,;~2,~)

F3(x) = 28x + 19 (mod 37) A legal principal ID, can computing K, first as follows: KI

=

=(Fl(l)$(83mod31),F2(l)~(83mod31), Fj( 1) $ (S3 mod 3 1)) =(23$16,31@16,10$16)

= (3,29) (mod 31)

= (7,15,26)

volume

18 number

12 december

reconstruct

(kll,h2,kl3)

= (17 x 2,30 x 2) (mod31)

communications

10)

Then, chairman IDo constructs polynomials F,(x) over GF(Q), for t = 1,2,3. In this example, we assume that n = 5 and Q = 37:

(17 x 16-‘,30 x 16-l) (mod31)

computer

have

F2(x) = 28x + 3 (mod 37)

ID,

is a member in the conference, an M?,,= F,(l) (mod31) = 19, can get w,3 = F3(1) (mod 31) = 23, and WI2 = F2(1) (mod 31) = 13. Next, he computes (e;, , e’,,, e’,,) = (mod31) = (19,23,13) x (2,4,7) (WI], WI29 WI31 x VI (mod 3 1) = (16, 17,30) (mod 3 1). By proposition 4, the opponent can obtain:

980

we

F,(x) = 24x + 36 (mod 37)

F3@) = 16x2+7x+21

CK=

Example,

‘mod31)$15 = (1 31) ii: F203mod 31) @?20) =‘(2 22)

Then, the chairman ID0 constructs polynomials F,(x), for t = 1,2,3, by applying the secret key of ID0 and public keys y$ of the legal principals ID, and IDI as:

Knowing opponent

earlier

3mod31)@7 = (1 23) ~::~203mod31)@8)~(2 10)

r: :)(mod31)

so: Kl = (7, 15,26)

the

VI x Vz = (30,28,2) (mod 31) and CK = (3,29). Then ID0 computes K, = (7,15,26) and K2 = (8,20,3). Instead of multiplying K, and K2 by zi, he uses an Exclusive OR operation to form two points on Fr(x), such as:

1995

CK

by

Wu and Yeh’s conference

key distribution

system: T Hwang et al.

ACKNOWLEDGEMENTS

Thus: K, x I’, = (7,15,26) x (2,4,7)

The authors wish to thank the referees of this paper for their useful comments. This paper is supported by the National Science Council of ROC under contract number NSC 83-0408-E-006-043.

= (1,3,29) CK = (3 x l-l,29

x I-‘)

= (3,29)

REFERENCES 1

CONCLUSIONS In this paper, we investigate the security of Wu and Yeh’s conference key distribution system based on cross-product. We have shown that their scheme is not secure enough because an opponent can obtain the conference key without knowing any secret information of the system. Instead, we propose a modified scheme to avoid this attack. The modified scheme is more efficient than Wu and Yeh’s scheme.

computer

3

4

5

Ingemarson, I, Tang, D T and Wong, C K ‘A conference key distribution system, IEEE Trans. Infor. Theory, Vol 28 No 5 (1982) pp 714720 Lu, E H, Hwang, W Y and Lee, J Y ‘A conference key distribution system based on Lagrange interpolation polynomial’, Proc. 7th Ann. Joint Cocf. IEEE Camp. Comm. Sot., Singapore (1988)pp 1092-I 094 Koyama, K and Ohta, K ‘Identity-based conference key distribution system in broadcasting networks’, Elecfr. Letr, Vol28, No 5 (1987)pp 6477649 Okamoto, E and Tanaka, K ‘Key distribution system based on identification information’, IEEE J. Selected Areas in Comm., Vol7 No 4 (1989) pp 481485 Wu, T C and Yeh, Y S ‘A conference key distribution system based on cross-product’, Comput. Math. Applic., Vol 25 No 4 (1993) pp 3946

communications

volume

18 number

12 december

1995

981