CryptoDB
Cas Cremers
Publications
Year
Venue
Title
2024
EUROCRYPT
A Holistic Security Analysis of Monero Transactions
Abstract
Monero is a popular cryptocurrency with strong privacy guarantees for users' transactions.
At the heart of Monero's privacy claims lies a complex transaction system called RingCT, which combines several building blocks such as linkable ring signatures, homomorphic commitments, and range proofs, in a unique fashion.
In this work, we provide the first rigorous security analysis for RingCT (as given in Zero to Monero, v2.0.0, 2020) in its entirety.
This is in contrast to prior works that only provided security arguments for parts of RingCT.
To analyze Monero's transaction system, we introduce the first holistic security model for RingCT.
We then prove the security of RingCT in our model.
Our framework is modular: it allows to view RingCT as a combination of various different sub-protocols.
Our modular approach has the benefit that these components can be easily updated in future versions of RingCT, with only minor modifications to our analysis.
At a technical level, we split our analysis in two parts.
First, we identify which security notions for building blocks are needed to imply security for the whole system.
Interestingly, we observe that existing and well-established notions (e.g., for the linkable ring signature) are insufficient.
Second, we analyze all building blocks as implemented in Monero and prove that they satisfy our new notions.
Here, we leverage the algebraic group model to overcome subtle problems in the analysis of the linkable ring signature component.
As another technical highlight, we show that our security goals can be mapped to a suitable graph problem, which allows us to take advantage of the theory of network flows in our analysis. This new approach is also useful for proving security of other cryptocurrencies.
2024
RWC
Reclaiming our passwords: Protecting End-to-End Encryption from a Malicious Zoom Server
Abstract
Video conferencing apps like Zoom have hundreds of millions of daily users, making them a high-value target for surveillance and subversion. While such apps claim to achieve some forms of end-to-end encryption, they usually assume an incorruptible server that is able to identify and authenticate all the parties in a meeting. Concretely this means that, e.g., even when using the “end-to-end encrypted” setting, malicious Zoom servers could eavesdrop or impersonate in arbitrary groups.
In this work, we show how security against malicious servers can be improved by changing the way in which such protocols use passwords (known as passcodes in Zoom) and integrating a password-authenticated key exchange (PAKE) protocol.
To formally prove that our approach achieves its goals, we formalize a class of cryptographic protocols suitable for this setting, and define a basic security notion for them, in which group security can be achieved assuming the server is trusted to correctly authorize the group members. We prove that Zoom indeed meets this notion. We then propose a stronger security notion that can provide security against malicious servers, and propose a transformation that can achieve this notion. We show how we can apply our transformation to Zoom to provably achieve stronger security against malicious servers, notably without introducing new security elements.
2022
CRYPTO
CHIP and CRISP: Protecting All Parties Against Compromise through Identity-Binding PAKEs
Abstract
Recent advances in password-based authenticated key exchange (PAKE) protocols can offer stronger security guarantees for globally deployed security protocols. Notably, the OPAQUE protocol [Eurocrypt2018] realizes Strong Asymmetric PAKE (saPAKE), strengthening the protection offered by aPAKE to compromised servers: after compromising an saPAKE server, the adversary still has to perform a full brute-force search to recover any passwords or impersonate users. However, (s)aPAKEs do not protect client storage, and can only be applied in the so-called asymmetric setting, in which some parties, such as servers, do not communicate with each other using the protocol.
Nonetheless, passwords are also widely used in symmetric settings, where a group of parties share a password and can all communicate (e.g., Wi-Fi with client devices, routers, and mesh nodes; or industrial IoT scenarios). In these settings, the (s)aPAKE techniques cannot be applied, and the state-of-the-art still involves handling plaintext passwords.
In this work, we propose the notions of (strong) identity-binding PAKEs that improve this situation: they protect against compromise of any party, and can also be applied in the symmetric setting. We propose counterparts to state-of-the-art security notions from the asymmetric setting in the UC model, and construct protocols that provably realize them. Our constructions bind the local storage of all parties to abstract identities, building on ideas from identity-based key exchange, but without requiring a third party.
Our first protocol, CHIP, generalizes the security of aPAKE protocols to all parties, forcing the adversary to perform a brute-force search to recover passwords or impersonate others. Our second protocol, CRISP, additionally renders any adversarial pre-computation useless, thereby offering saPAKE-like guarantees for all parties, instead of only the server.
We evaluate prototype implementations of our protocols and show that even though they offer stronger security for real-world use cases, their performance is in line with, or even better than, state-of-the-art protocols.
2022
RWC
CHIP and CRISP -- Password based key exchange: Storage hardening beyond the client-server setting
Abstract
Recent advances in password-based key exchange (PAKE) protocols can offer stronger security guarantees for globally deployed security protocols. Notably, the OPAQUE protocol realizes saPAKE [Eurocrypt2018], strengthening the protection offered by aPAKE to compromised servers: after compromising an saPAKE server, the adversary still has to perform a full brute-force search to recover any passwords or impersonate users. However, (s)aPAKEs do not protect client storage, and can only be applied in the so-called asymmetric setting, in which some parties, such as servers, do not communicate with each other.
Nonetheless, passwords are also widely used in symmetric settings, where a group of parties share a password and can all communicate (e.g., Wi-Fi with client devices, routers, and mesh nodes; or industrial IoT scenarios). In these settings, the (s)aPAKE techniques cannot be applied, and the state-of-the-art still involves handling plaintext passwords.
We propose the notions of (strong) identity-binding PAKEs that improve this situation in two dimensions: they protect all parties from compromise, and can also be applied in the symmetric setting. We propose stronger counterparts to state-of-the-art security notions from the asymmetric setting in the UC model, and construct protocols that provably realize them. Our constructions bind the local storage of all parties to abstract identities, building on ideas from identity-based key exchange, but without requiring a third party.
Our first protocol, CHIP, generalizes the security of aPAKE protocols to all parties, forcing the adversary to perform a brute-force search to recover passwords or impersonate others. Our second protocol, CRISP, additionally renders any adversarial pre-computation useless, thereby offering saPAKE-like guarantees for all parties, instead of only the server.
We aim to work towards standardization of CHIP and CRISP, for example through IETF. Exposure through Real World Crypto will not only help people find our solutions, but also help to connect us with people who might be interested in working with us towards standardization.
2021
RWC
SoK: Computer-Aided Cryptography
Abstract
Computer-aided cryptography is an active area of research that develops and
applies formal, machine-checkable approaches to the design, analysis, and
implementation of cryptography. We present a cross-cutting systematization of
the computer-aided cryptography literature, focusing on three main areas:
(i) design-level security (both symbolic security and computational
security), (ii) functional correctness and efficiency, and (iii)
implementation-level security (with a focus on digital side-channel
resistance). In each area, we first clarify the role of computer-aided
cryptography---how it can help and what the caveats are---in addressing
current challenges. We next present a taxonomy of state-of-the-art tools,
comparing their accuracy, scope, trustworthiness, and usability. Then, we
highlight their main achievements, trade-offs, and research challenges. After
covering the three main areas, we present two case studies. First, we study
efforts in combining tools focused on different areas to consolidate the
guarantees they can provide. Second, we distill the lessons learned from the
computer-aided cryptography community's involvement in the TLS 1.3
standardization effort. Finally, we conclude with recommendations to paper
authors, tool developers, and standardization bodies moving forward.
2020
JOFC
A Formal Security Analysis of the Signal Messaging Protocol
Abstract
The Signal protocol is a cryptographic messaging protocol that provides end-to-end encryption for instant messaging in WhatsApp, Wire, and Facebook Messenger among many others, serving well over 1 billion active users. Signal includes several uncommon security properties (such as “future secrecy” or “post-compromise security”), enabled by a technique called ratcheting in which session keys are updated with every message sent. We conduct a formal security analysis of Signal’s initial extended triple Diffie–Hellman (X3DH) key agreement and Double Ratchet protocols as a multi-stage authenticated key exchange protocol. We extract from the implementation a formal description of the abstract protocol and define a security model which can capture the “ratcheting” key update structure as a multi-stage model where there can be a “tree” of stages, rather than just a sequence. We then prove the security of Signal’s key exchange core in our model, demonstrating several standard security properties. We have found no major flaws in the design and hope that our presentation and results can serve as a foundation for other analyses of this widely adopted protocol.
2019
CRYPTO
Highly Efficient Key Exchange Protocols with Optimal Tightness
📺
Abstract
In this paper we give nearly-tight reductions for modern implicitly authenticated Diffie-Hellman protocols in the style of the Signal and Noise protocols, which are extremely simple and efficient. Unlike previous approaches, the combination of nearly-tight proofs and efficient protocols enables the first real-world instantiations for which the parameters can be chosen in a theoretically sound manner.Our reductions have only a linear loss in the number of users, implying that our protocols are more efficient than the state of the art when instantiated with theoretically sound parameters. We also prove that our security proofs are optimal: a linear loss in the number of users is unavoidable for our protocols for a large and natural class of reductions.
Service
- Eurocrypt 2022 Program committee
Coauthors
- Manuel Barbosa (1)
- Gilles Barthe (1)
- Karthik Bhargavan (1)
- Bruno Blanchet (1)
- Katriel Cohn-Gordon (2)
- Cas Cremers (7)
- Benjamin Dowling (1)
- Luke Garratt (1)
- Kristian Gjøsteen (1)
- Håkon Jacobsen (1)
- Tibor Jager (1)
- Kevin Liao (1)
- Julian Loss (1)
- Moni Naor (2)
- Bryan Parno (1)
- Shahar Paz (2)
- Eyal Ronen (3)
- Douglas Stebila (1)
- Benedikt Wagner (1)
- Mang Zhao (1)