CSCI-UA.0480-11: Intro to Computer Security Spring 2019
Computer Security代写 In this assignment you’ll implement the cryptographic logic for a secure messaging client. The security goals
Project 1: Chatterbox Computer Security代写
due: Tuesday 2019-03-26 22:00 EST via classes.nyu.edu
In this assignment you’ll implement the cryptographic logic for a secure messaging client. The security goals are to achieve integrity and confidentiality of all messages transmitted, deniable session authentication, forward secrecy at the level of individual messages, and recovery from compromise. To make your protocol usable you’ll also want to recover gracefully from errors and handle messages delivered out-of-order.
We’ll build this up in a few stages. You’ll also be given some simple libraries to handle many low-level cryptographic details for you as well as testing code to guide your development. The total amount of code you’ll need to write is only about 100-200 lines. Unfortunately, almost every line will take significant thinking, as is typically the case for cryptographic code.
Comparison to Signal
The end result will be quite similar to the protocol pioneered by Signal and since adopted by WhatsApp, Skype, and many other tools which support encrypted communication. If you’re curious, you can read Signal’s protocol documentation, though it is not necessary to complete this assignment. Note that the protocol you’ll develop won’t be exactly like Signal:
- Many complexities such as prekeys have been removed for
- Signal uses the curve25519 elliptic curve and AES-CBC encryption with HMAC. We’ll useNIST’s P-256 curve and AES-GCM authenticated encryption (largely because these are available in Go’s standard libraries). You shouldn’t need to touch this code
- The data being sent with each message will be slightly
- A slightly different key Computer Security代写
There are many open-source implementations of Signal available. You can refer to these if you find it helpful, but keep in mind that it is an honor code violation to copy another’s code. In any case, it is the effort required in porting an existing implementation to the test framework for this assignment will likely be far higher than doing the assignment yourself.
Starter code
You can download the starter code from Github:
https://github.com/jcb82/chatterbox
If patches are needed to fix bugs, they’ll be uploaded to the repository.
Programming environment
The supported language for this assignment is Go, an increasingly popular choice for cryptographic code as it provides good performance while avoiding many types of memory corruption problems. If you haven’t programmed in Go before, don’t panic. It is quite similar to the imperative style in languages like C++, Java or Javascript. There are many resources to help you get up and running with Go for the first time:
- Read first if you haven’t used Go: A Tour of Gohttps://tour.golang.org/welcome/1
- Go by Example:https://gobyexample.com/
- Installation:https://golang.org/doc/install
- IDES:https://golang.org/doc/editors.html
- Detailedlanguage specification https://golang.org/ref/spec (you will not need to know Go to this level of detail)
You only need to edit one file: chatter.go. You may of course add additional tests or split your code into multiple files if you like. You should not edit the cryptographic libraries too much, your code will be run with the starter versions for grading.Computer Security代写
The most important commands you’ll want (if you’re working on the command line) are:
- go test: run all testcases
- gotest -v prints more detailed There is also a VERBOSE constant in the
chat_test.go file.
- go test -shortskips the longer extended test cases
- go fmt*.go: a cool feature of Go: automatically format your code according to the language
Part 1: The Triple Diffie-Hellman handshake (3DH)Computer Security代写
A chat between Alice and Bob starts with a handshake where they exchange cryptographic key material and establish a shared session key. First, Alice and Bob must learn each other’s public keys. In the real world this is a significant challenge. For this assignment we’ll just assume they get them from some trusted source like a key server.
A classic approach is to do a Diffie-Hellman (hereafter DH) exchange to establish a session key, with Alice and Bob using their private keys to sign their DH values ga, gb. These DH shares are called ephemeral since they last for one session only, compared to the long-term or identity public keys which identify Alice and Bob permanently.
Signal does a more interesting handshake to achieve deniability. No signatures are involved. Instead, three DH exchanges are combined to authenticate both parties and produce a session. Alice starts with identity key gA and ephemeral key ga (her secrets are A and a). Similarly Bob has identity key gB and ephemeral key gb (his secrets are B and b). Alice send Bob gA and ga and he sends back gB and gb. Their initial shared secret is:
k = KDF(gA·b, ga·B, ga·b)
Alice is convinced she’s talking to Bob if he can derive the same kroot1,
because this requires knowing his long-term private key B. Similarly Bob is convinced he’s talking to Alice. But it’s also possible for anybody to simulate this handshake without the involvement of either party at all by choosing a and b, so either party can deny they ever participated in the conversation.Computer Security代写
Order matters! Note that both parties need to agree on an ordering of the shares gA·b, ga·B, ga·b when they compute the KDF, or they will get different results. We’ll use the following simple convention: whoever sends the first message of the handshake (the initiator) is “Alice” and whoever sends the second (the responder) is “Bob.” Both parties will sort the three shares according to their role in the protocol.
Implementation notes: The handshake requires that two messages are exchanged, which are implemented as three methods for a Chatter object:
- InitiateHandshake():Alice sets up state for her session with Bob and returns an ephemeral public
- ReturnHandshake(): Bob receives Alice’s ephemeral key. He sets up state for his sessionwith her and returns his own ephemeral public He also derives the initial root key and returns a key derived from it (for authentication checks).
- FinalizeHandshake():Alice receives Bob’s ephemeral She derives the initial root key and returns a hash of it (for authentication checks).
To compute a root key,Computer Security代写
both sides will call CombineKeys() with the outputs gA·b, ga·B, ga·b in order. Note that CombineKeys() is a variadic function which can take any number of arguments.
Checking the handshake: Both Alice and Bob return a special check key derived from the root key. This won’t be used for any encryption, but can be used by both parties to verify that the handshake was successful. In your implementation, use the DeriveKey method on the root key with the label HANDSHAKE_CHECK_LABEL. The testing code will assume you derive the returned key this way (and that you combine keys in the order listed above).Computer Security代写
Testing: When you’ve implemented the handshake correctly, your code should pass the TestHandshake test and TestHandshakeVector tests. The second of these tests contains a precise expected value based on a fixed random number generator. Until you pass the basic handshake test the remaining tests will be skipped.
Part 2: Deriving forward-secure message keys with a double ratchet
After their handshake, Alice and Bob are ready to chat. They chat through the SendMessage and ReceiveMessage methods, which are actually the only two additional methods you’ll need to implement besides the handshake methods (you may of course want some helper functions).Computer Security代写
From the root key, Alice and Bob need to derive symmetric keys for authenticated encryption. They’ll derive these from the root key using the DeriveKey() method with the label CHAIN_LABEL. To achieve forward secrecy, after every message the sender and receiver ratchet the chain key (again using the DeriveKey() KDF with CHAIN_LABEL) to derive a new key. They should also delete the old value to ensure that it can’t later leak and allow an adversary to decrypt an intercepted ciphertext.
A simple ratchet wouldn’t support receiving out-of-order messages though:
the old value would Computer Security代写need to be kept around if a particular message wasn’t received on time, and that could be usedto derive all future keys in the chain. So Signal instead uses a double ratchet as follows:
From each chain key value, a message key is derived by again calling DeriveKey.Computer Security代写
Each message key is used only once: message key 1 is used to send/decrypt message 1 and is then deleted. The advantage of the double ratchet is that, if needed, an old message key can be cached to decrypt an out-of-order message, but keeping this value around does not allow deriving any other message keys in the chain.
These keys should be used to encrypt each message using the provided AESGCM AuthenticatedEncrypt function. You’ll want to create a random initialization vector for each message. In this application, each key is only used once so it would be okay to use a fixed IV, but it is good practice to generate a fresh IV for each message.
Testing: When you’ve implemented the doublet ratchet correctly, your code should pass the TestOneWayChat test, for a simple conversation in which only one party sends messages.Computer Security代写
Part 3: Adding resiliency with a Diffie-Hellman ratchet
The symmetric double ratchet enables good forward secrecy, as key material can be deleted quickly after it’s used. However, if this was the only ratcheting, the protocol would not be resilient to a temporary compromise. If an attacker learns any of the chain key values, they could compute all of the following values indefinitely.
To address this, Signal adds another layer of ratcheting. The root key is continuously updated by new Diffie Hellman computations. In fact, before Alice (the initiator) ever sends a message, she generates a new secret a2 and ephemeral DH key ga2. She then computes the DH value ga2·b1 (where Bob’s initial ephemeral DH value is gb1) and uses this to update her root key. In your implementation, Alice will update the root key by calling CombineKeys() with the old root key and the new key derived from ga2·b1 (passed in that order). She’ll then derive a new sending key chain as before and use it to encrypt the next message she sends.Computer Security代写
For Bob to be able to decrypt,
Alice will need to send her new DH value ga2 (her DH ratchet key) along with her encrypted message. Bob can then derive the same value ga2·b1 and update his copy of the root key to derive Alice’s current sending key chain. He can then use this to decrypt Alice’s message. As long as Alice is the only one sending messages, she’ll keep updating this sending chain using the symmetric ratchet (the double ratchet implemented above). Bob should also make sure to delete his secret b1 at this point, since he’ll no longer need it.
When Bob has a message to send back, it’s his turn to:
- Pick a new DH ratchet keygb2
- Update his root key by combining withga2·b2
- Derive a new sending keychain
- Usethis to encrypt his message and send it (along with gb2) to Alice so she can update her root key in the same way and derive the keys needed to decrypt Bob’s message
All this work to keep Eve out of the conversation! In general, the DH ratcheting proceeds in turns. At first, it’s Alice’s turn to send a new DH ratchet key and update her sending key chain. She’ll use these keys for all messages she sends until it’s her turn again. Note that this process ensures that Alice and Bob are never using the same chain of keys to send messages as each other.Computer Security代写
The sequence of root keys and derived chains will go like this:
Root key version | Derivation | Sender who uses this chain |
kroot1 | KDF(Triple DH output) | Bob |
kroot2 | a2b1
Combine(kroot1, g ) |
Alice |
kroot3 | a2b2
Combine(kroot2, g ) |
Bob |
kroot4 | a3b2
Combine(kroot3, g ) |
Alice |
… | … | … |
Note the convention that it’s Alice (the initiator)’s turn to send a new DH ratchet value first. If Bob happens to send a message first, he’ll use the sending chain derived directly from the first root key derived from the handshake.
Testing: When you’ve implemented the DH ratchet logic correctly, your code should pass the TestAlternatingChat test (a simple case where both sides send one message at a time), the TestSynchronousChat test (both sides may send more than one message at a time), the TestSynchronousChatVector test (a precise expected value using a fixed RNG), and the TestSynchronousChatExtended test (a longer, parameterized version with multiple senders randomly sending messages). The last one should be a good stress test to identify bugs. You can increase the parameters EXTENDED_TEST_ROUNDS and EXTENDED_TEST_PARTICIPANTS to make this test more thorough.Computer Security代写
Part 4: Handling out-of-order messages
So far we’ve assumed every message is delivered as soon as it is sent. With real networks, messages can be delivered out-of-order. Conceptually, the solution is straightforward. Each message has a counter value the sender users to signify which order the message was sent.
Handling “early” messages: When an out-of-order message is received with a higher counter value than the receiver has yet seen, they will need to advance their receiving key chain as needed to derive the key needed to decrypt this message. They’ll also need to store any intermediate message keys from the chain for messages not yet received. A good place to store them is in a Go map, indexed by sequence number.Computer Security代写
Note that sometimes the out-of-order message will also include a new DH ratchet value, requiring the receiving chain to be updated.
Only, at what point did the sender update? Consider the following scenario.
- Bobsends messages 1-3 using his initial sending chain, but Alice doesn’t receive
- Bobreceives a message from Alice with a new DH ratchet value, making it his turn to pick a new DH ratchet key. He does so, and updates his sending
- Bobsends messages 4-6 using his new sending chain, but Alice doesn’t receive
- Finally, Alice receives message
At this point Alice will need to derive and store the keys needed for messages 1-3 using Bob’s old sending chain, then derive Bob’s new sending chain using his new DH ratchet key, then derive and store the keys needed for messages 4-5, then finally decrypt message 6. To help Alice do this, each message from Bob contains a lastUpdate value in addition to a sequence number, indicating how many messages had been sent before the sending chain was last updated his sending chain (3 in the above example).Computer Security代写
Handling “late” messages: Assuming the logic for the above is implemented, handling a late message is easy. Just look up the stored value of the key needed, use it and zeroize it.
Testing: When you’ve implemented out-of-order message handling correctly, your code should pass the TestAsynchronousChat test (a simple case of 8 messages) and the TestAsynchronousChatExtended test (a longer, parameterized version with multiple senders randomly sending messages). You should set EXTENDED_TEST_ERROR_RATE to zero until you implement Part 5.You can again up the EXTENDED_TEST_ROUNDS and EXTENDED_TEST_PARTICIPANTS to make this test more thorough.
Part 5: Handling errors
What happens if a message is received that has been tampered with enroute? The simple answer is, nothing: the receiver should reject it and raise an error. The authenticated encryption library should raise an error if the ciphertext has been modified at all. Note that several pieces of important data cannot be encrypted though, since the receiver needs them to figure out which keys to decrypt with! This includes:Computer Security代写
- The sender and receiver’s identity keyfingerprints
- The sender’s DH ratchetvalue
- The sequence number and last updatenumber
All of these values should be added to the additional data portion of the authenticated encryption.
Remember it’s really AEAD (authenticated encryption with additional data) to handle data like this which cannot be encrypted but you want to verify the integrity of. A function EncodeData() has been provided for you which will encode this data to binary.
Avoiding corrupted state: You’ll need to make sure not to corrupt your state if a tampered message is received. If you update your root key only to realize later that there’s an error, you’ll be in trouble if you didn’t store the old value to revert back to. You’ll need to think carefully about error handling and only update state after confirming the message’s integrity.Computer Security代写
Testing: When you’ve implemented error handling correctly, your code should pass the small TestErrorRecovery test as well as the TestAsynchronousChatExtended test with EXTENDED_TEST_ERROR_RATE set to a non-zero value.
Part 6: Deleting key material Computer Security代写
It’s critical for cryptographic implementations to delete keys when they’re no longer needed. It’s not enough to just delete your reference to the key and wait for the garbage collector to overwrite this value, you need to actively call the provided Zeroize() method on every key (both symmetric keys/chain values and DH private keys) as soon as it is no longer needed.
Messages need only be decrypted once, after which their key should be zeroized.
Beware of course, that zeroizing keys too early could prevent you from decrypting legitimate messages, so you’ll need to think carefully about when to delete. You’ll also need to be sure not to make unintended copies of keys in memory. If you pass them by value (instead of by reference) a copy will be made that also needs to be zeroized. It’s safer to pass by reference and try to only have one copy exist that needs to be zeroized.Computer Security代写
There is also an EndSession method to implement, which should completely delete all remaining key material shared with a designated partner. After calling EndSession, it should be possible to open another session with that partner by running the handshake again.
Testing: There is a TestTeardown test which checks that you can call EndSession and then perform a second handshake. However, no test code is provided to actually check that you are deleting all key material (not just in EndSession, but in ReceiveMessage every time a message is received). You’ll need audit your own code. We will evaluate in the grading process that you have correctly zeroized every key no longer needed.Computer Security代写
Grading criteria
You’re advised to work in the order presented here. If you don’t get all parts working correctly, you will receive partial credit in the following amounts:
Part 1 | 15 points |
Part 2 | 15 points |
Part 3 | 20 points |
Part 4 | 20 points |
Part 5 | 15 points |
Part 6 | 15 points |
更多其他:C++代写 r代写 代码代写 考试助攻 C语言代写 finance代写 计算机代写 code代写 data代写 report代写 代写CS matlab代写 project代写 物理代写 数学代写 java作业代写