SlideShare a Scribd company logo
A Generic Algebraic Model for the Analysis of
Cryptographic-Key Assignment Schemes
Sabri and Khedri (FPS 2012)
Dhruv Gairola
Algebraic Methods in CS, Ridha Khedri
gairold@mcmaster.ca ; dhruvgairola.blogspot.ca
March 31, 2014
Dhruv Gairola (McMaster Univ.) Sabri and Khedri (FPS 2012) March 31, 2014 1 / 25
Overview
1 Problem and Motivation
2 Brief Mathematical Background
3 Proposed structures
4 Akl-Taylor Technique
5 Generalizing Akl-Taylor
6 Chinese Remainder Technique
7 Verification of security properties
8 Conclusion
Dhruv Gairola (McMaster Univ.) Sabri and Khedri (FPS 2012) March 31, 2014 2 / 25
Problem and Motivation
Problem : Many key assignment schemes. How to evaluate them?
Crampton et. Al. advocate the adoption of generic key assignment
model.
Proposed Solution : Algebraic model to analyse these schemes.
Benefit : asserting correctness in preserving confidentiality of info;
better understanding of key assignment.
Dhruv Gairola (McMaster Univ.) Sabri and Khedri (FPS 2012) March 31, 2014 3 / 25
Brief Mathematical Background
Semigroup : (S, ·) where · is an associative binary operator.
Semiring : (S, +, ·)
(S, +) is a commutative semigroup with identity 0s
(S, ·) is a semigroup with identity 1s
· distributes over + on the left and right
0s is absorbing in (S, ·) i.e., (∀x|x ∈ S : 0s · x = x · 0s = 0s)
Dhruv Gairola (McMaster Univ.) Sabri and Khedri (FPS 2012) March 31, 2014 4 / 25
Brief Mathematical Background (2)
Poset : (C, ) where is a partial order relation (reflexive, transitive,
antisymmetric).
Antisymmetry : x y ∧ y x =⇒ x = y
Quasi-ordered set : is only reflexive and transitive.
Dhruv Gairola (McMaster Univ.) Sabri and Khedri (FPS 2012) March 31, 2014 5 / 25
Proposed key structure
Key structure : K = (K, +k, ∗k, 0k, 1k)
Interpretation : +k and ∗k can be seen operators which combining
keys.
Can represent Cesar cipher, Vigenere cipher, Boyd’s RSA cipher using
the structure.
Dhruv Gairola (McMaster Univ.) Sabri and Khedri (FPS 2012) March 31, 2014 6 / 25
Proposed scheme structure
Key assignment scheme : S = (K, C, , a)
K is key structure
(C, ) is poset
a ⊆ K → C is an onto function (assignment function)
C is the set of security classes
k1 d k2 : info revealed by k1 can also be revealed by k2.
Dhruv Gairola (McMaster Univ.) Sabri and Khedri (FPS 2012) March 31, 2014 7 / 25
Proposed scheme structure (2)
Given d (key derivation relation) S is said to be :
Cluster secure : low class keys cannot reveal info of higher classes
Class secure : cluster secure and (C, ) is a chain
User secure : scheme contains independent keys s.t. no key can reveal
info that can be revealed from other keys
We have our structure. What about theories? (Axioms are obvious)
Dhruv Gairola (McMaster Univ.) Sabri and Khedri (FPS 2012) March 31, 2014 8 / 25
Proposed scheme structure (3)
Theories ( is a quasi-order relation):
1 k1 ≤k k2 =⇒ k1 k2
2 k1 ∗k k2 k2
3 k1 k2 =⇒ k1 +k k3 k2 +k k3
4 k1 k2 =⇒ k1 ∗k k3 k2 ∗k k3
5 k 1k
Now we have structure and theories. We can analyze specific key
assignment schemes and construct models.
Dhruv Gairola (McMaster Univ.) Sabri and Khedri (FPS 2012) March 31, 2014 9 / 25
Akl-Taylor Technique
Each user assigned a key, ki where ki = κti (mod m).
κ is a private number
m is a product of 2 large primes
ti is a product of n primes
Key idea : one key can be derived from another.
Dhruv Gairola (McMaster Univ.) Sabri and Khedri (FPS 2012) March 31, 2014 10 / 25
Akl-Taylor Technique (2)
Simple math : ki = κti (mod m)
(Hint- j:=i) kj = κtj
(mod m)
(Hint- LHS) κtj
(mod m) = (κti
)tj /ti
(mod m)
(Hint- LHS) (κti
)tj /ti
(mod m) = k
tj /ti
i
Therefore kj = k
tj /ti
i
Conclusion (key derivation) : kj can be derived from ki iff tj is
divisible by ti
Dhruv Gairola (McMaster Univ.) Sabri and Khedri (FPS 2012) March 31, 2014 11 / 25
Akl-Taylor Example
Example : ki = κti (mod m), let m = 11 × 17 = 187, κ = 13
User i : ki = 135×7
(mod 187) = 21
User j : kj = 133×5×7
(mod 187) = 98
k
tj /ti
i = kj
213
(mod 187) = 98
Dhruv Gairola (McMaster Univ.) Sabri and Khedri (FPS 2012) March 31, 2014 12 / 25
Generalizing Akl-Taylor
The sever that distributes keys determines κ and keeps it private.
Once κ and m are fixed, ti determines ki . This is given by log ki
log κ = ti .
We can view ti as the key.
Can we generalize ti ? Yes!
ti = {2 × 3 × 7} can be represented as {{2 × 3 × 7}} ∈ P(P(Np)) for
a fixed κ and m.
Dhruv Gairola (McMaster Univ.) Sabri and Khedri (FPS 2012) March 31, 2014 13 / 25
Generalizing Akl-Taylor (2)
P = {p1 × ... × pn|∃(p1...pn|pi ∈ Np : ∀(pi , pj |pi , pj ∈ Np : i = j =⇒
pi = pj ))}
P = {p1 × ... × pn|set of product of different primes)
ti = {2 × 3 × 7} ∈ P
From example in prev slide, generalized tigen ∈ P(P(Np))
Dhruv Gairola (McMaster Univ.) Sabri and Khedri (FPS 2012) March 31, 2014 14 / 25
Generalizing Akl-Taylor (3)
Function rep :
rep : P → P(P(Np))
rep(p1 × ... × pn) = {{p1 × ... × pn}}
Each user is given a set of keys e.g., {{2 × 3 × 7}, {2 × 11 × 17}}.
Dhruv Gairola (McMaster Univ.) Sabri and Khedri (FPS 2012) March 31, 2014 15 / 25
Model for the key structure
F = (P(P(Np)), +k, ∗k, 0, 1). We have a model for key structure K!
∗k : P(P(Np)) × P(P(Np)) → P(P(Np))
A ∗k B = {a ∪ b : a ∈ A, b ∈ B}
+k : P(P(Np)) × P(P(Np)) → P(P(Np))
A +k B = A ∪ B
Dhruv Gairola (McMaster Univ.) Sabri and Khedri (FPS 2012) March 31, 2014 16 / 25
Model for the scheme structure
Generalized Akl-Taylor : S = (F, C, , a). Model for S.
In Akl-Taylor (C, ) is a tree but in generalized Akl-Taylor, (C, ) can
be a forest.
Dhruv Gairola (McMaster Univ.) Sabri and Khedri (FPS 2012) March 31, 2014 17 / 25
Generalized Akl-Taylor Usefulness
Useful if we need more than one key per user (e.g., user involved in
more than 1 key assignment scheme).
In Akl-Taylor, “one key can be derived from another” i.e., can we
show κti
d κtj ?
Use the relators d and which are present in our scheme S .
We can use the 5 theories defined in slide 9 to obtain interesting
properties in our Generalized scheme.
Dhruv Gairola (McMaster Univ.) Sabri and Khedri (FPS 2012) March 31, 2014 18 / 25
Chinese Remainder Theorem
Given r, s ∈ Z+ and a, b are coprime, there ∃N ∈ Z s.t.
N ≡ a(mod r) and N ≡ b(mod s).
We can find N using basic algebra.
Dhruv Gairola (McMaster Univ.) Sabri and Khedri (FPS 2012) March 31, 2014 19 / 25
Chinese Remainder Technique
Uses ideas from the solution procedure for chinese remainder theorem.
Key structure same as Akl-Taylor. Even ∗k, +k are defined the same.
However, we have k1 d k2 ⇔ k2 k1 (dual), unlike for Akl-Taylor
where d and are the same.
Dhruv Gairola (McMaster Univ.) Sabri and Khedri (FPS 2012) March 31, 2014 20 / 25
Verification of security properties
Properties can be verified :
Ability of user to get info intended for higher class.
Ability of using several keys to reveal info that can be revealed by using
another key.
Can use Prover9 to verify each property.
Dhruv Gairola (McMaster Univ.) Sabri and Khedri (FPS 2012) March 31, 2014 21 / 25
Verification Example
Six classes get assigned keys :
Part-time nurses : key(cpn) = k1 ∗k k2 ∗k k4
Overnight nurses : key(cnn) = k1 ∗k k3 ∗k k4
Full-time nurses : key(cfn) = k1 ∗k k4
Part-time doctors : key(cpd ) = k2 ∗k k4
Overnight doctors : key(cnd ) = k3 ∗k k4
Full-time doctors : key(cfd ) = k4
Property : any doctor can get info of any nurse in the same class.
(key(cpn) d key(cpd )) ∧ (key(cnn) d key(cnd )) ∧ (key(cfn) d
key(cfd ))
(k1 ∗k k2 ∗k k4 d k2 ∗k k4)∧(k1 ∗k k3 ∗k k4 d k3 ∗k k4)∧(k1 ∗k k4 d k4)
Prover9 can verify such properties (automated).
Dhruv Gairola (McMaster Univ.) Sabri and Khedri (FPS 2012) March 31, 2014 22 / 25
Conclusion
Analyse key assignment schemes using algebraic structures.
Generalize existing key assignment schemes using model.
Automate verification of security properties.
Future work : examine other key assignment schemes to assess
strengths and weaknesses.
Dhruv Gairola (McMaster Univ.) Sabri and Khedri (FPS 2012) March 31, 2014 23 / 25
References
“A Generic Algebraic Model for the Analysis of Cryptographic-Key
Assignment Schemes”, Sabri, Khedri, FPS (2012) pp. 62-77
“Algebraic Framework for the Specification and Analysis of
Cryptographic-Key Distribution”, Sabri, Khedri, Fundamenta
Informaticae 112 (2011) pp. 305335
http://conferences.telecom-
bretagne.eu/fps2012/program/slides/24.pdf
http://mathworld.wolfram.com/ChineseRemainderTheorem.html
Dhruv Gairola (McMaster Univ.) Sabri and Khedri (FPS 2012) March 31, 2014 24 / 25
Thank you.
Dhruv Gairola (McMaster Univ.) Sabri and Khedri (FPS 2012) March 31, 2014 25 / 25

More Related Content

PPTX
Pert 05 aplikasi clustering
PPTX
Backtraking pic&def
PDF
PDF
Output Units and Cost Function in FNN
PDF
Correlation clustering and community detection in graphs and networks
PDF
CSC446: Pattern Recognition (LN5)
PDF
PDF
A lattice-based consensus clustering
Pert 05 aplikasi clustering
Backtraking pic&def
Output Units and Cost Function in FNN
Correlation clustering and community detection in graphs and networks
CSC446: Pattern Recognition (LN5)
A lattice-based consensus clustering

What's hot (20)

PDF
Spectral clustering with motifs and higher-order structures
PDF
Engineering Data Science Objectives for Social Network Analysis
PDF
D E S I G N A N D A N A L Y S I S O F A L G O R I T H M S J N T U M O D E L...
PDF
11 Machine Learning Important Issues in Machine Learning
PDF
CSC446: Pattern Recognition (LN6)
PDF
A lattice-based consensus clustering
PPTX
Deep Learning Opening Workshop - Deep ReLU Networks Viewed as a Statistical M...
PDF
DS-MLR: Scaling Multinomial Logistic Regression via Hybrid Parallelism
PDF
Accelerating Metropolis Hastings with Lightweight Inference Compilation
PDF
Deep Learning Opening Workshop - Horseshoe Regularization for Machine Learnin...
PDF
CSMR11b.ppt
PDF
Daa chapter 3
PDF
Gate-Cs 2009
PDF
Hyperparameter optimization with approximate gradient
PDF
Deep Learning Opening Workshop - ProxSARAH Algorithms for Stochastic Composit...
PDF
Nearly optimal average case complexity of counting bicliques under seth
PDF
CSC446: Pattern Recognition (LN4)
PDF
Error Estimates for Multi-Penalty Regularization under General Source Condition
PDF
Interactive Latent Dirichlet Allocation
Spectral clustering with motifs and higher-order structures
Engineering Data Science Objectives for Social Network Analysis
D E S I G N A N D A N A L Y S I S O F A L G O R I T H M S J N T U M O D E L...
11 Machine Learning Important Issues in Machine Learning
CSC446: Pattern Recognition (LN6)
A lattice-based consensus clustering
Deep Learning Opening Workshop - Deep ReLU Networks Viewed as a Statistical M...
DS-MLR: Scaling Multinomial Logistic Regression via Hybrid Parallelism
Accelerating Metropolis Hastings with Lightweight Inference Compilation
Deep Learning Opening Workshop - Horseshoe Regularization for Machine Learnin...
CSMR11b.ppt
Daa chapter 3
Gate-Cs 2009
Hyperparameter optimization with approximate gradient
Deep Learning Opening Workshop - ProxSARAH Algorithms for Stochastic Composit...
Nearly optimal average case complexity of counting bicliques under seth
CSC446: Pattern Recognition (LN4)
Error Estimates for Multi-Penalty Regularization under General Source Condition
Interactive Latent Dirichlet Allocation
Ad

Similar to A Generic Algebraic Model for the Analysis of Cryptographic Key Assignment Schemes (20)

PPTX
Cryptography and its types and Number Theory .pptx
PPTX
Number theory and cryptography
PDF
BBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBB
PDF
PDF
A Public-Key Cryptosystem Based On Discrete Logarithm Problem over Finite Fie...
PDF
Cs8792 cns - Public key cryptosystem (Unit III)
DOCX
Senior Research Final Draft3
PDF
1508.07756v1
PDF
Rsa documentation
PPT
Public key cryptography and RSA
PDF
LITTLE DRAGON TWO: AN EFFICIENT MULTIVARIATE PUBLIC KEY CRYPTOSYSTEM
PPTX
Cryptography and Network security # Lecture 6
PPTX
RSA final notation change2
DOCX
Network Security
PDF
Evaluation of Performance Characteristics of Polynomial based and Lattice bas...
PDF
A new RSA public key encryption scheme with chaotic maps
PPT
Other public key systems
Cryptography and its types and Number Theory .pptx
Number theory and cryptography
BBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBB
A Public-Key Cryptosystem Based On Discrete Logarithm Problem over Finite Fie...
Cs8792 cns - Public key cryptosystem (Unit III)
Senior Research Final Draft3
1508.07756v1
Rsa documentation
Public key cryptography and RSA
LITTLE DRAGON TWO: AN EFFICIENT MULTIVARIATE PUBLIC KEY CRYPTOSYSTEM
Cryptography and Network security # Lecture 6
RSA final notation change2
Network Security
Evaluation of Performance Characteristics of Polynomial based and Lattice bas...
A new RSA public key encryption scheme with chaotic maps
Other public key systems
Ad

More from dhruvgairola (8)

PPTX
Differences bet. versions of UML diagrams.
PPTX
Beginning jQuery
PPTX
Beginning CSS.
PDF
A Theory of the Learnable; PAC Learning
PPTX
Discussion : Info sharing across private DBs
PDF
PRIMES is in P
PPTX
PPTX
Potters wheel
Differences bet. versions of UML diagrams.
Beginning jQuery
Beginning CSS.
A Theory of the Learnable; PAC Learning
Discussion : Info sharing across private DBs
PRIMES is in P
Potters wheel

Recently uploaded (20)

PDF
cuic standard and advanced reporting.pdf
PDF
Network Security Unit 5.pdf for BCA BBA.
PDF
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
PDF
Building Integrated photovoltaic BIPV_UPV.pdf
PDF
Agricultural_Statistics_at_a_Glance_2022_0.pdf
PDF
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
PPT
Teaching material agriculture food technology
PDF
Encapsulation_ Review paper, used for researhc scholars
PPTX
MYSQL Presentation for SQL database connectivity
PDF
Chapter 3 Spatial Domain Image Processing.pdf
PDF
Unlocking AI with Model Context Protocol (MCP)
PDF
Dropbox Q2 2025 Financial Results & Investor Presentation
PDF
Review of recent advances in non-invasive hemoglobin estimation
PDF
The Rise and Fall of 3GPP – Time for a Sabbatical?
PDF
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
DOCX
The AUB Centre for AI in Media Proposal.docx
PDF
Spectral efficient network and resource selection model in 5G networks
PDF
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
PPTX
20250228 LYD VKU AI Blended-Learning.pptx
PDF
Mobile App Security Testing_ A Comprehensive Guide.pdf
cuic standard and advanced reporting.pdf
Network Security Unit 5.pdf for BCA BBA.
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
Building Integrated photovoltaic BIPV_UPV.pdf
Agricultural_Statistics_at_a_Glance_2022_0.pdf
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
Teaching material agriculture food technology
Encapsulation_ Review paper, used for researhc scholars
MYSQL Presentation for SQL database connectivity
Chapter 3 Spatial Domain Image Processing.pdf
Unlocking AI with Model Context Protocol (MCP)
Dropbox Q2 2025 Financial Results & Investor Presentation
Review of recent advances in non-invasive hemoglobin estimation
The Rise and Fall of 3GPP – Time for a Sabbatical?
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
The AUB Centre for AI in Media Proposal.docx
Spectral efficient network and resource selection model in 5G networks
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
20250228 LYD VKU AI Blended-Learning.pptx
Mobile App Security Testing_ A Comprehensive Guide.pdf

A Generic Algebraic Model for the Analysis of Cryptographic Key Assignment Schemes

  • 1. A Generic Algebraic Model for the Analysis of Cryptographic-Key Assignment Schemes Sabri and Khedri (FPS 2012) Dhruv Gairola Algebraic Methods in CS, Ridha Khedri gairold@mcmaster.ca ; dhruvgairola.blogspot.ca March 31, 2014 Dhruv Gairola (McMaster Univ.) Sabri and Khedri (FPS 2012) March 31, 2014 1 / 25
  • 2. Overview 1 Problem and Motivation 2 Brief Mathematical Background 3 Proposed structures 4 Akl-Taylor Technique 5 Generalizing Akl-Taylor 6 Chinese Remainder Technique 7 Verification of security properties 8 Conclusion Dhruv Gairola (McMaster Univ.) Sabri and Khedri (FPS 2012) March 31, 2014 2 / 25
  • 3. Problem and Motivation Problem : Many key assignment schemes. How to evaluate them? Crampton et. Al. advocate the adoption of generic key assignment model. Proposed Solution : Algebraic model to analyse these schemes. Benefit : asserting correctness in preserving confidentiality of info; better understanding of key assignment. Dhruv Gairola (McMaster Univ.) Sabri and Khedri (FPS 2012) March 31, 2014 3 / 25
  • 4. Brief Mathematical Background Semigroup : (S, ·) where · is an associative binary operator. Semiring : (S, +, ·) (S, +) is a commutative semigroup with identity 0s (S, ·) is a semigroup with identity 1s · distributes over + on the left and right 0s is absorbing in (S, ·) i.e., (∀x|x ∈ S : 0s · x = x · 0s = 0s) Dhruv Gairola (McMaster Univ.) Sabri and Khedri (FPS 2012) March 31, 2014 4 / 25
  • 5. Brief Mathematical Background (2) Poset : (C, ) where is a partial order relation (reflexive, transitive, antisymmetric). Antisymmetry : x y ∧ y x =⇒ x = y Quasi-ordered set : is only reflexive and transitive. Dhruv Gairola (McMaster Univ.) Sabri and Khedri (FPS 2012) March 31, 2014 5 / 25
  • 6. Proposed key structure Key structure : K = (K, +k, ∗k, 0k, 1k) Interpretation : +k and ∗k can be seen operators which combining keys. Can represent Cesar cipher, Vigenere cipher, Boyd’s RSA cipher using the structure. Dhruv Gairola (McMaster Univ.) Sabri and Khedri (FPS 2012) March 31, 2014 6 / 25
  • 7. Proposed scheme structure Key assignment scheme : S = (K, C, , a) K is key structure (C, ) is poset a ⊆ K → C is an onto function (assignment function) C is the set of security classes k1 d k2 : info revealed by k1 can also be revealed by k2. Dhruv Gairola (McMaster Univ.) Sabri and Khedri (FPS 2012) March 31, 2014 7 / 25
  • 8. Proposed scheme structure (2) Given d (key derivation relation) S is said to be : Cluster secure : low class keys cannot reveal info of higher classes Class secure : cluster secure and (C, ) is a chain User secure : scheme contains independent keys s.t. no key can reveal info that can be revealed from other keys We have our structure. What about theories? (Axioms are obvious) Dhruv Gairola (McMaster Univ.) Sabri and Khedri (FPS 2012) March 31, 2014 8 / 25
  • 9. Proposed scheme structure (3) Theories ( is a quasi-order relation): 1 k1 ≤k k2 =⇒ k1 k2 2 k1 ∗k k2 k2 3 k1 k2 =⇒ k1 +k k3 k2 +k k3 4 k1 k2 =⇒ k1 ∗k k3 k2 ∗k k3 5 k 1k Now we have structure and theories. We can analyze specific key assignment schemes and construct models. Dhruv Gairola (McMaster Univ.) Sabri and Khedri (FPS 2012) March 31, 2014 9 / 25
  • 10. Akl-Taylor Technique Each user assigned a key, ki where ki = κti (mod m). κ is a private number m is a product of 2 large primes ti is a product of n primes Key idea : one key can be derived from another. Dhruv Gairola (McMaster Univ.) Sabri and Khedri (FPS 2012) March 31, 2014 10 / 25
  • 11. Akl-Taylor Technique (2) Simple math : ki = κti (mod m) (Hint- j:=i) kj = κtj (mod m) (Hint- LHS) κtj (mod m) = (κti )tj /ti (mod m) (Hint- LHS) (κti )tj /ti (mod m) = k tj /ti i Therefore kj = k tj /ti i Conclusion (key derivation) : kj can be derived from ki iff tj is divisible by ti Dhruv Gairola (McMaster Univ.) Sabri and Khedri (FPS 2012) March 31, 2014 11 / 25
  • 12. Akl-Taylor Example Example : ki = κti (mod m), let m = 11 × 17 = 187, κ = 13 User i : ki = 135×7 (mod 187) = 21 User j : kj = 133×5×7 (mod 187) = 98 k tj /ti i = kj 213 (mod 187) = 98 Dhruv Gairola (McMaster Univ.) Sabri and Khedri (FPS 2012) March 31, 2014 12 / 25
  • 13. Generalizing Akl-Taylor The sever that distributes keys determines κ and keeps it private. Once κ and m are fixed, ti determines ki . This is given by log ki log κ = ti . We can view ti as the key. Can we generalize ti ? Yes! ti = {2 × 3 × 7} can be represented as {{2 × 3 × 7}} ∈ P(P(Np)) for a fixed κ and m. Dhruv Gairola (McMaster Univ.) Sabri and Khedri (FPS 2012) March 31, 2014 13 / 25
  • 14. Generalizing Akl-Taylor (2) P = {p1 × ... × pn|∃(p1...pn|pi ∈ Np : ∀(pi , pj |pi , pj ∈ Np : i = j =⇒ pi = pj ))} P = {p1 × ... × pn|set of product of different primes) ti = {2 × 3 × 7} ∈ P From example in prev slide, generalized tigen ∈ P(P(Np)) Dhruv Gairola (McMaster Univ.) Sabri and Khedri (FPS 2012) March 31, 2014 14 / 25
  • 15. Generalizing Akl-Taylor (3) Function rep : rep : P → P(P(Np)) rep(p1 × ... × pn) = {{p1 × ... × pn}} Each user is given a set of keys e.g., {{2 × 3 × 7}, {2 × 11 × 17}}. Dhruv Gairola (McMaster Univ.) Sabri and Khedri (FPS 2012) March 31, 2014 15 / 25
  • 16. Model for the key structure F = (P(P(Np)), +k, ∗k, 0, 1). We have a model for key structure K! ∗k : P(P(Np)) × P(P(Np)) → P(P(Np)) A ∗k B = {a ∪ b : a ∈ A, b ∈ B} +k : P(P(Np)) × P(P(Np)) → P(P(Np)) A +k B = A ∪ B Dhruv Gairola (McMaster Univ.) Sabri and Khedri (FPS 2012) March 31, 2014 16 / 25
  • 17. Model for the scheme structure Generalized Akl-Taylor : S = (F, C, , a). Model for S. In Akl-Taylor (C, ) is a tree but in generalized Akl-Taylor, (C, ) can be a forest. Dhruv Gairola (McMaster Univ.) Sabri and Khedri (FPS 2012) March 31, 2014 17 / 25
  • 18. Generalized Akl-Taylor Usefulness Useful if we need more than one key per user (e.g., user involved in more than 1 key assignment scheme). In Akl-Taylor, “one key can be derived from another” i.e., can we show κti d κtj ? Use the relators d and which are present in our scheme S . We can use the 5 theories defined in slide 9 to obtain interesting properties in our Generalized scheme. Dhruv Gairola (McMaster Univ.) Sabri and Khedri (FPS 2012) March 31, 2014 18 / 25
  • 19. Chinese Remainder Theorem Given r, s ∈ Z+ and a, b are coprime, there ∃N ∈ Z s.t. N ≡ a(mod r) and N ≡ b(mod s). We can find N using basic algebra. Dhruv Gairola (McMaster Univ.) Sabri and Khedri (FPS 2012) March 31, 2014 19 / 25
  • 20. Chinese Remainder Technique Uses ideas from the solution procedure for chinese remainder theorem. Key structure same as Akl-Taylor. Even ∗k, +k are defined the same. However, we have k1 d k2 ⇔ k2 k1 (dual), unlike for Akl-Taylor where d and are the same. Dhruv Gairola (McMaster Univ.) Sabri and Khedri (FPS 2012) March 31, 2014 20 / 25
  • 21. Verification of security properties Properties can be verified : Ability of user to get info intended for higher class. Ability of using several keys to reveal info that can be revealed by using another key. Can use Prover9 to verify each property. Dhruv Gairola (McMaster Univ.) Sabri and Khedri (FPS 2012) March 31, 2014 21 / 25
  • 22. Verification Example Six classes get assigned keys : Part-time nurses : key(cpn) = k1 ∗k k2 ∗k k4 Overnight nurses : key(cnn) = k1 ∗k k3 ∗k k4 Full-time nurses : key(cfn) = k1 ∗k k4 Part-time doctors : key(cpd ) = k2 ∗k k4 Overnight doctors : key(cnd ) = k3 ∗k k4 Full-time doctors : key(cfd ) = k4 Property : any doctor can get info of any nurse in the same class. (key(cpn) d key(cpd )) ∧ (key(cnn) d key(cnd )) ∧ (key(cfn) d key(cfd )) (k1 ∗k k2 ∗k k4 d k2 ∗k k4)∧(k1 ∗k k3 ∗k k4 d k3 ∗k k4)∧(k1 ∗k k4 d k4) Prover9 can verify such properties (automated). Dhruv Gairola (McMaster Univ.) Sabri and Khedri (FPS 2012) March 31, 2014 22 / 25
  • 23. Conclusion Analyse key assignment schemes using algebraic structures. Generalize existing key assignment schemes using model. Automate verification of security properties. Future work : examine other key assignment schemes to assess strengths and weaknesses. Dhruv Gairola (McMaster Univ.) Sabri and Khedri (FPS 2012) March 31, 2014 23 / 25
  • 24. References “A Generic Algebraic Model for the Analysis of Cryptographic-Key Assignment Schemes”, Sabri, Khedri, FPS (2012) pp. 62-77 “Algebraic Framework for the Specification and Analysis of Cryptographic-Key Distribution”, Sabri, Khedri, Fundamenta Informaticae 112 (2011) pp. 305335 http://conferences.telecom- bretagne.eu/fps2012/program/slides/24.pdf http://mathworld.wolfram.com/ChineseRemainderTheorem.html Dhruv Gairola (McMaster Univ.) Sabri and Khedri (FPS 2012) March 31, 2014 24 / 25
  • 25. Thank you. Dhruv Gairola (McMaster Univ.) Sabri and Khedri (FPS 2012) March 31, 2014 25 / 25