首页> 外文会议>2010 Network and distributed system security symposium >Defeating Vanish with Low-Cost Sybil Attacks Against Large DHTs
【24h】

Defeating Vanish with Low-Cost Sybil Attacks Against Large DHTs

机译:通过针对大型DHT的低成本Sybil攻击击败消失

获取原文
获取原文并翻译 | 示例

摘要

Researchers at the University of Washington recently proposedrnVanish [20], a system for creating messages that automaticallyrn"self-destruct" after a period of time. Vanishrnworks by encrypting each message with a random key andrnstoring shares of the key in a large, public distributed hashrntable (DHT). DHTs expunge data older than a certain age;rnafter this happens to the key shares, the key is permanentlyrnlost, and the encrypted data is permanently unreadable. Vanishrnis an interesting approach to an important privacy problem,rnbut, in its current form, it is insecure. In this paper,rnwe defeat the deployed Vanish implementation, explain howrnthe original paper's security analysis is flawed, and drawrnlessons for future system designs.rnWe present two Sybil attacks against the current Vanishrnimplementation, which stores its encryption keys in thernmillion-node Vuze BitTorrent DHT. These attacks work byrncontinuously crawling the DHT and saving each stored valuernbefore it ages out. They can efficiently recover keys for morernthan 99% of Vanish messages. We show that the dominantrncost of these attacks is network data transfer, not memory usagernas the Vanish authors expected, and that the total cost isrntwo orders of magnitude less than they estimated. While wernconsider potential defenses, we conclude that public DHTsrnlike Vuze probably cannot provide strong security for Vanish.
机译:华盛顿大学的研究人员最近提出了rnVanish [20],这是一种用于创建消息的系统,该消息在一段时间后会自动“自我毁灭”。 Vanishrn通过使用随机密钥加密每个消息并在大型公共分布式哈希表(DHT)中存储密钥份额来进行工作。 DHT清除了超过一定期限的数据;在密钥共享发生这种情况之后,密钥将永久丢失,并且加密的数据将永远无法读取。 Vanishrnis是解决重要隐私问题的一种有趣方法,但是以目前的形式,它是不安全的。在本文中,我们将挫败已部署的Vanish实现,解释原始文件的安全性分析是如何存在缺陷的,并为将来的系统设计提供经验教训。我们针对目前的Vanishrnimplementation提出了两次Sybil攻击,将其加密密钥存储在数百万个节点的Vuze BitTorrent DHT中。这些攻击通过不间断地爬行DHT并在其过期之前保存每个存储的值来起作用。他们可以有效地恢复超过99%的消失消息的密钥。我们表明,这些攻击的主要成本是网络数据传输,而不是Vanish作者所期望的内存使用量,并且总成本比他们的估计值低两个数量级。尽管我们在考虑潜在的防御措施,但我们得出的结论是,像Vuze这样的公共DHT可能无法为Vanish提供强大的安全性。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号