CoKey: Fast Token-based Cooperative Cryptography
Title | CoKey: Fast Token-based Cooperative Cryptography |
Publication Type | Conference Paper |
Year of Publication | 2016 |
Authors | Horsch, Julian, Wessel, Sascha, Eckert, Claudia |
Conference Name | Proceedings of the 32Nd Annual Conference on Computer Security Applications |
Publisher | ACM |
Conference Location | New York, NY, USA |
ISBN Number | 978-1-4503-4771-6 |
Keywords | Asymmetric Encryption, composability, cooperative cryptography, cryptographic token, data confidentiality, full disk encryption, linux operating systems security, Metrics, pubcrawl, Resiliency, USB armory, USB token |
Abstract | Keys for symmetric cryptography are usually stored in RAM and therefore susceptible to various attacks, ranging from simple buffer overflows to leaks via cold boot, DMA or side channels. A common approach to mitigate such attacks is to move the keys to an external cryptographic token. For low-throughput applications like asymmetric signature generation, the performance of these tokens is sufficient. For symmetric, data-intensive use cases, like disk encryption on behalf of the host, the connecting interface to the token often is a serious bottleneck. In order to overcome this problem, we present CoKey, a novel concept for partially moving symmetric cryptography out of the host into a trusted detachable token. CoKey combines keys from both entities and securely encrypts initialization vectors on the token which are then used in the cryptographic operations on the host. This forces host and token to cooperate during the whole encryption and decryption process. Our concept strongly and efficiently binds encrypted data on the host to the specific token used for their encryption, while still allowing for fast operation. We implemented the concept using Linux hosts and the USB armory, a USB thumb drive sized ARM computer, as detachable crypto token. Our detailed performance evaluation shows that our prototype is easily fast enough even for data-intensive and performance-critical use cases like full disk encryption, thus effectively improving security for symmetric cryptography in a usable way. |
URL | http://doi.acm.org/10.1145/2991079.2991117 |
DOI | 10.1145/2991079.2991117 |
Citation Key | horsch_cokey:_2016 |