Crypto-PAn

From HandWiki
Short description: Cryptographic algorithm for anonymizing IP addresses

Crypto-PAn (Cryptography-based Prefix-preserving Anonymization[1]) is a cryptographic algorithm for anonymizing IP addresses while preserving their subnet structure. That is, the algorithm encrypts any string of bits [math]\displaystyle{ x }[/math] to a new string [math]\displaystyle{ E_k(x) }[/math], while ensuring that for any pair of bit-strings [math]\displaystyle{ x, y }[/math] which share a common prefix of length [math]\displaystyle{ p }[/math], their images [math]\displaystyle{ E_k(x), E_k(y) }[/math] also share a common prefix of length [math]\displaystyle{ p }[/math]. A mapping with this property is called prefix-preserving.[2] In this way, Crypto-PAn is a kind of format-preserving encryption.

The mathematical outline of Crypto-PAn was developed by Jinliang Fan, Jun Xu, Mostafa H. Ammar (all of Georgia Tech) and Sue B. Moon.[3] It was inspired[3] by the IP address anonymization done by Greg Minshall's TCPdpriv program circa 1996.

Algorithm

A diagram of the Crypto-PAn algorithm as a tree descent. The nodes of the tree are colored according to a pseudo-random function of the key material (not shown). The arrows show the descent corresponding to the input bit-string "010". That descent's nodes are colored "001"; the anonymized output string is thus "011".

Intuitively, Crypto-PAn encrypts a bit-string of length [math]\displaystyle{ n }[/math] by descending a binary tree of depth [math]\displaystyle{ n }[/math], one step for each bit in the string. Each of the binary tree's [math]\displaystyle{ 2^n - 1 }[/math] non-leaf nodes has been given a value of "0" or "1", according to some pseudo-random function seeded by the encryption key. At each step [math]\displaystyle{ i }[/math] of the descent, the algorithm computes the [math]\displaystyle{ i }[/math]th bit of the output by XORing the [math]\displaystyle{ i }[/math]th bit of the input with the value of the current node.

The reference implementation[1] takes a 256-bit key. The first 128 bits of the key material are used to initialize an AES-128 cipher in ECB mode. The second 128 bits of the key material are encrypted with the cipher to produce a 128-bit padding block [math]\displaystyle{ \mathit{pad} }[/math].

Given a 32-bit IPv4 address [math]\displaystyle{ x }[/math], the reference implementation performs the following operation for each bit [math]\displaystyle{ x_i }[/math] of the input: Compose a 128-bit input block [math]\displaystyle{ I_i = x_{[0,i)} \mathit{pad}_{[i,128)} }[/math]. Encrypt [math]\displaystyle{ I_i }[/math] with the cipher to produce a 128-bit output block [math]\displaystyle{ O_i }[/math]. Finally, XOR the [math]\displaystyle{ i }[/math]th bit of that output block with the [math]\displaystyle{ i }[/math]th bit of [math]\displaystyle{ x }[/math], and append the result — [math]\displaystyle{ x_i \oplus O_{i,i} }[/math] — onto the output bitstring. Once all 32 bits of the output bitstring have been computed, the result is returned as the anonymized output [math]\displaystyle{ E_k(x) }[/math] which corresponds to the original input [math]\displaystyle{ x }[/math].

The reference implementation does not implement deanonymization; that is, it does not provide a function [math]\displaystyle{ D_k }[/math] such that [math]\displaystyle{ D_k(E_k(x)) = x }[/math]. However, decryption can be implemented almost identically to encryption, just making sure to compose each input block [math]\displaystyle{ I_i = x_{[0,i)} \mathit{pad}_{[i,128)} }[/math] using the plaintext bits of [math]\displaystyle{ x }[/math] decrypted so far, rather than using the ciphertext bits: [math]\displaystyle{ I_i \neq E_k(x)_{[0,i)} \mathit{pad}_{[i,128)} }[/math].

The reference implementation does not implement encryption of bitstrings of lengths other than 32; for example, it does not support the anonymization of 128-bit IPv6 addresses. In practice, the 32-bit Crypto-PAn algorithm can be used in "ECB mode" itself, so that a 128-bit string [math]\displaystyle{ x_{[0,128)} }[/math] might be anonymized as [math]\displaystyle{ E_k(x_{[0,32)}) E_k(x_{[32,64)}) E_k(x_{[64,96)}) E_k(x_{[96,128)}) }[/math]. This approach preserves the prefix structure of the 128-bit string, but does leak information about the lower-order chunks; for example, an anonymized IPv6 address consisting of the same 32-bit ciphertext repeated four times is likely the special address ::, which thus reveals the encryption of the 32-bit plaintext 0000:0000:0000:0000.

In principle, the reference implementation's approach (building 128-bit input blocks [math]\displaystyle{ I_i }[/math]) can be extended up to 128 bits. Beyond 128 bits, a different approach would have to be used; but the fundamental algorithm (descending a binary tree whose nodes are marked with a pseudo-random function of the key material) remains valid.

Implementations

Crypto-PAn's C++ reference implementation was written in 2002 by Jinliang Fan.[1]

In 2005, David Stott of Lucent made some improvements to the C++ reference implementation, including a deanonymization routine.[4] Stott also observed[4] that the algorithm preserves prefix structure while destroying suffix structure; running the Crypto-PAn algorithm on a bit-reversed string will preserve any existing suffix structure while destroying prefix structure. Thus, running the algorithm first on the input string, and then again on the bit-reversed output of the first pass, destroys both prefix and suffix structure. (However, once the suffix structure has been destroyed, destroying the remaining prefix structure can be accomplished far more efficiently by simply feeding the non-reversed output to AES-128 in ECB mode. There is no particular reason to reuse Crypto-PAn in the second pass.)

A Perl implementation was written in 2005 by John Kristoff.[5] Python[6] and Ruby[7] implementations also exist.

Versions of the Crypto-PAn algorithm are used for data anonymization in many applications, including NetSniff[8] and CAIDA's CoralReef library.[9]

References

  1. 1.0 1.1 1.2 Jinliang Fan (April 2002). "Crypto-PAn.1.0.tar.gz (reference implementation)". https://www.cc.gatech.edu/computing/Telecomm/projects/cryptopan/. 
  2. Jun Xu; Jinliang Fan; Mostafa H. Ammar; Sue B. Moon (2001). "On the Design and Performance of Prefix-Preserving IP Traffic Trace Anonymization". Proceedings of the First ACM SIGCOMM Workshop on Internet Measurement. http://conferences.sigcomm.org/imc/2001/imw2001-papers/69.pdf. Retrieved 2018-09-07. 
  3. 3.0 3.1 Jun Xu; Jinliang Fan; Mostafa H. Ammar; Sue B. Moon (2002). "Prefix-preserving IP address anonymization: Measurement-based security evaluation and a new cryptography-based scheme". Computer Networks 46 (2): 253–272. doi:10.1016/j.comnet.2004.03.033. ISBN 0769518567. 
  4. 4.0 4.1 David Stott (August 2005). "Lucent's Extensions to Cryptopan". https://www.cc.gatech.edu/computing/Networking/projects/cryptopan/lucent.shtml. 
  5. John Kristoff (November 2005). "IP-Anonymous 0.04". https://metacpan.org/pod/IP::Anonymous. 
  6. Michael Bauer (2013-08-26). "pycryptopan 0.01d". Python Package Index. https://pypi.org/project/pycryptopan/. 
  7. Peter Wood (2016-09-25). "CryptoPAn 0.1.0". rubygems.org. https://rubygems.org/gems/CryptoPAn/versions/0.1.0. 
  8. "NetSniff / IP Address Anonymisation Modes / Crypto-PAn". 2007-06-26. http://caia.swin.edu.au/ice/tools/netsniff/anonymisation.html. 
  9. "Documentation for the C Coral API / IP address anonymization". 29 March 2000. http://www.caida.org/tools/measurement/coralreef/doc/doc/libcoral-c.html.