Why Cryptosystems Fail Ross Anderson Proceeding of the 1 st ACM Conference on Computer and Communications Security, 1993 2010-20784 김학봉.

Slides:



Advertisements
Similar presentations
Why Cryptosystems Fail Nick Feamster CS 6262 Spring 2009.
Advertisements

ASYCUDA Overview … a summary of the objectives of ASYCUDA implementation projects and features of the software for the Customs computer system.
Overview of IS Controls, Auditing, and Security Fall 2005.
Auditing Concepts.
Auditing Computer Systems
Smart Grid - Cyber Security Small Rural Electric George Gamble Black & Veatch
Lecture 1: Overview modified from slides of Lawrie Brown.
Chapter 10  ATM 1 Automatic Teller Machines. Chapter 10  ATM 2 Automatic Teller Machines  “…one of the most influential technological innovations of.
1 Certification Chapter 14, Storey. 2 Topics  What is certification?  Various forms of certification  The process of system certification (the planning.
Chapter 8 Information Systems Development & Acquisition
Chapter 9 Banking and Book keeping Protecting yourself from you.
Chapter 10 Boundary Controls. Cryptographic Controls Cryptology is the science of secret codes Cryptography deals with systems for transforming data into.
Why Cryptosystems Fail?
Why cryptosystems Fail Ross Anderson Proceeding of the 1 st ACM Conference on Computer and Communications Security, 1993 SSR Jiyeon Park.
TEL382 Greene Chapter /27/09 2 Outline What is a Disaster? Disaster Strikes Without Warning Understanding Roles and Responsibilities Preparing For.
Lecture 11 Reliability and Security in IT infrastructure.
Problem with Software Requirements are complex The client does not know the functional requirements in advance Requirements may be changing Technology.
Introduction to Systems Analysis and Design
Chapter 2 A Strategy for the Appraisal of Public Sector Investments.
Why Cryptosystems Fail Ross Anderson Presented by Su Zhang 1.
Software Life Cycle Model
Network security policy: best practices
Introduction to Computer Technology
Systems Life Cycle A summary of what needs to be done.
1 Introduction to Security and Cryptology Enterprise Systems DT211 Denis Manley.
Air Force Association (AFA) 1. 1.Access Control 2.Four Steps to Access 3.How Does it Work? 4.User and Guest Accounts 5.Administrator Accounts 6.Threat.
1.Database plan 2.Information systems plan 3.Technology plan 4.Business strategy plan 5.Enterprise analysis Which of the following serves as a road map.
Introduction to Systems Analysis and Design Trisha Cummings.
Will You Ever Use Your ATM Again? Presented by: Bob Clary Carolyn McLellan Jane Mosher Karen Weil-Yates.
The Islamic University of Gaza
Use Cases 2 ENGR ♯10 Peter Andreae
Information Systems Security Computer System Life Cycle Security.
Why Cryptosystems Fail Prepared by Geoffrey Foote CSC 593 Secure Software Engineering Seminar Spring Semester 2006 Instructors: Dr. Charles Frank Dr. James.
1 IT Project – Project Lifecycle, methodologies, tools, resources and other issues.
1 Why Cryptosystems Fail Ross Anderson University Computer Laboratory Cambridge
©Ian Sommerville 2004Software Engineering, 7th edition. Chapter 26 Slide 1 Software cost estimation 1.
 CS 5380 Software Engineering Chapter 8 Testing.
Information Systems Security Operational Control for Information Security.
Information Security Antipatterns in Software Requriements Engineering Miroslav Kis Presented by Liping Cai.
Chapter 1 Overview The NIST Computer Security Handbook defines the term Computer Security as:
Week 10-11c Attacks and Malware III. Remote Control Facility distinguishes a bot from a worm distinguishes a bot from a worm worm propagates itself and.
©Ian Sommerville 2004Software Engineering, 7th edition. Chapter 20 Slide 1 Critical systems development 3.
The Role of Experience in Software Testing Practice Zahra Molaei Soheil Hedayatitezengi Comp 587 Prof. Lingard 1 of 21.
API-Level Attacks on Embedded Systems By Mike Bond and Ross Anderson “… by presenting valid commands to the security processor, but in an unexpected sequence,
How to Satisfy Reviewer B and Other Thoughts on the Publication Process: Reviewers’ Perspectives Don Roy Past Editor, Marketing Management Journal.
Business Functions, Processes, and Data Requirements
SECURITY OF DATA By: ADRIAN PERHAM. Issues of privacy; Threats to IT systems; Data integrity; Standard clerical procedures; Security measures taken to.
©Ian Sommerville 2004Software Engineering Case Studies Slide 1 The Internet Worm Compromising the availability and reliability of systems through security.
Lecture slides prepared for “Computer Security: Principles and Practice”, 3/e, by William Stallings and Lawrie Brown, Chapter 1 “Overview”. © 2016 Pearson.
Mario Čagalj Sveučilište u Splitu 2014/15. Sigurnost računala i podataka.
CHAPTER 2 TYPES OF BUSINESS INFORMATION SYSTEM. INTRODUCTION Information System support business operations by processing data related to business operation.
CSCE 548 Secure Software Development Security Operations.
Kathy Corbiere Service Delivery and Performance Commission
CS223: Software Engineering Lecture 2: Introduction to Software Engineering.
Why Cryptosystems Fail R. Anderson, Proceedings of the 1st ACM Conference on Computer and Communications Security, 1993 Reviewed by Yunkyu Sung
HNDIT23082 Lecture 09:Software Testing. Validations and Verification Validation and verification ( V & V ) is the name given to the checking and analysis.
A brief look at the components that make up the system life cycle.
Welcome to Software Project Management. CONVENTIONAL SOFTWARE MANAGEMENT The BEST and WORST thing about software is its flexibility. 1.Software development.
Chapter 16 – Technological Development Technological Development Employees, managers and organisations, as well as the population in general, take for.
LINUX Presented By Parvathy Subramanian. April 23, 2008LINUX, By Parvathy Subramanian2 Agenda ► Introduction ► Standard design for security systems ►
“The Role of Experience in Software Testing Practice” A Review of the Article by Armin Beer and Rudolf Ramler By Jason Gero COMP 587 Prof. Lingard Spring.
Computer Security Innovation IMHO Presented for your consideration by: Fred Seigneur.
Learning Intention Security of Information. Why protect files? To prevent unauthorised access to confidential information To prevent virus/corruption.
EMV Operation and Attacks Tyler Moore CS7403, University of Tulsa Reading: Anderson Security Engineering, Ch (136—138), (328—343) Papers.
Getting Ready for the NOCTI test April 30, Study checklist #1 Analyze Programming Problems and Flowchart Solutions Study Checklist.
Core Concepts of ACCOUNTING INFORMATION SYSTEMS Moscove, Simkin & Bagranoff John Wiley & Sons, Inc. Developed by: S. Bhattacharya, Ph.D. Florida Atlantic.
CS457 Introduction to Information Security Systems
Why Cryptosystems Fail Ross Anderson University Computer Laboratory
Why Cryptosystems Fail
Lecture 09:Software Testing
Presentation transcript:

Why Cryptosystems Fail Ross Anderson Proceeding of the 1 st ACM Conference on Computer and Communications Security, 김학봉

2/23 Introduction  Information on how cryptosystems fail hard to get due to secrecy  This paper surveys the failure modes of ATM in order to discover out the information After government, the next biggest application is in banking  It turns out that the threat model was wrong Most frauds were not caused by cryptanalysis or other technical attacks But by implementation errors and management failures  Alternative models are analyzed which we might usefully import into the security domain Safety critical systems

3/23 Limitation of Cryptology  No public feedback about how cryptographic systems fail Their major user have traditionally been government agencies, which are very secretive about their mistakes Difference with most other engineering − The flying community has a strong and institutional learning mechanism − If an aircraft crashes..  A typical example – phantom withdrawals Nonetheless customers did not withdraw money from an account, there is the withdrawal record on the account

4/23 Outline  Introduction  How ATM fraud takes place Simple attacks Complex attacks Discussion  The wider implications Why the threat model was wrong Confirmation of our analysis  A new security paradigm  Conclusion

5/23 Simple Attacks (1)  From inside (by bank staff) Issuing extra cards Recording customer’s PIN and account number, counterfeited cards Using cards which can withdraw money from any customer accounts  From outside Observing customers’ PINs standing in ATM queues − It can be done because the full account number is printed on the ATM ticket Recording a ‘pay’ response from the bank and keeping on replaying it until the machine is empty

6/23 Simple Attacks (2)  From outside Postal interception − 30% of all UK payment card losses Test transaction − Outputting 10 banknotes when a 14 digit sequence is entered False terminal − Collecting customer card and PIN data  Using flaws on PIN Offline ATMs used simple PIN checking logic Encrypted PINs are written to a file or the card strip

7/23 Outline  Introduction  How ATM fraud takes place Simple attacks Complex attacks Discussion  The wider implications Why the threat model was wrong Confirmation of our analysis  A new security paradigm  Conclusion

8/23  Keys used to encrypt PIN key derive the PIN from the account number Terminal key encrypts the sensitive data to a terminal (ATM) Working key encrypts the sensitive data between two servers Zone key encrypts working key  The standard approach is to use a security module The module is a PC in a safe All the bank’s key & PINs are in encrypted form, so that mainframe programmers only ever see a encrypted string How ATM Encryption Works User PIN key ATM terminal key ATM terminal key Bank ABank B zone key working key The security of the system depends on keeping the PIN key absolutely secret

9/23 Problems from Not Using a Hardware of Encryption Products  Reasons for not using the hardware Expensive Difficult and time-consuming to install ‘buy-IBM-or-else’ policy  Solutions Software level implementation  Caused problems PIN key can be found without too much effort by system programmer

10/23 Problems with Encryption Products (1)  Bad security products Trapdoor − A software-based hidden entrance to a computer system Weak parameter used to make keys Physically accessibility Back up in wrong place  Sloppy operating procedures even good products is purchased Ignoring error messages Loose key management − Giving keys to outside firms or maintenance engineers − Kept in open files

11/23 Problems with Encryption Products (2)  Cryptanalysis (one of the less likely threats to banking systems) Some banks are still using home-grown encryption algorithms Someone tried to entice a university student to break a bank’s proprietary algorithm Even a good algorithm is used, there are weak parameters Implementation or protocol error It is possible to find a DES key by trying all the possible keys

12/23 Outline  Introduction  How ATM fraud takes place Simple attacks Complex attacks Discussion  The wider implications Why the threat model was wrong Confirmation of our analysis  A new security paradigm  Conclusion

13/23 The Consequence for Banks  In the UK, one ATM transactions with an error occur out of transactions according to an article This paper guesses that the probability is about 1 in  This is not be news to large banks which employ staff to reconcile their bank accounts  When ATM customers complained without evidence, most bankers said that their systems are infallible This policy carries a number of risks  Their failure to face up to the problem may contribute to public pressure and ultimately legislation

14/23 The Implication for Equipment Vendors  The suppliers’ main failure is that they overestimate their customers’ level of design sophistication They provide a fairly raw encryption capability However, they leave the application designers to integrate the cryptographic facilities with application and system software  Tackling this problem will require: A system level approach − Not a component level A certification process − A hierarchy of licences

15/23 Outline  Introduction  How ATM fraud takes place Simple attacks Complex attacks Discussion  The wider implications Why the threat model was wrong Confirmation of our analysis  A new security paradigm  Conclusion

16/23 Why the Threat Model was Wrong  Uncritical acceptance of the conventional military wisdom of the 1970’s The military model stressed secrecy The early systems had only limited network Nowadays, however, ATM security involves a number of goals which including controlling internal & external fraud  Human factors It is hard to organize computer security team − The company’s managers is the only group with the motive to insist on good security  Many of well known consulting firms pretend to have expertise which they do not possess

17/23 Confirmation of Our Analysis  The vast majority of security failures occur at the level of implementation detail The result above came from a workshop  Survey of US Department of Defense organization has found that poor implementation is the main security problem  The need for more emphasis on quality control is now gaining gradual acceptance in the military sector The US Air Force is implementing ‘total quality management’ in its information security systems

18/23 Outline  Introduction  How ATM fraud takes place Simple attacks Complex attacks Discussion  The wider implications Why the threat model was wrong Confirmation of our analysis  A new security paradigm  Conclusion

19/23 A New Security Paradigm?  We need to make a systematic study of what is likely do Instead of worrying about what might possibly go wrong  Core business will be an engineering discipline concerned with quality control processes Not just building and selling ‘evaluated’ products  There are alternative models which we usefully import into security domain, safety critical system  Safety critical system is that failure could result in loss of life, injury or damage to the environment Ex) aircraft, nuclear power station controller system

20/23 Safety Critical Systems & Cryptosystems  Very basic points of safety critical systems 1.List all possible failure modes 2.Make clear what strategy has been adopted to prevent each of these failure modes 3.Explain in detail how each of these strategies is implemented 4.Test whether the equipment in fact can be operated according to the specification  Comparison with cryptosystems No one have attempted even the first stage As for the other three stages, it is clear that ITSEC (and TCSEC) will have to change radically − Because the standards are component-oriented, ignore the two most important factors, the system aspect and the human element ※ ITSEC : Information Technology Security Evaluation Criteria TCSEC : Trusted Computer System Evaluation Criteria

21/23 Two Competing Approach within Safety Critical Systems  Railway signalling systems Based on the safety features on the integrity of a kernel of hardware and software The system is in control − If the train driver falls asleep or goes through a red light, the train will stop automatically The train driver has been progressively deskilled  Aviation system Based on constant top level feedback and incremental improvement The pilot remains firmly in command Progress has made his job ever more complex and demanding

22/23 The Computer Security Implications  Both the railway and airline models find reflections in current security practice and research  The railway model is dominant, due to TCSEC / ITSEC emphasis on kernelization and formal methods  Nonetheless, we must consider whether this is the right paradigm to adopt  If our parallel with signalling systems is accurate, it is probably a blind alley, we should follow the aviation paradigm instead

23/23 Conclusion  A lack of feedback on cryptosystems’ failure has led to a false threat model Designers should have focused on what was likely to go wrong Their products are too complex and tricky to use  As a result, most security failures are due to implementation and management errors One specific consequence has been ATM frauds  Next version of standards must take much more account of the environment  A paradigm shift is underway We need a fusion of security with software engineering