Hardening Digital Signatures against Untrusted Signature Software 姓名:謝宏偉 學號: M99G0219 Digital Information Management, 2007. ICDIM '07. 2nd International.

Slides:



Advertisements
Similar presentations
Trusted Data Sharing over Untrusted Cloud Storage Provider Gansen Zhao, Chunming Rong, Jin Li, Feng Zhang, and Yong Tang Cloud Computing Technology and.
Advertisements

Digital Certificate Installation & User Guide For Class-2 Certificates.
New Security Issues Raised by Open Cards Pierre GirardJean-Louis Lanet GERMPLUS R&D.
Mobile Code Security Yurii Kuzmin. What is Mobile Code? Term used to describe general-purpose executables that run in remote locations. Web browsers come.
Public Key Infrastructure A Quick Look Inside PKI Technology Investigation Center 3/27/2002.
Digital Certificate Installation & User Guide For Class-2 Certificates.
Information Risk Management Key Component for HIPAA Security Compliance Ann Geyer Tunitas Group
Efficient Public Key Infrastructure Implementation in Wireless Sensor Networks Wireless Communication and Sensor Computing, ICWCSC International.
Mobile Code Security Aviel D. Rubin, Daniel E. Geer, Jr. MOBILE CODE SECURITY, IEEE Internet Computing, 1998 Minkyu Lee
SECURITY IN E-COMMERCE VARNA FREE UNIVERSITY Prof. Teodora Bakardjieva.
Digital Signatures and Hash Functions. Digital Signatures.
27 th Oct 2003 Checking Secure Interactions of Smart Card Applets: extended version P. Bieber, J. Cazin, P. Girard, J. –L. Lanet, V. Wiels, and G. Zanon.
Java Security: From HotJava to Netscape & Beyond Drew Dean, Edward W. Felten, Dan S. Wallach Department of Computer Science, Princeton University May,
6/1/20151 Digital Signature and Public Key Infrastructure Course:COSC Instructor:Professor Anvari Student ID: Name:Xin Wen Date:11/25/00.
1 © NOKIA Presentation_Name.PPT / DD-MM-YYYY / Initials Company Confidential The Internet offers no inherent security services to its users; the data transmitted.
1 Cryptography and Network Security Third Edition by William Stallings Lecturer: Dr. Saleem Al_Zoubi.
FIT3105 Smart card based authentication and identity management Lecture 4.
CSE331: Introduction to Networks and Security Lecture 28 Fall 2002.
Security in By: Abdulelah Algosaibi Supervised by: Prof. Michael Rothstein Summer II 2010: CS 6/79995 Operating System Security.
1 Digital Signatures CSSE 490 Computer Security Mark Ardis, Rose-Hulman Institute April 12, 2004.
FIT5037 Advanced Network Security --- Modern Computing and Security --- Lecture 1.
CS533 - Concepts of Operating Systems
Creating a Secured and Trusted Information Sphere in Different Markets Giuseppe Contino.
Financial Transactions on Internet Financial transactions require the cooperation of more than two parties. Transaction must be very low cost so that small.
© Julia Wilk (FHÖV NRW) 1 Digital Signatures. © Julia Wilk (FHÖV NRW)2 Structure 1. Introduction 2. Basics 3. Elements of digital signatures 4. Realisation.
Pay As You Go – Associating Costs with Jini Leases By: Peer Hasselmeyer and Markus Schumacher Presented By: Nathan Balon.
Digital Signature Xiaoyan Guo/ Xiaohang Luo/
Secure Systems Research Group - FAU Patterns for Digital Signature using hashing Presented by Keiko Hashizume.
Masud Hasan Secure Project 1. Secure It uses Digital Certificate combined with S/MIME capable clients to digitally sign and.
Software Dependability CIS 376 Bruce R. Maxim UM-Dearborn.
By Jyh-haw Yeh Boise State University ICIKM 2013.
Csci5233 Computer Security1 Bishop: Chapter 10 Key Management: Digital Signature.
Tonga Institute of Higher Education Design and Analysis of Algorithms IT 254 Lecture 9: Cryptography.
1 Introduction to Security and Cryptology Enterprise Systems DT211 Denis Manley.
Lecture 12 Electronic Business (MGT-485). Recap – Lecture 11 E-Commerce Security Environment Security Threats in E-commerce Technology Solutions.
Chapter 10: Authentication Guide to Computer Network Security.
Java Security. Topics Intro to the Java Sandbox Language Level Security Run Time Security Evolution of Security Sandbox Models The Security Manager.
LEVERAGING UICC WITH OPEN MOBILE API FOR SECURE APPLICATIONS AND SERVICES Ran Zhou 1 9/3/2015.
Patterns for Secure Boot and Secure Storage in Computer Systems By: Hans L¨ohr, Ahmad-Reza Sadeghi, Marcel Winandy Horst G¨ortz Institute for IT Security,
MOBILE AD-HOC NETWORK(MANET) SECURITY VAMSI KRISHNA KANURI NAGA SWETHA DASARI RESHMA ARAVAPALLI.
Introduction to Secure Messaging The Open Group Messaging Forum April 30, 2003.
CMSC 414 Computer (and Network) Security Lecture 14 Jonathan Katz.
Java Security Pingping Ma Nov 2 nd, Overview Platform Security Cryptography Authentication and Access Control Public Key Infrastructure (PKI)
Cryptography, Authentication and Digital Signatures
Security Protocols and E-commerce University of Palestine Eng. Wisam Zaqoot April 2010 ITSS 4201 Internet Insurance and Information Hiding.
1 UCR Hardware Security Primitives with focus on PUFs Slide credit: Srini Devedas and others.
Risks of data manipulation and theft Gateway Average route travelled by an sent via the Internet from A to B Washington DC A's provider Paris A.
1 Chapter 9: Key Management All algorithms we have introduced are based on one assumption: keys have been distributed. But how to do that? Key generation,
Key Agreement Guilin Wang School of Computer Science 12 Nov
Secure Messaging Workshop The Open Group Messaging Forum February 6, 2003.
Key Management. Session and Interchange Keys  Key management – distribution of cryptographic keys, mechanisms used to bind an identity to a key, and.
Shanti Bramhacharya and Nick McCarty. This paper deals with the vulnerability of RFIDs A Radio Frequency Identifier or RFID is a small device used to.
1 University of Palestine Information Security Principles ITGD 2202 Ms. Eman Alajrami 2 nd Semester
Middleware for Secure Environments Presented by Kemal Altıntaş Hümeyra Topcu-Altıntaş Osman Şen.
Csci5233 computer security & integrity 1 Cryptography: an overview.
Lecture 16: Security CDK4: Chapter 7 CDK5: Chapter 11 TvS: Chapter 9.
Payment in Identity Federations David J. Lutz Universitaet Stuttgart.
Security Vulnerabilities in A Virtual Environment
Introduction and Overview of Information Security and Policy By: Hashem Alaidaros 4/10/2015 Lecture 1 IS 332.
Lecture 11 Overview. Digital Signature Properties CS 450/650 Lecture 11: Digital Signatures 2 Unforgeable: Only the signer can produce his/her signature.
Chapt. 10 – Key Management Dr. Wayne Summers Department of Computer Science Columbus State University
Lecture 9 Overview. Digital Signature Properties CS 450/650 Lecture 9: Digital Signatures 2 Unforgeable: Only the signer can produce his/her signature.
Risk-Aware Mitigation for MANET Routing Attacks Submitted by Sk. Khajavali.
TAG Presentation 18th May 2004 Paul Butler
Security of Digital Signatures
TAG Presentation 18th May 2004 Paul Butler
CDK4: Chapter 7 CDK5: Chapter 11 TvS: Chapter 9
How to Mitigate the Consequences What are the Countermeasures?
CDK: Chapter 7 TvS: Chapter 9
Erica Burch Jesse Forrest
Presentation transcript:

Hardening Digital Signatures against Untrusted Signature Software 姓名:謝宏偉 學號: M99G0219 Digital Information Management, ICDIM '07. 2nd International Conference on

1. 前言  The basic property digital signature has to satisfy is that, at least as autograph signature, it is a non-repudiable proof of both the identity of the provenances of electronic documents and the declaration of what documents themselves represent.  As a consequence, every form of vulnerability should be carefully considered in order to understand whether digital signature may represent for electronic documents what handmade signature represents for traditional ones.

1. 前言  The most critical point of the digital signature protocol is the secreteness of the private key.  The weak point of this proposal is that the delayed confirmation of the signature introduces from both a practical and a legal point of view a number of problems, whose solution should not be simple and, more importantly, should have radical impacts, probably not tolerable in a scenario where digital signatures have a significative diffusion and are included in the law system of most countries in a stable and consolidated way.

2. 方法  As explained in the introduction, digital signature suffers from a severe vulnerability, directly deriving from the potential untrustworthy of the platform where the signature generation process runs.

2. 方法  Our method works as a full solution in a restricted (but probable) set of untrustworthy cases, and mitigates the problem in the more general case.  it does not require new peripherals,  it can be implemented using smart cards existing today as well as existing signature softwares,  it does not require significative extra procedural charge to the user and, finally,  it does not affect the legal notion of digital signature.

2. 方法  The data source employed for the check is a Java applet coming from the smart card (that is a Java smart card) and, to increase security, the operations required to the applet are minimized to just those necessary to implement the check, that is, both:  allowing the user to choose the document.  sending it to the smart card to serially compute the digest and comparing it with that coming from the signature software.

3. 執行結果  Our proposal requires an additional preliminary step w.r.t. the current signature protocol in which the user sends

3. 執行結果  It is worth noting that our technique is able to contrast the malware-based attack in case it is conducted at user-level, that is both JVM and OS of the PC are not corrupted.  In the other cases, clearly the proposed methodology cannot guarantee that it succeeds, since we cannot exclude that a man-in-the-middle attack, poisoning the I/O functionalities of the platform hides the actual communication between the PC and the smart-card.

3. 執行結果  As widely remarked both in this paper and in the literature, in case the platform cannot be considered trusted no full solution may exist.  Anyway, we may expect that a number of even kernel-level- malware-based attacks can be correctly intercepted by our check mechanism thus avoiding that it succeeds.

4. 執行問題  We start by giving some more detail about Java cards.  Every Java card can store and run several Java card applets allowing thus the implementation of different features carried on the same card.  Java applets are passive, so that they cannot start a communication but only reply requests coming from some software through the Java card reader device.

4. 執行問題  For security reasons, the default is that applets do not share memory and are isolated each other, but they can communicate or share resources in case this is explicitly required.  A Java card contains the Java Card Virtual Machine, used to process bytecode, and some native methods implemented in hardware in case it has to run complex operations like cryptographic algorithms.

4. 執行問題

5. 結論  The importance of encryption-based digital signature is nowadays universally known, due to the revolution that such a mechanism has induced on the role that electronic documents may have in both public and private organizations.  In fact, digital signature represents at the moment the only valid method to give to signed electronic documents probation value at least as traditional documents with autograph signature.

5. 結論  The above claim has a full counterpart with the current law system of most countries, so that the process of document dematerialization has been already started relying on the current infrastructures as well as the current juridical regulation, with strong attention towards interoperability common rules.  Actually, a serious vulnerability occurs, not depending on the algorithms on which digital signature relies, but strictly related to the practical way in which digital signature is implemented.

5. 結論  This vulnerability allows an attacker to sign documents and to exploit them without any intention of the signature's owner.  The danger is thus very concrete, especially if we think of a next future where electronic documents will be used in a pervasive way in all economics and administrative negotiations.