1 Why Cryptosystems Fail Ross Anderson University Computer Laboratory Cambridge

Slides:



Advertisements
Similar presentations
Collecting data Chapter 6. What is data? Data is raw facts and figures. In order to process data it has to be collected. The method of collecting data.
Advertisements

Why Cryptosystems Fail Nick Feamster CS 6262 Spring 2009.
Securing the Worlds Information Secure Dynamic Credit and Debit Cards Stop Credit Card and Identity Theft Andre Brisson Stephen Boren Co founders/ Co.
Gareth Ellis Senior Solutions Consultant Session 5a Key and PIN Management.
CSC 386 – Computer Security Scott Heggen. Agenda Authentication Passwords Reducing the probability of a password being guessed Reducing the probability.
SECURITY IN E-COMMERCE VARNA FREE UNIVERSITY Prof. Teodora Bakardjieva.
CEL: Computers in Banking and Retail
1 Software Engineering Lecture 11 Software Testing.
Securing. Agenda  Hard Drive Encryption  User Account Permissions  Root Level Access  Firewall Protection  Malware Protection.
1 Identity Theft and Phishing: What You Need to Know.
1.3.1.G1 © Family Economics & Financial Education – Revised October 2004 – Consumer Protection Unit – Identity Theft Funded by a grant from Take Charge.
Understanding Networked Applications: A First Course Chapter 14 by David G. Messerschmitt.
Chapter 10  ATM 1 Automatic Teller Machines. Chapter 10  ATM 2 Automatic Teller Machines  “…one of the most influential technological innovations of.
Intro To Secure Comm. Exercise 2. Problem  You wish for your users to access a remote server via user and password.  All of the users have modems and.
CMSC 414 Computer and Network Security Lecture 21 Jonathan Katz.
1 Applications of Computers Lecture-3 2 E-Commerce 4 Almost all major companies have their homes on the web, mainly for advertising 4 Companies were.
Chapter 9 Banking and Book keeping Protecting yourself from you.
Chapter 10 Boundary Controls. Cryptographic Controls Cryptology is the science of secret codes Cryptography deals with systems for transforming data into.
Why Cryptosystems Fail?
Why Cryptosystems Fail Ross Anderson Proceeding of the 1 st ACM Conference on Computer and Communications Security, 김학봉.
Why cryptosystems Fail Ross Anderson Proceeding of the 1 st ACM Conference on Computer and Communications Security, 1993 SSR Jiyeon Park.
EEC 693/793 Special Topics in Electrical Engineering Secure and Dependable Computing Lecture 5 Wenbing Zhao Department of Electrical and Computer Engineering.
VOICE BOX® VOICE RECOGNITION Using YOUR Voice to Protect YOUR Identity! By Neil Madadi, Allison Wright, Ava Embry, Jacob Howard.
Why Cryptosystems Fail Ross Anderson Presented by Su Zhang 1.
1 PIN Security Management and Concerns Susan Langford Sr. Cryptographer CACR Information Security Workshop.
AS Level ICT Selection and use of input devices and input media: Capturing transaction data.
1 Fluency with Information Technology Lawrence Snyder Chapter 17 Privacy & Digital Security Encryption.
Tonga Institute of Higher Education Design and Analysis of Algorithms IT 254 Lecture 9: Cryptography.
1 Introduction to Security and Cryptology Enterprise Systems DT211 Denis Manley.
Will You Ever Use Your ATM Again? Presented by: Bob Clary Carolyn McLellan Jane Mosher Karen Weil-Yates.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Cameron Simpson.
Computers Are Your Future Tenth Edition Chapter 12: Databases & Information Systems Copyright © 2009 Pearson Education, Inc. Publishing as Prentice Hall1.
Why Cryptosystems Fail Prepared by Geoffrey Foote CSC 593 Secure Software Engineering Seminar Spring Semester 2006 Instructors: Dr. Charles Frank Dr. James.
3.1.G1 © Family Economics & Financial Education – Revised October 2004 – Consumer Protection Unit – Identity Theft Funded by a grant from Take Charge America,
1 Chapter 9 E- Security. Main security risks 2 (a) Transaction or credit card details stolen in transit. (b) Customer’s credit card details stolen from.
Csci5233 Computer Security1 Bishop: Chapter 10 (Cont.) Key Management: Storage & Revoking.
_______________________________________________________________________________________________________________ E-Commerce: Fundamentals and Applications1.
Identity Theft  IDENTITY THEFT occurs when someone wrongfully acquires and uses a consumer’s personal identification, credit, or account information.
Public Key Encryption and the RSA Public Key Algorithm CSCI 5857: Encoding and Encryption.
1 Lecture 8: Authentication of People what you know (password schemes) what you have (keys, smart cards, etc.) what you are (voice recognition, fingerprints,
Cryptography Dave Feinberg. Suppose I send an from to Who has access to that ? What if I want the.
Security Analysis of a Cryptographically- Enabled RFID Device Steve Bono, Matthew Green, Adam Stubblefield, Ari Juels, Avi Rubin, Michael Szydlo Usenix.
Password authentication Basic idea –User has a secret password –System checks password to authenticate user Issues –How is password stored? –How does system.
API-Level Attacks on Embedded Systems By Mike Bond and Ross Anderson “… by presenting valid commands to the security processor, but in an unexpected sequence,
Network Security Lecture 27 Presented by: Dr. Munam Ali Shah.
Verification & Validation. Batch processing In a batch processing system, documents such as sales orders are collected into batches of typically 50 documents.
COMP 424 Lecture 04 Advanced Encryption Techniques (DES, AES, RSA)
DES Analysis and Attacks CSCI 5857: Encoding and Encryption.
ANS(Prepared by: Mazhar Javed )1 Computer crime The growth of use of computerised payment systems – particularly the use of credit cards and debit cards.
Decimalisation Table Attacks for PIN cracking “ It takes an average of 15 guesses to determine a four digit PIN using this technique, instead of the 5000.
DES: Data Encryption Standard
Securing A Wireless Home Network. Simple home wired LAN.
Why Cryptosystems Fail R. Anderson, Proceedings of the 1st ACM Conference on Computer and Communications Security, 1993 Reviewed by Yunkyu Sung
Protecting Your Assets By Preventing Identity Theft 1.
Cybersecurity Test Review Introduction to Digital Technology.
LINUX Presented By Parvathy Subramanian. April 23, 2008LINUX, By Parvathy Subramanian2 Agenda ► Introduction ► Standard design for security systems ►
EMV Operation and Attacks Tyler Moore CS7403, University of Tulsa Reading: Anderson Security Engineering, Ch (136—138), (328—343) Papers.
( ) 1 Chapter # 8 How Data is stored DATABASE.
By: Brett Belin. Used to be only tackled by highly trained professionals As the internet grew, more and more people became familiar with securing a network.
Introduction What would our society be like now if we did not have ATm’s? Not able to access money when we urgently want it. You will have to go to the.
7/10/20161 Computer Security Protection in general purpose Operating Systems.
Authentication Schemes for Session Passwords using Color and Images
Overview 1. Phishing Scams
SECURITY FEATURES OF ATM
Why Cryptosystems Fail Ross Anderson University Computer Laboratory
How An ATM Work's Prepaid by, kakani Dinesh.
Why Cryptosystems Fail
Protecting Your Identity
Computer Security Protection in general purpose Operating Systems
Presentation transcript:

1 Why Cryptosystems Fail Ross Anderson University Computer Laboratory Cambridge

2 Designers of cryptographic systems are at a disadvantage to most other engineers, in that information on how their systems fail is hard to get: their major users have traditionally been government agencies, which are very secretive about their mistakes. The failure modes of retail banking systems It turns out that the threat model commonly used by cryptosystem designers was wrong: most frauds were not caused by cryptanalysis or other technical attacks, but by implementation errors and management failures. This suggests that a paradigm shift is overdue in computer security; we look at some of the alternatives, and see some signs that this shift may be getting under way.

3 Use false terminals to collect customer card and PIN data –USA in 1988; there, crooks built a vending machine which would accept any card and PIN, and dispense a packet of cigarettes. They put their invention in a shopping mall, and harvested PINs and magnetic strip data by modem.

4 With 4-digit PINs someone who finds or steals another person's ATM card has a chance of only 1 in 10,000 of guessing the PIN If only three attempts are allowed  the likelihood of a stolen card being misused should be less than one in 3,000

5 Some systems have a scheme which enables PINs to be checked by offline ATMs which do not have full encryption capability. For example some old CC PINs have the property that: digit_1 + digit_4 == digit_2 + digit_3 While others had the property that: digit_1 + digit_3 == digit_2 + digit_4 This means that crooks could use stolen cards in offline devices by entering a PIN such as 4455.

6 In 1992, a bank sent its cardholders a letter warning them of the dangers of writing their PIN on their card, and suggested instead that they conceal the PIN in the following way and write it down on a distinctive piece of squared cardboard, which was designed to be kept alongside the ATM card in a wallet or purse.

7 Suppose your PIN is Choose a four-letter word, say “blue”. Write these four letters down in the second, second, fifth and sixth columns of the card respectively: Now fill up the empty boxes with random letters. Easy, isn't it?

8 There may be only about two dozen four- letter words which can be made up using a given grid of random letters  A thief's chance of being able to use a stolen card has just increased from 1 in 3,333 to 1 in 8

9 One institution issued the same PIN to all its customers, as a result of a simple programming error A programmer arranged things so that only three different PINs were issued

10 Some banks hold the encrypted PINs on a file. This means that a programmer might observe that the encrypted version of his own PIN is (say) 132AD6409BCA4331, and search the database for all other accounts with the same PIN. What’s the probability of this? One bank wrote the encrypted PIN to the card strip  you could change the account number on your own card's magnetic strip to that of your target, and then use it with your own PIN to loot his account. VISA recommends that banks should combine the customer's account number with the PIN before encryption.

11 All of the above is due to fairly simple errors of implementation and operation

12 The IBM PIN system Account number: PIN key: FEFEFEFEFEFEFEFE Result of DES: A2CE126C69AEC82D Result decimalised: Natural PIN: 0224 Offset: 6565 Customer PIN: 6789

13 The security of the system depends on keeping the PIN key absolutely secret. The usual strategy is to supply a “terminal key” to each ATM in the form of two printed components, which are carried to the branch by two separate officials. The PIN key, encrypted under this terminal key, is then sent to the ATM by the bank's central computer.

14 Problems? Key management Interoperability

15 Problems The problem with software PIN encryption is that the PIN key can be found without too much effort by system programmers Once armed with the PIN key, programmers can easily forge cards

16 Problems One bank had a policy that only IBM 3178 terminals could be purchased. The VISA security modules they used could not talk to these devices (they needed DEC VT 100s instead). A contractor obligingly lent them a laptop PC, together with software which emulated a VT100. With this the various internal auditors, senior managers and other bank dignitaries duly created the required zone keys and posted them off to VISA. However, none of them realized that most PC terminal emulation software packages can be set to log all the transactions passing through, and this is precisely what the contractor did. He captured the clear zone key as it was created, and later used it to decrypt the bank's PIN key. Fortunately for them (and VISA), he did this only for fun and did not plunder their network (or so he claims).

17 Problems keys being kept in open correspondence files, rather than being locked up. This applies not just to ATM keys, but also to keys for inter-bank systems such as SWIFT, which handles transactions worth billions. It might be sensible to use initialization keys, such as terminal keys and zone keys, once only and then destroy them.

18 Cryptanalysis Some banks are still using home-grown encryption algorithms of a pre-DES vintage. One switching network merely “scrambled” data blocks by adding a constant to them! banks have implemented RSA with key sizes between 100 and 400 bits, despite the fact that they key needs to be at least 500 bits to give any real margin of security. Or should it beat least 2048 bits!