Slide 1/9 07/17/03 57th IETF WIEN, Austria, July 13-18, 2003 “EAP Secured Smartcard Channel” Pascal Urien, Mesmin DANDJINOU ENST Draft-urien-EAP-SSC-00.txt
Slide 2/9 07/17/03 EAP-SSC at a glance Use of a single EAP type. Introduction of multiple sub-types. Symmetric or Asymmetric Key Exchange Procedures. Two working phases: Session Key (SK) Exchange & Validation Shared Secret. Common Certification Authority. Secure Messaging. Simple, but robust, security mechanisms, based on SHA-1 digest 3DES, AES Secure messaging could be used to exchange messages with embedded repositories in smartcards.
Slide 3/9 07/17/03 EAP-SSC Overview EAP Secured Smartcard Channel SSC messages EAP / RADIUS EAP / LAN EAP / 7816 RADIUS802.1xISO 7816 Smartcard Supplicant AuthenticatorRADIUS server EAP Embedded Repository
Slide 4/9 07/17/03 EAP-SSC PDUs | Code | Identifier | Length | | Type | Sub-Type | Flags |Message Length Message Length (cont) |..Payload.. | | | Digest | + | L = Length of the message included M = More fragments S = Start E = End D = Digest(Code, Identifier, Length, Type, Sub-Type, Flags, Message Length, Payload, SK) C = Ciphered (Payload) X = Sequence of X.509 Certificate(s) R = Reserved Flags |L M S E D C X R| EAP-SSC PDU EAP header
Slide 5/9 07/17/03 Key Production – Symmetric Case D i = D(M i | D i-1 | SK) Sub-Type = 1, Start, r 1 (20 bytes) r 2 (20 bytes) XOR D(r 1 | s) SK = D(r 1 | r 2 | s ) M 1, D 1 (M 1 | SK) D 1 = D(M 1 | SK) D=SHA-1 s=shared secret M 2, D 2 (M 2 | D 1 | SK) M i, D i M i+1,D i+1 End, M j, D j SK = D(r 1 | r 2 | s) D 1 = D(M 1 | SK) EAP-Success SK Production & Validation Secure Messaging r1=1 st random number r2= 2 nd random number Session Key D i = D(M i | D i-1 | SK)
Slide 6/9 07/17/03 Key Production – Asymmetric Case Sub-Type = 2, Start, Seq:C 1, Int: r 1 Seq:C 2, Int:r 2 K1public, Int:D 0 K2private SK = D(r 1 | r 2 ) M 1, D 1 (M 1 | SK) D 1 = D(M 1 | SK) C 1, C 2: Optional Sequence of X.509 Certificates r1, r2: Integer M 2, D 2 (M 2 | D 1 | SK) M i, D i M i+1, D i+1 End M j, D j SK = D(r 1 | r 2 ) D1 = D(M 1, SK) D i = D(M i | D i-1 | SK) EAP-Success D= SHA-1 Secure Messaging SK Production & Validation D i = D(M i | D i-1 | SK) r1=1 st random number r2= 2 nd random number Session Key
Slide 7/9 07/17/03 Secure Messaging All messages Mi are ended by a digest value D i. SK(r 1, r 2 [,s]) D 1 = D(M 1, SK) i>2, D i = D(M i, D i-1, SK) Message format is not yet defined. M 1,D 1 M 2,D2 SK r 1, r 2 [,s] M 3,D 3 M i,D i
Slide 8/9 07/17/03 Future Work Random number format rules, for the asymmetric case. Messages Ciphering 3DES AES Messages Format
Slide 9/9 07/17/03 Questions ?