Getting to know your card: Reverse-Engineering the Smart-Card Application Protocol Data Unit for PKCS#11 Functions
|
|
|
- Jessie Hamilton
- 9 years ago
- Views:
Transcription
1 : Reverse-Engineering the Smart-Card Application Protocol Data Unit for PKCS#11 Functions 1, Fiona McNeill 2, Alan Bundy 1, Graham Steel 3 Riccardo Focardi 4, Claudio Bozzato 4 1 University of Edinburgh 2 Heriot-Watt 3 Cryptosense 4 Ca Foscari
2 Smart-cards secure, trusted, tamper-resistant identification, authentication, data storage and application processing financial, communication, security and data management purposes
3 Smart-cards secure, trusted, tamper-resistant identification, authentication, data storage and application processing financial, communication, security and data management purposes third-party communication
4 Smart-cards secure, trusted, tamper-resistant identification, authentication, data storage and application processing financial, communication, security and data management purposes third-party communication black-box
5 Smart-cards secure, trusted, tamper-resistant identification, authentication, data storage and application processing financial, communication, security and data management purposes third-party communication black-box is your card breaking bad?
6 Cryptographic protocols RSA PKCS# 11 Cryptographic Token Interface Standard functions key management, signing, encryption, decryption etc. ensure sensitive data remain secure API-Level Attacks E.g., Clulow, J., On the security of PKCS# 11. CHES 2003 Bortolozzo, M., Centenaro, M., Focardi, R., & Steel, G. Attacking and fixing PKCS# 11 security tokens. CCS 2010
7 Cryptographic protocols RSA PKCS# 11 Cryptographic Token Interface Standard functions key management, signing, encryption, decryption etc. ensure sensitive data remain secure API-Level Attacks E.g., Clulow, J., On the security of PKCS# 11. CHES 2003 Bortolozzo, M., Centenaro, M., Focardi, R., & Steel, G. Attacking and fixing PKCS# 11 security tokens. CCS 2010 PKCS#11 Low-level Implementation has been kept in the dark
8 Smart-card communication Smart-card Communication How is PKCS#11 implemented at the lowest-level communication? Is it secure? Function call PKCS#11 API low-level communication APDU layer Smart-card
9 Smart-card communication
10 The REPROVE system REPROVE reverse-engineering system: no API access - no card access - implementation indepedent communication REPROVE PKCS#11 ISO 7816 APDU semantics On-card operations PKCS#11 function translation generic assumptions
11 ISO/IEC 7816 Defines the communication layer between the card and the reader:15 Parts Part 4: Organisation, security and commands for interchange Part 8: Commands for security operations Part 9: Commands for card management.
12 APDU command structure >00 a4 08 0c <
13 APDU command structure >00 a4 08 0c Cla: Instruction Class <
14 APDU command structure >00 a4 08 0c Cla: Instruction Class Ins: Instruction Code <
15 APDU command structure >00 a4 08 0c Cla: Instruction Class Ins: Instruction Code P1-P2: Instruction Parameters <
16 APDU command structure >00 a4 08 0c Cla: Instruction Class Ins: Instruction Code P1-P2: Instruction Parameters Lc: Length of sent data D: Sent data <
17 APDU command structure >00 a4 08 0c Cla: Instruction Class Ins: Instruction Code P1-P2: Instruction Parameters Lc: Length of sent data D: Sent data Le: Length of expected data <
18 APDU command structure >00 a4 08 0c Cla: Instruction Class Ins: Instruction Code P1-P2: Instruction Parameters Lc: Length of sent data D: Sent data Le: Length of expected data < D: Response data
19 APDU command structure >00 a4 08 0c < Cla: Instruction Class Ins: Instruction Code P1-P2: Instruction Parameters Lc: Length of sent data D: Sent data Le: Length of expected data D: Response data SW1-SW2: Command processing status
20 APDU command structure >00 a4 08 0c > c < Cla: Instruction Class Ins: Instruction Code P1-P2: Instruction Parameters Lc: Length of sent data D: Sent data Le: Length of expected data D: Response data SW1-SW2: Command processing status
21 APDU command structure >00 a4 08 0c Cla: Instruction Class Ins: Instruction Code P1-P2: Instruction Parameters Lc: Length of sent data D: Sent data Le: Length of expected data > c Analysis Challenge How can we infer the semantics of the proprietary command? e.g., 21 a4? < D: Response data SW1-SW2: Command processing status
22 Methodology ISO 7816 models Command precondition models Command categorization Card operations models Patterns Hierarchy of card operations PKCS#11 functions models: C_login, C_generateKey, C_sign, C_findObjectsInit, C_findObjects, C_getAttributeValue, C_setAttributeValue, C_wrapKey, C_encrypt, C_unwrapKey Inference Problem Given a set of models derive the meaning of the actual implementation.
23 APDU modelling operation decomposed into steps implemented as APDU layer commands characterised by data exchange and role properties sub-functionality 1 command a command b YY, core NY, core command x YY, core functionality sub-functionality 2 command y NY, additional command z YN, additional sub-functionality 3 command a YY, additional command x NN, dummy
24 APDU modelling PKCS#11 functions are expressed as sets of functionalities E.g., C_logIn : inputs/outputs specified by PKCS#11 authentication as defined by ISO 7816 with key; with PIN; using internal data; data encipherment additional operations secondary authentication data retrieval
25 Reverse-engineering main idea Step 1: Semantics of APDU Step 2: On-card operations Step 3: PKCS#11 function valid mappings valid paths sub-functionalities functionalities paths paths PKCS#11 functionalities path
26 Inferred model 3 abstractions of the protocol 3 levels of attacks
27 Inferred model 3 abstractions of the protocol 3 levels of attacks Commands semantics of the exchanged commands identify sensitive data, inject commands, blind reply sessions
28 Inferred model 3 abstractions of the protocol 3 levels of attacks Commands semantics of the exchanged commands identify sensitive data, inject commands, blind reply sessions On-card operations which/how on-card operations are executed perform unauthorised operations
29 Inferred model 3 abstractions of the protocol 3 levels of attacks Commands semantics of the exchanged commands identify sensitive data, inject commands, blind reply sessions On-card operations which/how on-card operations are executed perform unauthorised operations PKCS#11 interconnection how a specific cryptographic function is executed at the APDU layer PKCS#11 attacks bypass API restrictions
30 Inferred model: example Sniffed trace: >00a4080c >9000 >800a0200ea >Response >00a4080c b >9000 >80bb01b >9000 >80aa808602ffff >Response
31 Inferred model: example
32 Experiments Sniffed APDUs from 5 commercially available smart-cards; 9 PKCS#11 functions C_logIn C_generateKey C_sign C_encrypt C_findObjects C_getAttributeValue C_setAttributeValue C_wrapKey C_unwrapKey
33 Experiments evaluation on:
34 Experiments evaluation on: functional success
35 Experiments evaluation on: functional success successfully inferred at least 1 model
36 Experiments evaluation on: functional success successfully inferred at least 1 model quality of the results
37 Experiments evaluation on: functional success successfully inferred at least 1 model quality of the results apart from 3 cases; a unique model that matched exactly 3 cases: correct on-card operations; 2 suggested models; 1 matched exactly
38 Experiments evaluation on: functional success successfully inferred at least 1 model quality of the results apart from 3 cases; a unique model that matched exactly 3 cases: correct on-card operations; 2 suggested models; 1 matched exactly search-space restriction
39 Experiments evaluation on: functional success successfully inferred at least 1 model quality of the results apart from 3 cases; a unique model that matched exactly 3 cases: correct on-card operations; 2 suggested models; 1 matched exactly search-space restriction no explosion
40 Search-space sample Function Total B.CC R.CC R.SFC R.FC R.Model Card 2 C_logIn C_findObjects C_generateKey 540x C_setAttributeValue C_encrypt Card 4 C_logIn C_findObjects C_getAttributeValue C_sign Card 5 C_logIn C_sign C_setAttributeValue B.CC: baseline algorithm command combinations. R.CC: REPROVE command combinations. R.SFC: REPROVE sub-functionality combinations, R.FC: REPROVE functionality combinations. R.Model is the final model(s) suggested by REPROVE.
41 Results: Violations found c_login function No session handles all cards No verification 1 card PIN sent in plaintext 2 cards c_wrapkey function executed library side sensitive key sent in plaintext 1 card
42 Results: Violations found c_generatekey function executed library side sensitive key sent in plaintext 2 cards c_encrypt function executed library side sensitive key sent in plaintext 1 cards The location of the sensitive data and the related information (eg., attributes) was located for all cards.
43 Conclusion REPROVE: fully automated system for reverse-engineering APDUs and discovering interconnection with PKCS#11 functions it does not requires access to the card s code nor the API check if the card respects the standard 2 tested cards did nothing! access PKCS#11 objects from the low-level - bypass API restrictions
Smart Card Application Standard Draft
Smart Card Application Standard Draft Contents 1 SCOPE... 6 1.1 DEFINITIONS / DOCUMENT CONVENTIONS... 6 2 KEY DATA ELEMENTS AND CONCEPTS... 7 2.1 STATIC CARD INFORMATION... 7 2.1.1 Card ID (CdID)... 7
Attacking and Fixing PKCS#11 Security Tokens
Attacking and Fixing PKCS#11 Security Tokens Matteo Bortolozzo, Matteo Centenaro Riccardo Focardi and Graham Steel Università Ca Foscari, Venezia and LSV, INRIA & CNRS & ENS-Cachan RSA PKCS#11 Describes
PKCS. PKCS: Public Key Cryptography Standards. Apple, Digital, Lotus, Microsoft, MIT, Northern Telecom, Novell, Sun
: Public Key Cryptography Standards Devised and published by RSA Security Launched in 1991 as implementation agreements among early adopters of public-key cryptography Apple, Digital, Lotus, Microsoft,
PKCS. PKCS: Public Key Cryptography Standards
: Public Key Cryptography Standards Devised and published by RSA Security Launched in 1991 as implementation agreements among early adopters of public-key cryptography Apple, Digital, Lotus, Microsoft,
CALIFORNIA SOFTWARE LABS
; Digital Signatures and PKCS#11 Smart Cards Concepts, Issues and some Programming Details CALIFORNIA SOFTWARE LABS R E A L I Z E Y O U R I D E A S California Software Labs 6800 Koll Center Parkway, Suite
Public Key Infrastructure for a Higher Education Environment
Public Key Infrastructure for a Higher Education Environment Eric Madden and Michael Jeffers 12/13/2001 ECE 646 Agenda Architectural Design Hierarchy Certificate Authority Key Management Applications/Hardware
RVS Seminar Deployment and Performance Analysis of JavaCards in a Heterogenous Environment. Carolin Latze University of Berne
RVS Seminar Deployment and Performance Analysis of JavaCards in a Heterogenous Environment Carolin Latze University of Berne Table of contents > Introduction Smartcards > Deployment Overview Linux Windows
Smart Card APDU Analysis
Smart Card APDU Analysis Black Hat Briefings 2008 Las Vegas Ivan "e1" Buetler [email protected] Compass Security AG - Switzerland Compass Security AG Glärnischstrasse 7 Postfach 1628 CH-8640 Rapperswil
Deep-Secure Mail Guard Feature Guide
Deep-Secure Mail Guard Feature Guide The Deep-Secure Mail Guard provides a rich selection of message security functionality and content policy options to Simple Message Transfer Protocol (SMTP) and/or
Measurement and Analysis Introduction of ISO7816 (Smart Card)
Measurement and Analysis Introduction of ISO7816 (Smart Card) ISO 7816 is an international standard related to electronic identification cards with contacts, especially smart cards, managed jointly by
Java Card. Smartcards. Demos. . p.1/30
. p.1/30 Java Card Smartcards Java Card Demos Smart Cards. p.2/30 . p.3/30 Smartcards Credit-card size piece of plastic with embedded chip, for storing & processing data Standard applications bank cards
Reverse engineering smart cards
Reverse engineering smart cards Christian M. Amsüss [email protected] http://christian.amsuess.com/ 2010-05-06 Overview objective understand smart card communication based on sniffable
JCCM : Flexible Certificates for smartcards with Java Card
JCCM : Flexible Certificates for smartcards with Java Card M ā Celeste Campo, Andrés Marín, Arturo García, Ignacio Díaz, Peter T. Breuer, Carlos Delgado, Carlos García Universidad Carlos III de Madrid
ETSI TS 102 176-2 V1.2.1 (2005-07)
TS 102 176-2 V1.2.1 (2005-07) Technical Specification Electronic Signatures and Infrastructures (ESI); Algorithms and Parameters for Secure Electronic Signatures; Part 2: Secure channel protocols and algorithms
The SmartLogic Tool: Analysing and Testing Smart Card Protocols
The SmartLogic Tool: Analysing and Testing Smart Card Protocols Gerhard de Koning Gans, Joeri de Ruiter Digital Security, Radboud University Nijmegen The SmartLogic Tool A tool to analyse, emulate and
cipher: the algorithm or function used for encryption and decryption
! "# $ %& %'()! *,+ & -.! % %- / 0-1 2+ 34 576!! 8 9! ": ;
PrivateServer HSM EKM Provider for Microsoft SQL Server
PrivateServer HSM EKM Provider for Microsoft SQL Server January 2014 Document Version 1.1 Notice The information provided in this document is the sole property of Algorithmic Research Ltd. No part of this
Functional Specification of the OpenPGP application on ISO Smart Card Operating Systems
Functional Specification of the OpenPGP application on ISO Smart Card Operating Systems Version 2.0.1 Author: Achim Pietig 2009 April 22 Author: Achim Pietig Lippstädter Weg 14 32756 Detmold Germany Email:
Information Security
Information Security Dr. Vedat Coşkun Malardalen September 15th, 2009 08:00 10:00 [email protected] www.isikun.edu.tr/~vedatcoskun What needs to be secured? With the rapid advances in networked
ISM/ISC Middleware Module
ISM/ISC Middleware Module Lecture 13: Security for Middleware Applications Dr Geoff Sharman Visiting Professor in Computer Science Birkbeck College Geoff Sharman Sept 07 Lecture 13 Aims to: 2 Show why
Cryptography and Network Security Chapter 1
Cryptography and Network Security Chapter 1 Acknowledgments Lecture slides are based on the slides created by Lawrie Brown Chapter 1 Introduction The art of war teaches us to rely not on the likelihood
Introduction on Low level Network tools
Georges Da Costa [email protected] http: //www.irit.fr/~georges.da-costa/cours/addis/ 1 Introduction 2 Aircrack-ng 3 Wireshark Low level tools Hacking tools Aircrack-ng (ex Aircrack, ex Airsnort) WEP/WPA
Security for Computer Networks
Security for Computer Networks An Introduction to Data Security in Teleprocessing and Electronic Funds Transfer D. W. Davies Consultant for Data Security and W. L. Price National Physical Laboratory, Teddington,
EMV (Chip-and-PIN) Protocol
EMV (Chip-and-PIN) Protocol Märt Bakhoff December 15, 2014 Abstract The objective of this report is to observe and describe a real world online transaction made between a debit card issued by an Estonian
Report to WIPO SCIT Plenary Trilateral Secure Virtual Private Network Primer. February 3, 1999
Report to WIPO SCIT Plenary Trilateral Secure Virtual Private Network Primer February 3, 1999 Frame Relay Frame Relay is an international standard for high-speed access to public wide area data networks
Introducing etoken. What is etoken?
Introducing etoken Nirit Bear September 2002 What is etoken? Small & portable reader-less Smartcard Standard USB connectivity Logical and physical protection Tamper evident (vs. tamper proof) Water resistant
PrivyLink Cryptographic Key Server *
WHITE PAPER PrivyLink Cryptographic Key * Tamper Resistant Protection of Key Information Assets for Preserving and Delivering End-to-End Trust and Values in e-businesses September 2003 E-commerce technology
Cryptography and Network Security
Cryptography and Network Security Third Edition by William Stallings Lecture slides by Shinu Mathew John http://shinu.info/ Chapter 1 Introduction http://shinu.info/ 2 Background Information Security requirements
Microsoft Identity Lifecycle Manager & Gemalto.NET Solutions. Jan 23 rd, 2007
Microsoft Identity Lifecycle Manager & Gemalto.NET Solutions Jan 23 rd, 2007 Microsoft ILM is a comprehensive, integrated, identity and access solution within the Microsoft system architecture. It includes
Attestation and Authentication Protocols Using the TPM
Attestation and Authentication Protocols Using the TPM Ariel Segall June 21, 2011 Approved for Public Release: 11-2876. Distribution Unlimited. c 2011. All Rights Reserved. (1/28) Motivation Almost all
Cryptographic Modules, Security Level Enhanced. Endorsed by the Bundesamt für Sicherheit in der Informationstechnik
Common Criteria Protection Profile Cryptographic Modules, Security Level Enhanced BSI-CC-PP-0045 Endorsed by the Foreword This Protection Profile - Cryptographic Modules, Security Level Enhanced - is issued
Secure recharge of disposable RFID tickets
Secure recharge of disposable RFID tickets Riccardo Focardi Flaminia Luccio Università Ca Foscari, Venezia {focardi,luccio}@unive.it FAST 2011 15-16 September 2011, Leuven FAST 2011 ()Secure recharge of
Extending EMV payment smart cards with biometric on-card verification
Extending EMV payment smart cards with biometric on-card verification Olaf Henniger 1 and Dimitar Nikolov 2 1 Fraunhofer Institute for Computer Graphics Research IGD Fraunhoferstr. 5, D-64283 Darmstadt,
RF-Enabled Applications and Technology: Comparing and Contrasting RFID and RF-Enabled Smart Cards
RF-Enabled Applications and Technology: Comparing and Contrasting RFID and RF-Enabled Smart Cards January 2007 Developed by: Smart Card Alliance Identity Council RF-Enabled Applications and Technology:
Government Smart Card Interoperability Specification
Interagency Report 6887-2003 Edition Government Smart Card Interoperability Specification Version 2.1 Teresa Schwarzhoff Jim Dray John Wack Eric Dalci Alan Goldfine Michaela Iorga July 16, 2003 NIST Interagency
Secure Automated Document Delivery
Secure Automated Document Delivery Tom Casey Michael Roe Bill Tuck Steve Wilbur Department of Computer Science University College London Abstract 1 Background A document retrieval system is a specific
SafeNet KMIP and Google Cloud Storage Integration Guide
SafeNet KMIP and Google Cloud Storage Integration Guide Documentation Version: 20130719 Table of Contents CHAPTER 1 GOOGLE CLOUD STORAGE................................. 2 Introduction...............................................................
Secure Over the Air (OTA) Management Of Mobile Applications
Secure Over the Air (OTA) Management Of Mobile Applications Dinakaran Rajaram KTH-Royal Institute of Technology School Of Information and Communication Technology Communication Systems Master of Science
Table: Security Services (X.800)
SECURIT SERVICES X.800 defines a security service as a service provided by a protocol layer of communicating open systems, which ensures adequate security of the systems or of data transfers. Also the
YubiKey PIV Deployment Guide
YubiKey PIV Deployment Guide Best Practices and Basic Setup YubiKey 4, YubiKey 4 Nano, YubiKey NEO, YubiKey NEO-n YubiKey PIV Deployment Guide 2016 Yubico. All rights reserved. Page 1 of 27 Copyright 2016
Neutralus Certification Practices Statement
Neutralus Certification Practices Statement Version 2.8 April, 2013 INDEX INDEX...1 1.0 INTRODUCTION...3 1.1 Overview...3 1.2 Policy Identification...3 1.3 Community & Applicability...3 1.4 Contact Details...3
AN2598 Application note
AN2598 Application note Smartcard interface with the STM32F101xx and STM32F103xx Introduction This document describes a firmware and hardware Smartcard interface solution based on the STM32F10xxx USART
GlobalPlatform. Card Specification. Version 2.2
GlobalPlatform Card Specification Version 2.2 March 2006 Recipients of this document are invited to submit, with their comments, notification of any relevant patent rights or other intellectual property
PkBox Technical Overview. Ver. 1.0.7
PkBox Technical Overview Ver. 1.0.7 14 September 2015 All the information in this document is and can t be used entirely or in part without a written permission from Intesi Group S.p.A. Le informazioni
SSL A discussion of the Secure Socket Layer
www.harmonysecurity.com [email protected] SSL A discussion of the Secure Socket Layer By Stephen Fewer Contents 1 Introduction 2 2 Encryption Techniques 3 3 Protocol Overview 3 3.1 The SSL Record
White Paper. Digital signatures from the cloud Basics and Applications
White Paper Digital signatures from the cloud Basics and Applications Contents Basics of digital signature...3 Electronic documents and signature...3 Electronic signature...3 Digital signature...4 Standards
Public Key Infrastructure (PKI)
Public Key Infrastructure (PKI) In this video you will learn the quite a bit about Public Key Infrastructure and how it is used to authenticate clients and servers. The purpose of Public Key Infrastructure
WebService Security. A guide to set up highly secured client-server communications using WS-Security extensions to the SOAP protocol
WebService Security A guide to set up highly secured client-server communications using WS-Security extensions to the SOAP protocol Jam Hamidi Senior Technical Analyst BCcampus, Victoria, British Columbia,
Web Application Entity Session Management using the eid Card Frank Cornelis 03/03/2010. Fedict 2010. All rights reserved
Web Application Entity Session Management using the eid Card Frank Cornelis 03/03/2010 Fedict 2010. All rights reserved What is Entity Authentication? Entity authentication is the process whereby one party
[SMO-SFO-ICO-PE-046-GU-
Presentation This module contains all the SSL definitions. See also the SSL Security Guidance Introduction The package SSL is a static library which implements an API to use the dynamic SSL library. It
Smart Card. Smart Card applications
Smart Card Chip Plastic card A very secure way of storing a small amount of sensitive data 1 Smart Card applications Retail Sale of goods using Electronic Purses, Credit / Debit Vending machines Loyalty
Key & Data Storage on Mobile Devices
Key & Data Storage on Mobile Devices Advanced Computer Networks 2015/2016 Johannes Feichtner [email protected] Outline Why is this topic so delicate? Keys & Key Management High-Level Cryptography
Security (II) ISO 7498-2: Security Architecture of OSI Reference Model. Outline. Course Outline: Fundamental Topics. EE5723/EE4723 Spring 2012
Course Outline: Fundamental Topics System View of Network Security Network Security Model Security Threat Model & Security Services Model Overview of Network Security Security Basis: Cryptography Secret
Strong Authentication Protocol using PIV Card with Mobile Devices
KTH Information and Communication Technology Strong Authentication Protocol using PIV Card with Mobile Devices Kunning Mao KTH Royal Institute of Technology School of Information and Communication Technology
Digital Certificates (Public Key Infrastructure) Reshma Afshar Indiana State University
Digital Certificates (Public Key Infrastructure) Reshma Afshar Indiana State University October 2015 1 List of Figures Contents 1 Introduction 1 2 History 2 3 Public Key Infrastructure (PKI) 3 3.1 Certificate
SEZ SEZ Online Manual Digital Signature Certficate [DSC] V Version 1.2
SEZ SEZ Online Manual Digital Signature Certficate [DSC] V Version 1.2 Table of Contents 1 Introduction...2 2 Procurement of DSC...3 3 Installation of DSC...4 4 Procedure for entering the DSC details of
Securing Card-Not-Present Transactions through EMV Authentication. Matthew Carter and Brienne Douglas December 18, 2015
Securing Card-Not-Present Transactions through EMV Authentication Matthew Carter and Brienne Douglas December 18, 2015 Outline Problem Card-Not-Present (CNP) vs. PayPal EMV Technology EMV CNP Experiment
OWASP Mobile Top Ten 2014 Meet the New Addition
OWASP Mobile Top Ten 2014 Meet the New Addition Agenda OWASP Mobile Top Ten 2014 Lack of Binary Protections added Why is Binary Protection important? What Risks Need to be Mitigated? Where to Go For Further
Authentication Applications
Authentication Applications will consider authentication functions developed to support application-level authentication & digital signatures will consider Kerberos a private-key authentication service
Information System Security
Information System Security Chapter 1:Introduction Dr. Lo ai Tawalbeh Faculty of Information system and Technology, The Arab Academy for Banking and Financial Sciences. Jordan Chapter 1 Introduction The
Key Management and Distribution
Key Management and Distribution Raj Jain Washington University in Saint Louis Saint Louis, MO 63130 [email protected] Audio/Video recordings of this lecture are available at: http://www.cse.wustl.edu/~jain/cse571-11/
USB Portable Storage Device: Security Problem Definition Summary
USB Portable Storage Device: Security Problem Definition Summary Introduction The USB Portable Storage Device (hereafter referred to as the device or the TOE ) is a portable storage device that provides
/ Preparing to Manage a VMware Environment Page 1
Configuring Security for a Managed VMWare Enviroment in VMM Preparing to Manage a VMware Environment... 2 Decide Whether to Manage Your VMware Environment in Secure Mode... 2 Create a Dedicated Account
Contactless Smart Cards vs. EPC Gen 2 RFID Tags: Frequently Asked Questions. July, 2006. Developed by: Smart Card Alliance Identity Council
Contactless Smart Cards vs. EPC Gen 2 RFID Tags: Frequently Asked Questions July, 2006 Developed by: Smart Card Alliance Identity Council Contactless Smart Cards vs. EPC Gen 2 RFID Tags: Frequently Asked
WhiteHat Security White Paper. Top 11 PCI DSS 3.0 Changes That Will Affect Your Application Security Program
WhiteHat Security White Paper Top 11 PCI DSS 3.0 Changes That Will Affect Your Application Security Program October 2015 The Payment Card Industry Data Security Standard (PCI DSS) is a proprietary information
Cryptography and Network Security Overview & Chapter 1. Network Security. Chapter 0 Reader s s Guide. Standards Organizations.
Cryptography and Network Security Overview & Chapter 1 Fifth Edition by William Stallings Lecture slides by Lawrie Brown (with edits by RHB) Chapter 0 Reader s s Guide The art of war teaches us to rely
SBClient SSL. Ehab AbuShmais
SBClient SSL Ehab AbuShmais Agenda SSL Background U2 SSL Support SBClient SSL 2 What Is SSL SSL (Secure Sockets Layer) Provides a secured channel between two communication endpoints Addresses all three
Certification Report
Certification Report HP Network Automation Ultimate Edition 10.10 Issued by: Communications Security Establishment Certification Body Canadian Common Criteria Evaluation and Certification Scheme Government
Smart Cards and their Operating Systems
Smart Cards and their Operating Systems Heng Guo HUT, Telecommunications Software and Multimedia Laboratory [email protected] ABSTRACT This paper presents smart cards and their operating systems. First smart
Efficient Padding Oracle Attacks on Cryptographic Hardware
Efficient Padding Oracle Attacks on Cryptographic Hardware Romain Bardou 1, Riccardo Focardi 2, Yusuke Kawamoto 3, Lorenzo Simionato 2, Graham Steel 4, and Joe-Kai Tsay 5 1 INRIA SecSI, LSV, CNRS & ENS-Cachan,
Introduction...3 Terms in this Document...3 Conditions for Secure Operation...3 Requirements...3 Key Generation Requirements...
Hush Encryption Engine White Paper Introduction...3 Terms in this Document...3 Conditions for Secure Operation...3 Requirements...3 Key Generation Requirements...4 Passphrase Requirements...4 Data Requirements...4
Systematization of Knowledge Lessons Learned From SSL/TLS Attacks 20.08.2013
Systematization of Knowledge Lessons Learned From SSL/TLS Attacks 20.08.2013 [email protected] Source: http://www.digicert.com Source: http://www.digicert.com Source: http://www.digicert.com What
A Survey on Untransferable Anonymous Credentials
A Survey on Untransferable Anonymous Credentials extended abstract Sebastian Pape Databases and Interactive Systems Research Group, University of Kassel Abstract. There are at least two principal approaches
Integration Guide. SafeNet Authentication Service. SAS Using RADIUS Protocol with Microsoft DirectAccess
SafeNet Authentication Service Integration Guide SAS Using RADIUS Protocol with Microsoft DirectAccess Technical Manual Template Release 1.0, PN: 000-000000-000, Rev. A, March 2013, Copyright 2013 SafeNet,
Adversary Modelling 1
Adversary Modelling 1 Evaluating the Feasibility of a Symbolic Adversary Model on Smart Transport Ticketing Systems Authors Arthur Sheung Chi Chan, MSc (Royal Holloway, 2014) Keith Mayes, ISG, Royal Holloway
Rapid Security Framework (RSF) Taxonomie, Bewertungsparameter und Marktanalyse zur Auswahl von Fuzzing-Tools
Rapid Security Framework (RSF) Taxonomie, Bewertungsparameter und Marktanalyse zur Auswahl von Fuzzing-Tools Prof. Dr. Hartmut Pohl Peter Sakal, B.Sc. M.Sc. Motivation Attacks Industrial espionage Sabotage
Criteria for web application security check. Version 2015.1
Criteria for web application security check Version 2015.1 i Content Introduction... iii ISC- P- 001 ISC- P- 001.1 ISC- P- 001.2 ISC- P- 001.3 ISC- P- 001.4 ISC- P- 001.5 ISC- P- 001.6 ISC- P- 001.7 ISC-
Overview of Contactless Payment Cards. Peter Fillmore. July 20, 2015
Overview of Contactless Payment Cards Peter Fillmore July 20, 2015 Blackhat USA 2015 Introduction Contactless payments have exploded in popularity over the last 10 years with various schemes being popular
An Overview of Common Adversary Models
An Overview of Common Adversary Karl Palmskog [email protected] 2012-03-29 Introduction Requirements of Software Systems 1 Functional Correctness: partial, termination, liveness, safety,... 2 Nonfunctional
HMRC Secure Electronic Transfer (SET)
HM Revenue & Customs HMRC Secure Electronic Transfer (SET) Installation and key renewal overview Version 3.0 Contents Welcome to HMRC SET 1 What will you need to use HMRC SET? 2 HMRC SET high level diagram
Security Analysis of PLAID
Security Analysis of PLAID Dai Watanabe 1 Yokoyama Laboratory, Hitachi, Ltd., 292 Yoshida-cho, Totsuka-ku, Yokohama, 244-0817, Japan [email protected] Abstract. PLAID is a mutual authentication
Applying Cryptography as a Service to Mobile Applications
Applying Cryptography as a Service to Mobile Applications SESSION ID: CSV-F02 Peter Robinson Senior Engineering Manager RSA, The Security Division of EMC Introduction This presentation proposes a Cryptography
Public Key Cryptography in Practice. c Eli Biham - May 3, 2005 372 Public Key Cryptography in Practice (13)
Public Key Cryptography in Practice c Eli Biham - May 3, 2005 372 Public Key Cryptography in Practice (13) How Cryptography is Used in Applications The main drawback of public key cryptography is the inherent
EMV (Chip and PIN) Project. EMV card
EMV (Chip and PIN) Project Student: Khuong An Nguyen Supervisor: Professor Chris Mitchell Year: 2009-2010 Full Unit Project EMV card 1 Contents Figures... 6 Tables... 7 1. Introduction... 8 1.1 Electronic
Whitepaper on identity solutions for mobile devices
Whitepaper on identity solutions for mobile devices How software and hardware features of modern mobile devices can improve the security and user experience of your software Author: Jonas Lindstrøm The
SY0-201. system so that an unauthorized individual can take over an authorized session, or to disrupt service to authorized users.
system so that an unauthorized individual can take over an authorized session, or to disrupt service to authorized users. From a high-level standpoint, attacks on computer systems and networks can be grouped
The basic groups of components are described below. Fig X- 1 shows the relationship between components on a network.
Elements of Email Email Components There are a number of software components used to produce, send and transfer email. These components can be broken down as clients or servers, although some components
FIPS 140 2 Non Proprietary Security Policy: IBM Internet Security Systems Proventia GX Series Security
FIPS 140 2 Non Proprietary Security Policy IBM Internet Security Systems Proventia GX Series Security Document Version 1.2 January 31, 2013 Document Version 1.2 IBM Internet Security Systems Page 1 of
SecureDoc Disk Encryption Cryptographic Engine
SecureDoc Disk Encryption Cryptographic Engine FIPS 140-2 Non-Proprietary Security Policy Abstract: This document specifies Security Policy enforced by SecureDoc Cryptographic Engine compliant with the
CA Certificate Policy. SCHEDULE 1 to the SERVICE PROVIDER AGREEMENT
CA Certificate Policy SCHEDULE 1 to the SERVICE PROVIDER AGREEMENT This page is intentionally left blank. 2 ODETTE CA Certificate Policy Version Number Issue Date Changed By 1.0 1 st April 2009 Original
BlackBerry Enterprise Service 10. Secure Work Space for ios and Android Version: 10.1.1. Security Note
BlackBerry Enterprise Service 10 Secure Work Space for ios and Android Version: 10.1.1 Security Note Published: 2013-06-21 SWD-20130621110651069 Contents 1 About this guide...4 2 What is BlackBerry Enterprise
Public-Key Infrastructure
Public-Key Infrastructure Technology and Concepts Abstract This paper is intended to help explain general PKI technology and concepts. For the sake of orientation, it also touches on policies and standards
