The Digital Signature Paradox



Similar documents
Authentication requirement Authentication function MAC Hash function Security of

NEMA Standards Publication PS 3 Supplement 41. Digital Imaging and Communications in Medicine (DICOM) Digital Signatures

ETSI TS V1.1.1 ( ) Technical Specification

Part I. Universität Klagenfurt - IWAS Multimedia Kommunikation (VK) M. Euchner; Mai Siemens AG 2001, ICN M NT

Network Security. Security Attacks. Normal flow: Interruption: 孫 宏 民 Phone: 國 立 清 華 大 學 資 訊 工 程 系 資 訊 安 全 實 驗 室

OOo Digital Signatures. Malte Timmermann Technical Architect Sun Microsystems GmbH

Network Security. Gaurav Naik Gus Anderson. College of Engineering. Drexel University, Philadelphia, PA. Drexel University. College of Engineering

Security Digital Certificate Manager

Security Digital Certificate Manager

Biometrics, Tokens, & Public Key Certificates

Overview. SSL Cryptography Overview CHAPTER 1

How to Time Stamp PDF and Microsoft Office 2010/2013 Documents with the Time Stamp Server

JTC 1/SC 27Security Techniques - Översikt arbetsgrupper och standarder

2.1 The scope of Time Stamping Protocol (TSP)

Trustis FPS PKI Glossary of Terms

TechNote 0006: Digital Signatures in PDF/A-1

Network Security. Computer Networking Lecture 08. March 19, HKU SPACE Community College. HKU SPACE CC CN Lecture 08 1/23

TC TrustCenter GmbH Time-Stamp Policy

Record Integrity and Authentication for Electronic R&D

Content Teaching Academy at James Madison University

Technical Description. DigitalSign 3.1. State of the art legally valid electronic signature. The best, most secure and complete software for

TELECOMMUNICATION NETWORKS

Meeting the FDA s Requirements for Electronic Records and Electronic Signatures (21 CFR Part 11)

Ericsson Group Certificate Value Statement

Entrust Certificate Services. Java Code Signing. User Guide. Date of Issue: December Document issue: 2.0

Guideline for Implementing Cryptography In the Federal Government

IT Networks & Security CERT Luncheon Series: Cryptography

Adobe PDF for electronic records

Safeguarding Data Using Encryption. Matthew Scholl & Andrew Regenscheid Computer Security Division, ITL, NIST

SECURITY IN NETWORKS

A Security Flaw in the X.509 Standard Santosh Chokhani CygnaCom Solutions, Inc. Abstract

Kerberos. Public domain image of Heracles and Cerberus. From an Attic bilingual amphora, BC. From Italy (?).

ETSI TS V1.1.1 ( ) Technical Specification

mod_ssl Cryptographic Techniques

Key Management Interoperability Protocol (KMIP)

Cryptographic Modules, Security Level Enhanced. Endorsed by the Bundesamt für Sicherheit in der Informationstechnik

Cryptography in Metrology

Understanding digital certificates

Randomized Hashing for Digital Signatures

The Importance of Security Standards

Innovations in Digital Signature. Rethinking Digital Signatures

10 Secure Electronic Transactions: Overview, Capabilities, and Current Status

Overview of Cryptographic Tools for Data Security. Murat Kantarcioglu

Entrust Managed Services PKI. Getting started with digital certificates and Entrust Managed Services PKI. Document issue: 1.0

Understanding Digital Certificates & Secure Sockets Layer (SSL): A Fundamental Requirement for Internet Transactions

Outline. Computer Science 418. Digital Signatures: Observations. Digital Signatures: Definition. Definition 1 (Digital signature) Digital Signatures

EFFECT OF THE SARBANES-OXLEY ACT OF 2002

Lecture 9: Application of Cryptography

Introduction to Computer Security

Digital Signatures. (Note that authentication of sender is also achieved by MACs.) Scan your handwritten signature and append it to the document?

Information Security

Implement best practices by using FileMaker Pro 7 as the backbone of your 21 CFR 11 compliant system.

Comparing Cost of Ownership: Symantec Managed PKI Service vs. On- Premise Software

Danske Bank Group Certificate Policy

Computer Networks. Network Security 1. Professor Richard Harris School of Engineering and Advanced Technology

Berkley Insurance Company

An Introduction to Cryptography as Applied to the Smart Grid

ETSI EN V1.1.1 ( )

How To Understand And Understand The Certificate Authority (Ca)

12/3/08. Security in Wireless LANs and Mobile Networks. Wireless Magnifies Exposure Vulnerability. Mobility Makes it Difficult to Establish Trust

Network Security. Abusayeed Saifullah. CS 5600 Computer Networks. These slides are adapted from Kurose and Ross 8-1

CRYPTOGRAPHY IN NETWORK SECURITY

Certificates. Noah Zani, Tim Strasser, Andrés Baumeler

Information & Communication Security (SS 15)

Fighting product clones through digital signatures

Cryptography and Network Security Overview & Chapter 1. Network Security. Chapter 0 Reader s s Guide. Standards Organizations.

5 FAM 140 ACCEPTABILITY AND USE OF ELECTRONIC SIGNATURES

Understanding Digital Signature And Public Key Infrastructure

Digital Signatures in a PDF

The Concept of Trust in Network Security

PkBox Technical Overview. Ver

CIS 6930 Emerging Topics in Network Security. Topic 2. Network Security Primitives

TC TrustCenter GmbH Time-Stamp Practice and Disclosure Statement

How encryption works to provide confidentiality. How hashing works to provide integrity. How digital signatures work to provide authenticity and

Minnesota State Colleges and Universities System Procedures Chapter 5 Administration Procedures associated with Board Policy 5.22

Publicly trusted certification authorities (CAs) confirm signers identities and bind their public key to a code signing certificate.

1 Definitions

HOLDER IN DUE COURSE and CHECK FRAUD

Human Factors in Information Security

ETSI TS V1.1.2 ( ) Technical Specification

Chapter 7 Transport-Level Security

CoSign for 21CFR Part 11 Compliance

ehealth Ontario PKI Certification Policy Manual

Apple Corporate Certificates Certificate Policy and Certification Practice Statement. Apple Inc.

X.509 Certificate Generator User Manual

Chapter 4. Authentication Applications. COSC 490 Network Security Annie Lu 1

Digital Certificates (Public Key Infrastructure) Reshma Afshar Indiana State University

How To Get A Whistleblower Pass On A Corporation

Transcription:

White Paper The Digital Signature Paradox Jeff Stapleton, Paul Doyle, Steven Teppler, Esq. Abstract Paradox is a term often associated with Hollywood s fanciful time travel; however in the real world a time paradox does, in fact, exist. The system clock is the immediate source of time for any computer, and is the sole source for a time stamp determining when a document was created, modified and printed; or more interestingly when a digital signature was generated. Fraud has already been perpetrated by turning back system clocks, leading to the falsification of information for which individuals have been disbarred or incarcerated. The application of a digital signature would not have resolved these issues; that is because digital signatures are time-insensitive. However, an independent clock source providing a trusted time stamp would and can circumvent individuals taking such illegal liberties. This paper posits that data integrity needs to be redefined within the context of a time-sensitive mechanism. This document is an updated version of a paper titled The Digital Signature Paradox that was originally published in the Proceedings of the 2005 IEEE Workshop on Information Assurance and Security. It has been made available in this format with the permission of the authors.

White Paper Table of Contents I. Introduction 3 A. Asymmetric Cryptography 3 B. Digital Signatures 3 C. Stamping 5 II. Paradox 7 A. -Insensitive Digital Signatures 7 B. Trusted Stamp 8 C. X9.95 Standard 9 III. Consequences of -Based Data Manipulation 10 A. Enron (CFO) 10 B. Rite-Aid (CEO, CFO) 10 C. NextCard (Auditors) 10 D. Autotote (Programmers) 10 E. Sirena Corp (CEO) 10 F. Parmalat (CEO, CFO, and Family) 10 G. Adelphia Communications (executives) 11 IV. Conclusion 11 V. References 12

White Paper I. Introduction A. Asymmetric Cryptography Public key cryptography is the security discipline employing asymmetric cryptography that enables key establishment of symmetric keys and digital signatures. The intrinsic modularity of asymmetric cryptographic algorithms limits their applicability to relatively short data lengths such that they are typically used to establish symmetric cryptographic keys versus operating on the data itself. The established symmetric keys are then used in streaming or block ciphers with practically unlimited data lengths. Key establishment algorithms come in two flavors key agreement and key transport [X9.44]: Key agreement is a key establishment protocol whose secret key is a function of information contributed by two or more participants, so that no party can predetermine the value of the key. Key transport is a key establishment protocol under which the secret key is determined by the initiating party. B. Digital Signatures With regard to digital signatures, a hashing function is applied to very long data strings to produce a hash value; and the asymmetric private is applied to the hash value to generate a digital signature. The digital signature can be verified by a relying party using the corresponding asymmetric public key. In a classical public key infrastructure the identity of the signer is provided to the relying party via a public key certificate [X.509] issued by a certification authority (CA). The CA s digital signature on the signer s certificate cryptographically binds the signer s identity to the public key. Similarly, the CA s public key may likewise be encapsulated in another certificate issued by another CA such that a chain of certificates may exist; leading to a root CA. The underlying assumption is that the relying party has and trusts one or more of the certification authorities in the certificate chain. 3

White Paper Root CA Signature Red CA Signature Signer Signature???? Data Asymmetric public key Public key certificate Public key certificate Figure 1 Certificate Chain As shown in Figure 1 Certificate Chain, the signer generates a digital signature on data. The relying party checks the signer s white certificate and determines that it was issued by the Red CA; the relying party checks the Red CA s certificate and determines that it was issued by the green Root CA. Assuming that the relying party has a trusted copy of the green Root CA s public key, the relying party verifies the green signature on the Red CA s certificate and thus can trust the Red CA public key; the relying party verifies the red signature on the signer s certificate and thus can trust the signer s white public key; the relying party can finally verify the signer s signature on the data.

White Paper C. Stamping Most networks provide a system time such that data can be time stamped with the year, month, day, hour, minute, and second. Figure 2 System Stamps shows the relationship between the system clock and the time stamp associated with each piece of signed data. Signer???? Data? T1???? Data? T2???? Data? T3 Figure 2 System Stamps Presumably the time stamp indicates a sequence to the relying party and implies when the digital signatures were generated. However, note that the system generated time stamp is not independent of the data generation, or the digital signature generation processes. The system clock, via the local or wide area network, may be synchronized to a national measurement institute whose clock is calibrated to the international time authority Bureau International des Poids et Mesures (BIPM) located in France. In the United States, the recognized national measurement institutes are the National Institute of Standards and Technology (NIST) and the United States Naval Observatory (USNO).

White Paper Figure 3 US National Measurement Institutes shows the relationship of the various NIST timing services such as the: Internet Service (ITS), Automated Computer Service (ACTS), Frequency Measurement Analysis Service (FMAS); and the Global Positioning System (GPS) operated by the USNO [NIST].??? ITA International Authority National Institute of Standards & Technology???? NIST???? USNO United States Naval Observatory Automated Computer Service???? ACTS Traceable Monitored??? GPS Global Positioning System??? ITS Calibration Calibration Calibration???? FMAS Internet Service Device Under Test (DUT) Frequency Measurement & Analysis Service Figure 3 US National Measurement Institutes

White Paper II. Paradox A. -Insensitive Digital Signatures Figure 4 Digital Signature Paradox below shows the same sequence of signed data; however the system clock has been reset such that the same time stamp is generated at three different times (T1, T2, and T3) for different versions of the same data. The time paradox is that a relying party now has three versions of the same data with the same time stamp; and despite the presence of a legitimate digital signature the relying party can no longer have confidence in the data. Thus digital signatures are time-insensitive. The relying party has no practical method to distinguish between the three data versions, has no method to prioritize the data versions and has no option but to distrust all three versions. In order for the relying party to distinguish between the data versions and continue to trust the digital signatures, the signer needs to implement a verifiable mechanism such that the time stamp generation is independent of the signature generation. This method is referred to as a trusted time stamp. Signer Data T1 Data T2 Data T3 Figure 4 Digital Signature Paradox 7

White Paper B. Trusted Stamp In a trusted time stamp scheme, there are five entities: time source entity, time stamp authority, requestor, verifier, and relying party. The relying party can be the requestor or any other third party. The time stamp authority (TSA) calibrates its clock with an upstream time source entity such as Master Clock (MC) or directly with a national measurement institute. The TSA provides a trusted time stamp token to the requestor. The time stamp token can be verified by a third party verifier. Figure 5 Trusted Stamp shows the relationship between the time source entities, the TSA, and the requestor. The requestor generates a digital signature by hashing known data and applying its asymmetric private key to the hash. The digital signature is presented to the TSA as a request for a time stamp token. Note that the TSA only knows the digital signature, not the original source data, and therefore has no liability as to the data content. The TSA appends a time stamp to the requestor s hash and binds them together with a cryptographic method, such as a digital signature [X9.95]. The hash, the time stamp and the crypto are the essential elements of the time stamp token that the TSA returns to the requestor. The requestor can then provide the original data, the requestor s digital signature, and the time stamp token to a relying party.??? ITA International Authority Source Entities??? NMI?? MC National Measurement Institute Master Clock Hash Data Stamp Authority TSA Request Response Sign????? Token R Requestor???? Figure 5 Trusted Stamp???? DATA????? Token

Stamp Authority TSA Request Response Sign????? Token White Paper R Requestor???? Figure 6 Verification shows how the relying party can then make use of a verification service who (i) verifies that the hash in the time stamp token matches the data, (ii) verifies the TSA s crypto binding, and (iii) verifies the requestor s digital signature this provides non-reputable evidence of who signed the data (authentication), when it was signed (timeliness) and what data was signed (integrity) provable to an independent third party.???? DATA????? Token???? V Verifier Figure 6 Verification The definition of data integrity a property whereby data has not been altered or destroyed must therefore be expanded to embrace time-sensitive mechanisms such as trusted time stamps. An better definition might then be the continuity of data at a provable point in time. With this definition a relying party can verify that data integrity is currently contiguous from a previous point in time. C. X9.95 Standard The American National Standard X9.95-2005 Trusted Stamps was developed based on RFC 3161 [TSP] and the ISO/IEC 18014 standards [ISO], but goes much further in its analysis and offerings. X9.95 defines time stamp schemes that provide a high assurance level of data integrity and non-repudiation not achievable by digital signatures alone; suitable for regulatory compliance. The standard defines roles, responsibilities, and the management and security requirements for the time source entity, the time stamp authority, the requestor, and the verifier. The standard specifies data objects; message protocol; and trusted time stamp methods, including the digital signature, MAC, linked token, linked and signature, and transient key methods. The standard also provides sample time stamp policy and practice statements along with evaluation compliance criteria suitable for use by a professional practitioner.

White Paper III. Consequences of -Based Data Manipulation A. Enron (CFO) Mr. Fastow, the Chief Financial Officer of Enron, and other members of his executive team made it a habit to engage in time-based data manipulation, i.e., altering or changing financial data to suit whatever it was they wanted the investing public, or governmental authorities, to know or not know. Mr. Fastow pleaded guilty and is now a guest of the federal government. B. Rite-Aid (CEO, CFO) The CEO and the CFO of this publicly-traded company backdated compensation grant letters to enrich themselves by millions of dollars. They then attempted to remove any evidence of their wrongdoing by dumping the computer they used to backdate the documents into the Atlantic Ocean. These gentlemen are now guests of the federal government. C. NextCard (Auditors) Now defunct NextCard was the largest issuer of Internet MasterCard and Visa credit cards. Executives of this former high-flying public company fraudulently and illegally re-characterized loan losses, thereby reducing the amount of cash reserves required. Assisting in no small way in this billion dollar flameout, auditors from Ernst & Young perpetuated the company s fraud by backdating their work papers and their final reports to conform to the fraudulent representations by company executives. These auditors are also currently guests of the federal government. The SEC attorney investigating this matter lamented that the real crime here was that there was no way to ascertain or recover the real, or the true data, because of the time-based data manipulation of these insiders. D. Autotote (Programmers) A senior trusted-insider programmer for the largest electronic wagering organization in the United States back-dated data to create a 6 million dollar winning ticket in the Maryland Breeder s Cup race. This gentleman is now a guest of the state. E. Sirena Corp (CEO) The Securities and Exchange Commission fined publicly traded Sirena Corp. for holding the quarter open for days after the end of that quarter in order to squeeze additional revenues to meet analysts projections. Sirena eventually declared bankruptcy. F. Parmalat (CEO, CFO, and Family) In this 18 billion dollar 2003 bankruptcy, the entire CxO level of this multi-national conglomerate engaged in time-based data manipulation by creating an authenticappearing confirmation by Bank of America, on Bank of America letterhead, and signed by a Bank of America Vice President, to the effect that there existed an offshore bank account holding 5 billion euro on account. In reality both the funds and the account were non-existent, and the alleged Bank of America letter used by the Company to 10

White Paper raise billions in the public credit market was pieced together by the company executives using a scanner and Adobe Photoshop, from three totally unrelated sources. The signature of the Bank of America VP was from the information technology department. There are currently at least three lawsuits, including two class actions, pending in various courts around the world. G. Adelphia Communications (executives) Once one of the largest cable providers in the United States, Adelphia s top executives engaged in time-based data manipulation to hide the theft of more than 400 million dollars from the company. Adelphia subsequently entered bankruptcy, its top executives were tried (and two convicted), and the company is now being acquired by one of its competitors. IV. Conclusion So is time-based data manipulation really that much of a problem? It most certainly is: a multi-billion dollar problem, as the case studies above make clear. When given the opportunity, a certain percentage of trusted insiders will always abuse their authority to manipulate records to their advantage. Digital signature-based schemes cannot adequately address this problem, but trusted timestamp technologies might be just what the doctor ordered: a practical, inexpensive and technically robust solution. 11

White Paper V. References [X9.44] X9.44 (draft) Public Key Cryptography for the Financial Services Industry Key Establishment Using Integer Factorization Cryptography, Accredited Standards Committee X9, www.x9.org, October 2003 [X.509] ISO/IEC International Standard 9594-8 ITUT Recommendation X.509 (1997), Information Technology Open Systems Interconnections The Directory: Authentication Framework [NIST] National Institute of Standards and Technology, Physics Laboratory and Frequency Division, http://www.boulder.nist.gov/timefreq/index.html [X9.95] American National Standard X9.95-2005 Trusted Stamps, Accredited Standards Committee X9, www.x9.org, March 2005 [TPS] Request for Comments (RFC) 3161 Internet X.509 Public Key Infrastructure -Stamp Protocol (TSP), Internet Engineering Task Force (IETF), C. Adams, P. Cain, D. Pinkas, R. Zuccherato, August 2001 [ISO] ISO/IEC 18014 Information Technology Security Techniques Stamping Services, ISO/IEC Joint Technical Committee One (JTC1), 2003 Digital Signature Paradox, J. Stapleton, P. Doyle, S. Teppler Esq., Proceedings of the 2005 6th IEEE, Workshop on Information Assurance and Security, United States Military Academy, West Point, NY Digital Signatures are Not Enough, J. Stapleton, S. Teppler Esq, THE ISSA JOURNAL, January 2006 2007. All Rights Reserved., Transient Key, the logo, ProofMark and the ProofMark System are trademarks of Inc. All other trademarks are owned by their respective companies. 12