Caught in the Maze of Security Standards



Similar documents
ETSI TS V1.2.1 ( )

CS 758: Cryptography / Network Security

Description of the Technical Component:

Developing and Investigation of a New Technique Combining Message Authentication and Encryption

A Security Flaw in the X.509 Standard Santosh Chokhani CygnaCom Solutions, Inc. Abstract

Cryptography & Digital Signatures

Message Authentication Code

Practice Questions. CS161 Computer Security, Fall 2008

Overview of Cryptographic Tools for Data Security. Murat Kantarcioglu

Error oracle attacks and CBC encryption. Chris Mitchell ISG, RHUL

Handling of card data in conformance with PCI DSS

Lecture 9: Application of Cryptography

Keep Out of My Passport: Access Control Mechanisms in E-passports

Network Security. HIT Shimrit Tzur-David

Authentication requirement Authentication function MAC Hash function Security of

Cryptography and Network Security Chapter 12

Chapter 3. Network Domain Security

Measurement and Analysis Introduction of ISO7816 (Smart Card)

Security (WEP, WPA\WPA2) 19/05/2009. Giulio Rossetti Unipi

Web Security Considerations

Three attacks in SSL protocol and their solutions

Attestation and Authentication Protocols Using the TPM

12/3/08. Security in Wireless LANs and Mobile Networks. Wireless Magnifies Exposure Vulnerability. Mobility Makes it Difficult to Establish Trust

Client Server Registration Protocol

Cryptography and Network Security: Summary

IPsec Details 1 / 43. IPsec Details

ISO/IEC for secure mobile web applications

Authenticity of Public Keys

Message Authentication Codes

Chapter 17. Transport-Level Security

Authenticated encryption

IT Networks & Security CERT Luncheon Series: Cryptography

Talk announcement please consider attending!

Network Security CS 5490/6490 Fall 2015 Lecture Notes 8/26/2015

Counter Expertise Review on the TNO Security Analysis of the Dutch OV-Chipkaart. OV-Chipkaart Security Issues Tutorial for Non-Expert Readers

BSI TR : Secure Transport. Requirements for Service Providers (EMSP) regarding a secure Transport of s

Communication Security for Applications

Secure Network Communications FIPS Non Proprietary Security Policy

R&S MKS9680 Modular Encryption Device Secure voice, fax and data transmission

IY2760/CS3760: Part 6. IY2760: Part 6

Triathlon of Lightweight Block Ciphers for the Internet of Things

NISTIR 7676 Maintaining and Using Key History on Personal Identity Verification (PIV) Cards

Chapter 6 CDMA/802.11i

Introducing etoken. What is etoken?

Cryptographic hash functions and MACs Solved Exercises for Cryptographic Hash Functions and MACs

SPC5-CRYP-LIB. SPC5 Software Cryptography Library. Description. Features. SHA-512 Random engine based on DRBG-AES-128

Common Pitfalls in Cryptography for Software Developers. OWASP AppSec Israel July The OWASP Foundation

Chair for Network Architectures and Services Department of Informatics TU München Prof. Carle. Network Security. Chapter 13

MOTOROLA MESSAGING SERVER SERVER AND MOTOROLA MYMAIL DESKTOP PLUS MODULE OVERVIEW. Security Policy REV 1.3, 10/2002

Message authentication and. digital signatures

Network Security. Security Attacks. Normal flow: Interruption: 孫 宏 民 Phone: 國 立 清 華 大 學 資 訊 工 程 系 資 訊 安 全 實 驗 室

Protection Profile for UK Dual-Interface Authentication Card

Network Security. Computer Networking Lecture 08. March 19, HKU SPACE Community College. HKU SPACE CC CN Lecture 08 1/23

GlobalPlatform. Card Specification. Version 2.2

Authentication Types. Password-based Authentication. Off-Line Password Guessing

SAMPLE EXAM QUESTIONS MODULE EE5552 NETWORK SECURITY AND ENCRYPTION ECE, SCHOOL OF ENGINEERING AND DESIGN BRUNEL UNIVERSITY UXBRIDGE MIDDLESEX, UK

An Introduction to Cryptography as Applied to the Smart Grid

Fighting product clones through digital signatures

Key Agreement from Close Secrets over Unsecured Channels Winter 2010

Security Analysis of PLAID

50 ways to break RFID privacy

2.4: Authentication Authentication types Authentication schemes: RSA, Lamport s Hash Mutual Authentication Session Keys Trusted Intermediaries

JTC 1/SC 27Security Techniques - Översikt arbetsgrupper och standarder

Modeling and verification of security protocols

Secure Automatic Ticketing System

USB Portable Storage Device: Security Problem Definition Summary

Computer Networks. Network Security 1. Professor Richard Harris School of Engineering and Advanced Technology

Security Engineering Part III Network Security. Security Protocols (I): SSL/TLS

Network Security. Chapter 3 Symmetric Cryptography. Symmetric Encryption. Modes of Encryption. Symmetric Block Ciphers - Modes of Encryption ECB (1)

eidas as blueprint for future eid projects cryptovision mindshare 2015 HJP Consulting Holger Funke

SLE66CX322P or SLE66CX642P / CardOS V4.2B FIPS with Application for Digital Signature

Secret Sharing based on XOR for Efficient Data Recovery in Cloud

Journal of Mobile, Embedded and Distributed Systems, vol. I, no. 1, 2009 ISSN

Security Policy for Oracle Advanced Security Option Cryptographic Module

CSC474/574 - Information Systems Security: Homework1 Solutions Sketch

SSL/TLS: The Ugly Truth

SIGMA: the SIGn-and-MAc Approach to Authenticated Diffie-Hellman and its Use in the IKE Protocols

Cryptographic and Security Testing Laboratory. Deputy Laboratory Director, CST Laboratory Manager

Lecture Objectives. Lecture 8 Mobile Networks: Security in Wireless LANs and Mobile Networks. Agenda. References

OFFICE OF THE CONTROLLER OF CERTIFICATION AUTHORITIES TECHNICAL REQUIREMENTS FOR AUDIT OF CERTIFICATION AUTHORITIES

Kerberos. Login via Password. Keys in Kerberos

Security Technical. Overview. BlackBerry Enterprise Service 10. BlackBerry Device Service Solution Version: 10.2

Protocol Rollback and Network Security

Human Factors in Information Security

SECURE USB FLASH DRIVE. Non-Proprietary Security Policy

CIS433/533 - Computer and Network Security Cryptography

Chapter 8 Security. IC322 Fall Computer Networking: A Top Down Approach. 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012

1 Construction of CCA-secure encryption

Security Protocols/Standards

FIPS Non Proprietary Security Policy: Kingston Technology DataTraveler DT4000 Series USB Flash Drive

Lecture 10: CPA Encryption, MACs, Hash Functions. 2 Recap of last lecture - PRGs for one time pads

The Misuse of RC4 in Microsoft Word and Excel

Technical Guideline TR ecard-api-framework Protocols. Version 1.1.5

Athena Smartcard Inc. IDProtect Key with LASER PKI FIPS Cryptographic Module Security Policy. Document Version: 1.0 Date: April 25, 2012

Applying Cryptography as a Service to Mobile Applications

CSCE 465 Computer & Network Security

Hacking Mifare Classic Cards. Márcio Almeida

Transcription:

Caught in the Maze of ΓΝΩΘΙΣ Know Thyself ΑΥΤΟΝ Security Standards Dieter Gollmann Hamburg University of Technology

What this talk is not about 1. Designing security protocols is difficult and error prone We have heard it before. It is not true. Unless you insist on repeating known mistakes. 2. Flawed protocols can be found in standards. Go back to square 1. 2

What this talk is about Observations from a security evaluation of a German ecard project. Observations on the interplay between various security standards relevant for this project. ecard security is a politically charged topic; certificational weaknesses do matter. 3

Accreditation Someone has to make the decision to turn on a security critical system (accreditation). Executive management decision Components can be certified for use in certain applications (certification). For certification components are evaluated (evaluation). Technical checks How are these processes coordinated? How are the security requirements for the different steps specified? 4

Case study Security protocols use cryptographic algorithms, names, nonces, sequence numbers, time stamps etc to meet their security goals. How to specify protocols and security goals? Who specifies protocols and security goals? Further considerations cryptographic algorithms age; recommendations on key length and algorithms are regularly updated. 5

Security map Applications (with smart cards) BSI TR 03116 ISO/IEC 9798 series Protection Profiles Where/how is security specified? CWA 14980-1 6

Standards, etc. BSI TR03116 ecard-projekte der Bundesregierung catalogue of cryptographic algorithms, with required key and seed lengths, regularly updated does not specify protocols does not specify security requirements for protocols refers to international standards: CWA 14980-1, pren 14980-1, ANSI X9.63, ISO 9798-3 https://www.bsi.bund.de/cln_134/contentbsi/publikationen/ TechnischeRichtlinien/tr03116/index_htm.html 7

Standards, etc. CWA 14980-1 [CEN]: functional specification for smart cards, i.e. mainly interface specifications. Developers of card systems should not be unnecessarily restricted in their design decisions. defines concrete formats for protocol messages defines cryptographic algorithms defines some internal checks in the card instruction set from ISO/IEC 7816-4 No precise security properties of protocols ftp://ftp.cenorm.be/public/cwas/e- Europe/eSign/cwa14890-01-2004-Mar.pdf 8

Standards, etc ISO/IEC 9798: International standard for authentication protocols explains security properties of protocols; for details of authentication properties see e.g. the Handbook of Applied Cryptography defines protocols generically as sequences of messages abstract message formats does not define specific crypto algorithms or lengths of message fields useful advice on the use of optional fields 9

Protection Profiles Part of the Common Criteria evaluation methodology define security requirements for application classes several ecard protection profiles, e.g. epassport, machine readable travel documents, and many more specify generic protection requirements for the application (confidentiality, integrity, ) no concrete requirements on security protocols http://www.commoncriteriaportal.org/ 10

Comment It is very reasonable when application developers do not specify their own security protocols. It is very reasonable to refer to international standards and official technical guidance documents. Disadvantage: a lot of indirection. Where to find the security requirements for a given application? Who is in charge of coordinating this portfolio of standards and technical guidance documents? 11

ISO 9798-2 A R B Text1 B K AB TokenAB = Text3 ek AB (R B B Text2) K AB B verifies TokenAB by deciphering the enciphered part and checking the correctness of the distinguishing identifier B, if present, and that the random number R B, sent to A in step (1), agrees with the random number contained in TokenAB. Distinguishing identifier B is included in TokenAB to prevent a so-called reflection attack. 12

Problem? A R B Text1 B K AB TokenAB = Text3 ek AB (R B B Text2) K AB BSI TR03116 recommends TDES (168 bit key) CWA 14980-1 uses 64 bit random challenge R B, TDES in CBC mode with fixed IV=0. Effort to guess TokenAB: 2 63 Using TDES suggests a security level that is actually not reached. 13

CWA 14980-1, section 8.7.1 card reader interface device IFD GET DATA ICC smart card integrated circuit card S = RND.IFD SN.IFD RND.ICC SN.ICC K IFD SN.ICC GET CHALLENGE (n) RND.ICC ek ENC (S) MAC(K MAC ;ek ENC (S)) ek ENC (R) MAC(K MAC ;ek ENC (R)) decrypts input; compares RND.ICC with previous response; verifies RND.ICC, SN.ICC R = RND.ICC SN.ICC RND.IFD SN.IFD K ICC 14

Problem? Attacker Malou GET DATA ICC smart card integrated circuit card S = RND.IFD SN.IFD RND.ICC SN.ICC K IFD SN.ICC GET CHALLENGE (1) RND.ICC ek ENC (S) MAC(K MAC ;ek ENC (S)) ek ENC (R) MAC(K MAC ;ek ENC (R)) decrypts input; compares RND.ICC with previous response; verifies RND.ICC, SN.ICC attacker asks for 8 bit random challenge; standard does not define how card should react. Don t trust your inputs! R = RND.ICC SN.ICC RND.IFD SN.IFD K ICC 15

Variation card reader interface device IFD RND.IFD SN.IFD ICC smart card integrated circuit card R = RND.IFD SN.IFD RND.ICC SN.ICC K IFD ek ENC (S) MAC(K MAC ;ek ENC (S)) ek ENC (R) MAC(K MAC ;ek ENC (R)) S = RND.ICC SN.ICC RND.IFD SN.IFD K ICC 16

Problem? Attacker Malou RND.IFD SN.ICC ICC smart card integrated circuit card Attack succeeds if RND.ICC = RND.IFD ek ENC (S) MAC(K MAC ;ek ENC (S)) ek ENC (S) MAC(K MAC ;ek ENC (S)) S = RND.ICC SN.ICC RND.IFD SN.ICC K ICC ICC does not recognize its own message 17

Problem? K ICC, K IFD are 32 byte random values. K ICC K IFD is input for the generation of the session key. In the previous scenario K ICC = K IFD. Attacker does not know this value, but knows K ICC K ICC = 0 and can compute the session key. XOR with random value does not give perfect security. 18

Conclusion: All problems can be solved, but where? Applications (with smart cards) BSI TR 03116 ISO/IEC 9798 series Protection Profiles Where/how is security specified? CWA 14980-1 19