Digital signature in insecure environments



Similar documents
Understanding and Integrating KODAK Picture Authentication Cameras

Protecting the Creation of Digital Signatures with Trusted Computing Platform Technology Against Attacks by Trojan Horse Programs

HOW SECURE ARE CURRENT MOBILE OPERATING SYSTEMS?

Secure Data Exchange Solution

That Point of Sale is a PoS

Overview Most of the documentation out there on the transition from SHA-1 certificates to SHA-2 certificates will tell you three things:

What Are Certificates?

Bypassing Local Windows Authentication to Defeat Full Disk Encryption. Ian Haken

Executable Integrity Verification

S3 Control and System Call Indirection

Firmware security features in HP Compaq business notebooks

Content Teaching Academy at James Madison University

HE WAR AGAINST BEING AN INTERMEDIARY FOR ANOTHER ATTACK

Recipe for Mobile Data Security: TPM, Bitlocker, Windows Vista and Active Directory

Patterns for Secure Boot and Secure Storage in Computer Systems

School of Computer Science and Engineering policy with regard to self-administered computers

Secure and Safe Computing Primer Examples of Desktop and Laptop standards and guidelines

User Manual. HitmanPro.Kickstart User Manual Page 1

Trojan Horse Attacks on Software for Electronic Signatures

SecureAge SecureDs Data Breach Prevention Solution

SENSE Security overview 2014

NEW JERSEY STATE POLICE EXAMPLES OF CRIMINAL INTENT

2. From a control perspective, the PRIMARY objective of classifying information assets is to:

BUSINESS COMPUTER SECURITY. aaa BUSINESS SECURITY SECURITY FOR LIFE

NCS 330. Information Assurance Policies, Ethics and Disaster Recovery. NYC University Polices and Standards 4/15/15.

You re FREE Guide SSL. (Secure Sockets Layer) webvisions

Chapter 8: Security Measures Test your knowledge

Chapter 1: Introduction

CD180 CeMOS/Cedar Software Package Management and Release Management Cloud Services

Remote Access Securing Your Employees Out of the Office

WatchGuard Technologies, Inc. 505 Fifth Avenue South Suite 500, Seattle, WA

Studying Security Weaknesses of Android System

LASTLINE WHITEPAPER. In-Depth Analysis of Malware

International Journal of Enterprise Computing and Business Systems ISSN (Online) :

System Security Policy Management: Advanced Audit Tasks

Security Evaluation CLX.Sentinel

Guide Installing Digital Certificates in Outlook 2000

Digital Signatures on iqmis User Access Request Form

THE CHALLENGES OF DATA SECURITY IN THE MODERN OFFICE

WINDOWS AZURE EXECUTION MODELS

PCI PA - DSS. Point BKX Implementation Guide. Version Atos Xenta, Atos Xenteo and Atos Yomani using the Point BKX Payment Core

How To Set Up A Net Integration Firewall

October Is National Cyber Security Awareness Month!

Sophistication of attacks will keep improving, especially APT and zero-day exploits

E-commerce. Security. Learning objectives. Internet Security Issues: Overview. Managing Risk-1. Managing Risk-2. Computer Security Classifications

Ovation Security Center Data Sheet

Using Remote Desktop Clients

Understanding Digital Signature And Public Key Infrastructure

Desktop and Laptop Security Policy

Mitigating Server Breaches with Secure Computation. Yehuda Lindell Bar-Ilan University and Dyadic Security

A Roadmap for personal identity management

Ohio Supercomputer Center

Smart Card- An Alternative to Password Authentication By Ahmad Ismadi Yazid B. Sukaimi

BE SAFE ONLINE: Lesson Plan

Key Management. CSC 490 Special Topics Computer and Network Security. Dr. Xiao Qin. Auburn University

Practical Mobile Digital Signatures

INFORMATION TECHNOLOGY SECURITY POLICY COUNTY OF IMPERIAL

Willem Wiechers 3 rd March 2015

Advanced Endpoint Protection Overview

WEB SECURITY CONCERNS THAT WEB VULNERABILITY SCANNING CAN IDENTIFY

University of Kent Information Services Information Technology Security Policy

IDRBT Working Paper No. 11 Authentication factors for Internet banking

Applying Cryptography as a Service to Mobile Applications

User. Role. Privilege. Environment. Checkpoint. System

Intelligent Log Analyzer. André Restivo

THOUSANDS OF APPS CAN'T BE WRONG: MOBILE APPLICATION ANALYSIS AT SCALE

STANDARD ON CONTROLS AGAINST MALICIOUS CODE

Server Security. Contents. Is Rumpus Secure? 2. Use Care When Creating User Accounts 2. Managing Passwords 3. Watch Out For Aliases 4

B U S I N E S S G U I D E

The 12 Essentials of PCI Compliance How it Differs from HIPPA Compliance Understand & Implement Effective PCI Data Security Standard Compliance

Is Drupal secure? A high-level perspective on web vulnerabilities, Drupal s solutions, and how to maintain site security

Skoot Secure File Transfer

MASTER OF SCIENCE IN INFORMATION ASSURANCE PROGRAM DEPARTMENT OF COMPUTER SCIENCE HAMPTON UNIVERSITY

UNCLASSIFIED Version 1.0 May 2012

BlackBerry Enterprise Service 10. Secure Work Space for ios and Android Version: Security Note

Advanced Authentication

Course overview. CompTIA A+ Certification (Exam ) Official Study Guide (G188eng verdraft)

How To Choose An Electronic Signature

Chapter 1. Introduction to ios Development. Objectives: Touch on the history of ios and the devices that support this operating system.

ELECTRONIC SIGNATURES FACTSHEET

Secure Signature Creation Devices (SSCDs)

Ovation Security Center Data Sheet

ScoMIS Encryption Service

SecureDoc Disk Encryption Cryptographic Engine

Boston University Security Awareness. What you need to know to keep information safe and secure

Contents III: Contents II: Contents: Rule Set Based Access Control (RSBAC) 4.2 Model Specifics 5.2 AUTH

AdwareMedic. About AdwareMedic How to use AdwareMedic Frequently Asked Questions Version History... 9 License Agreement...

LOCKSS on LINUX. Installation Manual and the OpenBSD Transition 02/17/2011

How To Monitor The Internet In Idaho

The Key to Secure Online Financial Transactions

Technical Description. DigitalSign 3.1. State of the art legally valid electronic signature. The best, most secure and complete software for

PCI PA - DSS. Point ipos Implementation Guide. Version VeriFone Vx820 using the Point ipos Payment Core

Guidelines for the use of electronic signature

Article. Electronic Notary Practices. Copyright Topaz Systems Inc. All rights reserved.

How to Encrypt your Windows 7 SDS Machine with Bitlocker

The Feasibility and Application of using a Zero-knowledge Protocol Authentication Systems

Transcription:

Digital signature in insecure environments Janne Varjus Helsinki University of Technology jvarjus@cc.hut.fi Abstract Due to current legislation the digital signatures can be as valid as the hand written signatures. If the signing environment is compromised there is no way for the signatory to know what he/she is signing. Even if signing process is secure, data can be switched before signing by malware. Home computers are usually in a risk to get compromised by virus attacks and computers elsewhere can be untrusted. If computers in a risk cannot be used for signing it greatly reduces the applications of the digital signatures. To solve this issue hardware and software approaches have been developed that try to minimize the risks. KEYWORDS: Digital Signatures, Trusted Computing, Malware 1 Introduction Digital signatures are nowadays as legally binding as the normal signatures are in many countries [7]. Accredited certificate authorities have been around for some time now, but the current usage of the digital signatures is still rare. The digital signatures should be secure enough and easy to use to gain a wide acceptance from the public and the service providers. Current implementations lack such a security as well as the ease of the usage [4]. Also the price is a very important issue. To be able to provide services to the general public these issues must be addressed. Usable and secure digital signatures would make it possible to offer many kinds of services, which currently require a hand written signature. Numerous government and private sector services could be provided online and the need to make and archive paper documents, which will be after all inputted to the computer systems, would be eliminated. This would speed up the service and reduce the cost caused by archiving and manually processing the documents. For example the new legislation in the Finland requires the use of the digital signature for signing documents stored in the new health care information system [2]. To be more useful also patients should be able to sign the documents stored there. Places where the most of the signing would take a place are probably the home computer of the patient and a public terminal in the hospital. This requires at least addressing the security issues. 2 Technology Digital signatures are produced by using public-key cryptography. This is usually achieved by using a smart card that holds keys and does the actual signing. The private key never leaves the card. The smart card is protected by a PIN-code that must be entered before signing. [6] To be able to sign a document user needs a card reader (preferably with a pin pad) and a software that handles the signing process. Software calculates a hash value for the document, transfers it to the smart card, and the smart card signs it with the private key if the entered PIN-code is correct. After signing anyone can verify with the public key that the document is signed with the corresponding private key. [8] To be able to trust that the public key is belonging to the user it says it belongs to, it must be signed by a trusted certificate authority. The certificate authority must also have a way to revoke the certificate. Usually the certificate authority is a third party. Also some kind of service to establish the timeline between signatures is usually required to determine which signatures have been made before revoking the certificate. Signing with an old key must also be prevented. [8] 3 Legislation In Finland all signatures created using accredited certificate authority signed keys and secure signing device are legally binding. Otherwise signature is not necessarily legally valid. It could be argued that the law requires completely secure signing method and therefore no signature is legally binding. [1] Digital signatures are already required by the law in electronic medical records. After the transition period secure way to sign medical documents will be needed. [2] Internationally digital signature laws are quite different in different countries and legally binding signature in one country might not be binding in another country. Also liability of the signatory could differ between countries. There is work being done to harmonize laws between countries so international commerce could use the digital signature. [7] 4 Problem description Digital signatures are usually created by calculating a hash value from the data to be signed and then the hash value

is signed with a public key algorithm [8]. Signing operations and key storage are usually done with a smart card or a similar device which is a closed platform. This assures that the private keys are safe and the signing operation is secure. It however doesn t prevent malicious alteration of the hash value or the document to be signed before signing. This is because the computer used for the signing operation is an open platform, which can be infected by a trojan horse. Malware could easily alter the document to be signed when using current signing software packages. [6] Preventing this from happening would require that the malware couldn t take a part in the signing process. This could be achieved by using a completely closed system for the signing or by trying to verify that the software components taking part to the signing process are unaltered. First available solution is hardware based and requires a special display controller and a smart card reader combination. It basically signs what you see in the display. It is in practice a closed system so the malware should not affect it. [3] Second solution is software or partly software based and reduces risk that the malware could operate in the system. It is usually referred as a Trusted Computing. Hardware or software verifies the integrity of the software and detects any changes. It doesn t offer complete protection but it greatly increases the security. [6] Software solutions tested at autumn 2005 didn t have any kind of protection for modifying the data to be signed or the data to be verified. Some solutions are even allowed to execute arbitrary code in their address space. [4] Smart cards usually have PIN codes to ensure that the card is only used by the card owner. Cheaper readers do not have a numeric keypad for the PIN code. When the PIN-code is inputted by a computer keyboard, it is relatively easy to capture it. After the PIN-code is captured, the malware can use the card whenever it wants to, if the card is inserted to the reader. Alternatively someone could acquire the PINcode and then steal the card. [5] The PIN-code is relatively easy to protect with readers that have a keypad and use it for entering the PIN-code. Digital signatures that satisfy certain conditions are legally binding so care should be taken when signing any document [7]. Every time a signing operation could be misused to sign something else if the platform is compromised. However the hash should be secure so malicious information to be signed must be available at the moment when signature is performed. After signing operation the user can be very confident at least that no more forged signatures can be made using his keys, if the key material isn t exposed to the malware. Current signing software require saving the document, launching separate program for a signing operation and reviewing the document in a separate secure viewer before signature even if you just have written the document. Of course there could be only one button that reads "Sign", but it would undermine the security against malware. Also the PIN-code will be asked each time you want to sign something. [4] This should be much easier for the general public. 5 Software based secure signing environment using Trusted Computing Platform Document to be signed is saved to a SWORM medium to prevent modification. Java application will be used for signing because it can be executed in a trusted Java Virtual Machine or in the memory of a smart card when intelligent adjunct model is used. The signing application should be saved to the memory of the smart card so it will be more platform independent and always trusted. [6] This approach could be used by the general public in the future because it only requires Trusted Platform Module and a smart card reader to be in the computer, and the rest depends on the software and the smart card. Because it is very unlikely, that the malware that targets digital signatures attacks operating system loader, it could be possible to drop off the Trusted Platform Module. Then the whole solution would be software based and usable in all computers that are running operating systems supporting Trusted Computing Platform. Currently there isn t required support in any mainstream operating system so this approach is valid only in the future. [6] 5.1 Trusted Computing Platform To prevent that the malware has access to the signing process, Trusted Computing Platform could be used. It consists of a hardware module that functions as a root of the software signature verification. Previously loaded software components verify that the components they load have a valid signature. This way the whole operating system could be verified and loading the malware as trusted software prevented. At least the malware wouldn t be able to mess up with the operating system. Also path from the reader to the software and the path from the keyboard to the software are protected. Signing software is not required to be signed and it could be run for example in a trusted Java Virtual Machine. [6] 5.2 WORM and SWORM WORM means write once read multiple and SWORM is a software implementation of WORM. For example it could be securely implemented by using Trusted Computing Platform. WORM ensures that when a file is saved it cannot be modified anymore. When software saves a file to the SWORM medium it is impossible to tell if it will be signed in the future. This prevents the malware from monitoring when the document to be signed is saved. Also malware has only a short window of opportunity to change the data to be signed. This reduces the need of the secure viewer component in the signing software. [6] 5.3 Intelligent adjunct model Normally smart card controls only the signing process inside the smart card, but in the Intelligent Adjunct model the smart card is given control of resources outside the smart card. The card could for example retrieve file to be signed from the SWORM medium. This means that the Java Virtual Machine

running on the smart card is given access to the hardware of the computer through the smart card reader interface. [6] 5.4 Storing signing software on the smart card Signing software resides in the smart card and is loaded from there to the secure Java Virtual Machine or it could be also executed in the smart card s own internal virtual machine. Signing software should be implemented in Java so it can be run in the virtual machine. This makes it possible that integrity of the signing software is verified even if it doesn t have a signature from the Trusted Computing Platform Alliance. This makes it easier to make updates to the software. Smart card manufacturer or developer writes the signing software to the smart card and if it cannot be modified it could be considered trusted. [6] 6 Trusted Display Controller based secure signing method Trusted Display Controller is used to control the video path. Together with a smart card reader it forms a closed platform for signing. Trusted Display Controller is a modification for the Trusted Platform Module. Rest of the system can be a normal personal computer that has open platform. [3] When an application wants to sign some information it sends it to the Trusted Display Controller. Trusted Display Controller first performs mutual authentication with the smart card using secure communication between the smart card reader and the controller. Only controllers that have correct certificates can access to the smart card data. User can be guaranteed that the hardware is approved to be used with the smart card even when using computer that the user has never used before. [3] After the authentication controller fetches a seal image from the smart card and displays the bitmap of the information to be signed with it. The controller generates a random number and displays it with the seal and the document. User can confirm that the image on the display actually comes from the controller by looking at the seal image which is chosen by user, and only user knows what it looks like. To sign the bitmap user is required to input that random number with a normal keyboard. Security of the keyboard input is not an issue because the number is used only once. [3] This method could be impractical with large documents because each page must be shown and signed separately. Also because the image of the document is signed it could be hard to automatically process that data. [3] This isn t very appealing to the general public because special display controller costs too much for someone who just wants to use some services that require digital signature. Hardware based approach could be used in public computers intended for producing digital signatures. It could be a good idea if such a solution supported also viewing and signing documents in pdf-format instead of just bitmap. 7 Other hardware based solutions Secure signing operation could be performed on a completely separate hardware. To be able to trust the signing process, this hardware device should have a display to view the document and a smart card reader with a possibility to input the PIN-code. [6] The device could be a dedicated computer that has only minimal software for performing the signing process and a secure way to transfer the document to be signed. Also completely closed system that is only meant for this use is possible [6]. It could be connected to the computer via USB or by some other means. Problem with this solution would be a high price tag and therefore it wouldn t be practical for home usage. By using a PDA as a secure signing device this could be a solution for business use. Completely closed system would be difficult for most applications because it could sign only a few preselected formats. However this could be useful when the formats are known before, like for example when signing documents at some government bureau. [6] 8 Commercial software available from the store. Commercial software products for producing the digital signature are the easy way to go. These products are usually build to perform digital signature operations the user friendly way. But there isn t sufficient security against malware in these programs. More secure platform could help. [4] Many products available are vulnerable to even the most basic attacks by trojan horses. In most cases attack could be executed by using only basic user rights. Attack can be performed with a very little knowledge about the internals of the program. [4] DLL that provides an interface to the smart card reader can be replaced with another DLL that wraps functionality of the real DLL and so malicious DLL gains an access to the signing software address space. It could be used as a sniffer for the smart card traffic or to make changes to the signing software. [4] The PIN-code can be usually intercepted by just accessing to the password input box through the Windows API. Some software has protection against this, but usually the PIN-code can be still retrieved. Key pad with the smart card reader eliminates this security problem. [4] Most programs have secure viewer component that displays the document just before it will be signed. Malicious program can draw to the viewer surface or open a new window on top of the viewer. This could be prevented by refreshing the content frequently enough and by monitoring that no window is on top of the actual viewer window. [4] Most of these attacks can be prevented using simple methods, but programs do not employ them. Software manufacturers assume that environment where programs will be used is not compromised. And it is responsibility of the user to assure this. [4] This option is more appealing to the general public because it needs just the software and the smart card reader and

is compatible with the platforms that the software supports. Security however is not so great and for the digital signature with legal obligations it isn t a very good option. 9 Solution for the general public For the general public the security should be high because users aren t experts and the equipment should be cheap for home use. Also the solution must be easy to use. Users shouldn t be able to make any modifications that would produce a security risk. This means that the platform must be closed or at least the software must be protected from any modifications. To keep the cost of this solution low need of extra hardware should be kept minimal. To protect the software from modifications it should be loaded from read only memory and no other software should be running at the same time. Device used needs a display because of the need to inspect the document to be signed. Displays capable to view documents aren t cheap, so usually at home buying one for this reason is out of the question. A computer display is usually the only display that is found from home and is capable to view documents. This means that the computer should be used to sign the documents in home environment. I propose that a specialized Linux distribution booted from a CD-ROM could be used to perform the signing. Booting from the CD-ROM ensures that only the software that is on the CD is running and making changes to the software is impossible. This would be a good solution for home use because only needed hardware is a card reader and a normal computer. Distribution should include only the necessary tools and nothing else. Such tools would be the signing software and a collection of editors and viewers. Also tools to access file systems on the computer should be included. Distribution could be easily customized to fit any special purpose by adding software to it. If trusted service provider provides the CD, user knows that he/she has obtained a valid copy. For example the distribution could be constructed to support all the services that the government offers. It might be advantageous for the service providers to create one common distribution for every service. Security with this solution would be quite good because every time system is booted, clean copy of the operating system will be loaded and minimal Linux is a very hard target for any kind of malware that doesn t already come with the distribution. Of course any other OS could be used for this purpose if it can be customized. This Linux distribution could also be running under a virtual machine. It reduces security but could be a good option for some purposes. In this configuration the smart card reader could pose a security risk because it needs to be connected to the virtual machine through the actual computer. Otherwise well implemented virtual machine should be relatively safe place to run this Linux distribution. Normal trojan horse would have great difficulty to do something because it would have to directly modify address space used by the virtual machine. Need to boot to another operating system makes this Linux distribution a little difficult to use if it is needed frequently. Solution Price Security Software, Trusted Computing low medium Hardware high high Current software in market low low Bootable linux CD free medium Table 1: Solutions for producing digital signatures For users who use it just occasionally it could be the best solution and because the Linux is under the GPL it would also be free. This Linux distribution could also be useful for applications where whole computer is dedicated to performing digital signature operations. This could be the case for example if temporary workstation is needed to produce digital signatures. 10 Analysis of the solutions Different solutions follow the rule: When usability increases security decreases or the price increases. Trusted Computing Platform based solutions provide more secure environment and therefore increase also security of the signing software. Current software shows that the developers don t care to make even the most basic protection against malware. Usually the manual says that it is responsibility of the user to provide malware-free environment. [4] Closed platform hardware solutions are very secure and also expensive. The advantage with the closed platform is that outside influence can t interfere with it. Special hardware is also usually easy and fast to use. Linux boot CD solution seems to be a good choice compared to the other choices, but it is necessary to boot computer to this special environment. Frequent usage with one computer that is in other uses too could be very inconvenient. This solution could also be used to make workstation that is dedicated for digital signing. Solutions are compared in the Table 1. 11 Conclusion Emerging services that use digital signatures need to have a secure way for the user to make the signatures. As the number of the services will increase also solutions to perform digital signatures will increase and security will be taken into account more seriously. Current hardware solutions are expensive and software solutions insecure. Specialized hardware could be option when the signing of documents is very frequent. Because hardware solution also makes it possible to authenticate the hardware by the smart card, it is the best solution for use in public computers like for example the computer in the library. Current software solutions are suitable for people that can be sure that their computer doesn t contain any malware. Software solution that utilizes Trusted Computing Platform would be secure and inexpensive but operating systems that support it are not currently available for the wide audience. [6]

New solutions must be developed before the general public can utilize the services safely. Because of the legally binding nature of the digital signature equal to a hand written signature these solutions must be very secure. One possibility to achieve secure and inexpensive system could be using Linux system that boots from the CD. It however isn t very user friendly because user must first shut down the operating system he/she uses regularly. References [1] Laki sähköisistä allekirjoituksista 24.1.2003/14, 2003. [2] Laki sosiaali- ja terveydenhuollon asiakastietojen sähköisestä käsittelystä 9.2.2007/159, 2007. [3] B. Balacheff, L. Chen, D. Plaquin, and G. Proudler. A trusted process to digitally sign a document. In NSPW 01: Proceedings of the 2001 workshop on New security paradigms, pages 79 86, New York, NY, USA, 2001. ACM Press. [4] H. Langweg. Malware attacks on electronic signatures revisited. In Konferenzband der 3. Jahrestagung Fachbereich Sicherheit der Gesellschaft für Informatik., pages 244 255, 2006. [5] A. Spalka, A. B. Cremers, and H. Langweg. The fairy tale of what you see is what you sign - trojan horse attacks on software for digital signatures. In Proceedings of the IFIP WG 9.6/11.7 Working Conference., 2001. [6] A. Spalka, A. B. Cremers, and H. Langweg. Protecting the creation of digital signatures with trusted computing platform technology against attacks by trojan horse programs. In Sec 01: Proceedings of the 16th international conference on Information security: Trusted information, pages 403 419, 2001. [7] M. Wang. A review of electronic signatures regulations: do they facilitate or impede international electronic commerce? In ICEC 06: Proceedings of the 8th international conference on Electronic commerce, pages 548 552, New York, NY, USA, 2006. ACM. [8] J. Zhou and R. Deng. On the validity of digital signatures. SIGCOMM Comput. Commun. Rev., 30(2):29 34, 2000.