but as already pointed out in past investigations the banks don't accept a
random TTPs issued cert (whether using OCSP or not). They issue
relying-party-only certificates .... for privacy and liability reasons. The
certificate just contains the account number .... any other information is
privacy-invasive. So while the certificate appears like issued from a TTP
... it is in fact, from a business process standpoint issued by the
financial institution that is executing the transaction.

ok, have been around the relying-party-only certificate by financial
institutions numerous times before .... in much the same way have been
around the ssl domain name cert:
http://www.garlic.com/~lynn/subtopic.html#rpo

so investigating what happens with a relying-party-only-certificate ... the
financial institution registers the person's key, stores it in their
account record and issues a certificate .... also stored in the account
record.

Rather than the RPO case ... lets look at vanilla TTP w/OCSP case (possibly
3d secure)

a single message comes with
A) the ISO8583 transaction  ... 50 bytes,
B) the digital signature  ... 20-40 bytes
C) the certificate  ... 4kbytes to 12kbytes

the bank looks up the account record from the ISO8583 message and checks
for open to buy ... it is now ready to reply ... except it has to

1) find the CAs public key,
2)  check the trust hierarchy (which could involve large amount of network
chatter)
3) validate the certificate key
4)  use the public key from the certificate to validate the financial
transaction digital signature
5) contact the OCSP (which involves more network chatter)
6) do this in under 350milliseconds (the avg. elapsed time for the original
payment gateway roundtrip)

previous refernce to the original payment gateway
http://www.garlic.com/~lynn/aadsm5.htm#asrn2
http://www.garlic.com/~lynn/aadsm5.htm#asrn3

So now .... we examine the RPO case

1) eliminated ... bank is the CA
2) eliminated ... bank is the trust hierarchy
3) bank validates their own certificate signature
4) use the public key from the certificate to validate the financial
transaction digital signature
5) eliminated ... bank account is the OCSP

now the RPO case still has the bank validating its own signature and the
humongous payload bloat caused by the certificate. X9.63 has done a lot of
work on certificate compression because of the humongous bloated penalty
that certificates place on the financial transaction network. So,
compression can use a technique of field elimination if the relying-party
already possesses the field. It is possible to show that the relying-party
for a financial transaction already possesses all fields of interest that
might be in the certificate. As a result it is trivial to show (using
X9.63) techniques that the certificate in "C" can be reduced to zero bytes
.... significantly reducing the bloat and penalty placed on the financial
network. The problem is that there is still this transmitted certificate
(even if it is only zero bytes) that needs to have the signature verified.

so the RPO case goes to the next level of optimization. In addition to
compressing the certificate to zero bytes ... the signature on the
certificate is verified when the certificate is original issued and
deposited in the account record. Since the bank knows that only valid
information is being placed in the account record .... it is not possible
for the CA's signature on the certificate to change after it has been
deposited in the account record. So it follows, that it is not necessary to
perform subsequent checks at every transaction as to the validity of the
bank's own key.

So in the optimized version we have:

A) the ISO8583 transaction ... 50 bytes
B) the digital signature ... 20-40 bytes
C) the compressed certificate ... 0 bytes

And because validation is done at the time the information is entered into
the account record, the transaction becomes

1) read the account record from the ISO 8583 transaction
2) use the public key in the account record to validate the signature on
the ISO 8583 transaction
3) possibly do the operation in a single network round-trip of avg.
350milliseconds.

This is very close to what is defined for ISO8583 X9.59 financial payment
standard (including the part of compressing the certificate to zero bytes)
http://www.garlic.com/~lynn/index.html#x959

and is also very close to what NACHA implemented for the ISO8583 debit
network trials
http://www.garlic.com/~lynn/index.html#aadsnacha

This is also the KISS principle applied to digital signature
infastructures:
http://www.garlic.com/~lynn/aadsm10.htm#hackhome Hackers Targeting Home
Computers
http://www.garlic.com/~lynn/aadsm10.htm#boyd AN AGILITY-BASED OODA MODEL
FOR THE e-COMMERCE/e-BUSINESS ENTERPRISE
http://www.garlic.com/~lynn/aadsm11.htm#10 Federated Identity Management:
Sorting out the possibilities
http://www.garlic.com/~lynn/aadsm11.htm#30 Proposal: A replacement for 3D
Secure
http://www.garlic.com/~lynn/aadsm12.htm#19 TCPA not virtualizable during
ownership change (Re: Overcoming the potential downside of TCPA)
http://www.garlic.com/~lynn/aadsm12.htm#54 TTPs & AADS Was: First Data Unit
Says It's Untangling Authentication
http://www.garlic.com/~lynn/aadsm2.htm#mcomfort Human Nature
http://www.garlic.com/~lynn/aadsm3.htm#kiss1 KISS for PKIX. (Was: RE: ASN.1
vs XML (used to be RE: I-D ACTION :draft-ietf-pkix-scvp- 00.txt))
http://www.garlic.com/~lynn/aadsm3.htm#kiss2 Common misconceptions, was Re:
KISS for PKIX. (Was: RE: ASN.1 vs XML (used to be RE: I-D ACTION
:draft-ietf-pkix-scvp-00.txt))
http://www.garlic.com/~lynn/aadsm3.htm#kiss3 KISS for PKIX. (Was: RE: ASN.1
vs XML (used to be RE: I-D ACTION :draft-ietf-pkix-scvp- 00.txt))
http://www.garlic.com/~lynn/aadsm3.htm#kiss4 KISS for PKIX. (Was: RE: ASN.1
vs XML (used to be RE: I-D ACTION :draft-ietf-pkix-scvp- 00.txt))
http://www.garlic.com/~lynn/aadsm3.htm#kiss5 Common misconceptions, was Re:
KISS for PKIX. (Was: RE: ASN.1 vs XML (used to be RE: I-D ACTION
:draft-ietf-pkix-scvp- 00.txt))
http://www.garlic.com/~lynn/aadsm3.htm#kiss6 KISS for PKIX. (Was: RE: ASN.1
vs XML (used to be RE: I-D ACTION :draft-ietf-pkix-scvp- 00.txt))
http://www.garlic.com/~lynn/aadsm3.htm#kiss7 KISS for PKIX. (Was: RE: ASN.1
vs XML (used to be RE: I-D ACTION :draft-ietf-pkix-scvp- 00.txt))
http://www.garlic.com/~lynn/aadsm3.htm#kiss8 KISS for PKIX
http://www.garlic.com/~lynn/aadsm3.htm#kiss9 KISS for PKIX ....
password/digital signature
http://www.garlic.com/~lynn/aadsm3.htm#kiss10 KISS for PKIX.
(authentication/authorization seperation)
http://www.garlic.com/~lynn/aadsm5.htm#liex509 Lie in X.BlaBla...
http://www.garlic.com/~lynn/aadsm7.htm#3dsecure 3D Secure Vulnerabilities?
http://www.garlic.com/~lynn/aadsm8.htm#softpki10 Software for PKI
http://www.garlic.com/~lynn/aadsmail.htm#comfort AADS & X9.59 performance
and algorithm key sizes
http://www.garlic.com/~lynn/aepay3.htm#gaping gaping holes in security
http://www.garlic.com/~lynn/aepay7.htm#nonrep3 non-repudiation, was Re:
crypto flaw in secure mail standards
http://www.garlic.com/~lynn/aepay7.htm#3dsecure4 3D Secure Vulnerabilities?
Photo ID's and Payment Infrastructure
http://www.garlic.com/~lynn/2001.html#18 Disk caching and file systems.
Disk history...people forget
http://www.garlic.com/~lynn/2001i.html#51 DARPA was: Short Watson Biography
http://www.garlic.com/~lynn/2001l.html#1 Why is UNIX semi-immune to viral
infection?
http://www.garlic.com/~lynn/2001l.html#3 SUNW at $8 good buy?
http://www.garlic.com/~lynn/2002b.html#22 Infiniband's impact was Re:
Intel's 64-bit strategy
http://www.garlic.com/~lynn/2002b.html#44 PDP-10 Archive migration plan
http://www.garlic.com/~lynn/2002b.html#59 Computer Naming Conventions
http://www.garlic.com/~lynn/2002c.html#15 Opinion on smartcard security
requested
http://www.garlic.com/~lynn/2002d.html#0 VAX, M68K complex instructions
(was Re: Did Intel Bite Off   MoreThan   It Can Chew?)
http://www.garlic.com/~lynn/2002d.html#1 OS Workloads : Interactive etc
http://www.garlic.com/~lynn/2002e.html#26 Crazy idea: has it been done?
http://www.garlic.com/~lynn/2002e.html#29 Crazy idea: has it been done?
http://www.garlic.com/~lynn/2002i.html#62 subjective Q. - what's the most
secure OS?
http://www.garlic.com/~lynn/2002k.html#11 Serious vulnerablity in several
common SSL implementations?
http://www.garlic.com/~lynn/2002k.html#43 how to build tamper-proof unix
server?
http://www.garlic.com/~lynn/2002k.html#44 how to build tamper-proof unix
server?
http://www.garlic.com/~lynn/2002m.html#20 A new e-commerce security
proposal
http://www.garlic.com/~lynn/2002m.html#27 Root certificate definition
http://www.garlic.com/~lynn/2002p.html#23 Cost of computing in 1958?
http://www.garlic.com/~lynn/99.html#228 Attacks on a PKI


[EMAIL PROTECTED] on 12/20/2002 11:30 am wrote:


- Using 3D Secure the bank (issuer) would check the TTP-issued cert using
OCSP
- Then it would check the account
- And if it looks OK sign the transaction to the merchant
- Privacy is fairly OK unless it is a problem that the bank knows your
favorite merchants

BTW, I think that 3D, SAML et al will create a market for TTPs that
did not exist a year ago.




Reply via email to