John Levine wrote:
It doesn't do anything about the obvious attack path of phishing
credentials from the users to stick bogus trusted entries into their
accounts. My examples showed all sorts of benign looking situations
in which users provide their credentials to parties of unknown
identity or reliability.
part of x9.59 financial standard
http://www.garlic.com/~lynn/x959.html
http://www.garlic.com/~lynn/subpubkey.html#x959
was to consistently require (digital signature) strong authentication and integrity on all transactions. as a result, phishing, data breaches, security breaches (with regard to account numbers) was eliminated as risk vector (account numbers could be divulged, phished, breached, etc ... but couldn't be used for fraudulent purposes). this also eliminated needing SSL for electronic commerce transactions (as part of hiding account numbers). in the online model ... don't require independent stand-alone/offline paradigm credentials ... just need a reliable authentication mechanism that is reasonably resisted to attacks.
sort of as part the x9.59 effort ... in the later half of the 90s, was the aads chip strawman
http://www.garlic.com/~lynn/x959.html#aads
as countermeasure to software private keys being easily compromised ... i.e. digital signature becomes a "something you have" authentication operation ... i.e. it represents having unique hardware token containing the private key that generates the digital signature.
the next issue was hardware token costs ... both the costs of individual
hardware tokens ... as well as the aggregate infrastructure costs related to
institutional centric model with each institution issuing their own hardware
token.
the first part was addressed by eliminating everything thing from the chip that wasn't in direct support of (security)
of "something you have" authentication ... and the other was moving from a "institution centric"
hardware token to a "person centric" hardware token. Moving to a "person centric" hardware token
also turns out to eliminate a bunch of institutional hardware token personalization costs. The objective was
aggressive cost reduction gaining possibly two orders of magnitude on per chip .... and instead of requiring a unique
hardware token effectively replacing every password a person currently uses ... just have one (or a small few) tokens
per person. Institutional specific credentials go away ... since the increase the per chip issuing costs and tend to
eliminate person-centric operation (resulting in unique chips per institution).
This makes the hardware token ("something you have") authentication much more analogous
to biometrics ("something you are") authentication. The hardware token for digital
signature ... is presented in very much the same way a RFID chip (with static number vulnerable to
replay attacks) might be presented ... or a fingerprint is sensed (again w/o being subject to
replay attacks) .... but not requiring any other infrastructure, institutional, or application
specific processing (it becomes a single function ... authentication, unlimited multi-app ... for
whatever apps require authentication ... implementation).
A couple of the remaining vulnerabilities are
1) social engineering attacks getting victim to directly perform operations on
behalf of
the attacker.
2) direct chip attacks to give up private key
current phishing tends to be convincing the person that they have to divulge some piece of
information to verify and/or in support of other operations. the attacker then uses the information
to perform fraudulent transactions w/o the victims knowledge. social engineering to perform
operations on behalf of the attacker would tend to raise alarms in more peoples minds and possibly
has less fraud ROI ... since it would presumably require more effort on the attacker's behalf for
each fraudulent transactions. another possible social engineering operation is to convince the
individual to "return" their hardware token (possibly as part of some required exchange
operations). This would be easier done with the institutional-centric model ... since the victims
would associate the token with the institution ... rather than believing they "owned" the
token (in a person-centric model).
the issue in direct chip attacks is attempting to keep the cost of the attack somewhat higher than reasonable expected returns for the attacker ... i.e. part of this is parameterized risk management. the other is try and have the various chip attacks reasonably take longer than the typical lost/stolen reporting interval ... i.e. associated with an online transaction model.
If the chip attacks cost more than the reasonable return to the attacker ... or the attack typically takes longer than avg. remaining lifetime before a lost/stolen report deactivates the chip.
In the parameterized risk management scenario ... the risk profile is registered for each kind of chip ... while there is possibility of a single kind of chip serving all possible operations ... there may be a case for multiple kinds of chips that have different costs and risk profiles. Some scenarios might require an individual to have a (person-centric) chip with a significantly better risk profile (being able to perform transactions with values up to the limit of a particular kind of chip risk profile).
This may not provide extensive countermeasures to the possible kinds of attacks
... but it may be sufficient to provide countermeasures to 99percent of the
current attacks (and make many of the remaining kinds of attacks financially
unattractive).
In the past, i've somewhat facetiously stated that the aads chip strawman with
person-centric approach and aggressive end-to-end cost reduction could reduce
fully loaded hardware token infrastructure deployment costs by four orders of
magnitude (reducing both per chip costs as well as total aggregate number of
chips for scenario where hardware token authentication becames pervasive, say
replacement for all existing password/pin operations).
One of the scenarios is that there is currently a significant amount of
operations around hardware token paradigm that approach it from the profit
perspective ... as opposed to approaching it from the cost perspective ...
suggesting that total, fully loaded hardware token deployment costs are
potentially reduced by four orders of magnitude has downside effect on many
visions of profit.
disclaimer ... neither of us are associated with the owners of the aads chip
strawman
patent portfolio
http://www.garlic.com/~lynn/aadssummary.htm
misc. past posts mentioning person-centric hardware token authentication
paradigm
http://www.garlic.com/~lynn/aadsm12.htm#0 maximize best case, worst case, or
average case? (TCPA)
http://www.garlic.com/~lynn/aadsm19.htm#14 To live in interesting times - open
Identity systems
http://www.garlic.com/~lynn/aadsm19.htm#41 massive data theft at MasterCard
processor
http://www.garlic.com/~lynn/aadsm19.htm#47 the limits of crypto and
authentication
http://www.garlic.com/~lynn/aadsm20.htm#41 Another entry in the internet
security hall of shame
http://www.garlic.com/~lynn/aadsm22.htm#12 thoughts on one time pads
http://www.garlic.com/~lynn/aadsm24.htm#49 Crypto to defend chip IP: snake oil
or good idea?
http://www.garlic.com/~lynn/aadsm24.htm#52 Crypto to defend chip IP: snake oil
or good idea?
http://www.garlic.com/~lynn/aadsm25.htm#7 Crypto to defend chip IP: snake oil
or good idea?
http://www.garlic.com/~lynn/aadsm25.htm#42 Why security training is really
important (and it ain't anything to do with security!)
http://www.garlic.com/~lynn/2003e.html#22 MP cost effectiveness
http://www.garlic.com/~lynn/2003e.html#31 MP cost effectiveness
http://www.garlic.com/~lynn/2004e.html#8 were dumb terminals actually so dumb???
http://www.garlic.com/~lynn/2005g.html#47 Maximum RAM and ROM for smartcards
http://www.garlic.com/~lynn/2005g.html#57 Security via hardware?
http://www.garlic.com/~lynn/2005m.html#37 public key authentication
http://www.garlic.com/~lynn/2005p.html#6 Innovative password security
http://www.garlic.com/~lynn/2005p.html#25 Hi-tech no panacea for ID theft woes
http://www.garlic.com/~lynn/2005t.html#28 RSA SecurID product
http://www.garlic.com/~lynn/2005u.html#26 RSA SecurID product
http://www.garlic.com/~lynn/2006d.html#41 Caller ID "spoofing"
http://www.garlic.com/~lynn/2006o.html#20 Gen 2 EPC Protocol Approved as ISO
18000-6C
http://www.garlic.com/~lynn/2006p.html#32 OT - hand-held security
http://www.garlic.com/~lynn/2006q.html#3 Device Authentication - The answer to
attacks lauched using stolen passwords?
http://www.garlic.com/~lynn/2007b.html#12 Special characters in passwords was
Re: RACF - Password rules
http://www.garlic.com/~lynn/2007b.html#13 special characters in passwords
http://www.garlic.com/~lynn/2007d.html#12 One Time Identification, a request
for comments/testing
---------------------------------------------------------------------
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to [EMAIL PROTECTED]