Good points, Jean-Luc.  Open source is not about free software, as 
Rich Stallman has noted repeatedly.  Nor is it about easily modified 
software.  It is about understandable and therefore trustworthy software.
 
I wonder how many smart card manufacturers would be willing
to give their source code to any government that requested it as
Microsoft is doing with their source code.
 
I don't doubt that smart card manufactures at one time possessed 
special expertise in countering environmental attacks.  Whether this 
understanding was effectively implemented in the software in the smart 
card is another question.  I have no evidence here.  I have seen a card
that burped up its keys when given valid sequences of commands so
the trip from expertise to implementation does deserve attention.
 
Furthermore, it must be noted that the half-life of physical attack
expertise is about two years so a relevant question is how quickly 
can the manufactureres respond.  In the case of both timing and power
attacks, the chip manufacturers responded much more quickly
and more effectively than the smart card manufacturers.
 
Which brings another point.  Hasn't the physical security of the token
moved by and large from software to hardware? It the early days
of smart cards, the card software did have to worry about these things.
But aren't those days long gone and isn't the expertise that created
this software obsolete?  As far as today's environmental attacks go,
the expertise is with the chip manufactureres and the counter measures 
are largely in the silicon, not in the software.
 
IMHO, as always.
 
Cheers, Scott

        -----Original Message----- 
        From: Jean-Luc Giraud [mailto:[EMAIL PROTECTED] 
        Sent: Sun 8/17/2003 9:41 PM 
        To: [EMAIL PROTECTED] 
        Cc: 
        Subject: Re: [Muscle] Re: SSP smart card
        
        


        On Saturday, August 16, 2003, at 01:07 AM, Scott Guthery wrote:
        
        > Interesting discussion.
        >
        > Conjecture I: Smart card software has more in common with cryptographic
        > algorithms than with computer operating systems.
        >
        > None of us (I assume) would use a cryptographic algorithm without
        > being provided
        > every technical detail of the algorithm and assurance that the
        > realization
        > we planned to use faithfully implemented these details.  Cryptographic
        > security
        > flows from key secrecy, not algorithm secrecy.
        
        I agree that the security relies on key secrecy and not the algorithm
        secrecy.
        
        IMHO there is also another thing to take into account: the algorithm
        and the keys are used on a physical piece of hardware (like a smart
        card). This piece of hardware is likely to leak key material even if
        the software "faithfully implements the details" of the algorithm. In
        order to build a secure system, a functionally accurate software
        implementation is necessary but not sufficient. A secure implementation
        (against side-channel attacks or other forms of attacks) is required.
        Writing of secure implementation of an algorithm is very time-consuming
        and requires a lot of expertise. Smart card manufacturers usually have
        this expertise.
        
        > There is a long history of smart card manufacturers and smart card
        > issuers
        > embedding backdoors in smart card software.   Witness the weak
        > algorithms
        > and keys in GSM SIMs and http://www.parodie.com/humpich/home.htm/
        
        I find this affirmation quite aggressive against the smart card
        industry. The 2 examples you give (GSM and Humpich) are certainly not
        the fault of the card manufacturers (who faithfully implemented the
        specifications and any code review would have said so). The issue was a
        problem of closed specifications that were not widely reviewed. These
        specifications had security issues.
        
        I have worked as a smart card OS developer and I never put any backdoor
        in the OSes I wrote. I have never heard of anybody having been asked to
        do it (let alone actually doing it!!). I have always treated the
        existence of back doors in a smart card OS as an urban legend. If in
        your long involvement in card OS design you have come across such back
        doors and are allowed to mention them, I'd be very interested in some
        examples.
        
        Frankly, if I had to break a system using a card, I would focus more on
        the card environment than the card itself. If I could not corrupt the
        environment and had the means to get a trapdoor installed somewhere I
        would put it on the chip. This would let me break any OS running on
        that chip. However I am quite sure that Secure IC manufacturer do not
        do this.
        
        > Conjecture II: If you as a card issuer or cardholder can't analyze the
        > source
        > code of the smart card operating system in your card and insure that
        > what is
        > in the card you hold is exactly the code you have analyzed, you are
        > playing
        > at security.
        
        This does not protect you from an extra "feature" in the hardware that
        could bypass the OS you have reviewed (see above).
        
        Please do not get me wrong: I am for open specifications and open
        source systems. Software I write in my spare time is open source under
        a BSD license. I personally wish that the industry had a more open
        attitude. This is why I try to help Muscle and the Musclecard
        technology.
        
        Cheers,
        JLuc.
        
        
        _______________________________________________
        Muscle mailing list
        [EMAIL PROTECTED]
        http://lists.musclecard.com/mailman/listinfo/muscle
        


_______________________________________________
Muscle mailing list
[EMAIL PROTECTED]
http://lists.musclecard.com/mailman/listinfo/muscle

Reply via email to