On Friday 21 September 2007 01:10:38 pm Douglas E. Engert wrote:
> Shawn Willden wrote:
> > In general, though, I think it also doesn't matter that much. Any
> > reasonable secure smart card API (I'm talking about the APDU-level API)
> > must assume that an attacker can get between the card and the reader, or
> > the reader and the application.
>
> Not the ones I have seen. The assumption is the user of the card has
> physical control over the reader, and is using the machine in front of him.

I should also mention that even for user authentication, the protocol must be 
designed so that an attacker who has control of the communication channel 
between application and card, but doesn't control either end, is unable to 
subvert or replay authentications.  Of course, such an attacker can deny 
service.

So, the key assumptions for authentication are that (1) the authenticating 
user controls the card and that (2) the application has some way to assure 
that the user at the keyboard is the same as the one with the card.  
Requiring that the reader and the UI (screen/keyboard) be the ones connected 
to the same physical box is one means of achieving (2), though it's easy to 
come up with ways to violate that assurance, unless another authentication 
factor is used.

Assuming those two assumptions can be made, remote authentication also doesn't 
require encryption or an additional authentication layer.

        Shawn.
_______________________________________________
Muscle mailing list
[email protected]
http://lists.drizzle.com/mailman/listinfo/muscle

Reply via email to