Hello,

I'd be interested if somebody here has practical experience with
"Secure Messaging" modes in general and would be so kind to
answer a few questions:

  In authentic as well as in combined mode, the use of symmetric 
  ciphers seems to be the standard approach. To migitate simple MITM 
  techniques, at least one keypair must be already integrated into 
  ROM/EEPROM at the production/personalization stage and kept secret.

  As a result, SM can only be used with designated terminals
  from a single emitting instance (or partner organizations) 
  that have knowledge about this secret key. This defeats
  interoperability as a whole and reminds me to the infamous
  "security by obscurity" solutions popular in former decades.

  Are there any practical attempts to negotiate keys for SM by
  use of public keys?

  What is the impact in terms of computation time for encrypted 
  transfer at the moment, compared to a plain transmission? 
  (Last info: x4)

  Plain signature functionality is neither time-critical and
  generally uses basic facilities available on nearly every
  token. As digital signatures slowly gain acceptance outside 
  specialized applications, are there any ambitions to secure the
  card-to-terminal communication by default?
  
  Isn't it urgently necessary to use ad-hoc interoperable
  security routines in the light of the legal status of digital
  signatures within the EU?

Thanks a lot for your efforts.

All the best,
/Markus
_______________________________________________
opensc-devel mailing list
opensc-devel@lists.opensc-project.org
http://www.opensc-project.org/mailman/listinfo/opensc-devel

Reply via email to