Alon

Alon Bar-Lev wrote:
>  
...
> 
> In terms of security, there is no point of using a device that store keys
> only to be extracted by applications.
> In order to secure your identity you must use a device that cannot be
> duplicated.
> This can be implemented only if the device does not allow the private key to
> be extracted from it.

This is the case for the ikey 1000. The device _should_ not allow
duplication.

> In order to make use of this none extractable key, the device must perform
> the cryptographic operations and not the software.

Which implies that you send cleartext to the device and get cyphertext
back. So the easiest way to tamper the message is to intercept it at the
 smartcard driver level :-) and modify it on the fly. If someone is
smart enough to fetch the key contents from memory while it is being
used by the crypto software, he is smart enough to intercept the
cleartext message.

> 
> What you describe is somewhat like putting the private key on USB Storage
> device... This is very low security level.

This device at least protects its contents against tampering, and does
not yield the key without authentication. And this authentication is
done on the device itself.

cheers

Erich

Reply via email to