Hardening Digital Signatures against Untrusted Signature Software 姓名:謝宏偉 學號:...

15
Hardening Digital Signatures against Untrusted Signature Software 姓姓 姓姓姓 姓姓M99G0219 Digital Information Management, 2007. ICDIM '07. 2nd Interna tional Conference on

Transcript of Hardening Digital Signatures against Untrusted Signature Software 姓名:謝宏偉 學號:...

Page 1: Hardening Digital Signatures against Untrusted Signature Software 姓名:謝宏偉 學號: M99G0219 Digital Information Management, 2007. ICDIM '07. 2nd International.

Hardening Digital Signatures against Untrusted Signature Software

姓名:謝宏偉學號:M99G0219

Digital Information Management, 2007. ICDIM '07. 2nd International Conference on

Page 2: Hardening Digital Signatures against Untrusted Signature Software 姓名:謝宏偉 學號: M99G0219 Digital Information Management, 2007. ICDIM '07. 2nd International.

1.前言 The basic property digital signature has to satisfy is that, at

least as autograph signature, it is a non-repudiable proof of both the identity of the provenances of electronic documents and the declaration of what documents themselves represent.

As a consequence, every form of vulnerability should be carefully considered in order to understand whether digital signature may represent for electronic documents what handmade signature represents for traditional ones.

Page 3: Hardening Digital Signatures against Untrusted Signature Software 姓名:謝宏偉 學號: M99G0219 Digital Information Management, 2007. ICDIM '07. 2nd International.

1.前言 The most critical point of the digital signature protocol is

the secreteness of the private key.

The weak point of this proposal is that the delayed confirmation of the signature introduces from both a practical and a legal point of view a number of problems, whose solution should not be simple and, more importantly, should have radical impacts, probably not tolerable in a scenario where digital signatures have a significative diffusion and are included in the law system of most countries in a stable and consolidated way.

Page 4: Hardening Digital Signatures against Untrusted Signature Software 姓名:謝宏偉 學號: M99G0219 Digital Information Management, 2007. ICDIM '07. 2nd International.

2.方法 As explained in the introduction, digital signature suffers

from a severe vulnerability, directly deriving from the potential untrustworthy of the platform where the signature generation process runs.

Page 5: Hardening Digital Signatures against Untrusted Signature Software 姓名:謝宏偉 學號: M99G0219 Digital Information Management, 2007. ICDIM '07. 2nd International.

2.方法 Our method works as a full solution in a restricted (but

probable) set of untrustworthy cases, and mitigates the problem in the more general case.

it does not require new peripherals,

it can be implemented using smart cards existing today as well as existing signature softwares,

it does not require significative extra procedural charge to the user and, finally,

it does not affect the legal notion of digital signature.

Page 6: Hardening Digital Signatures against Untrusted Signature Software 姓名:謝宏偉 學號: M99G0219 Digital Information Management, 2007. ICDIM '07. 2nd International.

2.方法 The data source employed for the check is a Java applet

coming from the smart card (that is a Java smart card) and, to increase security, the operations required to the applet are minimized to just those necessary to implement the check, that is, both:

allowing the user to choose the document.

sending it to the smart card to serially compute the digest and comparing it with that coming from the signature software.

Page 7: Hardening Digital Signatures against Untrusted Signature Software 姓名:謝宏偉 學號: M99G0219 Digital Information Management, 2007. ICDIM '07. 2nd International.

3.執行結果 Our proposal requires an additional preliminary step w.r.t.

the current signature protocol in which the user sends

Page 8: Hardening Digital Signatures against Untrusted Signature Software 姓名:謝宏偉 學號: M99G0219 Digital Information Management, 2007. ICDIM '07. 2nd International.

3.執行結果 It is worth noting that our technique is able to contrast

the malware-based attack in case it is conducted at user-level, that is both JVM and OS of the PC are not corrupted.

In the other cases, clearly the proposed methodology cannot guarantee that it succeeds, since we cannot exclude that a man-in-the-middle attack, poisoning the I/O functionalities of the platform hides the actual communication between the PC and the smart-card.

Page 9: Hardening Digital Signatures against Untrusted Signature Software 姓名:謝宏偉 學號: M99G0219 Digital Information Management, 2007. ICDIM '07. 2nd International.

3.執行結果 As widely remarked both in this paper and in the

literature, in case the platform cannot be considered trusted no full solution may exist.

Anyway, we may expect that a number of even kernel-level-malware-based attacks can be correctly intercepted by our check mechanism thus avoiding that it succeeds.

Page 10: Hardening Digital Signatures against Untrusted Signature Software 姓名:謝宏偉 學號: M99G0219 Digital Information Management, 2007. ICDIM '07. 2nd International.

4.執行問題 We start by giving some more detail about Java cards.

Every Java card can store and run several Java card applets allowing thus the implementation of different features carried on the same card.

Java applets are passive, so that they cannot start a communication but only reply requests coming from some software through the Java card reader device.

Page 11: Hardening Digital Signatures against Untrusted Signature Software 姓名:謝宏偉 學號: M99G0219 Digital Information Management, 2007. ICDIM '07. 2nd International.

4.執行問題 For security reasons, the default is that applets do not

share memory and are isolated each other, but they can communicate or share resources in case this is explicitly required.

A Java card contains the Java Card Virtual Machine, used to process bytecode, and some native methods implemented in hardware in case it has to run complex operations like cryptographic algorithms.

Page 12: Hardening Digital Signatures against Untrusted Signature Software 姓名:謝宏偉 學號: M99G0219 Digital Information Management, 2007. ICDIM '07. 2nd International.

4.執行問題

Page 13: Hardening Digital Signatures against Untrusted Signature Software 姓名:謝宏偉 學號: M99G0219 Digital Information Management, 2007. ICDIM '07. 2nd International.

5.結論 The importance of encryption-based digital signature is

nowadays universally known, due to the revolution that such a mechanism has induced on the role that electronic documents may have in both public and private organizations.

In fact, digital signature represents at the moment the only valid method to give to signed electronic documents probation value at least as traditional documents with autograph signature.

Page 14: Hardening Digital Signatures against Untrusted Signature Software 姓名:謝宏偉 學號: M99G0219 Digital Information Management, 2007. ICDIM '07. 2nd International.

5.結論 The above claim has a full counterpart with the current law

system of most countries, so that the process of document dematerialization has been already started relying on the current infrastructures as well as the current juridical regulation, with strong attention towards interoperability common rules.

Actually, a serious vulnerability occurs, not depending on the algorithms on which digital signature relies, but strictly related to the practical way in which digital signature is implemented.

Page 15: Hardening Digital Signatures against Untrusted Signature Software 姓名:謝宏偉 學號: M99G0219 Digital Information Management, 2007. ICDIM '07. 2nd International.

5.結論 This vulnerability allows an attacker to sign documents

and to exploit them without any intention of the signature's owner.

The danger is thus very concrete, especially if we think of a next future where electronic documents will be used in a pervasive way in all economics and administrative negotiations.