1 / 17

Wireless PKI Security and Mobile Voting

Wireless PKI Security and Mobile Voting. Jaak Tepandi and Stanislav Vassiljev, Tallinn University of Technology Ilja Tšahhirov, InVision Software AG. Source : IEEE Computer Society / August 2010 Date : March 2, 2012 Presenter : 黃家柔. Outline. Introduction

rashad
Download Presentation

Wireless PKI Security and Mobile Voting

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Wireless PKI Security and Mobile Voting Jaak Tepandi and Stanislav Vassiljev, Tallinn University of Technology Ilja Tšahhirov, InVision Software AG Source : IEEE Computer Society / August 2010 Date : March 2, 2012 Presenter :黃家柔

  2. Outline • Introduction • Mobile phones: a “ handy” solution • WPKI authentication and digital signing • WPKI security study • Manageable WPKI-specific risk • WPKI-specific risk requiring attention • Implications for m-voting • WPKI requirements • Conclusion

  3. Introduction • Wireless public-key infrastructure technology is used in many security-critical applications including banking and digital signing. • An analysis of WPKI security using ID-card-based PKI (ID-PKI) as a benchmark highlights various risks and their implications for mobile voting.

  4. Mobile phones: a “ handy” solution(1/2) • Security-critical applications can utilize a computer and a mobile phone with a Universal Subscriber Identity Module (USIM) card for authentication and electronic signatures. • In Estonia, Mobiil-ID technology enables personal identification and authentication with a mobile phone. • a Mobiil-ID USIM card provides the usual SIM card functionality and also incorporates the private keys for authentication and digital signatures, obviating the need for a physical ID card reader.

  5. Mobile phones: a “ handy” solution(2/2) • Mobiil-ID is based on emerging wireless PKI specifications. WPKI can be used to obtain client authentication and nonrepudiation .

  6. WPKI authentication and digital signing registration 5. V+ H + request PIN user Registration Authority(RA) Mobile operator 6. User input PIN & Cards bound to user’s identities 8. 5. 6. 4. authentication or reject 1. V + H Verification code (V) Identifier 7. TSP verifies the user’s signature and send result to the AP 3. validates ID’s certificate Trust service provider Application provider 4. Verification code (V) Certificate Authority(CA) 2. Request identity service for ID

  7. WPKI security study(1/2) • Main types of threats focused on -General Threats related to Legal issues -Cryptography -Software Development, technical threats -M-Voting Threats

  8. WPKI security study(2/2) • Risks with WPKI -Risks associated with WPKI are of Information security. ‧Integrity ‧Confidentiality ‧Authenticity ‧Non repudiation ‧Availability

  9. Manageable WPKI-specific risk(1/3) • The risk within the Mobile Operator’s Subsystem ──the Over the Air (OTA) Server and SMS Center can be subject to Man in the Middle Attack. • Mobile Operator must impose security measures including the encryption communication over VPN and securing LAN with firewall. Detailed analysis demonstrates that the risk of MITM attacks is low.

  10. Manageable WPKI-specific risk(2/3) Sent to wrong mobile phone ! 5. H(V) + request PIN user Mobile operator User input PIN & 6. 5. The risk of MITM attack is low. 4. 6. H(V) Verification code (V) 1. Identifier modify 3. X validates ID’s certificate Trust service provider Application provider 4. Verification code (V) attack Certificate Authority(CA) 2. Request identity service for ID ▲ Example 1

  11. Manageable WPKI-specific risk(3/3) 因為VU1≠ VA2,則user不被認證,反而是攻擊者被認證了!(VA1=VA2) ▪Note: I1=I2, VA1=VA2 ▪: 合法 : 不合法 User input PIN & sign user Attacker 10. Mobile operator 9. VA2+ H(VA2) + request PIN ‧Solution: 中止同時有兩個驗證要求從一個user傳來的情況。 ──WPKI的安全應用也必須是以這樣的情況為前提才行。 不是MITM attack,只是攻擊者取代user驗證,非攻擊者在user連結server時介入中間,就像是一個騙人的網站而已。 13. 11. 8. 1. 7. 4. 14. I2 I1 VA2 + H(VA2) VA1 VU1 authenticated 3. 2. I1 validates ID’s certificate Trust service provider 5. VA1 Application provider Certificate Authority(CA) 12. VU1 I2 6. ▲ Example 2 - An attacker grasping a user’s session

  12. WPKI-specific risk requiring attention • Man in the middle attack between APs and users are easier in WPKI than in ID-PKI.(attacker may fake server between client and server connecting) • Compared with other authentication methods.(ex.one time passwords). WPKI enabled measureshelp prevent many kind of attacks. • ID-PKI authenticates the user based on bothuser’s certificate and the server public keycertificate during the SSL session handshake.This makes an MITM attack unrealistic.

  13. Implications for m-voting • Electronic voting asks for additional demanding security. -votes must remain anonymous. -the system must record every action. • The I-Voting(over the internet) used in Estonia and several other settings utilizes the ”digital envelope”. -Inner envelope has the encrypted vote. -outer envelope has digital signature.

  14. WPKI requirements(1/2) • RA : maintain , document,and periodically audit strict procedures for person’s identity and citizenship verification. • CA : Informing people about m-voting security problem.(ex. User can’t lend somebody mobile phone capable of signature service.) • M-voting infrastructure, operational procedures, and application development should match traditional e-voting systems’ strict security requirements.

  15. WPKI requirements(2/2) • It is vital to ensure quality handling of USIM card private keys ,secret keys, and PIN codes. (ex. MOs should keep logs.) • MO procedures should also ensure voter anonymity by preventing administrators from observing the m-voting process in any way.

  16. Conclusion • WPKI的流程雖然趨近於完整,但TSP必須要等到user輸入PIN和簽章後才能查覺被攻擊,會造成驗證時間變長,若能在AP與user之間或者是AP與TSP之間於傳輸前再追加一道驗證手續,或許就能夠提早發現問題。

  17. THE END

More Related