dual-use digital signature vulnerability
Anne & Lynn Wheeler
lynn at garlic.com
Fri Jul 16 10:31:27 EDT 2004
ok, this is a long posting about what i might be able to reasonable assume
if a digital signature verifies (posting to c.p.k newsgroup):
http://www.garlic.com/~lynn/2004h.html#14
basically the relying-party has certified the environment that houses the
private key and the environment that the digital signature was done in ...
then the verification of the digital signature might be assumed to imply
one-factor or possibly two-factor authentication (i.e. if the relying-party
has certified that a private key is housed in a secure hardware token and
can never leave that hardware token, then the verification of the digital
signature might imply one-factor, "something you have" authentication).
that establishes the basis for using digital signature for authentication
purposes ... being able to assume that verification of the digital
signature possibly implies "something you have" authentication (or
something similar).
just the verification of the digital signature, however doesn't do anything
to establish any implication about a legal signature where the "signer" is
assumed to have read and agrees to the contents of the thing being signed
(intention to sign the content of the document as agreement, approval,
and/or authorization).
lets assume for argument sake that some sort of environment can be
certified that provides a relying party some reasonable assurance that the
signer has, in fact, read and is indicating agreement, approval, and/or
authorization ... then there might possible be the issue of the dual-use
vulnerability.
the dual-use comes up when the person is 'signing" random challenges as
purely a means of authentication w/o any requirement to read the contents.
Given such an environment, an attack might be sending some valid text in
lieu of random data for signature. Then the signer may have a repudiation
defense that he hadn't signed the document (as in the legal sense of
signing), but it must have been a dual-use attack on his signature (he had
signed it believing it to be random data as part of an authentication
protocol).
--
Anne & Lynn Wheeler http://www.garlic.com/~lynn/
---------------------------------------------------------------------
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to majordomo at metzdowd.com
More information about the cryptography
mailing list