dual-use digital signature vulnerability

Anne & Lynn Wheeler lynn at garlic.com
Fri Jul 16 10:31:27 EDT 2004


ok, this is a long posting about what i might be able to reasonable assume
if a digital signature verifies (posting to c.p.k newsgroup):
http://www.garlic.com/~lynn/2004h.html#14

basically the relying-party has certified the environment that houses the 
private key and the environment that the digital signature was done in ... 
then the verification of the digital signature might be assumed to imply 
one-factor or possibly two-factor authentication (i.e. if the relying-party 
has certified that a private key is housed in a secure hardware token and 
can never leave that hardware token, then the verification of the digital 
signature might imply one-factor, "something you have" authentication).

that establishes the basis for using digital signature for authentication 
purposes ... being able to assume that verification of the digital 
signature possibly implies "something you have" authentication (or 
something similar).

just the verification of the digital signature, however doesn't do anything 
to establish any implication about a legal signature where the "signer" is 
assumed to have read and agrees to the contents of the thing being signed 
(intention to sign the content of the document as agreement, approval, 
and/or authorization).

lets assume for argument sake that some sort of environment can be 
certified that provides a relying party some reasonable assurance that the 
signer has, in fact, read and is indicating agreement, approval, and/or 
authorization ... then there might possible be the issue of the dual-use 
vulnerability.

the dual-use comes up when the person is 'signing" random challenges as 
purely a means of authentication w/o any requirement to read the contents. 
Given such an environment, an attack might be sending some valid text in 
lieu of random data for signature. Then the signer may have a repudiation 
defense that he hadn't signed the document (as in the legal sense of 
signing), but it must have been a dual-use attack on his signature (he had 
signed it believing it to be random data as part of an authentication 
protocol).


--
Anne & Lynn Wheeler    http://www.garlic.com/~lynn/ 

---------------------------------------------------------------------
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to majordomo at metzdowd.com



More information about the cryptography mailing list