dual-use digital signature vulnerability

Anne & Lynn Wheeler lynn at garlic.com
Mon Jul 19 01:51:28 EDT 2004


At 08:08 PM 7/18/2004, Sean Smith wrote:
>Why isn't it sufficient?   (Quick: when was the last time anyone on this 
>list authenticated by signing unread random data?)
>
>The way the industry is going, user keypairs live in a desktop keystore, 
>and are used for very few applications.  I'd bet the vast majority of 
>usages are client-side SSL, signing, and encryption.
>
>If this de facto universal usage suite contains exactly one authentication 
>protocol that has a built-in countermeasure, then when this becomes solid, 
>we're done.

so if digital signing is used for nothing else than authentication ... with 
signing of challenge data (with or with/out client-side modification) ... 
then there is no concern that something signed might be a document or 
authorization form. it is a non-problem.

EMV chipcards are supposed to be doing dynamic data RSA signing of 
authorized transactions  ... at some point, real soon now ... and the 
financial industry is writting some number of apps to be able to use the 
EMV cards for other applications.

this is from yesterday
http://www.smartcardalliance.org/industry_news/industry_news_item.cfm?itemID=1316

which talks about additional applications (in addition to expected RSA 
signing at EMV point-of-sale terminals)

* OneSMART MasterCard Authentication – ensures a higher level of security 
for online shopping and remote banking
* OneSMART MasterCard Web – allows cardholders to securely store and manage 
a wide range of personal data (such as names, addresses, URLs, log-on 
passwords) on the smart card chip
* OneSMART MasterCard Pre-Authorised – a new chip-based payment solution 
suitable for new markets and off-line payment environments

===

it doesn't give any details but possibly if the expected RSA signing at EMV 
point-of-sale terminals is an example of aggreement/approval ... then the 
authentication application may be RSA signing of some sort of challenge 
data .... and i would guess that few, if any people make it a habit to 
examine presented challenge data.

part of the issue is creating an environment where all authentication 
protocols and all authentication implements are required to have 
countermeasures against dual-use attack on signing of documents or 
transactions ... means that loads of stuff have to be perfect in the future.

the other is requiring more proof regarding the signing environment to be 
carried when the signing is associated with approval, agreement, and/or 
authorization (more than simple authentication) .... for instance that for 
some of the non-repudiation features (that supposedly address such issues) 
.... that they have to also sign in some manner to indicate non-repudiation 
features in in place.


--
Anne & Lynn Wheeler    http://www.garlic.com/~lynn/ 

---------------------------------------------------------------------
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to majordomo at metzdowd.com



More information about the cryptography mailing list