Unit 8
Unit 8
Issues
- Dr. G.S. Rawat
Smart Cards
• A smart card contains an integrated circuit chip that can hold information, which
then can be used as part of the authentication process.
Smart cards
• Contact Cards: allowing electronic access to the contents of the chip
• Contactless: do not require physical contact with the card itself
• Smart Card and a Card Accepting Device (CAD) communicate via means
of small data packets called APDUs (Application Protocol Data Units)
• harder for third parties to attack the system successfully
• Small bit rate (9600 bits per second) using a serial bi-directional transmission line
(ISO standard 7816/3),
• half duplex mode for sending the information (data only travels in one direction
at a time)
• most common encryption methods are symmetric DES (Data Encryption
Standard), 3DES (triple DES) and public key RSA
Smart Card: Hardware Security
• All data and passwords on a card are stored in the EEPROM
• can be erased or modified by an unusual voltage supply
• heating the controller to a high temperature or focusing the UV light on the EEPROM
• removing the security lock
• Invasive physical attacks
• card is cut and processor removed
• layout of the chip can be reverse engineered
• Differential Power Analysis (DPA)
• statistical attack on a cryptographic algorithm
• measuring the precise time and electric current required for certain encryption or decryption
operations
• Simple Power Analysis (SPA)
• direct analysis of the recorded power data
Smart Card: Hardware Security Solutions
• Technology barrier. Advanced 0.6 micron technology greatly reduces the size and
power consumption of cards as well as the relative variations in their operating
parameters. This makes it very hard for external SPA/DPA methods to distinguish
between normal card fluctuations and data-related fluctuations.
• Clock fluctuation. A special Clock Software Management facility, when properly used,
results in highly variable software timing when the embedded application program is
executing.
• Unpredictable behavior. A built-in timer with Interrupt capability and an
Unpredictable Number Generator is used to impose unpredictable variations on
software execution behavior, with consequent changes in the pattern of power
consumption.
Smart Card: Hardware Security
Solutions
• Robust design. A modular design allows new hardware variations, including custom
variations, to be produced quickly and efficiently, thereby allowing fast response to
new attack scenarios.
• Memory control for multi-applications. An enhanced Memory Access Control
system provides secure operating system support for multi-application cards.
• Security mechanisms and firmware functions. An enhanced set of security
mechanisms and firmware functions allow the application to detect and respond
appropriately to the occurrence of conditions that might indicate an attack. These
conditions include invalid operating conditions, bad opcodes, bad addresses and
violations of chip integrity; the possible responses include interrupts, program
reset, immediate erasure of all RAM data and flash programming of the entire
EEPROM array.
Smart Cards: OS security
• Data on Smart Cards is organized into a tree hierarchy
Smart Cards: OS Security
Five basic levels of access rights to a file (both DF and EF)
• Always (ALW): Access of the file can be performed without any
restriction.
• Card holder verification 1 (CHV1): Access can only be possible when a
valid CHV1 value is presented.
• Card holder verification 2 (CHV2): Access can only be possible when a
valid CHV2 value is presented.
• Administrative (ADM): Allocation of these levels and the respective
requirements for their fulfilment are the responsibility of the
appropriate administrative authority.
• Never (NEV): Access of the file is forbidden.
Smart Cards: OS Security
• The PINs are stored in separate elementary files
• OS blocks the card after a wrong PIN is entered several consecutive
times
• Once blocked, the card can only be unblocked with a specific
unblocking PIN stored in the card
• unblocking PIN can become blocked in the same way.
• irreversible blockage and may have to be scrapped for security
reasons
Zero Knowledge Protocol
Pros:
• Secured – Not requiring the revelation of one’s secret.
• Simple – Does not involve complex encryption methods.
Cons:
• Limited – Secret must be numerical, otherwise a translation is needed.
• Lengthy – There are 2k computations, each computation requires a
certain amount of running time.
• Imperfect – The malice can still intercept the transmission (i.e.
messages to the Verifier or the prover might be modified or destroyed)
Enterprise Application Security
• the protection of enterprise applications from external attacks, privilege
abuse and data theft
• implementing security across all applications, enterprises
• greater data security and protect applications from vulnerabilities
Enterprise Application Security Threats
• Device specific threats
• personal devices, insecure applications, outdated OS
• Network-specific threats
• Unsecure wifi
• App-specific threats
• Injection flaws, Broken authentication, Security misconfiguration
• User-specific threats
• Malicious employees, negligent ones
Enterprise Application Security
• Educate
• dos and don’ts of technology.
• Implement strict access control policy
• Force strong user authentication
• Encrypt all data
• Updating firmware, software and applications
• Identify all points of vulnerability
• Monitor, track, and attack
• Make security a part of the business process
Biometrics
• analysis of unique biological and physiological characteristics with the
aim of confirming a person's identity
• common biometric identifiers:
• Fingerprints
• Facial
• Voice
• Iris
• palm or finger vein patterns
Biometric Authentication
• Security measure that matches the biometric features of a user looking to access a
device or a system
• Access to the system is granted only when the parameters match those stored in the
database for that particular user
• Biometric characteristics are the physical and biological features unique to every
individual
• These are saved in a database and can be easily compared to the user attempting
to access the data or device
• biometric authentication can be placed in various physical environments such as
doors, gates, server rooms, military bases, airports, and ports
Biometric Authentication: Types
Multi-Factor Authentication