06.11.2014 Views

A User Centric Security Model for Tamper-Resistant Devices

A User Centric Security Model for Tamper-Resistant Devices

A User Centric Security Model for Tamper-Resistant Devices

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

4.6 Device Ownership<br />

3. On verication of the credentials, the UCTD checks the mode of plat<strong>for</strong>m assurance<br />

and validation selected by the user. The supported modes are oine and online<br />

attestation (section 4.3.5). Depending upon the user's choice the UCTD proceeds<br />

with the security attestation process.<br />

4. Once the assurance validation is communicated to the CAMS, the user can compare<br />

the smart card features with those stated by the card manufacturer at the time<br />

of purchase. If satised, the user will provide her credentials and they are used<br />

to authenticate the user to the UCTD <strong>for</strong> management operations (e.g. application<br />

installation, deletion, and registration with an administrative authority) discussed in<br />

chapter 5. The credentials can be based on a Personal Identication Number (PIN),<br />

a password, a pass-phrase, or biometric data [137][139] depending upon the card<br />

manufacturer, and user's requirements.<br />

The ownership delegation process is used when a user relinquished control of a UCTD to<br />

re-sell or scrap the device. The process is similar to ownership acquisition but this time the<br />

user requests ownership delegation that will delete the user's space and any applications<br />

she has installed in it.<br />

4.6.4 Key Generation<br />

Individual smart cards have a unique set of cryptographic keys that the card uses <strong>for</strong><br />

dierent protocols/mechanisms during its lifetime. There<strong>for</strong>e, after the hardware fabrication<br />

and masking of the SCOS is completed [5] the card manufacturer initiates the key<br />

generation process.<br />

Each smart card will generate a signature key pair that does not change <strong>for</strong> the lifetime of<br />

the smart card. The smart card signature key pair is certied by the card manufacturer,<br />

and it is used to provide oine attestation (section 4.5). Furthermore, in the certicate<br />

hierarchy shown in gure 4.3, the smart card signature key pair is linked with the PAC via<br />

the card manufacturer's certicate. The reason <strong>for</strong> this is that a malicious user might copy<br />

a PAC that belongs to a genuine device and put it on his tampered device and when an SP<br />

requests security assurance from the tampered device, it provides the (copied) PAC of a<br />

(trusted) genuine device. By ensuring the PAC is tied to genuine devices by the certicate<br />

hierarchy shown in gure 4.3 we can avert such scenarios.<br />

As discussed in section 4.4.2.1, the evaluation authority issues a certicate (e.g. a PAC)<br />

which certies that the signature key of the card manufacturer is valid only <strong>for</strong> the evaluated<br />

product. If an adversary can get hold of the manufacturer's signature key pairs then he<br />

100

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!