06.11.2014 Views

A User Centric Security Model for Tamper-Resistant Devices

A User Centric Security Model for Tamper-Resistant Devices

A User Centric Security Model for Tamper-Resistant Devices

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

4.8 Protocol Analysis<br />

the SC + i ′ is generated as SC + i ′ = f mKCM (CM i ||N SC ||N CM ||SID), where mK CM is the<br />

MAC key that the CM does not share<br />

4.8 Protocol Analysis<br />

In this section, we analyse the proposed attestation protocol <strong>for</strong> given goals and provide<br />

details of the test per<strong>for</strong>mance results.<br />

4.8.1 In<strong>for</strong>mal Analysis<br />

In order to meet the goals PG-1 and PG-2, all messages communicated between the SC<br />

and CM are encrypted and MACed using long term secret encryption and MAC keys;<br />

K SC−CM and mK SC−CM , respectively. The A has to compromise these keys in order<br />

to violate the PG-1. If we consider that the symmetric algorithm used (e.g. AES) is<br />

suciently strong to avert any exhaustive key search and robust enough to thwart any<br />

cryptanalysis then it is dicult <strong>for</strong> the A to break the protocol by attacking the used<br />

symmetric algorithms. A possibility can be to per<strong>for</strong>m side-channel analysis of the smart<br />

card and attempt to retrieve the cryptographic keys; however, most modern smart cards<br />

have adequate security to prevent this attack, and third party evaluation will endorse and<br />

evaluate these mechanisms. Nevertheless, these assurances can only be against the state-ofthe-art<br />

attack methodologies at the time of manufacturing/evaluation. Any attacks which<br />

surface after manufacture and evaluation will render both the assurance and validation<br />

mechanisms useless.<br />

The smart card identity is not used as plaintext during the communication between the SC<br />

and the CM. Instead of using the SC i , the SC uses a pseudo-identity SC i ′ which changes<br />

on every successful completion of communication with the respective CM. There<strong>for</strong>e, a<br />

particular SC will only use SC i ′ once during its lifetime.<br />

4.8.2 Protocol Verication by CasperFDR<br />

The CasperFDR approach is adopted to test the soundness of the proposed protocol under<br />

the dened security properties. In this approach, the Casper compiler [142] takes<br />

a high-level description of the protocol, together with its security requirements. It then<br />

translates the description into the process algebra of Communicating Sequential Processes<br />

(CSP) [143]. The CSP description of the protocol can be machine veried using the<br />

Failures-Divergence Renement (FDR) model checker [144]. A short introduction to the<br />

106

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!