06.11.2014 Views

A User Centric Security Model for Tamper-Resistant Devices

A User Centric Security Model for Tamper-Resistant Devices

A User Centric Security Model for Tamper-Resistant Devices

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

6.3 Secure and Trusted Channel Protocol Service Provider<br />

will generate the session keys, verify the MAC and decrypt the message, and then verify<br />

the smart card certicate. The smart card certicate gives the required assurance that<br />

the smart card plat<strong>for</strong>m has had a third party evaluation, and the SP will then proceed<br />

with verifying the signature. The assumption here is that if the third party evaluation<br />

has concluded that the smart card is a tamper-resistant device with an eective validation<br />

mechanism, then it will be dicult <strong>for</strong> a malicious user to obtain the TEM keys. Hence,<br />

in the presence of a tamper-evidence mechanism only a genuine TEM can generate the<br />

correct signature. However, if the SP cannot verify the signature, then the current state<br />

of the SC has been modied and it is dierent to the one <strong>for</strong> which it was evaluated.<br />

As a next step, the SP ascertains whether it has already issued an application lease to the<br />

stated smart card. If there is an application lease to the SC <strong>for</strong> the requested application,<br />

the protocol will terminate. Otherwise, the SP will proceed to the next step.<br />

STCP SP -3. SP : hp = h(SP i ||SC i ||g r SP<br />

||g r SC<br />

||N SP ||N SC )<br />

SP : AU SP = Sign SP (SP i ||SC i ||hp||ALP )<br />

SP : mE = ek SC−SP (AU SP ||ADP ||CertS SP )<br />

SP → SC : mE||f mkSC−SP (mE)||SI<br />

The SP will then sign the identities of both the SC and SP along with the ALP and<br />

hp. The hp is similar to the hs but it is generated by the SP and provides the necessary<br />

evidence to the SC that the message is not a replay or mirror message while at the same<br />

time avoiding man-in-the-middle attack. The signed message is appended to the ADP and<br />

SP's certicate.<br />

On receipt, the SC will verify whether it can support the listed requirements in the ALP.<br />

The most important requirement is whether the SC has enough memory space to accommodate<br />

the SP's application. Furthermore, the SC will also check the hp to prevent<br />

man-in-the-middle and replay attacks.<br />

STCP SP -4. SC : AU U = Sign U (SC i ||SP i ||U i ||hp||hs)<br />

SC : mE = ek SC−SP (U Cre ||AU U ||CertS U )<br />

SC → SP : mE||f mkSC−SP (mE)||SI<br />

The SC requests the cardholder to provide the SP's authentication credentials as requested<br />

by the SP in the SP Sup . After the user provides those credentials they are packaged as<br />

U Cre and are concatenated with a signed message (AU U ) containing the identities of the<br />

SC, SP and user along with the hp and hs. The reason behind including the hp and<br />

hs in the signature is to provide a proof, signed by the user's signature key pair, that<br />

she initiated the protocol session. The signed message along with the certicate and the<br />

user's credentials are then encrypted and MACed. The MAC is generated on the encrypted<br />

message.<br />

138

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!