Markus Schatzl ha scritto:
Hello,

I'd be interested if somebody here has practical experience with
"Secure Messaging" modes in general and would be so kind to
answer a few questions:

In authentic as well as in combined mode, the use of symmetric ciphers seems to be the standard approach. To migitate simple MITM techniques, at least one keypair must be already integrated into ROM/EEPROM at the production/personalization stage and kept secret.

  As a result, SM can only be used with designated terminals
from a single emitting instance (or partner organizations) that have knowledge about this secret key. This defeats
  interoperability as a whole and reminds me to the infamous
  "security by obscurity" solutions popular in former decades.

Unfortunately, this is the way latest Italian EU - normative compliant digital signature cards are working now, AFAIK. As you said use of secure messaging by mean of a secret key makes almost impossible to develop an open solution because it leverages on "security by obscurity", and ties the card with use of manufacturer's middleware which carries the secret key.

Note that all digital signature - relevant APDUS are SM protected on these cards.

EU normative mandates only use of "secure path" and "secure channel" between SSCD and user terminal. (http://www.interlex.it/testi/pdf/dec030714.pdf , or better, referenced technical rules: CWA 14167-1 CWA 14167-2 CWA 14169 available here: http://www.cen.eu/cenorm/businessdomains/businessdomains/isss/cwa/electronic+signatures.asp )


  Are there any practical attempts to negotiate keys for SM by
  use of public keys?

As someone noted in another reply, there is another very interesting CWA: in 14890-1 (Chapter 8, "Device authentication") , different schemes are proposed for SM, using symmetric key and using asymmetric one. With the asymmetric scheme, no prior knowledge of a secret key is necessary.


What is the impact in terms of computation time for encrypted transfer at the moment, compared to a plain transmission? (Last info: x4)

  Plain signature functionality is neither time-critical and
  generally uses basic facilities available on nearly every
token. As digital signatures slowly gain acceptance outside specialized applications, are there any ambitions to secure the
  card-to-terminal communication by default?
Isn't it urgently necessary to use ad-hoc interoperable
  security routines in the light of the legal status of digital
  signatures within the EU?

Definitely.

Bye,
Roberto Resoli.

_______________________________________________
opensc-devel mailing list
opensc-devel@lists.opensc-project.org
http://www.opensc-project.org/mailman/listinfo/opensc-devel

Reply via email to