Secure Messaging Implementation in OpenSC

نویسندگان

  • Maurizio Talamo
  • Maulahikmah Galinium
  • Christian H. Schunck
  • Franco Arcieri
چکیده

Smartcards are used for a rapidly increasing number of applications including electronic identity, driving licenses, physical access, health care, digital signature, and electronic payments. The use of a specific smartcard in a “closed” environment generally provides a high level of security. In a closed environment no other smartcards are employed and the card use is restricted to the smartcard’s own firmware, approved software applications, and approved card reader. However, the same level of security cannot be claimed for open environments where smartcards from different manufacturers might interact with various smartcard applications. The reason is that despite a number of existing standards and certification protocols like Common Criteria and CWA 14169, secure and convenient smartcard interoperability has remained a challenge. Ideally, just one middleware would handle the interactions between various software applications and different smartcards securely and seamlessly. In our ongoing research we investigate the underlying interoperability and security problems specifically for digital signature processes. An important part of such a middleware is a set of utilities and libraries that support cryptographic applications including authentication and digital signatures for a significant number of smartcards. The open-source project OpenSC provides such utilities and libraries. Here we identify some security lacks of OpenSC used as such a middleware. By implementing a secure messaging function in OpenSC 0.12.0 that protects the PIN and data exchange between the SC and the middleware, we address one important security weakness. This enables the integration of digital signature functionality into the OpenSC environment.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

MCMix: Anonymous Messaging via Secure Multiparty Computation

We present MCMix, an anonymous messaging system that completely hides communication metadata and can scale in the order of hundreds of thousands of users. Our approach is to isolate two suitable functionalities, called dialing and conversation, that when used in succession, realize anonymous messaging. With this as a starting point, we apply secure multiparty computation (“MC” or MPC) and proce...

متن کامل

Design and Implementation of a Secure Instant Messaging Service based on Elliptic-Curve Cryptography

Instant Messaging (IM) is a useful communication and work collaboration tool between individuals, groups, or enterprises. Unfortunately, most IM systems lack the needed security mechanism capable of ensuring the secure communications of IM client-client and IM client-server. In order to find a solution to secure IM communications, we designed and implemented a Secure Instant Messaging and Prese...

متن کامل

A Protocol for Secure Public Instant Messaging (Extended Version)

Although Instant Messaging (IM) services are now relatively long-standing and very popular as an instant way of communication over the Internet, they have received little attention from the security research community. Despite important differences distinguishing IM from other Internet applications, very few protocols have been designed to address the unique security issues of IM. In light of t...

متن کامل

A Protocol for Secure Public Instant Messaging

Although Instant Messaging (IM) services are now relatively long-standing and very popular as an instant way of communication over the Internet, they have received little attention from the security research community. Despite important differences distinguishing IM from other Internet applications, very few protocols have been designed to address the unique security issues of IM. In light of t...

متن کامل

(In-)Secure messaging with the Silent Circle instant messaging protocol

Silent Text, the instant messaging application by the company Silent Circle, provides its users with end-to-end encrypted communication on the Blackphone and other smartphones. The underlying protocol, SCimp, has received many extensions during the update to version 2, but has not been subjected to critical review from the cryptographic community. In this paper, we analyze both the design and i...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:
  • J. Information Security

دوره 3  شماره 

صفحات  -

تاریخ انتشار 2012