TalTech_crypt/hw4/reseni.md

7.9 KiB
Raw Permalink Blame History

title author documentclass classoption geometry header-includes csl link-citations references
Analysis of Electronic Resident Identity Card proposal Ondřej Hladůvka extarticle 10pt left=3.5cm,right=3.5cm,top=1cm,bottom=1cm,includeheadfoot \hyphenpenalty=10000 ieee.csl true
id container-title type genre number author issued URL
rc4 RFC 7465 Prohibiting RC4 Cipher Suites report RFC 7465 Andrei Popov 2015 https://datatracker.ietf.org/doc/html/rfc7465
id container-title type genre number author issued URL
des RFC 4772 Security Implications of Using the Data Encryption Standard (DES) report RFC 4772 Scott G. Kelly 2006 https://datatracker.ietf.org/doc/html/rfc4772
id container-title type genre number author issued URL
rsa-pss RFC 3447 Public-Key Cryptography Standards (PKCS) #1 report RFC 3447 Jakob Jonsson and Burt Kaliski 2003 https://datatracker.ietf.org/doc/html/rfc3447#section-8.1
id title author container-title volume issue page type issued DOI
elgamal A Public-Key Cryptosystem and a Signature Scheme Based on Discrete Logarithms Taher Elgamal IEEE Transactions on Information Theory 31 4 469-472 article 1985 10.1109/TIT.1985.1057074
id title type genre number publisher author issued URL
SHA3 SHA-3 Derived Functions: cSHAKE, KMAC, TupleHash, and ParallelHash report NIST Special Publication 800-185 National Institute of Standards and Technology (NIST)
Kelsey John
Chang Shu-jen
Perlner Ray
2016 https://doi.org/10.6028/NIST.SP.800-185
id type title collection-title publisher issued URL
ecdsa report Module-Lattice-Based Digital Signature Standard (ML-DSA) FIPS 204 National Institute of Standards and Technology (NIST) 2024 https://doi.org/10.6028/NIST.FIPS.204
id type title collection-title publisher issued author URL
luov report Status Report on the Second Round of the NIST Post-Quantum Cryptography Standardization Process Section 3.24 NIST Interagency or Internal Report (NISTIR) 8309 National Institute of Standards and Technology (NIST) 2020
Alkemade Nicky
Alperin-Sheriff Joel
Apon Daniel
Cooper David
Dang Quynh
Kelsey John
Licht Sean
Liu Yi-Kai
Miller Dustin Moody
Peralta Rene
Perlner Ray
Smith-Tone David
Alagic Gorjan
https://nvlpubs.nist.gov/nistpubs/ir/2020/NIST.IR.8309.pdf
id type title author issued container-title page DOI URL
clone-attack article-journal Android Data-Clone Attack via Operating System Customization
Song Wenna
Ming Jiang
Jiang Lin
Yan Han
Xiang Yi
Chen Yuan
Fu Jianming
Peng Guojun
2020 IEEE Access 184708184720 10.1109/ACCESS.2020.3035089 https://ieeexplore.ieee.org/document/9246570
id type title collection-title publisher issued URL
owasp-auth report Authentication Cheat Sheet OWASP Cheat Sheet Series Open Web Application Security Project (OWASP) 2023 https://cheatsheetseries.owasp.org/cheatsheets/Authentication_Cheat_Sheet.html
id type title author publisher collection-title issued URL
luov-attack article The Nested Subset Differential Attack: A Practical Direct Attack Against LUOV which Forges a Signature within 210 Minutes Beullens Ward International Association for Cryptologic Research (IACR) IACR Cryptology ePrint Archive 2020 https://eprint.iacr.org/2020/967

Introduction

This analysis evaluates proposed e-ID system's compliance agains given criteria.

Proposed requirements compliance

The system must manage encryption keys and signing keys securely, including usage of Hardware Security Modules (HSMs) where applicable

Not met. Usage of HSM is not even mentioned outside of section 2.2. thus it si certainly not enforced.

The e-ID data must be encrypted using strong, industry-standard encryption algorithms

Not met. Section 2.3 describes encryption of the e-ID credential by the issuer with:
DES[@des] and RC4[@rc4] which are insecure. SHA3 which is a hash family[@SHA3], not encryption. RSA-PSS which is signature algorithm[@rsa-pss], not encryption. And ElGamal-OFB which is not a block cipher[@elgamal], thus its not standardized in OFB mode

The system should rely on use of digital signatures to verify the authenticity of the e-ID data and to ensure that the data has not been tampered with

Partially met. LUOV/ECDSA signatures are proposed, but the issuers signature on the e-ID is not explicitly verified by RPs.

The system must ensure that e-ID that was not created by the issuer does not pass verification by the RP

Not met. In Presentation protocol step 8 RPs only check for "meaningful plaintext," not issuer signatures, enabling tampering and unauthorised access.

The system must ensure post-quantum security for all the components

Not met. ECDSA is vulnerable to Shors algorithm, as confirming by NIST PQC standardization [@ecdsa]. But its still proposed in both issuing and presentation protocols.

The system must use standardised cryptographic algorithms

Not met. LUOV is not standardized and was rulled out by NIST[@luov]. Voulnabirities was found[@luov-attack] and proposal does not mention any mitigation. DES[@des] and RC4[@rc4] are deprecated.

The system must ensure that attackers getting access to the users device are not able present honest users credential to the RP

Not met. System lacks device-level authentication or any other second factor, allowing attackers to present credentials.

The system must ensure strong user authentication before credential is issued

Not met. System proposes just photo verification which is weak and unrealiable[@owasp-auth]. No multi-factor authentication is required.

The system must ensure that adversary cloning the mobile device memory, does not gain access to user private information

Not met. Private keys arent explicitly stored in HSM, thus they are vulnerable to memory cloning[@clone-attack].

The system must ensure that adversary cloning the mobile device memory is not able to issue revocation, issuing and presentation requests (without active participation of user)

Not met. Revocation requires no user verification enabling misuse by attackers.

Additional notes

Insecure Communication

Section 2.2 proposes to send all the information over public communication channel without TLS, this is a critical flaw.

Offline Revocation

Users can self-revoke/modify e-IDs without issuer, risking fraud.

Unencrypted Cloud Storage

Lack of encryption at rest for cloud storage of e-IDs risks data breach.

Denial of service

System do not restrict the number of field in the credentials, risking overload by maliciously large input.

Conclusion

Proposal makes several false claims, proposes usage of deprecated (DES, RC4) as well as experimental ciphers (LUOV). Does not enforce HSM usage, multifactor authentication and data at rest encryption. It also fails at choosing standardised ciphers and does not enforce post-quantum cryptography. And is by design vulnarable to denial of service.
I do not recommend system implementation until these issues are resolved as it would not improve security compared to present system.

\newpage

References