Technical Presentation
AIAC 2010-2011
Group 1
1



System Rationale
System Architecture
Secure Channel Establishment
◦ Username/Password
◦ Cartão Cidadão
◦ Digital Certificate

Secure Functionalities
◦ Competence Verification
◦ Document Signature and Validation

System Security Analysis
AIAC 2010-2011
Group 1
2

Client asked for a system who was able to:
◦ Verify a title or competency of a subject;
◦ Digitally Sign a document with a given Competency
of a subject.


All the communication and processes
performed in a secure fashion
CERTCOP was developed to address these
(and more…) requisites
AIAC 2010-2011
Group 1
3
AIAC 2010-2011
Group 1
4

3 Modes Used:
◦ Username/Password
◦ Cartão Cidadão
◦ Digital Certificates
 Used with a slight modification in Web Server


All modes based on EKE (Encrypted Key
Exchange)
At the end each entity has:
◦ Public/Private Key;
◦ Symmetric Session Key;
◦ Mutual Authentication Guarantees.
AIAC 2010-2011
Group 1
5
AIAC 2010-2011
Group 1
6
AIAC 2010-2011
Group 1
7
AIAC 2010-2011
Group 1
8

One signature is generated for every message
𝑀𝑒𝑠𝑠𝑎𝑔𝑒𝑆𝑖𝑔𝑛𝑎𝑡𝑢𝑟𝑒(𝑈𝑠𝑒𝑟𝐼𝑑, 𝑅𝑒𝑚𝑜𝑡𝑒𝑈𝑠𝑒𝑟𝐼𝑑, 𝐶𝑢𝑟𝑟𝑒𝑛𝑡𝑇𝑆, 𝑀𝑒𝑠𝑠𝑎𝑔𝑒𝐻𝑎𝑠ℎ, {𝐻𝑎𝑠ℎ 𝑀𝑒𝑠𝑠𝑎𝑔𝑒𝑆𝑖𝑔𝑛𝑎𝑡𝑢𝑟𝑒) 𝐾 − )
◦ Provides Integrity, Freshness and Non-Repudiation

The original message, along with the
Signature, is ciphered with the Symmetric
Session Key
◦ Providing Confidentiality and Authentication
𝑆𝑒𝑐𝑢𝑟𝑒𝑀𝑒𝑠𝑠𝑎𝑔𝑒( 𝑂𝑟𝑖𝑔𝑖𝑛𝑎𝑙𝑀𝑒𝑠𝑠𝑎𝑔𝑒, 𝑀𝑒𝑠𝑠𝑎𝑔𝑒𝑆𝑖𝑔𝑛𝑎𝑡𝑢𝑟𝑒 𝐾𝑠 )
AIAC 2010-2011
Group 1
9

Competence Verification

Document Signature and Validation
AIAC 2010-2011
Group 1
10
−
𝐺𝑒𝑛𝑆𝑖𝑔𝑛𝑎𝑡𝑢𝑟𝑒( 𝐻𝑎𝑠ℎ 𝑁𝑜𝑢𝑛𝑐𝑒, 𝐶𝑜𝑚𝑝𝑒𝑡𝑒𝑛𝑐𝑦 𝐾𝐶𝑖𝑡𝑖𝑧𝑒𝑛𝐶𝑎𝑟𝑑
)
AIAC 2010-2011
Group 1
11
−
𝐴𝑢𝑡ℎ𝑆𝑖𝑔𝑛𝑎𝑡𝑢𝑟𝑒( 𝐻𝑎𝑠ℎ 𝑁𝑜𝑢𝑛𝑐𝑒, 𝐶𝑜𝑚𝑝𝑒𝑡𝑒𝑛𝑐𝑦 𝐾𝐶𝑖𝑡𝑖𝑧𝑒𝑛𝐶𝑎𝑟𝑑
)
AIAC 2010-2011
Group 1
12

To each signed document is generated the
following signature:
𝐷𝑜𝑐𝑢𝑚𝑒𝑛𝑡𝑆𝑖𝑔𝑛𝑎𝑡𝑢𝑟𝑒(𝐻𝑎𝑠ℎ 𝐷𝑜𝑐𝑢𝑚𝑒𝑛𝑡 , 𝑆𝑒𝑟𝑖𝑎𝑙𝑁𝑢𝑚𝑏𝑒𝑟, 𝑈𝑠𝑒𝑟𝐼𝑑, 𝑈𝑠𝑒𝑟𝐶𝑜𝑚𝑝𝑒𝑡𝑒𝑛𝑐𝑒,
𝑆𝑒𝑟𝑖𝑎𝑙𝑁𝑢𝑚𝑏𝑒𝑟𝑆𝑖𝑔𝑛𝑒𝑟𝐶𝑒𝑟𝑡𝑖𝑓𝑖𝑐𝑎𝑡𝑒 𝑉𝐸𝑅𝐼𝐶𝑂𝑃? , 𝑆𝑖𝑔𝑛𝑎𝑡𝑢𝑟𝑒𝑉𝑎𝑙𝑖𝑑𝑖𝑡𝑦, 𝑆𝑖𝑔𝑛𝑎𝑡𝑢𝑟𝑒𝐺𝑒𝑛𝑒𝑟𝑎𝑡𝑖𝑜𝑛𝐷𝑎𝑡𝑒,
−
{𝐻𝑎𝑠ℎ(𝐷𝑜𝑐𝑢𝑚𝑒𝑛𝑡𝑆𝑖𝑔𝑛𝑎𝑡𝑢𝑟𝑒)}𝐾𝐶𝐸𝑅𝑇𝐶𝑂𝑃
)

If the Document has a higher priority it is
stored and verified by another system
◦ VERICOP

This additional service can be billed at a
higher price
AIAC 2010-2011
Group 1
13

State of the art cryptographic algorithms and
protocols used:
◦ AES (with 128 bits key and 10 encryption rounds)
◦ SHA-2 (256 bits)
◦ RSA (with 2048 bits key for certificate, 1024 for the
transient key pairs)
◦ Adapted EKE Protocol

Quite few practical attacks reported on those
algorithms
AIAC 2010-2011
Group 1
14

System Security is an important issue:
◦ Database Servers Isolation
◦ Credentials Management
◦ Firewall Configuration

Users and Administrators security awareness
is vital to the Security
◦ Neither Users nor Administrators should ever
release their passwords to anybody
AIAC 2010-2011
Group 1
15


Web Interface will be available in a future
release;
System design based on state of the art
security technologies
◦ Great overall System Security Level

Special care must be taken to the
maintenance and operation procedures of the
system
AIAC 2010-2011
Group 1
16
Download

Secure Channel Establishment