2.09k likes | 2.25k Views
Electronic Cash and User Authentication using the Dallas Semiconductor / Maxim DS1963 S Monetary i Button. e-Cash - “Electronic Money”. The DS1963S eCash i Button. An Apology.
E N D
Electronic Cash andUser Authentication using the Dallas Semiconductor / Maxim DS1963S Monetary iButton
e-Cash - “Electronic Money” • The DS1963S eCash iButton
An Apology This presentation was intended for “interested lay-persons”. Apologies in advance for it’s extreme simplicity. It was also intended to make sense without the accompanying lecturer, to please excuse the detail (and length) of the presentation.
What We Will Discuss • How money and credit are handled now • Why e-Cash is better • The Evolution of a Secure eCash iButton • The DS1963S Monetary iButton (MiB) • Why Security is Important • How the DS1963S features provide security
We’ll Also Touch On... • iButtons in General • iButton Physical Security Issues • Various kinds of Cryptography • Attacks against e-Cash Schemes • Various e-Cash Applications
Be Sure You Understand! • These slides indicate places where you should make sure that you are keeping up • If you missed something, SPEAK UP! • These slides will remind you
What is “Cash Money” ? • A representation of value • Recognized and validated by look, feel, familiarity • Value is represented physically (ink on paper) • Can be stolen by anyone with a physical advantage
What’s Good About Cash? • Anonymous - The seller doesn’t care who you are • Difficult to counterfeit (paper, printing methods, lots of new tricks) • Backed by the government • Trusted by everyone (We’re all used to it…) • A visible representation of funds (you can see what you’ve got)
What’s New About Your Cash Serial Numbers Fine Line Printing Portrait Watermark Security Thread Micro-printing Color Shifting Ink
What’s Bad About Cash? • Must be handled/observed by human eyesight or costly photo-scanner • Fixed denominations - requires making change • Not suitable for use on the Internet • Bills consume space, must be physically secured • No audit trail
What’s REALLY Bad About Cash? • Carrier is in physical danger of being robbed of cash • Stolen cash may be freely used • Paper bills spread germs and disease
A Warning! • “It is highly likely that an epidemic of global proportions - a serious threat to all human life - will be spread around the world quickly and efficiently on paper currency.” - From ajoint statement by the World Health Organization and the United States Centers for Disease Control in 1994.
What is a Credit Card? • A representation of your responsibility • Really just an ID card • Backed by you - the individual • Recognized and validated by look, feel, familiarity
What’s Good About Credit Cards? • Somewhat difficult to duplicate (embossed plastic, magnetic stripe data, holograms) • No denomination - No need to make change • Audit trail is owned by the card issuer and the user • Slightly more easily used over the Internet (only because number can be used w/o plastic card)
What’s Bad About Credit Cards? • Notanonymous. Depends on knowing exactly who you are • Data stored magnetically, costly mechanical reader • Audit trail owned by the card issuer and who else? • No easy visual representation of funds
What’s REALLY Bad about Credit Cards • Account number alone can be used if it is stolen or discovered (card is not required) • No PIN or Password required in most cases, allows anyone with the number to use it • Every vendor must be connected to the central server (via phone or network) • Vendor-end equipment is costly
Why eCash is Like Cash? • A representation of value • Anonymous - The seller doesn’t care who you are i
Why is eCash like a Credit Card? • No denomination - No need to make change • Information is electronic, access is simple and fast • Audit trail is optional and personal i
Why is eCash Better than Cashor Credit Cards? • Perfectly suited for computers, the Internet • Validated using advanced cryptography (much more secure) • Almost impossible to counterfeit • Carrier is not in physical danger of robbery • It’s easier to obtain a visual, private representation of your funds
Why Not e-Credit Cards? • Credit Cards require database lookups • Database lookups take time • Database currency is a problem • All vendors must have a telephone or network connection to access database • Not all recipients are connected or even “connectable” to the bank • Vending equipment is too expensive
The Dallas SemiconductoriButton as an Electronic Token fore-Cash Applications
What is an iButton? • Portable memory that doesn’t forget • Electronic circuits that can control or limit data access • It can keep secrets • Physically secure circuit assembly • Physically secure steel container ROM ID C O N T R O L RAM Battery
Non-Volatile Memory • Random Access Memory (RAM) • Data is sustained by internal battery • Special mechanisms to assure good data despite intermittent connections • Memory organization using TMEX allows easy, efficient sharing of the memory area between users
Very Simple Connection • Communicates 2-ways using one signal line • Much simpler than radio, magnetic, or infra-red communications • Very simple and inexpensive connection to electronic systems • A variety of ways to get into computers (serial ports, parallel ports, USB ports, etc..)
Just a Touch... • Communicating with an iButton requires a simple touch of the iButton to a reader • Positive action by the user is required • There is no doubt about the intent, no accidental communications take place
The Most Important Feature • A unique Serial Number, sometimes called a “ROM ID” • A permanent identifier that cannot be re-programmed • No two iButtons EVER have the same serial number ROM ID C O N T R O L RAM Battery
An iButton Serial Number 15 00 00 00 01 40 D6 0C Unique Serial Number Error Check Code Family Code Shown in Hexadecimal notation
Facts about iButton Serial Numbers • Written by a laser when iButton is manufactured • Every iButton is unique. No two iButtons will ever have the same serial number • The biggest iButton serial number possible is 281,474,977,000,000 iButtons in each family • There can be 256 families, for a total of 18,010,000,000,000,000 iButtons in all! • We will NEVER run out of numbers
iButtons with Special Functions • Temperature Sensors • Time/Temperature Histograms • Time clocks (DS1994) • Password-protected memories (DS1991) • Analog-to-Digital Converters
Be Sure You Understand! • Do you know all about iButtons and their basic features? • Do you know how iButtons are carried and used in day to day applications? • Understand the Unique Serial Number?
Evolving eCash... • We will walk through the evolution of an eCash iButton, starting at the simplest form, examining ways that it could be attacked, and then adding methods to protect against attacks, until we achieve a sound eCash solution.
How We Can Put Money Into an iButton • Money is just a number (call it your “balance”) • The bank takes cash, writes money amount into your iButton memory • Seller reads the balance, subtracts the amount of the sale, writes the new balance back into the iButton $123.45 i
Think of it as Money • The iButton contains a balance stored in the RAM by a monetary authority (like a bank) • The balance represents your money remaining; the funds that are left in your iButton “account”
Let’s Make Ourselves Rich! • It’s EASY to change the numbers in RAM • We’ll just raise the balance amount to whatever we want • Instant money! • Who will know?
Why is it So Easy to Cheat? • Access to the iButton data is very easy (our own data books tell you how) • The Bad Guy just writes in a bigger balance • There’s no protection against anyone altering the memory contents • There’s no easy way to detect that the fraud has been perpetrated
A Memory iButton Alone isNot Enough for Secure eCash The Evolution of a Better e-Cash iButton
To Make a Better eCash Token,We’ll Need Some Help... • Special Hardware Features and Functions • Special Secure Assembly Methods • Strong Cryptographic Techniques • Careful Analysis of All Possible Attacks
Introducing Cryptography • From simple substitution ciphers to highly advanced mathematical algorithms • Cryptography is a science all its own! • It has its own language, symbols, and lingo Message Cryptogram CIPHER Plaintext Ciphertext
Message Plaintext Ciphertext Cryptogram Cipher Algorithm Key Secret Encode, Encrypt Decode, Decrypt Attacker, or “Bad Guy” Cryptography Lingo
“Message” • Simple enough: Your “message” is whatever you have that you wish to protect or hide from all but the intended recipient.
Plaintext is the message that you wish to send It is clearly read and understood by anyone It is insecure Ciphertext is the encrypted message It makes no sense to anyone when they attempt to read it It is secure because the real contents cannot be read or understood Plaintext, Ciphertext
“Cryptogram” • A Cryptogram is a Message that has been encrypted, or converted to a form that a person who does not have the secret “key” cannot understand. • An entire Message, converted to Ciphertext, is a Cryptogram.
“Cipher” or Algorithm • A “Cipher” is the process by which PlainText is converted into CipherText • An Algoriothm is a series of operations that, when performed on the PlainText data, will turn it into Ciphertext. • “Cipher” is a catch-all term for a variety of encryption algorithms
Key, Secret • The ingredient of the Cipher that is known only to the legitimate parties to the message is the “Secret” or “Key”. • Just as a mechanical key opens a lock, the cipher Key makes the data readable again. • The words Key and Secret are sometimes interchangeable, but not always (we’ll see why later on…)
“Encrypt” < > “Decrypt” • Encrypt means to make Plaintext into Ciphertext • Decrypt is to make Ciphertext back into Plaintext once again • Sometimes “Encode” and “Decode” are used to mean the same thing.
“Attacker”, “Bad Guy” • The person or organization who wants to break your crypto-system and find out what the secret message contains • Perhaps wants to alter the secret message before it gets to its rightful destination • Sometimes, its your own courier, or your own customer!
Single Key Ciphers Original message Hello • The old “Decoder Ring” • Both ends of the conversation must know the same secret key • Only one or a limited number of recipients • Recipient can also encrypt messages using the same secret key Cipher Key Cipher- text pjighqr Same Key Cipher Key Restored message Hello
What Does It Tell You? • Only that whoever sent the message knows the secret key, because, • If they didn’t know the secret, they could not have made a valid encrypted message. • If more than one other person knows the secret, you can never be sure who sent you any given message.