320 likes | 532 Views
Smart Card Security in Wireless Network Transmission. Presentation of project : 4 th april 2003. Jean-François DAHAN, Sébastien FORGET Olivier AMIOT, Nicolas BERROGAIN, Jianwei YU Erwan ASSELOOS, Rio SASMITA. Responsable : M. KOENIG, Maître de conférences, ESSI.
E N D
Smart Card Security in Wireless Network Transmission Presentation of project : 4th april 2003 Jean-François DAHAN, Sébastien FORGET Olivier AMIOT, Nicolas BERROGAIN, Jianwei YU Erwan ASSELOOS, Rio SASMITA Responsable : M. KOENIG, Maître de conférences, ESSI
Smart Card Security in Wireless Network Transmission • Introduction • Objective • Problem and Solution • Implementation • Conclusion • Question
Introduction E-gate ? The USB Smart Card platform for E-business Security, based on Java Card Technology E-Gate Smart Card Token format E-Gate Smart Card ISO format
Introduction Benefit: Works on existing terminals Branding space Fits in wallet E-Gate Smart Card ISO format Plug-in token, SIM Format Integrated solution Key Ring format E-Gate Smart Card Token format
Introduction Benefit: • Easy implementation • ISO/USB versatility • USB communication performance • Plug & play • High level cryptographic capability: digital ID, authentication • A cost effective device, fast communications speed • Can combine strong authentication with other applications on the same card E-Gate Smart Card
Wifi network Wi-Fi and Access Point
Problem and Solution • Authentication • Access to Network Jean-François, Sébastien • Certification • Data integrity Jianwei, Olivier, Nicolas • Cryptography • Confidentiality Rio, Erwan
Objective Wi-Fi and Access Point
Solution Problem and Solution • Authentication • Certification • Cryptography
USB Communications Expected Signal Acknolegement APDU 2 V/cm 100 µS/cm
USB Communications Measured Signal : Numerous Gaps 2 V/cm 10 µS/cm
Development Environments • J2SE with Java 2 SDK v1.4 include JCE : Java Cryptographic Environment • JavaCard 2.1.1 Development Kit with SchlumbergerSema cryptographic extension • For compilation card applet Java 2 SDK v1.3 • SchlumbergerSema Cyberflex Access Software Development Kit
Implementation SchlumbergerSema IOP API • API (C++) for communication with the windows device manager • For Java Application use IOP JNI API
Implementation PC Client Installation • Activate Windows Smart Card communication service PC/SC device drivers • Communication program with proxy server • Web navigator with Java interpreterfor applet authentication
Implementation Trusted Applet : Signature • Security policy : file java.policy • Applet sign = jar file • Applet encrypted with the private key
Implementation Authentication
Authentication • Server Side • Owns clients public keys • PC Applet Receives encrypted message from the server and sends them to the javacard applet for decryption • Javacard Applet Receives encrypted messages and decrypts it
Authentication Protocol SHA Server private key Client private key Client public key Server public key 2 WWW 5 8 3 rdm 4 1 : PC wants to authenticate to the server 7 2 : PC sends user ID to the server 6 3: Server encrypts random message with server private key 4: Server sends the encrypted message 5: PC transmits the encrypted message to the card 6: Card decrypts the message with the server public key. If OK, the card makes a SHA encrypt of the random message using private key 7: The encrypted SHAis transmitted to the server 8: Server decrypts the message with the card public key.
Implementation Certification
Certification On Sender Side
Certification = Receiver Side for Verification Decypher Digest from the Sender Encrypted Digest Signed Message = Public Key =? Comparison Original Message Local Generation of the Digest
Certification Test Procedure Signatured Verification Calculated by the Client Certification Test (SHA and RSA) Achieved by the E-Gate Référence Calculation on the client Server Client Message Sent by the Client
Implementation Cryptography Asymmetric Key Session Key
Asymmetric Key How does it work ? Server private key Client private key Server public key Client public key
Asymmetric Key • On the client side • Client private key : in the card and never go out. • Messages encrypted by the card. • This solution is very secure but all performance depends on the performance of the card. How to measure this performance :
Asymmetric Key Results : Encryption time with the card • Very bad performances => This algorithm can not be used
Session key Session Key How does it work ? Server private key Client private key Server public key Client public key
Session Key • Private key remains in the card • Exchange client/server with symmetric key in the computer. • Much faster and reliable • Results : Encryption time with the card
Demonstration URL To change the browser properties Go to the URL Previous page To connect to the secure server
Conclusion • Some solutions • Smart Card = Future Technology • A Good Team Project and Experiences