• Tidak ada hasil yang ditemukan

A taxonomy and survey of attacks on digital signatures

N/A
N/A
Protected

Academic year: 2023

Membagikan "A taxonomy and survey of attacks on digital signatures"

Copied!
46
0
0

Teks penuh

The goal of an attack will be to achieve one of the following service failures in the Signature Creation System (SCS) or the Signature Verification System (SVS): The goal of the attacker is to use the Signature Creation Data (SCD) on behalf of the user, but without his consent and knowledge. There is an exception when the attacker tries to show different content related to the signer's identity.

This category includes the methods aimed at manipulating the environment of the Signature Creation System (SCS). The attacker applies methods specifically focused on breaking the security of the hash function used in the signature calculation. The attacker modifies the request information that identifies the certificate whose revocation is being requested.

This subcategory considers methods where the attacker changes the verification of the certificate validity period. This category includes methods of attack that affect the verification of the signature being verified. The attacker changes the visualization of the Data To Be Verified (DTBV) and can present a DTBV that differs from what is actually signed.

The attacker changes the behavior of the viewer so that it presents the Data To Be Verified (DTBV) in a different way.

Fig. 1 e Expected evolution of a taxonomy.
Fig. 1 e Expected evolution of a taxonomy.

Method of classification

The target of the attack must be identified and classified according to the Attacker's target dimension. The attack method must be classified in the deepest level subcategory of the selected branch. As in the previous step, the subcategory of the deepest level of the selected branch must be selected.

The attack is carried out on two of the most widely deployed signature applications in Germany. Second, and using the information above, the purpose of the attack must be classified. In this case, the main goal of the attacker is to use the signature creation data without the user's permission.

Therefore, we classify the attack method as D2-CAT4: Unauthorized invocation of the signing function. However, the sort method specifies that the deepest level subcategory of the selected industry must be selected.

Table 3 e Classification of Spalka et al. (2001) Trojan horse attack.
Table 3 e Classification of Spalka et al. (2001) Trojan horse attack.

Survey and classification of attacks on digital signatures

The method proposed here aims to reduce ambiguity during the classification process, but we do not claim that the method is deterministic, as we believe that this is not possible in this imprecise field of study. 4 shows the specificity of the attacks, each of which is used to achieve a single specific goal. Figure 5 shows the distribution of attack methods used for verification level versus target dimension.

As in the previous distribution, it can be seen that there is a clear specificity in the surveyed attacks. Also, two methods prevail: those focused on modifying the appearance of the signed document by masking the document attacks (10 attacks) and, to a lesser extent, methods that mask the displayed verification result (5 attacks) . 4 and 5, the attack method raises accurate information about the target pursued and vice versa.

Each classified method is assigned to only one goal, unlike goal distribution, where some goals are assigned to more than one goal. This can help make informed decisions when implementing security measures to counter certain types of attacks or prevent the attacker from achieving a specific goal. Consequently, systems must be designed and implemented to specifically mitigate the risks associated with attacks involving target D1-CAT2.

Fig. 3 e Distribution of attacks: target versus goal.
Fig. 3 e Distribution of attacks: target versus goal.

Evaluation of the taxonomy

Conclusions

Description: The attack is carried out on two of the most installed signature software in Germany. Description: The attacker basically monitors the communication between the signature software and the chip card to change the hash of the data sent to the card (DTBSR). Description: The attacker aims to replace the content of an email with arbitrary data, maintaining the validity of the signature.

Method: D2-CAT5: Compromise of the Signature Creation Data (SCD)/D2-CAT5.3: Unauthorized Access to the SCDev/D2-CAT5.3.2: Bypassing Authentication. Method: D2-CAT5: Compromise of Signature Creation Data (SCD)/D2-CAT5.3: Unauthorized Access to the SCDev/Compromise of Signer Authentication Data (SAD)/D2-CAT4.1.2: SAD- interception/D2-CAT4 .1.2.2: Interception in communication between processes/entities. Method: D2-CAT5: Compromise of Signature Creation Credentials (SCD)/D2-CAT5.3: Unauthorized Access to the SCDev/D2-CAT5.3.1: Compromise of Signer Authentication Credentials (SAD)/D2- CAT4.1.1: Social engineering.

Method: D2-CAT5: Signature Creation Data Compromise (SCD)/D2-CAT5.2: Eavesdropping (Side Channel)/D2-CAT5.2.1: Timing Analysis. Method: D2-CAT5: Signature Creation Data Compromise (SCD)/D2-CAT5.2: Eavesdropping (Side Channel)/D2-CAT5.2.3: Power Analysis. Method: D2-CAT5: Signature Creation Data Compromise (SCD)/D2-CAT5.2: Eavesdropping (Side Channel)/D2-CAT5.2.2: Electromagnetic Analysis.

Method: D2-CAT5: Signature Creation Data Compromise (SCD)/D2-CAT5.2: Eavesdropping (Side Channel)/D2-CAT5.2.6: Bug Insertion. Method: D2-CAT5: Signature Creation Data Compromise (SCD)/D2-CAT5.2: Eavesdropping (Side Channel)/D2-CAT5.2.4: Microarchitectural Analysis. Method: D2-CAT4: Unauthorized Invocation of Signing Function/D2-CAT4.1: Compromising Signer Authentication Data (SAD)/D2-CAT4.1.3: Guessing.

If the user does not notice the change, it will be completely felt in the hands of the attacker. Method: D2-CAT5: Compromise of Signature Creation Data (SCD)/D2-CAT5.3: Unauthorized Access to SCDev/D2-CAT5.3.1: Compromise of Signatory Authentication Data (SAD)/D2- CAT4.1.2: SAD/D2 Interception-CAT4.1.2.3: Endpoint Compromise. Method: D2-CAT5: Signature Creation Data (SCD) Compromise/D2-CAT5.1: SCD Interception/D2- CAT5.1.1: Inter-Process/Entity Communication Interception.

Description: The attacker observes how the signer introduces the SAD into the platform of the SCS (eg before generating a signature). In particular, the attack changes the viewer's presentation surface without detection to trick the user into respecting the result of the signature verification. In this potential attack, the revocation request is modified by the attacker before it is verified by the owner of the certificate.

Description: This potential attack requires the attacker to be able to change the signature timestamp without detection.

Gambar

Table 1 e List of acronyms used for the entities within the signature creation and verification environments.
Fig. 1 e Expected evolution of a taxonomy.
Table 2 shows the relationship between the categories of the first dimension with the categories in the first level of the second dimension.
Table 3 e Classification of Spalka et al. (2001) Trojan horse attack.
+4

Referensi

Dokumen terkait

https://doi.org/ 10.1017/jie.2019.13 Received: 17 September 2018 Revised: 17 October 2018 Accepted: 23 April 2019 First published online: 2 September 2019 Key words: Aboriginal