Sie sind auf Seite 1von 13

Smart Cards and Digital Identity

JEAN-DANIEL AUSSEL

Smart cards are portable tamper-resistant cryptographic devices that play a key role in digital iden-
tity by securely storing the card owner identity attributes and preserving its privacy, and by providing
strong authentication of the card owner before releasing identity attributes. Internet authentication
has traditionally been performed using Public Key Infrastructure (PKI) and one-time password (OTP)
smart cards, mostly for identifying and authenticating corporate users. On the other hand, a huge
number of smart cards are deployed by mobile network operators (MNO) to authenticate and identify
Jean-Daniel subscribers to the GSM and 3G networks, and by banks and financial institutions for payment. Large
Aussel is Head
deployments are also on the way for government identification cards or electronic passports. As a
of the Tools &
Application Labs result, card issuers like MNOs and banks can reuse their existing infrastructure and act as identity
R&D in Gemalto providers to third-party service providers, or service provider can use government cards to identify
and authenticate users.

Introduction ing key loggers, phishing, pharming and DNS poi-


Several internet services require the identification of soning. Key loggers are Trojan horses maliciously
the user, e.g. for home banking, online purchases, installed on the user computer that record keyboard
voice-over-IP calls, or tax return filing. Identification keystrokes and intercept username and passwords as
of the user to access these services involves the dis- they are keyed in. In phishing, pharming and DNS
closure of one or more identity attributes. These iden- poisoning [1], the user is directed to a fraudulent web
tity attributes can be domain-dependent, such as the site that looks like the real service provider site. The
account number for home banking, or cross-domain, user name and passwords are stolen as the user enters
such as the user address. A variable degree of secu- them on the fake site.
rity is required for authenticating the user and pro-
tecting her identity attributes. Authentication that Stronger authentication is obtained with smart cards,
results in the proof of identity must be secured to which can provide two-factor authentication, i.e.
avoid impersonation by a fraudster. Similarly, iden- something I have (the smart card) and something I
tity attributes must be securely stored and their access know (the personal identification number of the smart
controlled to prevent unnecessary disclosure of iden- card).
tity attributes.
The first section of this paper is a quick review of the
Identification does not always require user authenti- hardware and software mechanism that makes a smart
cation. For example, cookies in a browser can be used card tamper resistant against several attacks, and
to store persistent identity attributes without the need therefore well fit for securely storing identity
to authenticate the user, such as the user’s city for a attributes and providing strong authentication.
weather forecast site. However, authentication is gen-
erally required for identifying users to gain access to The second section presents the conventional smart
valuable services, such as online payment, or services card strong authentication methods based on Public
involving privacy such as online consultation of a Key Infrastructure (PKI) or One-Time Password
medical record or tax return. (OTP). PKI and OTP cards are mostly used in corpo-
rate environments to secure Virtual Private Networks
User name and passwords are traditionally used to or intranet web site access. However, more and more
authenticate users, and are dimmed as one-factor PKI-enabled government identity or health cards are
authentication, i.e. something you know. Passwords deployed around the world and are expected to pro-
have two main issues: convenience and security. On vide the digital identity of citizens towards online
the convenience side, the average individual holds government or commercial services.
several online accounts for online banking, email,
social networks, online retailers, etc. It consequently A huge number of cards are currently deployed by
becomes difficult and confusing for consumers to Mobile Network Operators and financial institutions,
remember all their logins. On the security side, fraud- who also operate an associated server and crypto-
sters have developed several techniques to steal the graphic infrastructure for network access or payment,
username and passwords of legitimate users, includ- respectively. Section three presents methods for per-

ISSN 0085-7130©Telenor ASA 2007


66 Telektronikk 3/4.2007
forming strong authentication for web server access Side channel attacks on the card are used to recover
control using Subscriber Identity Module (SIM) cards secrets by monitoring execution time, power con-
and payment cards. sumption or electromagnetic radiation. A well-known
class of attacks is based on analysis of smart card
Finally, the integration of strong authentication in power consumption. This class includes Differential
two identity frameworks, Liberty Alliance and Win- Power Analysis (DPA), Simple Power Analysis
dows CardSpace is discussed. In identity frameworks, (SPA) and timing analysis.
the roles of service provider and identity provider are
clearly separated. Mobile Network operator or finan- Two principles are used for protection against side
cial institution can operate as identity providers and channel attacks: the first is to reduce as much as pos-
build value for the end-users and service providers. sible the power signal and electromagnetic emissions,
the second is to add noise, i.e. randomly alter the sig-
nals, or add random processor interrupts or change
Why Smart Cards Are Secure? the clock speed.
A smart card is like an ordinary credit card, except
that it has an embedded microchip and metallic Fault channel attacks are conducted using a combina-
contacts. The smart card operates as a very small tion of environmental conditions that causes the chip
computer with an embedded operating system that to produce computational errors that can leak pro-
controls application execution, access restrictions and tected information. Against fault channel attacks,
communication with the outside world. The purpose hardware sensors are used to detect abnormal varia-
of the smart card is to ensure secure processing and tions of voltage, frequency, light and temperature.
storage of sensitive data and applications. Highly sen- In addition, random delays are added to the code,
sitive data such as the user attributes or cryptographic making it difficult to identify when to inject a fault,
keys to authenticate the user are never released out- and redundancy and consistency checks are imple-
side the card, and all operations are handled by the mented to prevent erroneous executions to compro-
operating system of the card. mise sensitive functions.

The security of smart cards is based on a set of com- The security of the smart cards against physical and
ponents that protect both the physical card and stored logical attacks has been achieved thru the develop-
data or applications. The first component is the card ment of advanced counter-measures, and as a result,
body. Human-readable techniques (barcodes, holo- smart cards are the de-facto standard for digital secu-
grams, identity pictures) are used to prevent the card rity, and as such are the most deployed personal com-
body from being physically copied or counterfeited. puting device as shown in Table 1.
This offers a first level of security thru visual inspec-
tion, which obviously is not relevant for online digital
identity. Public Key Infrastructure Strong
Authentication
For protection against physical attacks, functional Public Key Infrastructure (PKI) smart cards are rou-
blocks are mixed, producing what is called a glue tinely used on personal computers for authentication
logic design. This makes it much more difficult for and identification of users, mostly in the corporate
an attacker to analyze the structure of the logic and world. PKI smart cards provide two-factor authenti-
locate functional blocks such as the CPU or coproces- cation, i.e. something you have, the smart card, and
sors. Buses are scrambled and buried, and thus inac- something you know, the card Personal Identification
cessible from outside the chip, so that connections Number (PIN). The main operating systems have
cannot be made to recover memory content. Memory
is also scrambled, to protect the chip from selective
access/erasure of individual data bytes. On top of the
physical scrambling, latest chips implement strong Personal Computing Device 2006 Worldwide shipments
in Millions of Units
ciphering thus preventing the reverse engineering of
memory and bus content. A current-carrying protec- Personal Digital Assistants (PDA) 18
tive layer is added at the top of the chip for power
Personal Computers (PC) 232
supply. If this layer is removed, the chip no longer
operates. Finally a set of sensors is activated to detect Mobile Phones 1000

abnormal variations of voltage, temperature, clock Microprocessor Cards 2655


frequency and light.
Table 1 Personal computing devices worlwide shipments.
Source: Gartner and Eurosmart for Microprocessor Cards

ISSN 0085-7130©Telenor ASA 2007


Telektronikk 3/4.2007 67
PKCS#11 aware applications Microsoft CAPI aware applications

Internet
Firefox Thunderbird Outlook
explorer

PKCS#11 interface Microsoft CAPI interface

Smart card cryptoki Smart card CAPI service provider

PCSC smart card base components

Smart card reader driver

Figure 1 PKI aware applications interface to the smart card using the PKCS#11 or Microsoft CAPI interfaces.
Smart card vendors typically provide a PKCS#11 cryptoki library or a Microsoft CAPI service provider

smart card support for establishing VPN connections, identity. To do so, the 3rd party checks the certificate
most browsers are smart card enabled to perform validity by verifying that the certificate is effectively
secure connections using the Secure Socket Layer signed by the certificate issuer. This verification is
(SSL) or Transport Layer Security (TLS) protocols, done using the public key of the certificate issuer.
and several applications such as e-mail client are PKI
aware and can perform for example digital signature The PKI client, e.g. browser, mail client, or VPN
or mail encryption. client, interfaces to the smart card using two main
industry standards: Microsoft CAPI [3] and
PKI smart cards contain one or several X509 v3 [2] PKCS#11 [4], as shown in Figure 1. The use of stan-
certificates. A X509 v3 certificate is a digital certifi- dard APIs allows the plug-in of different implementa-
cate containing among other things subject identity tions of these cryptographic components, called cryp-
attributes, such as the common name, the public key tographic service providers (CSP) for CAPI and cryp-
of the subject, the certificate issuer, and the descrip- toki for PKCS#11. PKI smart cards are essentially
tion of the PKI algorithms, such as RSA or DSA, and limited to the corporate environment usage for secur-
finally a digital signature of the certificate by the cer- ing web access or establishing VPN connections.
tificate issuer. For strong authentication, the private The deployment in the consumer market is limited
key of the subject is stored securely inside the smart by the required issuance of smart cards and smart
card. The basic principle for authentication is to ask card reader, their associated device drivers, the post-
the user to sign a challenge with her private key, and issuance management of the cards, and the certificate
verify the signature with the public key of the user and certificate revocation list management.
which is stored in the certificate.
However, more and more identity smart cards with
For proof of identity, the user presents her certificate PKI features are deployed in several countries such as
containing the public key to a 3rd party. This certificate Belgium, Italy, Spain, Estonia, Austria. These identity
presentation is done programmatically by the client cards aim to provide to the citizen identification,
software. For example during the establishment of an authentication and signature features, for access to
SSL/TLS connection with a browser, the user certifi- a wide range of online services, such as online tax
cate is transmitted during the client hello message. The return. Companies like banks will also use the digital
3rd party then challenges the identity of the subject by identity of the citizen and the associated strong authen-
requiring the subject to sign a challenge with its private tication. The European Committee for Standardization
key. Successful authentication is obtained if the signed has standardized the signature card [5] and the Euro-
challenge can be recovered with the public key of the pean Citizen Card [6]. An ISO standardization effort
certificate. So far, this only proves that the subject is the has also started to standardize the cryptographic inter-
valid owner of the certificate, but it does not certify its face of the applications to the smart card [7].

ISSN 0085-7130©Telenor ASA 2007


68 Telektronikk 3/4.2007
One-time Passwords
External data: time, counter, challenge
An alternate method for authentication using smart
cards is the one-time password (OTP). An OTP is
a generated password valid only once. The user is
given a device that can generate an OTP using an
Encryption algorithms
algorithm and cryptographic keys. On the server side,
an authentication server can check the validity of the
password by sharing the same algorithm and keys.

Several software or devices can be used to generate Formatting, e,g, 6 digits

the OTP, including personal digital assistants, mobile


phones, dedicated hardware tokens, the most secure Figure 2 The generation of One-Time passwords
means being smart cards which provide tamper-resis- generally involves three steps: the collection of authen-
tant two-factor authentication: a PIN to unlock the tication information like the value of a counter, the
OTP generator (something you know), and the OTP time, or a challenge, a ciphering algorithm applied
smart card itself (something you have). Figure 2 illus- on this external information, and finally formatting
trates the three steps required to generate an OTP: the of the OTP to a typical length of 6 to 8 digits
collection of some external data, such as the time for
synchronous OTP or a challenge for an asynchronous
OTP, a ciphering algorithm with secret keys shared open standard allows multi-sourcing of the OTP gen-
by the device and the authentication server, and erating devices and authentication servers from dif-
finally a formatting step that sets the size of the OTP ferent vendors. The HOTP algorithm is based on a
to typically six to eight digits.

Until recently, OTP solutions were based on propri- Service provider


ISP web portal
etary and often patented time-based or event-based bank web portal.
algorithms. In 2005, OATH-HOTP [8] was defined as etc
an open standard by major actors in the industry. This

Internet

Authentication server:
(performs user enrollment
and validation of OTP
authentication attempts)
OTP validation

PC with internet
access

Reflex 330 Reflex 570 Reflex 371

Figure 3 Authentication with smart card based OTP. On the server side, an authentication server validates the
OTP passwords entered by the users on the service provider login page. On the user side, several devices can
be used to generate the OTP. From left to right, the first two devices are one-factor authenticators, i.e. some-
thing I have, and do not require a PIN. The first device is a smart card with a simple display and push-button,
the second device has in addition a USB interface that can be connected to the PC and perform automated
form-filling of the password in the browser. The third device is a two factor authenticator, where a PIN or a
challenge can be entered on the device to generate the OTP. In the fourth device, the smart card inside the
mobile phone equipment generates the OTP and uses the handset display and keyboard using the SIM toolkit
programming interface

ISSN 0085-7130©Telenor ASA 2007


Telektronikk 3/4.2007 69
secret key and a counter shared by the device and the tion to secure their online services. Mastercard [9]
server, and uses standard algorithms such as SHA-1 and Visa [10] have develop OTP generation algo-
and HMAC. rithms, in which the cardholders use their smart card
payment card and a hardware device to generate the
OTP has some advantages over PKI in that it does not OTP. The OTP generation uses the built-in EMV
require the deployment of smart card readers, drivers application of the payment card, with a dedicated
and PC software. However in terms of features, OTP EMV key and counter storage. In addition, the
only provides identification and authentication, devices can implement transaction signature, for
whereas PKI provides in addition encryption and sig- example money transfer signature, to prevent man-in-
nature. OTP being a password-based authentication the-middle attacks and render impossible the altering
is also vulnerable to man-in-the-middle attacks, such of the transaction parameters on the fly.
as phishing scams. Since there is no mutual authenti-
cation of the PC and the internet service provider Mobile network operators (MNO) have an even wider
server, an attacker can intercept an OTP using a base of smart cards installed inside the end-user
mock-up site, and impersonate the user to the real handsets, Subscriber Identity Module (SIM) for the
internet web site. 2nd generation network (2G), or Universal Subscriber
Identity Module (USIM) for the UMTS or 3G net-
work. MNO applications can be loaded onto the
Banking Cards and Mobile Phone (U)SIM card and use the handset display and key-
One-Time Passwords board for user interaction thru the SIM Toolkit
The identification of the users using strong authenti- standardized interface [11]. As a result, MNOs have
cation and smart cards, either OTP or PKI, requires started to offer OTP authentication for access to their
both the deployment of devices to the customers, and subscriber services portal. A first solution is to gener-
the operation of authentication servers. Two indus- ate the OTP offline and send it using a Short Message
tries however already have a wide base of issued (SMS) over-the-air to the card. The second solution is
smart cards or devices and their associated authenti- to load an OTP generating SIM Toolkit application
cation servers: the financial institutions and the on the SIM/USIM card, and to generate and display
mobile network operators. the OTP using this card application. The on-card gen-
eration is more secure, since it can prompt for a chal-
Eurocard Mastercard Visa (EMV) smart cards are lenge or a PIN before generating the OTP.
now the standard in Europe, and are gaining momen-
tum in Asian and South American countries. Finan-
cial institutions are turning to two-factor authentica-

Internet Financial
institution
online portal
OTP validation

PC with
Authentication Hardware
internet
server security
access
module

GemPocket

Figure 4 Authentication with OTP generated by EMV banking cards inside a dedicated reader device. The
device uses the on-card EMV application and keys to generate the OTP from the EMV transaction counter. The
authentication server uses the same hardware security module used for validating EMV payment transactions

ISSN 0085-7130©Telenor ASA 2007


70 Telektronikk 3/4.2007
EAP-SIM and EAP-AKA Wireless protocols have the advantage of using the MNO
Authentication existing cryptographic infrastructure, i.e. the algo-
For MNOs, the OTP solution still requires the instal- rithms and associated keys. The EAP-SIM interface
lation on the operator network of an authentication between the PC WiFi network components and the
server managing the validation of the passwords, and SIM has been further standardized by the ETSI [16]
managing the identities of the card holders. In the and the WLAN smart card consortium [17].
case of OTP generation using OATH-HOTP, the
server would have to manage the identities, counter Figure 5 describes the components of 802.11 authen-
values, secret keys for the users, and the computation tication to a wireless access point using EAP-SIM. A
of the OTP using the HOTP algorithm. All this is SIM card is plugged into the personal computer using
duplicating the existing MNO infrastructure, which a smart card reader, which can have a USB token
already manages a card holder database in the Home form factor. The smart card issuer provides an EAP-
Location Register (HLR), with a secret identity key SIM supplicant, which is a system library that inter-
Ki for each user both on the HLR and the SIM card, faces the networking component to the SIM. The sup-
and an identification GSM algorithm for the network. plicant implements the authentication protocol and
required calls to the card as per WLAN-SIM specifi-
This problem is similar to the identification and cation. On the network side, the WiFi access point
authentication of users towards wireless network sends EAP messages to the authentication server,
access points, in which initially the authentication which is interfaced to an HLR thru an IP/SS7 gate-
protocol was based on Extensible Authentication way. The authentication server can in this way
Protocols (EAP) [12] such as EAP-TLS [13], or request cryptographic data to validate the authentica-
EAP-PEAP. EAP-PEAP uses server-side certificates tion. Upon successful authentication, the network
and authenticates the end-user with a login/password access point opens the access to the internet.
encrypted with an SSL/TLS tunnel, and is therefore a
weak one-factor authentication. EAP-TLS is based on GSM authentication is based on a challenge/response
PKI and mutual authentication, and is a two-factor mechanism. The SIM card and mobile operator server
authentication when using smart cards. However, share a secret key Ki. The A3/A8 authentication algo-
EAP-TLS requires client and server side certificates. rithm that runs on the SIM card is given a 128-bit
To avoid deployment of a PKI infrastructure, includ- random number RAND as a challenge, and computes
ing certificate generation, deployment and manage- a 32-bit response SRES and a 64-bit key Kc from the
ment, and the operation of certificate authorities and challenge and Ki. The challenge RAND, 32-bit
certificate revocation lists, two EAP protocols have response SRES and Kc constitute a triplet. On the
been specified for Wireless LAN authentication: the server side, the EAP messages are processed by a
EAP-SIM [14] protocol, based on the SIM, and the radius server connected to the subscriber Home
EAP-AKA [15] protocol, based on the (U)SIM. Both Location Register (HLR) thru an IP/SS7 gateway.

Personal computer

Windows networking components


802.11 wireless client WiFi hot spot

Smart card EAP-SIM/AKA Authentication


supplicant server

ETSI TS 102.310 interface


IP/SS7
PCSC API
Internet gateway

(U)SIM
smart card
Home
location
register

Figure 5 EAP-SIM 802.11 wireless strong authentication with smartcards

ISSN 0085-7130©Telenor ASA 2007


Telektronikk 3/4.2007 71
PC networking Network Authentication server
Networkaccess
accesspoint
point
components

EAP request identity

EAP response - identity based on IMSI Radius gets n triplets


-
(RAND, SRES, Kc)
EAP request/SIM/start for the
user from the HLR
Generate a random
EAP request/SIM/start with random
Generate a MAC1 from
EAP request/SIM/challenge with RAND n, MAC1 the random and Kcn
Compute SRESn and
Kcn using RANDn and Ki.
Then compute MAC1
and compare.with the
MAC1 received
If the values match,
use SRES, to
generate a MAC2 EAP response/SIM/challenge with MAC2
Compute MAC2 and
compare with the one
received from the client
EAP success

Figure 6 EAP-SIM authentication message flow. The shared keys are only stored securely in the HLR or in the
SIM card. The radius server only retrieves a series of triplets from the HLR to optimize network connection.
On the PC side, all cryptographic operations are performed by the SIM card, as specified by the WLAN-SIM
specification

The radius server can retrieve a set of triplets from ods are mostly used for identifying users accessing
the HLR and perform authentication, as described web servers from a browser, but can be extended to
by the message flow of Figure 6. any client protocol, such as the Session Initialization
Protocol (SIP) for Voice-over-IP.
Multiple authentication triplets can be combined to
create authentication responses and encryption keys For network authentication, the EAP allows for arbi-
of greater strength than individual triplets. EAP-SIM trary authentication methods such as EAP-TLS, EAP-
also includes network authentication, user anonymity PEAP, EAP-SIM or EAP-AKA. The EAP messages
and fast re-authentication. are transported without interpretation over the net-
work components, e.g. the WiFi access point, and are
only interpreted by the supplicant and smart card on
EAP-SIM and EAP-AKA Authenti- the PC side, and by the radius server authentication
cation for Internet Services policy. In the case of WLAN-SIM, the EAP messages
EAP-SIM and EAP-AKA were initially designed to are even not interpreted by the PC supplicant but just
identify and authenticate card holders for wireless transmitted to the smart card that performs the com-
network access. This identity is the network identity plete EAP messages processing.
of the user. However, the identification of the users
to access internet services is not necessarily the same A web extensible authentication framework has been
as the network identity for several reasons. First, the built on this principle, for browser authentication
personal computer could be shared by several users. with EAP[13]. The extensible authentication frame-
Second, the internet services to access might be pro- work components are shown in Figure 7. When con-
vided by different business units or companies from necting to a service provider web site from a browser,
the internet provider, in which case the identity of the the user is directed to an authentication url that holds
network account cannot be retrieved. Finally, some an EAP gateway java servlet. By accessing the EAP
services require explicit user consent or proof of pres- servlet, the browser loads a signed ActiveX for Inter-
ence, and require more identity attributes than the net Explorer or a plug-in for Firefox, the Card Access
simple connection identifier. For these reasons, appli- Module (CAM). The EAP servlet and the CAM are
cation level authentications using EAP-SIM or EAP- then acting as gateways that carry transparently EAP
AKA have been developed to authenticate a user to messages between the smart card and the Radius
an internet service [18]. These authentication meth- server.

ISSN 0085-7130©Telenor ASA 2007


72 Telektronikk 3/4.2007
Personal computer Web server Radius server
EAP over
EAP over EAP gateway radius/UDP
Browser
HTTP servlet

EAP over TCP

Card access EAP SIM- EMV


authentication authentication
module policy policy

EAP-SIM over EMV transaction


APDUs
IP/SS7
gateway

EMV
authentication
server

Figure 7 Extensible strong authentication framework for web server Home


location
authentication. The Card Access Module (CAM) and EAP servlet are
register
acting as gateway to pass EAP messages between the smart card and the Hardware
security
radius server. The messages are only passed thru the CAM and EAP gate-
module
way servlet without interpretation. As a result, new authentication methods can
be implemented by writing the corresponding authentication policies

Smart Card access Authentication


Browser Web site
card module server

Sign-on request

auth. request
authentication request

start client module


start client module
Read card ID
PIN code
OK
Card ID
Request ARQC (card signature of a transaction) check card
ID
generate
ARQC
ARQC

check card
signature
ARQC, + issuer scripts
issuer scripts
Generate TC
TC
TC
TC
check
SAML token transaction
SAML token certificate
service

Figure 8 EMV authentication to a web server using the extensible authentication framework. The EMV
authentication is performed by completing a zero-amount EMV payment transaction

ISSN 0085-7130©Telenor ASA 2007


Telektronikk 3/4.2007 73
Several authentication protocols can be implemented ters. Recently, several identity frameworks have been
on top of this framework, the EAP gateway and CAM specified, which formalize the roles of the different
acting only as message gateways that do not process actors and allow a clear separation between the iden-
the EAP messages. Supporting a protocol requires the tity providers and the identity consumers. This sepa-
implementation of an authentication policy plug-in on ration brings value to all the identity actors.
the radius server. In Figure 7 an EAP-SIM authenti-
cation policy is communicating with a SIM smart For MNOs or financial institutions, operating identity
card thru the network to perform an EAP-SIM provider services using their infrastructure can pro-
authentication, and alternatively an EMV authentica- vide new sources of revenues not based on sale of air
tion policy is communicating with an EMV smart traffic or payment transactions, improve customer
card [19]. In the case of the EAP-SIM authentication, loyalty, attract new business customers and
the messages are the same as defined in the WLAN- strengthen their position by extending the conven-
SIM specification. tional role and values to the internet world.

For the EMV strong authentication, a complete pay- For service providers, delegating identity and authen-
ment transaction with a zero amount is performed tication to identity providers provides a higher level
to authenticate the user, and the message flow is of security, cost saving by stopping the operation of
described in Figure 8. the existing authentication schemes, lowering thresh-
old for deployment since the identity provider man-
Although most browsers support natively PKI ages most of the infrastructure, simpler customer
authentication, this extensible authentication frame- management and the ability to reach more customers
work has the advantage to be open to new protocols, that are subscribers of the identity provider.
and hence allow the reuse of an existing infrastruc-
ture of cards, cryptographic devices and authentica- Finally for the end-users, having a centralized iden-
tion servers. Typically, financial institutions can tity provider provides a better control and manage-
reuse their issued cards and payment servers by ment of their identities, e.g. fewer passwords to
implementing an authentication based on the EMV remember, better protection and higher level of secu-
specifications, or mobile network operators can reuse rity with strong authentication, single-sign-on (SSO)
their existing HLR and deploy SIM cards for PC with framework that supports it, and universal appli-
authentication to their subscribers. cability to various services.

Compared to the OTP authentication, this framework Some of the recent identity frameworks include
can implement protocols with mutual authentication Liberty Alliance [20], OpenID [21], and Microsoft
of the card and server, such as EAP-AKA, and hence CardSpace [22].
avoid man-in-the-middle attacks.
Liberty Alliance is a consortium of industries that
defines a set of specifications for identity federation
Strong Authentication and Identity and single-sign-on. Identity federation in Liberty
Frameworks Alliance is based on the Security Assertion Markup
The strong authentication methods presented so far Language (SAML) defined by OASIS [23]. In Lib-
assume that the service provider authenticating the erty Alliance specification, single-sign-on (SSO) is
user is the card issuer, with the exception of PKI performed using browser redirection, as shown in
authentication with citizen cards emitted by govern- Figure 9.
ment or health care.
When the user is requesting a web page from the ser-
Deploying a strong authentication solution has a cost: vice provider that requires authentication, the service
procurement of the identity smart cards and devices provider redirects the authentication request to the
such as smart card readers, 24/7 operation of the identity provider (IDP). The IDP authenticates and
authentication server, deployment of drivers and mid- identifies the user, and returns upon successful
dleware for the client PCs, operation of a customer authentication a SAML token to the service provider
care center and card management system for post- using browser redirection. The service provider can
issuance operations, such as unblocking a PIN. optionally validate further the token offline, and gives
access to the required service if the SAML token is
On the other hand, several actors such as MNOs or valid.
financial institutions already have a huge installed
base of smart cards and devices such as handsets, as SSO requires a one-time initialization phase called
well as a server infrastructure and customer care cen- federation, in which the IDP and service provider

ISSN 0085-7130©Telenor ASA 2007


74 Telektronikk 3/4.2007
Service Identity
Browser
provider provider

Single-Sign-On request

Authentication request

Authentication request
Authenticate
SAML token user

SAML token

SAML token
Validate
Token ok token
Access to service

Figure 9 Liberty Alliance single-sign-on data flow

exchange an opaque identifier to the user. This opac- MNOs such as Telenor, TeliaSonera and Orange to
ity ensures that the IDP and service provider do not operate pilot IDPs.
share the respective identity of the user.
An interesting variant of the EAP-SIM strong authen-
Liberty Alliance specifications do not specify the tication method for web access control has been
authentication methods. As a result, there is no stan- designed within the SIMStrong consortium [25],
dard strong authentication method implemented in which has the advantage of avoiding the deployment
the IDP products of the different vendors, nor is there of SIM cards with a USB form factor. In this solu-
a framework for plugging authentication methods. As tion, the Over-The-Air channel (OTA) is used to per-
a result, integrating a strong authentication method in form an EAP-SIM authentication between the radius
Liberty Alliance currently requires case-by-case inte- server and the SIM card inside the handset, as
gration with the different commercial IDP offers. In described in Figure 10.
the scope of the Celtic Fidelity [24] Eureka project,
the EAP-SIM/AKA method has been implemented in In this solution, called SIMStrong-over-SMS, when
IDPs from different vendors, and allowed several the end-user is redirected to the IDP for authentica-

Personal computer IDP Radius server

HTTPS EAP gateway EAP over EAP SIM


Browser authentication
servlet UDP policy

EAP
-
Handset

Baseband EAP over SMS


modem IP/SS7
gateway
EAP over
APDU
SMS gateway

GSM modem Home


location
register

Figure 10 Liberty Alliance strong authentication using over-the-air short-messages

ISSN 0085-7130©Telenor ASA 2007


Telektronikk 3/4.2007 75
Gemalto .NET crypto
Framework
architecture
enabling smart
cards for strong
Microsoft smart card tools
authentication

Microsoft base smart card CSP Proxy plug-in to the MS base CSP
Manages
access to to forward calls to the mini driver on
.NET mini driver proxy the Gemalto .NET card
readers and
smart cards
MS smart card resource manager
Standard model
for interfacing
PC/SC
smart cards and
readers with
computers Gemalto .NET
Mini driver

Figure 11 Gemalto .Net Architecture to support Windows CardSpace X509 authentication

tion an end-to-end EAP-SIM protocol is performed claims. Some cards are self-managed, i.e. the claims
between the SIM card in the handset and the Radius are not certified, but other claims are certified and
server. All EAP messages are exchanged over SMS managed by an identity provider. Self-managed cards
between the card and the IDP, and as standard radius are like user name/password chosen by a user to
messages over UDP between the IDP and the radius access a service, without any verification of the real
server. A SIM toolkit applet in the SIM card prompts identity of the user. Managed cards have an identity
for user-consent on the handset, and on consent and certified by an identity provider operating a Secure
successful authentication, the SAML token is Token Server (STS). To retrieve the claims of a man-
returned by the IDP to the browser, who is then aged card, the card-holder must authenticate to the
authenticated towards the service provider. STS, which returns an encrypted and signed token
that can be further presented to the Service Provider.
Windows CardSpace is another identity framework
released with Windows Vista and .NET framework Windows CardSpace authentication supports login/
3.0. CardSpace is a claim-based identity management password, Kerberos and X509 certificates, which
system, in wich a web service provider, called Rely- limits the possibility of integrating a strong authenti-
ing Party in the CardSpace framework, requests iden- cation protocol inside the CardSpace selector. Strong
tity claims from the user. The user can select a virtual authentication with smart cards can be performed
card thru a card selector that provides the required using either OTP or PKI.

Mobile
SIM card SMS gateway Secure token PC Relying party
network
server
operator

Get Information
card
Browse web site
Authenticate
Request security Prompt for claims user
Request token
Authenticate & authentication
retrieve claim A
in SIM u
t
Claim h
Security token
response
Send token to web site

Access to services

Figure 12 CardSpace strong authentication using the OTA channel. Upon authentication request from
CardSpace when selecting the managed card, the STS authenticates the user over the air and retrieves the
user’s claims inside the SIM card. A SIM toolkit applet prompts the user for consent to publish the identity
attributes

ISSN 0085-7130©Telenor ASA 2007


76 Telektronikk 3/4.2007
Integrating OTP strong authentication in CardSpace positioned to operate identity provider services for
is straightforward: the managed card is a login/pass- end-users and 3rd party service providers.
word card type, in which the user enters the OTP gen-
erated by the smart card device. On the server side,
the STS is connected to an authentication server that References
validates the OTP, and there is no restriction on the 1 Anti-Phishing working group. August 31, 2007
type of OTP algorithm. [online] – URL: http://www.antiphishing.org

Windows CardSpace X509 strong authentication is 2 Housley, R, Polk, W, Ford, W, Solo, D. Certifi-
based on PKI, in which the STS authenticates the user cate and Certificate Revocation List (CRL)
using a challenge-response mechanism based on the Profile. IETF, April 2002. (RFC 3280)
X509 certificate of the user in the managed card and a
private key stored in the smart card. CardSpace client 3 Microsoft. Cryptography API. August 31, 2007
components are accessing the smart card thru a new [online] – URL: http://msdn2.microsoft.com/
API, the Crypto API Next Generation (CNG). Smart en-us/library/aa380255.aspx
cards providers typically write a smart card mini-driver
[26], also known as a card module, to interface their 4 RSA Laboratories. Cryptographic Token Inter-
smart card to the CNG. The CardSpace selector imple- face Standard. June 2004. (PKCS#11 v2.20)
ments the logics to perform the PKI authentication by
calling the Base Smart Card Cryptographic Service 5 CEN/ISSS. Fundamental specification : applica-
Provider (CSP). Figure 11 shows the current imple- tion smart card used as secure signature creation
mentation of X509 CardSpace using a .Net card, which device – Part 1 Basic Requirements, Part 2
is a smart card with an embedded .Net virtual machine. Optional Features. European Committee for
The base CSP performs the required cryptography with Standardization, March 2007. (CEN/ISSS EN
the .Net smart card using the associated mini-driver 14890-1&2)
proxy that forwards the calls to the .Net Mini Driver.
6 CEN/TC. European Citizen Card – Part 1 Physi-
Adding another type of authentication than OTP and cal, electrical and transport protocol characteris-
X509 to the CardSpace selector is not possible, since tics, Part 2 Logical data structure and card ser-
the selector is a closed-source component provided vices. European Committee for Standardization,
by Microsoft. However, using a second channel, such April 2007. (Technical Committee CEN/TC 224,
as the over-the-air channel for mobile network opera- Technical Specification 15480-1&2)
tors allow to perform any type of strong authentica-
tion in background between the STS and the card. 7 ISO/IEC. Integrated circuit card programming
This has been implemented for SMS strong authenti- interfaces – Part 1: Architecture, Part 2: Generic
cation [25] as illustrated in Figure 12. card interface, Part 3: Application interface, Part
4: API Administration. 2006. (ISO/IEC 24727-
1&2&3&4)
Conclusion
Smart cards are tamper-resistant devices that can play 8 M’Raihi, D, Bellare, M, Hoornaert, F, Naccache,
a key role for storing the identity attributes of the D, Ranen, O. HOTP : An HMAC-Based One-
user, or performing strong authentication for proof of Time Password Algorithm. December 2005.
identity. (RFC 4226, IETF)

Citizen cards are emerging in several countries, are 9 Mastercard. OneSmart Authentication. August 31,
based on PKI, and can provide identification, authen- 2007 [online] – URL: https://mol.mastercard.net/
tication and signature services. The electronic identity mol/molbe/public/login/ebusiness/smart_cards/
of these citizen cards is guaranteed by the authorities, one_smart_card/biz_opportunity/cap/index.jsp
and authentication can be performed online using the
card issuer certificates without requiring connection 10 Visa. Dynamic passcode authentication. August
to an identity provider. 31, 2007 [online] – URL: http://www.visaeurope.
com/aboutvisa/products/dynamicpasscode.jsp
Financial institutions and Mobile Network Operators
have issued a huge number of payment cards and 11 ETSI. Specification of the SIM Application
SIM cards and are operating the associated crypto- Toolkit for the SIM – Mobile Equipment Inter-
graphic server infrastructure. They are as such well face, GSM 11.14 v. 5.9.0. 1996.

ISSN 0085-7130©Telenor ASA 2007


Telektronikk 3/4.2007 77
12 Aboba, B, Blunk, L, Vollbrecht, J, Carlson, J, 20 Liberty Alliance Specifications. August 31, 2007
Levkowetz, H. Extensible Authentication Proto- [online] – URL:
col (EAP). IETF, June 2004. (RFC 3748) http://www.projectliberty.org/specifications__1

13 Aboba, B. PPP EAP TLS Authentication 21 OpenID Specifications. August 31, 2007 [online]
Protocol. IETF, October 1999. (RFC 2716) – URL: http://openid.net/specs.bml

14 Haverinen, H, Salowey, J. Extensible Authentica- 22 Windows CardSpace. August 31, 2007 [online] –
tion Protocol Method for GSM Subscriber Iden- URL: http://cardspace.netfx3.com/
tity Modules (EAP-SIM). IETF, January 2006.
(RFC 4186) 23 OASIS. SAML v2.0 specifications. August 31,
2007 [online] – URL: http://www.oasis-open.
15 Arkko, J, Haverinen, H. Extensible Authentication org/specs/index.php#samlv2.0. (March 2005)
Protocol Method for 3rd Generation Authentica-
tion and Key Agreement (EAP-AKA). IETF, Jan- 24 FIDELITY – Federated Identity Management
uary 2006. (RFC 4187) based on LIBERTY. August 31, 2007 [online] –
URL: http://www.celtic-fidelity.org/fidelity/
16 ETSI. Smart Cards: Extensible Authentication index.jsp
Protocol support in the UICC, V6.2.0. September
2005. 25 Van Thanh, D et al. Unified SIM Strong Authen-
tication for CardSpace and Liberty Alliance.
17 WLAN Consortium. EAP-SIM Handler Specifica- 3GSM World Congress, Barcelona, February 12-
tion Version 1.1. August 1, 2004. 15, 2007. Available at http://www.simstrong.org.

18 Van Thanh, D et al. Offering SIM Strong Authen- 26 Microsoft. Smart Card Minidriver Specification
tication to Internet Services. SIMstrong White for Windows Base Cryptographic Service
Paper, 3GSM World Congress, Barcelona, Febru- Provider (Base CSP) and Smart Card Key Stor-
ary 13-16, 2006. age Provider (KSP), Version 5.06a. January
2007.
19 EMVCo. EMV 4.1 Specifications. August 31,
2007 [online] – URL: http://www.emvco.com/
specifications.asp. (June 2004)

Jean-Daniel Aussel is Head of the Tools & Application Labs R&D in Gemalto, in the Technology and Innovation division.
Gemalto is a provider of end-to-end digital security solutions, from the development of software applications through design
and production of secure personal devices such as smart cards, SIMs, e-passports, and tokens to the management of deploy-
ment services for its customers. Jean-Daniel holds a PhD from the INSA Engineering School in Lyon, France, and has been
working in the smart card industry successively in Bull, CP8, Schlumberger smart cards, axalto, and currently Gemalto, created
from the merge of the two smart card market leaders gemplus and axalto. Before working in smart cards and security, Jean-
Daniel has been successively working in digital signal processing at the Research Council Canada and Ultra Optec, a small
Canadian start-up, and later on designing personal computer and server operating systems at Prologue Software.

email: jean-daniel.aussel@gemalto.com

ISSN 0085-7130©Telenor ASA 2007


78 Telektronikk 3/4.2007

Das könnte Ihnen auch gefallen