Skip to main content
Erschienen in:
Buchtitelbild

2016 | OriginalPaper | Buchkapitel

Towards a Personal Security Device

verfasst von : Christof Rath, Thomas Niedermair, Thomas Zefferer

Erschienen in: Security and Trust Management

Verlag: Springer International Publishing

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

In Europe, eID and e-signature solutions are basic building blocks of many transactional e-government services, especially in citizens-to-government communication. Many European countries issue smart cards to provide eID and e-signature functionality on a high assurance level. However, to access these tokens, security-critical code has to be executed on the client platform of the user. If the client platform is compromised, an attacker may gain access to credentials of the user and subsequently be able to issue electronic signatures or access protected resources. To address this problem, we present the concept of a personal security device. It is an isolated, low-cost, single-purpose device to execute security-critical code of eID and e-signature tasks. We developed a concrete implementation on a RaspberryPI and evaluated the solution via an external application. Our solution increases the security of eID and e-signature processes by mitigating the impact of a compromised client platform.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
2.
Zurück zum Zitat Centner, M., Orthacker, C., Bauer, W.: Minimal-Footprint Middleware for theCreation of Qualified Signatures. In: Institute for Systems and Technologies of Information, Control and Communication (ed.) Proceedings of the 6th International Conference onWeb Information Systems and Technologies, pp. 64–69. INSTICC - Institute for Systems and Technologies of Information, Control and Communication, Portugal (2010) Centner, M., Orthacker, C., Bauer, W.: Minimal-Footprint Middleware for theCreation of Qualified Signatures. In: Institute for Systems and Technologies of Information, Control and Communication (ed.) Proceedings of the 6th International Conference onWeb Information Systems and Technologies, pp. 64–69. INSTICC - Institute for Systems and Technologies of Information, Control and Communication, Portugal (2010)
3.
Zurück zum Zitat CWA 14170: Security requirements for signature creation applications (2004) CWA 14170: Security requirements for signature creation applications (2004)
4.
Zurück zum Zitat Cock, D., Wouters, K., Preneel, B.: Introduction to the Belgian EID card. In: Katsikas, S.K., Gritzalis, S., López, J. (eds.) EuroPKI 2004. LNCS, vol. 3093, pp. 1–13. Springer, Heidelberg (2004). doi:10.1007/978-3-540-25980-0_1 CrossRef Cock, D., Wouters, K., Preneel, B.: Introduction to the Belgian EID card. In: Katsikas, S.K., Gritzalis, S., López, J. (eds.) EuroPKI 2004. LNCS, vol. 3093, pp. 1–13. Springer, Heidelberg (2004). doi:10.​1007/​978-3-540-25980-0_​1 CrossRef
5.
Zurück zum Zitat Ducastel, N.: International Comparison eID Means. Technical report PBLQ (2015) Ducastel, N.: International Comparison eID Means. Technical report PBLQ (2015)
7.
Zurück zum Zitat ETSI: Electronic Signatures and Infrastructures (ESI); PDF Advanced Electronic Signatures (PAdES); TS 102 778. Technical report, European Telecommunication Standards Institute (2009) ETSI: Electronic Signatures and Infrastructures (ESI); PDF Advanced Electronic Signatures (PAdES); TS 102 778. Technical report, European Telecommunication Standards Institute (2009)
8.
Zurück zum Zitat ETSI: Electronic Signatures and Infrastructures (ESI); XML Advanced Electronic Signatures (XAdES); TS 101 903. Technical report, European Telecommunication Standards Institute (2010) ETSI: Electronic Signatures and Infrastructures (ESI); XML Advanced Electronic Signatures (XAdES); TS 101 903. Technical report, European Telecommunication Standards Institute (2010)
9.
Zurück zum Zitat ETSI: Electronic Signatures and Infrastructures (ESI); CMS Advanced Electronic Signatures (CAdES); TS 101 733. Technical report, European Telecommunication Standards Institute (2013) ETSI: Electronic Signatures and Infrastructures (ESI); CMS Advanced Electronic Signatures (CAdES); TS 101 733. Technical report, European Telecommunication Standards Institute (2013)
10.
Zurück zum Zitat European Parliament: Directive 95/46/EC. In: Official Journal of the European Communities, vol. 38, pp. 31–50. European Commision (1995) European Parliament: Directive 95/46/EC. In: Official Journal of the European Communities, vol. 38, pp. 31–50. European Commision (1995)
11.
Zurück zum Zitat European Parliament: eIDAS - Regulation (EU) No 910/2014. In: Official Journal of the European Union, vol. 57, pp. 73–114. European Commision (2014) European Parliament: eIDAS - Regulation (EU) No 910/2014. In: Official Journal of the European Union, vol. 57, pp. 73–114. European Commision (2014)
12.
Zurück zum Zitat Eurosmart: Landscape of eID in Europe in 2013. Technical report, Eurosmart (2014) Eurosmart: Landscape of eID in Europe in 2013. Technical report, Eurosmart (2014)
14.
Zurück zum Zitat IDABC: Study on eID Interoperability for PEGS: Update of Country Profiles (2009) IDABC: Study on eID Interoperability for PEGS: Update of Country Profiles (2009)
16.
Zurück zum Zitat ISO, IEC 24727: Identification cards - Integrated circuit card programming interfaces, Part 1–6 ISO, IEC 24727: Identification cards - Integrated circuit card programming interfaces, Part 1–6
17.
Zurück zum Zitat Leitold, H., Hollosi, A., Posch, R.: Security architecture of the Austrian citizen card concept. In: 18th Annual Computer Security Applications Conference, Proceedings, pp. 391–400 (2002) Leitold, H., Hollosi, A., Posch, R.: Security architecture of the Austrian citizen card concept. In: 18th Annual Computer Security Applications Conference, Proceedings, pp. 391–400 (2002)
18.
Zurück zum Zitat OASIS: Digital signature services core protocols, elements, and bindings (2007) OASIS: Digital signature services core protocols, elements, and bindings (2007)
19.
Zurück zum Zitat Orthacker, C., Centner, M., Kittl, C.: Qualified mobile server signature. In: IFIP Advances in Information and Communication Technology. vol. 330, pp. 103–111 (2010) Orthacker, C., Centner, M., Kittl, C.: Qualified mobile server signature. In: IFIP Advances in Information and Communication Technology. vol. 330, pp. 103–111 (2010)
20.
Zurück zum Zitat Panda Security: Pandalabs’ Annual Report 2015 Panda Security: Pandalabs’ Annual Report 2015
21.
Zurück zum Zitat Spalka, A., Cremers, A.B., Langweg, H.: Trojan horse attacks on software for electronic signatures. Informatica (Slovenia) 26(2) (2002) Spalka, A., Cremers, A.B., Langweg, H.: Trojan horse attacks on software for electronic signatures. Informatica (Slovenia) 26(2) (2002)
22.
Zurück zum Zitat Sun Microsystems Inc.: JSR 268: Java Smart Card I/O API (2006) Sun Microsystems Inc.: JSR 268: Java Smart Card I/O API (2006)
23.
Zurück zum Zitat Zefferer, T., Teufl, P.: Leveraging the adoption of mobile eID and e-Signature solutions in Europe. In: Kő, A., Francesconi, E. (eds.) EGOVIS 2015. LNCS, vol. 9265, pp. 86–100. Springer, Heidelberg (2015). doi:10.1007/978-3-319-22389-6_7 CrossRef Zefferer, T., Teufl, P.: Leveraging the adoption of mobile eID and e-Signature solutions in Europe. In: Kő, A., Francesconi, E. (eds.) EGOVIS 2015. LNCS, vol. 9265, pp. 86–100. Springer, Heidelberg (2015). doi:10.​1007/​978-3-319-22389-6_​7 CrossRef
Metadaten
Titel
Towards a Personal Security Device
verfasst von
Christof Rath
Thomas Niedermair
Thomas Zefferer
Copyright-Jahr
2016
DOI
https://doi.org/10.1007/978-3-319-46598-2_1