Secure Audit Logging with Tamper-Resistant Hardware

Secure perimeter schemes (e.g. DRM) and tracing traitor schemes (e.g. watermarking, audit logging) strive to mitigate the problems of content escaping the control of the rights holder. Secure audit logging records the user's actions on content and enables detection of some forms of tampering with the logs. We implement Schneier and Kelsey's secure audit logging protocol, strengthening the protocol by using tamper-resistant hardware (an iButton) in two ways: Firstly our implementation of the protocol works offline as well as online. Secondly, we use unforgeable time stamps to increase the possibilities of fraud detection. We provide a performance assessment of our implementation to show under which circumstances the protocol is practical to use.

[1]  Bruce Schneier,et al.  Minimizing Bandwidth for Remote Access to Cryptographically Protected Audit Logs , 1999, Recent Advances in Intrusion Detection.

[2]  Stefan Lucks,et al.  The Performance of Modern Block Ciphers in Java , 1998, CARDIS.

[3]  Bruce Schneier,et al.  Cryptographic Support for Secure Logs on Untrusted Machines , 1998, USENIX Security Symposium.

[4]  Berry Schoenmakers Basic Security of the ecash Payment System , 1997 .

[5]  Sean W. Smith,et al.  Application Support Architecture for a High-Performance, Programmable Secure Coprocessor , 1999 .

[6]  William Aiello,et al.  Using smartcards to secure a personalized gambling device , 1999, CCS '99.

[7]  Bruce Schneier,et al.  Secure audit logs to support computer forensics , 1999, TSEC.

[8]  Jonathan Knudsen Java cryptography , 1998, Java series.

[9]  Alfred Menezes,et al.  Handbook of Applied Cryptography , 2018 .

[10]  Xavier Leroy On-Card Bytecode Verification for Java Card , 2001, E-smart.

[11]  Peter Gutmann An Open-Source Cryptographic Coprocessor , 2000, USENIX Security Symposium.

[12]  Christian S. Collberg,et al.  A Taxonomy of Obfuscating Transformations , 1997 .

[13]  Mihir Bellare,et al.  Forward Integrity For Secure Audit Logs , 1997 .

[14]  Christian F. Tschudin,et al.  Protecting Mobile Agents Against Malicious Hosts , 1998, Mobile Agents and Security.

[15]  M. Ruffin,et al.  A Survey of Logging Uses , 1994 .

[16]  Pieter H. Hartel,et al.  Security Attributes Based Digital Rights Management , 2002, IDMS/PROMS.

[17]  James H. Burrows,et al.  Secure Hash Standard , 1995 .

[18]  Stuart Haber,et al.  How to time-stamp a digital document , 1990, Journal of Cryptology.

[19]  Markus Jakobsson,et al.  Mix-Based Electronic Payments , 1998, Selected Areas in Cryptography.

[20]  Leslie Lamport,et al.  Password authentication with insecure communication , 1981, CACM.

[21]  Radek Vingralek,et al.  How to Manage Persistent State in DRM Systems , 2001, Digital Rights Management Workshop.

[22]  David Clausen,et al.  Secure Voting Using Disconnected , Distributed Polling Devices , 2000 .

[23]  Bruce Schneier,et al.  Automatic Event-Stream Notarization Using Digital Signatures , 1996, Security Protocols Workshop.

[24]  Clark Thomborson,et al.  Manufacturing cheap, resilient, and stealthy opaque constructs , 1998, POPL '98.

[25]  Alain Durand Efficient Ways to Implement Elliptic Curve Exponentiation on a Smart Card , 1998, CARDIS.

[26]  Bruce Schneier,et al.  Twosh on Smart Cards , 2000 .

[27]  Bruce Schneier,et al.  Twofish on Smart Cards , 1998, CARDIS.