Smart Card Applications and Mobility in a World of Short Distance Communication

The CASTING project is concerned with the application of smart card technology in combination with short distance wireless communication. This report focuses on secure access to Web pages, meaning that the right person has access to his or her personal Web pages in a manner that respects integrity, authenticity and confidentiality. This requires authentication of users, which is achieved by providing users with public-key certificates and the corresponding private keys, stored in a mobile device. The mobile device contains a smart card that stores the user’s certificate and the user’s private key and executes the necessary operations to convince the remote Web server about the identity of the local user. The client application that is adapted for user authentication is Netscape, version 4.7x. The Web server used is Apache, extended with the Apache-SSL module. The long distance link between Web server and Netscape is secured with the SSL/TLS protocol. The Web server is configured to ask for user authentication, which is provided by the user’s mobile security device. This device is accessible wirelessly via a short distance link that is in turn secured via the SECTUS protocol. Netscape is adapted with a custom security module that implements the PKCS #11 interface. The CASTING project is part of a cooperation between the Distributed Systems Group at ETH Zurich and Swisscom AG Bern, Corporate Technology. This report describes phase 2 of the CASTING project. Phase 1 was done by researchers at EPFL and focused on protocols for secure spontaneous connections. The work described in this report was done at ETH Zurich and funded by Swisscom. Contact persons are Prof. Friedemann Mattern at ETH Zurich, and Karin Busch and Michael Deichmann at Swisscom.

[1]  OpenSSL OpenSSL : The open source toolkit for SSL/TSL , 2002 .

[2]  Carlisle M. Adams,et al.  Internet X.509 Certificate Request Message Format , 1999, RFC.

[3]  Jessica Staddon,et al.  PKCS #1: RSA Cryptography Specifications Version 2.0 , 1998, RFC.

[4]  Etsi Tc-Smg Digital cellular telecommunications system (Phase 2+); Specification of the SIM Application Toolkit for the Subscriber Identity Module - Mobile Equipment , 1996 .

[5]  Christopher Allen,et al.  The TLS Protocol Version 1.0 , 1999, RFC.

[6]  Stefan Santesson,et al.  Internet X.509 Public Key Infrastructure: Qualified Certificates Profile , 2001, RFC.

[7]  Adi Shamir,et al.  A method for obtaining digital signatures and public-key cryptosystems , 1978, CACM.

[8]  Xuejia Lai,et al.  On the design and security of block ciphers , 1992 .

[9]  Rodney Thayer,et al.  A Stream Cipher Encryption Algorithm 'Arcfour' , 1999 .

[10]  Stefan Santesson,et al.  Internet X.509 Public Key Infrastructure Qualified Certificates Profile , 2001, RFC.

[11]  Russ Housley,et al.  Internet X.509 Public Key Infrastructure Certificate and CRL Profile , 1999, RFC.

[12]  Eberhard Ulich,et al.  Software-Ergonomie ’91 , 1991 .

[13]  Stephen Farrell,et al.  Internet X.509 Public Key Infrastructure Certificate Management Protocols , 1999, RFC.

[14]  Eric Rescorla,et al.  HTTP Over TLS , 2000, RFC.

[15]  Burton S. Kaliski Some Examples of the PKCS Standards , 2002 .

[16]  Hugo Krawczyk,et al.  HMAC: Keyed-Hashing for Message Authentication , 1997, RFC.

[17]  Burton S. Kaliski A Layman's Guide to a Subset of ASN.1, BER, and DER , 2002 .

[18]  Rodney Thayer,et al.  A Stream Cipher Encryption Algorithm , 1997 .

[19]  Ronald L. Rivest,et al.  The MD5 Message-Digest Algorithm , 1992, RFC.