Why Cryptosystems Fail

Why Cryptosystems Fail
Ross Anderson
Presented by
Su Zhang
1
Main Idea
• Wrong assumption causes bad consequences
• What is the true case?
– Most losses are caused by implementation errors
and management failures.
2
Differences Between Cyber And Real Security
• Real life security:
– Has strong organized learning mechanism.
• Governmental cryptosystem:
– No such good schema because some secrecy
involved.
3
How ATM Fraud Takes - Bad Insiders
• (dismissed employees with evil minds)
– Two incidents (stealing cards and PINs ) per
business day.
4
How ATM Fraud Takes - Black-hearted Outsiders
• Peeper
• Jackpotting (Intercepting pay response from
ATM)
• ATM bug --- Believe the card inserted is the
same as the previous card.
5
How ATM Fraud Takes – Exploit ATM
“Vulnerabilities”
• Naïve offline ATMs procedure
– e.g. first + third = second +fourth
– Issuing only three different PINs to all users.
• Stupid squared cardboard
– Dramatically reduced the decryption complexity
(from 1/3000 to 1/8).
6
Stored Encrypted PIN in a Database
• Programmer can get another card’s PIN by
searching his encrypted PIN in the Database.
• Wrote encrypted PIN into magnetic strip
– Bad guys can only change their card number into
the target number.
– Mitigation: Encrypt the combination of account
number and its PIN.
7
How ATM Encryption Works
8
Problems With Encryption Products
• PIN keys can be found easily.
• Soft/Hardware compatibility issue.
• Not all security products are good.
• Hard to get qualified maintainers.
9
Cryptanalysis Threats Need to be Considered
• Home-grown encryption algorithms.
• Weak parameters.
– e.g. RSA keys are too “short” to be secure.
• Weak algorithms – DES.
• Hardware custodians could misuse it for
private gain.
10
Risks From Bankers
• Two key components holder may conspire to
steal money.
• Need more effort on quality control.
• Lack of audit processes.
11
Equipment Vendors’ Issues
• Specialized security expertise need to be
spread.
– User need to understand how to use the high level
product.
– Vendor should keep their eyes on all of the time.
• Attacks may be launched after several years
“hibernate”.
– Sloppy quality control.
• Products are not carefully examined.
12
What Required to Mitigate These Issues?
• Classify different levels of users
– e.g. beginner, professional, expert, etc.
• Design an integrated application.
• Provide training service to client personnel.
• Provide their own experts for maintaining.
13
Why Provider Misjudged Users’ Ability?
• The networking during early days is limited.
– Internal, external even abroad disputed transitions
need to be considered.
• Human factors.
– e.g. Audit department personnel dislike security
group because they will “bring” them more work.
– Security teams didn’t last too long.
– Managers don’t like to be specialized in security
for fear that will affect their career track.
14
Confirmation -Military Department is
Suffering the Same Problems
• Most security failures are at implementation level.
• They are not cleverer but they are more concerned
on security issues.
• The threat profiles developed by the NSA for its
own use are classified .
• They put more effort on quality control. But still
need more investment.
15
One Possible New Paradigm (Inspired
by Safety Critical System)
• List all possible failure modes.
• Make clear preventing strategies.
• Explain in detail how these strategies are implemented.
• Make sure equipments are operated by right people.
• Auto process system.
16
Conclusion
• Why security failed?
– Implementation errors.
– Management errors.
– System and human factors.
• Consequence: Security paradigms have mixed
some software engineering ideas.
17