You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
- organization: Federal Office for Information Security (BSI)
107
-
seriesinfo:
108
-
BSI: TR-03181 Version 0.94
109
-
date: 2023-04
110
96
Verheul2024:
111
97
title: Attestation Proof of Association – provability that attestation keys are bound to the same hardware and person
112
98
target: https://eprint.iacr.org/2024/1444
@@ -608,28 +594,7 @@ The internal registry can be managed by the WSCA agent, by the WSCA service, or
608
594
609
595
In a distributed WSCA architecture, the WSCA could internally apply distributed key generation. A description of this is out of scope for the current document.
610
596
611
-
The HDK algorithm can support any of the following WSCD architectures:
612
-
613
-
1. Local external standalone device, for example:
614
-
- GlobalPlatform secure element, running for example a Java Card applet as WSCA for:
615
-
- Personal Identity Verification (PIV)
616
-
- Fast IDentity Online 2 (FIDO2)
617
-
2. Local internal standalone programmable cryptographic chip, for example:
618
-
- Smartphone embedded universal integrated circuit card (eUICC), running for example a Subscriber Identity Module (SIM) as WSCA; also called eSIM
619
-
- Smartphone embedded secure element (eSE), running for example a Java Card applet as WSCA
620
-
3. Local internal preprogammed security platform, for example:
621
-
- Android trusted execution environment acting as WSCA
622
-
- Android StrongBox secure element acting as WSCA
623
-
- iOS Secure Enclave system-on-chip acting as WSCA
624
-
- Trusted Platform Module (TPM) acting as WSCA
625
-
4. Remote HSM, for example:
626
-
- Cryptographic module certified against EN 419221-5:2018 with a local client application providing a WSCA service, remotely controlled for example using:
627
-
- PIV card as possession factor and PIN verification using a HSM-backed Device-Enhanced Augmented PAKE (an approach proposed by Sweden)
628
-
- Android/iOS security platform or standalone device, applying asymmetric cryptography to enable detection of remote HSM corruption as described in [SCAL3]
629
-
630
-
In all cases, the WSCD may implement a Cryptographic Service Provider [TR03181] to reduce the scope for Common Criteria certification of the WSCA.
631
-
632
-
The solution proposal discussed herein works in all four WSCD architectures that support the required cryptographic primitives within the WSCD:
597
+
The solution proposal discussed herein works in all any WSCD architecture that supports the required cryptographic primitives:
633
598
634
599
- In the case of HDK-ECDH-P256 (see [HDK-ECDH-P256](#hdk-ecdh-p256)):
635
600
- P-256 ECDH key pair generation
@@ -643,10 +608,6 @@ The solution proposal discussed herein works in all four WSCD architectures that
643
608
644
609
The other HDK operations can be performed in a WSCA or WSCA agent running on any UD, including hostile ones with limited sandboxing capabilities, such as in a smartphone's rich execution environment or in a personal computer web browser.
645
610
646
-
If the user enters the PIN in the WI instead of on the WSCD directly, the WI MUST process it directly after entering, the WI MUST keep the plaintext PIN confidential, and the WI MUST delete the PIN from memory as soon as the encrypted PIN or data derived from the PIN is passed over the SCI.
647
-
648
-
The rate-limiting of the PIN check MUST be managed within the WSCD or on securely managed SCI infrastructure. In particular, the rate-limiting MUST NOT be managed solely in local WI or WSCA agent software since it is assumed that attackers could modify this without detection.
649
-
650
611
## Trust evidence
651
612
652
613
Some issuers could require evidence from a solution provider of the security of the holder's cryptographic device. This evidence can in the context of [EU2024-1183] be divided into initial "Wallet Trust Evidence" and related "Issuer Trust Evidence". Each is a protected document that contains a trust evidence public key associated with a private key that is protected in the secure cryptographic device. With HDK, these public keys are specified as follows.
0 commit comments