Skip to content

Commit 3248ef6

Browse files
committed
Remove general explanation of WSCD
Text remains available in Wallet Secure Cryptographic Commons: https://github.com/cleverbase/wallet-secure-crypto-commons
1 parent 2b6be4e commit 3248ef6

File tree

1 file changed

+1
-40
lines changed

1 file changed

+1
-40
lines changed

draft-dijkhuis-cfrg-hdkeys.md

Lines changed: 1 addition & 40 deletions
Original file line numberDiff line numberDiff line change
@@ -93,20 +93,6 @@ informative:
9393
(EU): 2024/1183
9494
date: 2024-04
9595
I-D.draft-bradleylundberg-cfrg-arkg-02:
96-
SCAL3:
97-
title: "SCAL3: Verify that systems operate under your sole control, version de8c5ae"
98-
target: https://github.com/cleverbase/scal3
99-
author:
100-
- organization: Cleverbase ID B.V.
101-
date: 2024-03
102-
TR03181:
103-
title: Cryptographic Service Provider 2 (CSP2)
104-
target: https://www.bsi.bund.de/EN/Themen/Unternehmen-und-Organisationen/Standards-und-Zertifizierung/Technische-Richtlinien/TR-nach-Thema-sortiert/tr03181/TR-03181_node.html
105-
author:
106-
- organization: Federal Office for Information Security (BSI)
107-
seriesinfo:
108-
BSI: TR-03181 Version 0.94
109-
date: 2023-04
11096
Verheul2024:
11197
title: Attestation Proof of Association – provability that attestation keys are bound to the same hardware and person
11298
target: https://eprint.iacr.org/2024/1444
@@ -608,28 +594,7 @@ The internal registry can be managed by the WSCA agent, by the WSCA service, or
608594

609595
In a distributed WSCA architecture, the WSCA could internally apply distributed key generation. A description of this is out of scope for the current document.
610596

611-
The HDK algorithm can support any of the following WSCD architectures:
612-
613-
1. Local external standalone device, for example:
614-
- GlobalPlatform secure element, running for example a Java Card applet as WSCA for:
615-
- Personal Identity Verification (PIV)
616-
- Fast IDentity Online 2 (FIDO2)
617-
2. Local internal standalone programmable cryptographic chip, for example:
618-
- Smartphone embedded universal integrated circuit card (eUICC), running for example a Subscriber Identity Module (SIM) as WSCA; also called eSIM
619-
- Smartphone embedded secure element (eSE), running for example a Java Card applet as WSCA
620-
3. Local internal preprogammed security platform, for example:
621-
- Android trusted execution environment acting as WSCA
622-
- Android StrongBox secure element acting as WSCA
623-
- iOS Secure Enclave system-on-chip acting as WSCA
624-
- Trusted Platform Module (TPM) acting as WSCA
625-
4. Remote HSM, for example:
626-
- Cryptographic module certified against EN 419221-5:2018 with a local client application providing a WSCA service, remotely controlled for example using:
627-
- PIV card as possession factor and PIN verification using a HSM-backed Device-Enhanced Augmented PAKE (an approach proposed by Sweden)
628-
- Android/iOS security platform or standalone device, applying asymmetric cryptography to enable detection of remote HSM corruption as described in [SCAL3]
629-
630-
In all cases, the WSCD may implement a Cryptographic Service Provider [TR03181] to reduce the scope for Common Criteria certification of the WSCA.
631-
632-
The solution proposal discussed herein works in all four WSCD architectures that support the required cryptographic primitives within the WSCD:
597+
The solution proposal discussed herein works in all any WSCD architecture that supports the required cryptographic primitives:
633598

634599
- In the case of HDK-ECDH-P256 (see [HDK-ECDH-P256](#hdk-ecdh-p256)):
635600
- P-256 ECDH key pair generation
@@ -643,10 +608,6 @@ The solution proposal discussed herein works in all four WSCD architectures that
643608

644609
The other HDK operations can be performed in a WSCA or WSCA agent running on any UD, including hostile ones with limited sandboxing capabilities, such as in a smartphone's rich execution environment or in a personal computer web browser.
645610

646-
If the user enters the PIN in the WI instead of on the WSCD directly, the WI MUST process it directly after entering, the WI MUST keep the plaintext PIN confidential, and the WI MUST delete the PIN from memory as soon as the encrypted PIN or data derived from the PIN is passed over the SCI.
647-
648-
The rate-limiting of the PIN check MUST be managed within the WSCD or on securely managed SCI infrastructure. In particular, the rate-limiting MUST NOT be managed solely in local WI or WSCA agent software since it is assumed that attackers could modify this without detection.
649-
650611
## Trust evidence
651612

652613
Some issuers could require evidence from a solution provider of the security of the holder's cryptographic device. This evidence can in the context of [EU2024-1183] be divided into initial "Wallet Trust Evidence" and related "Issuer Trust Evidence". Each is a protected document that contains a trust evidence public key associated with a private key that is protected in the secure cryptographic device. With HDK, these public keys are specified as follows.

0 commit comments

Comments
 (0)