The GNU Taler System: Practical and Provably Secure Electronic Payments

Total Page:16

File Type:pdf, Size:1020Kb

The GNU Taler System: Practical and Provably Secure Electronic Payments The GNU Taler system : practical and provably secure electronic payments Florian Dold To cite this version: Florian Dold. The GNU Taler system : practical and provably secure electronic payments. Cryptogra- phy and Security [cs.CR]. Université Rennes 1, 2019. English. NNT : 2019REN1S008. tel-02138082 HAL Id: tel-02138082 https://tel.archives-ouvertes.fr/tel-02138082 Submitted on 23 May 2019 HAL is a multi-disciplinary open access L’archive ouverte pluridisciplinaire HAL, est archive for the deposit and dissemination of sci- destinée au dépôt et à la diffusion de documents entific research documents, whether they are pub- scientifiques de niveau recherche, publiés ou non, lished or not. The documents may come from émanant des établissements d’enseignement et de teaching and research institutions in France or recherche français ou étrangers, des laboratoires abroad, or from public or private research centers. publics ou privés. THESE DE DOCTORAT DE L'UNIVERSITE DE RENNES 1 COMUE UNIVERSITE BRETAGNE LOIRE ECOLE DOCTORALE N° 601 Mathématiques et Sciences et Technologies de l'Information et de la Communication Spécialité : Informatique Par « Florian DOLD » « The GNU Taler System » « Practical and Provably Secure Electronic Payments » Thèse présentée et soutenue à « Rennes », le « 25.02.2019 » Unité de recherche : Inria Thèse N° : 195897 Rapporteurs avant soutenance : Philip ROGAWAY Professeur à l’University of California, Davis Sarah MEIKLEJOHN Professeure à l’University College London Composition du Jury : Chercheur à l’Inria Rennes Président : Alan SCHMITT Examinateurs : Philip ROGAWAY Professeur à l’University of California, Davis Sarah MEIKLEJOHN Professeure à l’University College London Alex PENTLAND Professeur à Massachusetts Institute of Technology Dir. de thèse : Christian GROTHOFF Professeur à Bern University of Applied Sciences Co-dir. de thèse : Jean-Louis LANET Directeur de recherche, Inria Titre : Le système GNU Taler : Paiements électroniques pratiques et sécurisés. Mots clés : Monnaie électronique, Cryptographie, Sécurité, Systèmes distribués, Applications pratiques Résumé : Les nouveaux protocoles de réseautage et Notre mise en œuvre du GNU Taler est utilisable cryptographiques peuvent considérablement par des utilisateurs non experts et s’intègre à améliorer les systèmes de paiement l’architecture du web moderne. Notre plateforme électroniques en ligne. Le présent mémoire de paiement aborde une série de questions porte sur la conception, la mise en œuvre et pratiques telles que la prodigue des conseils aux l’analyse sécuritaire du GNU Taler, un système clients, le mode de remboursement, l’intégration de paiement respectueux de la vie privée conçu avec les banques et les chèques “know-your- pour être pratique pour l’utilisation en ligne customer (KYC)”, ainsi que les exigences de comme méthode de (micro-)paiement, et en sécurité et de fiabilité de la plateforme web. Sur même temps socialement et moralement une seule machine, nous réalisons des taux responsable. d’opérations qui rivalisent avec ceux des processeurs de cartes de crédit La base technique du GNU Taler peut être dû à commerciaux globaux. l’e cash de David Chaum. Notre travail va au- delà de l’e-cash de Chaum avec un Pendant que les crypto-monnaies basées sur la changement efficace, et la nouvelle notion de preuve de travail à l’instar de Bitcoin doivent transparence des revenus garantissant que les encore être mises à l’échelle pour servir de marchands ne peuvent recevoir de manière substituant aux systèmes de paiement établis, fiable un paiement d’un payeur non fiable que d’autres systèmes plus efficaces basés sur les lorsque leurs revenus du paiement est visible blockchains avec des algorithmes de consensus aux autorités fiscales. plus classiques pourraient avoir des applications prometteurs dans le secteur financier. Nous La transparence des revenus est obtenue grâce faisons dans la conception, la mise en œuvre et à l’introduction d’un protocole d’actualisation l’analyse de la Byzantine Set Union Consensus, donnant lieu à un changement anonyme pour un protocole de Byzantine consensus qui un jeton partiellement dépensé sans avoir s’accorde sur un (Super-)ensemble d’éléments à besoin de l’introduction d’une évasion fiscale la fois, au lieu d’accepter en séquence les échappatoire. De plus, nous démontrons la éléments individuels sur un ensemble. Byzantine sécurité prouvable de la transparence anonyme Set consensus peut être utilisé comme de nos revenus e-cash, qui concerne en plus composante de base pour des chaînes de blocs l’anonymat habituel et les propriétés de permissions, où (à l’instar du style Nakamoto infalsifiables de l’e-cash, ainsi que la consensus) des blocs entiers d’opérations sont conservation formelle des fonds et la convenus à la fois d’augmenter le taux transparence des revenus. d’opération. Title: The GNU Taler System: Practical and Provably Secure Electronic Payments Keywords: Electronic Cash, Cryptography, Security, Distributed Systems, Practical Applications Abstract: We describe the design and implementation of On a single machine, we achieve transaction GNU Taler, an electronic payment system based rates that rival those of global, commercial credit on an extension of Chaumian online e-cash with card processors. efficient change. In addition to anonymity for customers, it provides the novel notion of We increase the robustness of the exchange—the income transparency, which guarantees that component that keeps bank money in escrow in merchants can reliably receive a payment from exchange for e-cash—by adding an auditor an untrusted payer only when their income from component, which verifies the correct operation of the payment is visible to tax authorities. the system and allows to detect a compromise or misbehavior of the exchange early. Income transparency is achieved by the introduction of a refresh protocol, which gives Just like bank accounts have reason to exist anonymous change for a partially spent coin besides bank notes, e-cash only serves as part of without introducing a tax evasion loophole. In a whole payment system stack. Distributed addition to income transparency, the refresh ledgers have recently gained immense popularity protocol can be used to implement Camenisch- as potential replacement for parts of the traditional style atomic swaps, and to preserve anonymity financial industry. While cryptocurrencies based in the presence of protocol aborts and crash on proof-of-work such as Bitcoin have yet to scale faults with data loss by participants. to be useful as a replacement for established payment systems, Furthermore, we show the provable security of other more efficient systems based on our income-transparent anonymous e-cash, blockchains with more classical consensus which, in addition to the usual anonymity and algorithms might still have promising applications unforgeability properties of e-cash, also formally in the financial industry. models conservation of funds and income transparency. We design, implement and analyze the performance of Byzantine Set Union Consensus Our implementation of GNU Taler is usable by (BSC), a Byzantine consensus protocol that non-expert users and integrates with the agrees on a (super-)set of elements at once, modern Web architecture. Our payment instead of sequentially agreeing on the individual platform addresses a range of practical issues, elements of a set. While BSC is interesting in such as tipping customers, providing refunds, itself, it can also be used as a building block for integrating with banks and know-your-customer permissioned blockchains, where—just like in (KYC) checks, as well as Web platform security Nakamoto-style consensus—whole blocks of and reliability requirements. transactions are agreed upon at once, increasing the transaction rate. Acknowledgements I would like to thank Moritz Bartl for helping with the funding for this thesis. Bruno Haible provided generous support for the GNU Taler team to visit meetings of the W3C’s Web Payment Working Group. I also thank Ashoka, the Tor project and the Donaukurier for their support. This work benefits from the financial support of the Brittany Region (ARED 9174) and the Renewable Freedom Foundation (RFF). I want to thank Inria and my team leader Axel Legay for hosting me during the work on my thesis, and Jean-Louis Lanet for agreeing to co-advise my thesis. Special thanks goes to Thomas Given-Wilson, Fabrizio Biondi, Laurent Morin and Nisrine Jafri for their support and company. I also thank the Bern University of Applied Sciences for providing the hardware that was using during experiments. Thanks to Marcello Stanisci for his work as an engineer on the GNU Taler project. Chapter 5 is based on work published in the EURASIP Journal on Wireless Communications and Networking in collaboration with Christian Grothoff. Parts of Chapter 4 have been published in collaboration with Jeff Burdges, Christian Grothoff and Marcello Stanisci at SPACE 2016. Thanks to Cristina Onete and Jeff Burdges for their collaboration on the prov- able security of GNU Taler. I am grateful to the GNU project, in particular Richard Stallman, for their support of this project. I also thank all GNUnet developers and GNU Guix developers, especially Hartmut Goebel, Nils Gillmann, Gabor Toth, Ludovic Courtès and Andreas Enge. Thanks to the Taler Systems business team, in particular Leon Schumacher and Michael Widmer, for their continuous faith in the project. I thank my advisor Christian Grothoff for his advice and friendship. Last but not least I’d like to thank my parents, my oldest friends Tom and Ben and my fiancée Vaish for their relentless support even during the most difficult times. v Contents 1. Introduction 1 1.1. Design Goals for GNU Taler . 2 1.2. Features of Value-based Payment Systems . 4 1.2.1. Offline vs Online Payments . 4 1.2.2. Change and Divisibility . 5 1.2.3. Anonymity Control . 6 1.2.4. User Suspension . 6 1.2.5. Transferability . 6 1.2.6. Atomic Swaps . 7 1.2.7. Refunds . 7 1.3. User Experience and Performance . 7 1.4. The Technical Foundation: Anonymous E-Cash .
Recommended publications
  • Technical Report (Open)SSH Secure Use Recommendations
    DAT-NT-007-EN/ANSSI/SDE PREMIERMINISTRE Secrétariat général Paris, August 17, 2015 de la défense et de la sécurité nationale No DAT-NT-007-EN/ANSSI/SDE/NP Agence nationale de la sécurité Number of pages des systèmes d’information (including this page): 21 Technical report (Open)SSH secure use recommendations Targeted audience Developers Administrators X IT security managers X IT managers Users Document Information Disclaimer This document, written by the ANSSI, presents the “(Open)SSH secure use recom- mendations”. It is freely available at www.ssi.gouv.fr/nt-ssh. It is an original creation from the ANSSI and it is placed under the “Open Licence” published by the Etalab mission (www.etalab.gouv.fr). Consequently, its diffusion is unlimited and unrestricted. This document is a courtesy translation of the initial French document “Recommanda- tions pour un usage sécurisé d’(Open)SSH”, available at www.ssi.gouv.fr/nt-ssh. In case of conflicts between these two documents, the latter is considered as the only reference. These recommendations are provided as is and are related to threats known at the publication time. Considering the information systems diversity, the ANSSI cannot guarantee direct application of these recommendations on targeted information systems. Applying the following recommendations shall be, at first, validated by IT administrators and/or IT security managers. Document contributors Contributors Written by Approved by Date Cisco1, DAT DAT SDE August 17, 2015 Document changelog Version Date Changelog based on 1.3 – french August 17, 2015 Translation Contact information Contact Address Email Phone 51 bd de La Bureau Communication Tour-Maubourg [email protected] 01 71 75 84 04 de l’ANSSI 75700 Paris Cedex 07 SP 1.
    [Show full text]
  • Openssh Client Cryptographic Module Versions 1.0, 1.1 and 1.2
    OpenSSH Client Cryptographic Module versions 1.0, 1.1 and 1.2 FIPS 140-2 Non-Proprietary Security Policy Version 3.0 Last update: 2021-01-13 Prepared by: atsec information security corporation 9130 Jollyville Road, Suite 260 Austin, TX 78759 www.atsec.com © 2021 Canonical Ltd. / atsec information security This document can be reproduced and distributed only whole and intact, including this copyright notice. OpenSSH Client Cryptographic Module FIPS 140-2 Non-Proprietary Security Policy Table of Contents 1. Cryptographic Module Specification ....................................................................................................... 5 1.1. Module Overview .................................................................................................................................... 5 1.2. Modes of Operation ................................................................................................................................ 9 2. Cryptographic Module Ports and Interfaces ......................................................................................... 10 3. Roles, Services and Authentication ...................................................................................................... 11 3.1. Roles ...................................................................................................................................................... 11 3.2. Services .................................................................................................................................................
    [Show full text]
  • Openssh-Ldap-Pubkey Documentation Release 0.3.0
    openssh-ldap-pubkey Documentation Release 0.3.0 Kouhei Maeda May 18, 2020 Contents 1 openssh-ldap-pubkey 3 1.1 Status...................................................3 1.2 Requirements...............................................3 1.3 See also..................................................3 2 How to setup LDAP server for openssh-lpk5 2.1 Precondition...............................................5 2.2 Requirements...............................................5 2.3 Install...................................................5 3 How to setup OpenSSH server9 3.1 Precondition...............................................9 3.2 Requirements...............................................9 3.3 Install with nslcd (recommend).....................................9 3.4 Install without nslcd........................................... 11 4 History 13 4.1 0.3.0 (2020-05-18)............................................ 13 4.2 0.2.0 (2018-09-30)............................................ 13 4.3 0.1.3 (2018-08-18)............................................ 13 4.4 0.1.2 (2017-11-25)............................................ 13 4.5 0.1.1 (2015-10-16)............................................ 14 4.6 0.1.0 (2015-10-16)............................................ 14 5 Contributors 15 6 Indices and tables 17 i ii openssh-ldap-pubkey Documentation, Release 0.3.0 Contents: Contents 1 openssh-ldap-pubkey Documentation, Release 0.3.0 2 Contents CHAPTER 1 openssh-ldap-pubkey 1.1 Status 1.2 Requirements 1.2.1 LDAP server • Add openssh-lpk schema. • Add an objectClass ldapPublicKey to user entry. • Add one or more sshPublicKey attribute to user entry. 1.2.2 OpenSSH server • OpenSSH over 6.2. • Installing this utility. • Setup AuthorozedKeysCommand and AuthorizedKeysCommandUser in sshd_config. 1.3 See also • OpenSSH 6.2 release 3 openssh-ldap-pubkey Documentation, Release 0.3.0 • openssh-lpk 4 Chapter 1. openssh-ldap-pubkey CHAPTER 2 How to setup LDAP server for openssh-lpk 2.1 Precondition This article restricts OpenLDAP with slapd_config on Debian systems only.
    [Show full text]
  • T U M a Digital Wallet Implementation for Anonymous Cash
    Technische Universität München Department of Informatics Bachelor’s Thesis in Information Systems A Digital Wallet Implementation for Anonymous Cash Oliver R. Broome Technische Universität München Department of Informatics Bachelor’s Thesis in Information Systems A Digital Wallet Implementation for Anonymous Cash Implementierung eines digitalen Wallets for anonyme Währungen Author Oliver R. Broome Supervisor Prof. Dr.-Ing. Georg Carle Advisor Sree Harsha Totakura, M. Sc. Date October 15, 2015 Informatik VIII Chair for Network Architectures and Services I conrm that this thesis is my own work and I have documented all sources and material used. Garching b. München, October 15, 2015 Signature Abstract GNU Taler is a novel approach to digital payments with which payments are performed with cryptographically generated representations of actual currencies. The main goal of GNU Taler is to allow taxable anonymous payments to non-anonymous merchants. This thesis documents the implementation of the Android version of the GNU Taler wallet, which allows users to create new Taler-based funds and perform payments with them. Zusammenfassung GNU Taler ist ein neuartiger Ansatz für digitales Bezahlen, bei dem Zahlungen mit kryptographischen Repräsentationen von echten Währungen getätigt werden. Das Hauptziel von GNU Taler ist es, versteuerbare, anonyme Zahlungen an nicht-anonyme Händler zu ermöglichen. Diese Arbeit dokumentiert die Implementation der Android-Version des Taler-Portemonnaies, der es Benutzern erlaubt, neues Taler-Guthaben zu erzeugen und mit ihnen Zahlungen zu tätigen. I Contents 1 Introduction 1 1.1 GNU Taler . .2 1.2 Goals of the thesis . .2 1.3 Outline . .3 2 Implementation prerequisites 5 2.1 Native libraries . .5 2.1.1 Libgcrypt .
    [Show full text]
  • Balancing Privacy and Accountability in Digital Payment Methods Using Zk-Snarks
    1 Faculty of Electrical Engineering, Mathematics & Computer Science Balancing privacy and accountability in digital payment methods using zk-SNARKs Tariq Bontekoe M.Sc. Thesis October 2020 Supervisors: prof. dr. M. J. Uetz (UT) dr. M. H. Everts (TNO/UT) dr. B. Manthey (UT) dr. A. Peter (UT) Department Applied Mathematics Discrete Mathematics & Mathematical Programming Department Computer Science 4TU Cyber Security Faculty of Electrical Engineering, Mathematics and Computer Science University of Twente Preface This thesis concludes my seven years (and a month) as a student. During all these years I have certainly enjoyed myself and feel proud of everything I have done and achieved. Not only have I completed a bachelor’s in Applied Mathematics, I have also spent a year as a board member of my study association W.S.G. Abacus, spent a lot of time as a student assistant, and have made friends for life. I have really enjoyed creating this final project, in all its ups and downs, that concludes not only my master’s in Applied Mathematics but also that in Computer Science. This work was carried out at TNO in Groningen in the department Cyber Security & Ro- bustness. My time there has been amazing and the colleagues in the department have made that time even better. I am also happy to say that I will continue my time there soon. There are quite some people I should thank for helping my realise this thesis. First of all, my main supervisor Maarten who helped me with his constructive feedback, knowledge of blockchains and presence at both TNO and my university.
    [Show full text]
  • Scripting the Openssh, SFTP, and SCP Utilities on I Scott Klement
    Scripting the OpenSSH, SFTP, and SCP Utilities on i Presented by Scott Klement http://www.scottklement.com © 2010-2015, Scott Klement Why do programmers get Halloween and Christmas mixed-up? 31 OCT = 25 DEC Objectives Of This Session • Setting up OpenSSH on i • The OpenSSH tools: SSH, SFTP and SCP • How do you use them? • How do you automate them so they can be run from native programs (CL programs) 2 What is SSH SSH is short for "Secure Shell." Created by: • Tatu Ylönen (SSH Communications Corp) • Björn Grönvall (OSSH – short lived) • OpenBSD team (led by Theo de Raadt) The term "SSH" can refer to a secured network protocol. It also can refer to the tools that run over that protocol. • Secure replacement for "telnet" • Secure replacement for "rcp" (copying files over a network) • Secure replacement for "ftp" • Secure replacement for "rexec" (RUNRMTCMD) 3 What is OpenSSH OpenSSH is an open source (free) implementation of SSH. • Developed by the OpenBSD team • but it's available for all major OSes • Included with many operating systems • BSD, Linux, AIX, HP-UX, MacOS X, Novell NetWare, Solaris, Irix… and yes, IBM i. • Integrated into appliances (routers, switches, etc) • HP, Nokia, Cisco, Digi, Dell, Juniper Networks "Puffy" – OpenBSD's Mascot The #1 SSH implementation in the world. • More than 85% of all SSH installations. • Measured by ScanSSH software. • You can be sure your business partners who use SSH will support OpenSSH 4 Included with IBM i These must be installed (all are free and shipped with IBM i **) • 57xx-SS1, option 33 = PASE • 5733-SC1, *BASE = Portable Utilities • 5733-SC1, option 1 = OpenSSH, OpenSSL, zlib • 57xx-SS1, option 30 = QShell (useful, not required) ** in v5r3, had 5733-SC1 had to be ordered separately (no charge.) In v5r4 or later, it's shipped automatically.
    [Show full text]
  • Using Vmware Vrealize Orchestrator 8.4 Plug-Ins
    Using VMware vRealize Orchestrator 8.4 Plug-Ins 15 APRIL 2021 vRealize Orchestrator 8.4 Using VMware vRealize Orchestrator 8.4 Plug-Ins You can find the most up-to-date technical documentation on the VMware website at: https://docs.vmware.com/ VMware, Inc. 3401 Hillview Ave. Palo Alto, CA 94304 www.vmware.com © Copyright 2008-2021 VMware, Inc. All rights reserved. Copyright and trademark information. VMware, Inc. 2 Contents Using VMware vRealize Orchestrator Plug-Ins 9 1 Introduction to vRealize Orchestrator Plug-Ins 10 vRealize Orchestrator Architecture 11 Plug-Ins Installed with the vRealize Orchestrator Server 11 Access the vRealize Orchestrator API Explorer 14 Time Zone Codes 15 2 Configuring the vRealize Orchestrator Plug-Ins 18 Manage vRealize Orchestrator Plug-Ins 18 Install or Update a vRealize Orchestrator Plug-In 19 Delete a Plug-In 19 3 Using the Active Directory Plug-In 21 Configuring the Active Directory Plug-In 21 Using the Active Directory Plug-In Workflow Library 22 Computer Workflows 22 Organizational Unit Workflows 22 User Workflows 23 User Group Workflows 23 Client-Side Load Balancing for the Active Directory Plug-In 24 4 Using the AMQP Plug-In 25 Configuring the AMQP Plug-In 25 Add a Broker 25 Subscribe to Queues 26 Update a Broker 27 Using the AMQP Plug-In Workflow Library 27 Declare a Binding 28 Declare a Queue 28 Declare an Exchange 29 Send a Text Message 30 Delete a Binding 31 5 Using the Configuration Plug-In 32 6 Using the Dynamic Types Plug-In 34 Dynamic Types Configuration Workflows 34 VMware, Inc.
    [Show full text]
  • Z/OS Openssh User's Guide
    z/OS Version 2 Release 4 z/OS OpenSSH User's Guide IBM SC27-6806-40 Note Before using this information and the product it supports, read the information in “Notices” on page 503. This edition applies to Version 2 Release 4 of z/OS (5650-ZOS) and to all subsequent releases and modifications until otherwise indicated in new editions. Last updated: 2020-11-16 © Copyright International Business Machines Corporation 2015, 2019. US Government Users Restricted Rights – Use, duplication or disclosure restricted by GSA ADP Schedule Contract with IBM Corp. Contents Figures................................................................................................................. ix Tables.................................................................................................................. xi About this document...........................................................................................xiii Who should use this document?............................................................................................................... xiii z/OS information........................................................................................................................................xiii Discussion list...................................................................................................................................... xiii How to send your comments to IBM......................................................................xv If you have a technical problem.................................................................................................................xv
    [Show full text]
  • Digital Trade Coin: Towards a More Stable Digital Currency Rsos.Royalsocietypublishing.Org Alex Lipton, Thomas Hardjono and Alex Pentland
    Digital trade coin: towards a more stable digital currency rsos.royalsocietypublishing.org Alex Lipton, Thomas Hardjono and Alex Pentland MIT Connection Science, Massachusetts Institute of Technology, Cambridge, MA, USA Research TH, """"-"""#-('&)-()*" Cite this article: Lipton A, Hardjono T, We study the evolution of ideas related to creation of asset- Pentland A. !"#$ Digital trade coin: towards a backed currencies over the last 200 years and argue that recent more stable digital currency. R. Soc. open sci. developments related to distributed ledger technologies and !: #$"#%%. blockchains give asset-backed currencies a new lease of life. We http://dx.doi.org/#".#"&$/rsos.#$"#%% propose a practical mechanism combining novel technological breakthroughs with well-established hedging techniques for building an asset-backed transactional oriented cryptocurrency, which we call the digital trade coin (DTC). We show that in its Received: '# January !"#$ mature state, the DTC can serve as a much-needed counterpoint Accepted: #$ June !"#$ to fiat reserve currencies of today. #. Introduction Subject Category: This paper describes the concept of the asset-backed digital Computer science trade coins (DTCs), currently under development at MIT [1]. It outlines an approach to building a consortium of sponsors, Subject Areas: who contribute real assets, a narrow bank handling financial cryptography/human-computer transactions involving fiat currencies, and an administrator, who interaction/software issues the corresponding digital token in exchange for fiat payments and makes fiat payments in exchange for digital tokens. Keywords: In short, our proposal is to apply distributed ledger technology to blockchain technology, digital currency, give a new lease of life to the old notion of a sound asset-backed currency, and to use this currency as a transactional tool for a large electronic cash pool of potential users, including small and medium enterprises and individuals.
    [Show full text]
  • Gnuk — a Free Software USB Token Implementation Niibe Yutaka
    Gnuk — A Free Software USB Token Implementation Niibe Yutaka <[email protected]> What’s Gnuk? Free Software implementation of Cryptographic Token For GNU Privacy Guard Supports OpenPGP card protocol version 2 Runs on STM32 processor Named after NUK® My son used to be with his NUK®, always, everywhere I wish Gnuk Token can be a soother for GnuPG user NUK® is a registered trademark owend by MAPA GmbH, Germany. Cryptographic Token? Stores your Secret Keys Performs security operations on the device Digital signature Authentication Decryption No direct access of Secret Keys How useful? Can bring secret keys securely On the go, you can do: Make digital signature Authenticate yourself Read encrypted mail GNU Privacy Guard (GnuPG) Tool for Privacy by Cryptography Conforms to OpenPGP standard Usage: Digital Signature Encryption/Decryption Authentication Supports "OpenPGP card" OpenPGP card Smartcard to put GnuPG keys Follows OpenPGP protocol standard Features of v2.0: RSA 1024-bit, 2048-bit, 3072-bit Three keys: Sign, Decrypt, Auth Key generation on the card RSA accelerator OpenPGP card Applications GnuPG OpenSSH → gpg-agent TLS/SSL Client authentication Scute (Network Security Service) PAM Poldi Problem to solve Where and how we put our secret keys? On the disk of our PC Encrypted by passphrase Not Secure Enough OpenPGP card Good (portable, secure) Not easily deployed (reader is not common) FSIJ USB Token v1 (2008) Hardware: Built a PCB CPU: Atmel AVR ATmega 328 @20MHz Software: RSA computation routine for AVR RSA 1024-bit About 5sec Data objects
    [Show full text]
  • Escaping the Ossification Trap with Gnunet
    Escaping the Ossification Trap with GNUnet Christian Grothoff BFH & The GNU Project 25.1.2018 \We shape our tools, and thereafter our tools shape us". {John Culkin What can be done? I Democracies are slow ) Effective regulation of mega-corporations exists only under dictatorships Dictatorship or Corpocracy? Regulation? I Charles Stross (@34c4) warns: Companies are AIs that develop faster than the law I Julia Reda (@IGF) warns: Regulation of platforms paradoxically can give them more power Regulation? I Charles Stross (@34c4) warns: Companies are AIs that develop faster than the law I Julia Reda (@IGF) warns: Regulation of platforms paradoxically can give them more power I Democracies are slow ) Effective regulation of mega-corporations exists only under dictatorships Dictatorship or Corpocracy? Better Technology! Data protection! Decentralization! Self-Organization! Technological impact assessment!1 1Difficult, but better than design-by-buzzword! Technological impact assessment case-study: Name systems DNS/DNSSEC DNS Server Root Zone a.root-servers.net. www.example.com? a.gtld-servers.net.test E2D3C9.... DNSSEC Trust Anchor NS . S4LXnQiBS... 49AAC1... DS RRSIG www.example.com? Recursive DNS Server Stub www.example.com? Name .com Resolver Server NS a.gtld-servers.net.test a.gtld-servers.net. A 93.184.216.119 DS 3490A6.... RRSIG example.com. K0rp9n... RRSIG com. U/ZW6P3c... AD www.example.com? RRSIG A 93.184.216.119 example.com. K0rp9n... DNS Server example.com a.iana-servers.net. RAINS Authority Server Root Zone 44 ) com ZK ; :registry www.example.com?
    [Show full text]
  • Hardware Cryptographic Support of IBM Z Systems for Openssh in RHEL 7.2 and SLES 12 SP1
    Hardware cryptographic support of IBM z Systems for OpenSSH in RHEL 7.2 and SLES 12 SP1 Uwe Denneler, Harald Freudenberger, Paul Gallagher, Manfred Gnirss, Guillaume Hoareau, Arwed Tschoeke, Ingo Tuchscherer, Arthur Winterling August 18, 2016 Abstract This article summarizes our experiences with the configuration and usage of OpenSSH using hardware cryptographic support of IBM z Systems. We report our findings in the areas of performance and throughput improvement. Our positive experience indicates that you should make use of this capability when using OpenSSH. i IBM Client Center, Germany Contents 1 Introduction 1 2 Hardware cryptographic support of z Systems 1 2.1 Verification of installed LIC 3863 using the SE . .1 2.2 Verification of installed LIC 3863 using a Linux command . .2 3 Configuration of Crypto Express feature for Linux for IBM z Systems 4 4 HW- Support - Architecture for OpenSSH 4 5 Our environment 5 5.1 Installation of SLES 12 SP1 . .6 5.2 Installation of RHEL 7.2 . .9 5.3 Configuring ibmca engine . 14 6 CPACF Support for OpenSSH 15 6.1 General test using openssl speed . 15 6.2 First test with SCP of OpenSSH . 17 6.3 Test with SSH client . 19 7 Selection of cipher and MAC 21 7.1 Small comparison between SHA with CPACF support and MD5 . 21 7.2 Profiles for OpenSSH client and server . 22 7.2.1 SSH client configuration . 22 7.2.2 SSHD server configuration . 23 8 Crypto Express support for RSA with OpenSSH 24 9 Some more performance aspects 25 9.1 Choice of cipher algorithm .
    [Show full text]