
questions and the test question response may be repeated several times depending on
the way the questions are presented and the complexity of the concepts.
Authentication Command - The Cardholder System sends the Test Question
Response and the encrypted Correct Test Response coming from the
authentication response to the smart card for a matching verification.
Authentication Decision - The smart card compares the cardholder's response with
the Correct Test Response. If no difference is found, the cardholder is authenticated
and the authentication decision is true. Any other comparison results will result in a
failed user authentication and the authentication decision is false. If the decision is
false, the smart card must destroy any data received for this session of user
authentication and must block any further data leaving the card. Whether or not the
card lets the Cardholder System and the Authentication Server know the
authentication decision is an optional step accomplished by an individual
implementation of this scheme according to the requirements. In our implementation,
the decision is transmitted to the Cardholder System and the Authentication Server. It
is a compulsory requirement to encipher the decision with a proper recipient's public
key.
6 Possible Effective Security Attacks
The implemented scheme is based on EMV [1] functions and the SET [2]
specification, thereby protecting against most attacks. A Substitution attack is only
really successful against a very limited range of authentication methods and
encryptions and Exhaustive Search is not really appropriate to most Internet
transactions. The only effective weakness of the scheme lies in the fact that no part of
the PC can be considered a tamper evident device and so information cannot be
reliably encrypted thereon. In particular, information transferred from the keyboard or
mouse of the PC to the smart card interface device is not secure. This is not an issue if
the question and answer involved in authentication reveal no information to enable
future correct response to some question. If however they do, the Man in the Middle
attack, in conjunction with obtaining a copy of the smart card could be successful for
attaining the ability to make fraudulent authentication if the following procedure is
achieved:
The Cardholder's response to the question can be accessed via the channel
connecting keyboard or mouse of the PC to its processor or that connecting the latter
to the card interface device. This can be compared with the question, accessed via the
general Internet channel connecting the Authentication Server to the Cardholder
System, after timing differences are allowed for. Repeated observations
for the cardholder over a number of authentication sessions can compromise the
secret to enable false authentication provided a copy of the smart card is available to
the attacker. Note, however, that the proximity of the user to the smart card can be
verified by the use of a physical contact on the card connector. As a result remote
access to the card during the user authentication procedure can be prevented.
Note that the success of this attack necessitates each of five components:
1) Access to a copy of the smart card;
2) Ability to undetectably read and interpret at the correct time the information on
24