On 06/24/2016 06:21 PM, Andreas Fenkart wrote: > I'm only interested in creating signatures for FW releases. What > confuses me is the claim made by NitroKey that it is "tamper > resistant". I guess kernelconcepts card being a BasicCard[1] should be > "tamper resistant" as well.
IIUC, NitroKey Pro uses ZeitControl smartcard for crypto computation. So, it is same as a chip. I think that the term "tamper resistance" is usually used for a chip, if it has some counter measure against some sort of physical attacks. Please note that it doesn't directly mean it can be safe device as a whole. I think that we also need some "tamper resistance" in different level(s). Well, the combination of smatcard chip + USB MCU (which works as a card reader) is a kind of practice for a token. And people discuss it is good as it's has "tamper resistance" feature (in the chip level). I think that the combo is generally good thing, but we also know that this could have a different type of attack vector. Suppose that an attacker has enough time&budget to manufacture similar looking device, and it is possible for the attacker to access to my device multiple times (say, at nights). Then, there is a scenario like: (1) he steals my device when I sleep. (2) he extracts the smartcard chip from my device. Then, using the chip, he makes a token replacing MCU or MCU's firmware. The card reader part will have a special malicious feature recording PIN of mine in the communication. And he puts back the device to me, before I wake. (3) I just keep using my device. I don't notice the change because "it just works". (4) he again steals my device, at another night. (5) Since PIN is recorded in the MCU, my private keys are under control by him now (even if the chip itself is "secure"). I usually recommend implementing some counter measure as a device by customizing your own device. Here are examples: http://www.fsij.org/gnuk/craftwork-fst-01.html http://www.fsij.org/gnuk/customizing-gnuk-token.html http://www.fsij.org/gnuk/mono-the-eraser-case.html I don't know if it's an effective counter measure or not. Anyway, I enjoyed. If it's an effective counter measure, do we need chip level counter measure? That's my question. Already, I know that an effective counter measure is never sleeping. Please don't suggest this method. :-) -- _______________________________________________ Gnupg-users mailing list Gnupg-users@gnupg.org http://lists.gnupg.org/mailman/listinfo/gnupg-users