guided specification and analysis of a loyalty card system
play

Guided Specification and Analysis of a Loyalty Card System Laurent - PowerPoint PPT Presentation

Guided Specification and Analysis of a Loyalty Card System Laurent Cuennet 1 Marc Pouly 2 c 3 Sa sa Radomirovi 1 University of Fribourg 2 Lucerne University of Applied Sciences 3 Institute of Information Security, ETH Z urich July 13,


  1. Guided Specification and Analysis of a Loyalty Card System Laurent Cuennet 1 Marc Pouly 2 c 3 Saˇ sa Radomirovi´ 1 University of Fribourg 2 Lucerne University of Applied Sciences 3 Institute of Information Security, ETH Z¨ urich July 13, 2015 1

  2. Loyalty Cards Paper-based ink stamp cards are a convenient and inexpensive way for small shops to improve customer loyalty. ◮ Advantage: customer benefits without being tracked and profiled. ◮ Disadvantage: too many different cards accumulate over time. 2

  3. Physical Loyalty Card Protocol Customer Vendor − − − − − − − − − − − − − → , ← − − − − − − − − − − − − − , 3

  4. Sketch of Electronic Loyalty Card Protocol Mobile Customer Vendor Server − − − − − → ← − − − − − ← − − − − − − − − − − − − − − − − − − − − − − − − 4

  5. Security Requirements Customer anonymity: Vendor cannot link points to customer’s identity. Customer privacy: Vendor can- not link customer’s transac- tions. 5

  6. Security Requirements Customer anonymity: Vendor cannot link points to customer’s identity. Customer privacy: Vendor can- not link customer’s transac- tions. Theft protection: Points issued to an agent can be redeemed by the agent. 5

  7. Security Requirements Customer anonymity: Vendor cannot link points to customer’s identity. Customer privacy: Vendor can- not link customer’s transac- tions. Theft protection: Points issued to an agent can be redeemed by the agent. Non-repudiation: Vendor can- not repudiate validity of unre- deemed points. 5

  8. Security Requirements Customer anonymity: Vendor Unforgeability: Loyalty points cannot link points to customer’s accepted by vendor have been identity. issued by vendor. Customer privacy: Vendor can- No double-spending: Redeemed not link customer’s transac- loyalty points will not be ac- tions. cepted. Theft protection: Points issued to an agent can be redeemed by the agent. Non-repudiation: Vendor can- not repudiate validity of unre- deemed points. 5

  9. Security Requirements Customer anonymity: Vendor Unforgeability: Loyalty points cannot link points to customer’s accepted by vendor have been identity. issued by vendor. Customer privacy: Vendor can- No double-spending: Redeemed not link customer’s transac- loyalty points will not be ac- tions. cepted. Theft protection: Points issued to an agent can be redeemed by the agent. Non-repudiation: Vendor can- not repudiate validity of unre- deemed points. 5

  10. Theft protection Points issued to an agent can be redeemed by the agent: ◮ “Agent” = Mobile Device. We are not protecting against theft of Mobile Device. 6

  11. Theft protection Points issued to an agent can be redeemed by the agent: ◮ “Agent” = Mobile Device. We are not protecting against theft of Mobile Device. 2 Threats: 1. Points issued to a mobile device are redeemed by an attacker’s device. ⇒ Requirement: Confidentiality of loyalty points. 2. Points issued to a mobile device are corrupted or lost and thus not redeemable by the device. ⇒ Requirement: Authenticity of loyalty points. 6

  12. Theft protection Points issued to an agent can be redeemed by the agent: ◮ “Agent” = Mobile Device. We are not protecting against theft of Mobile Device. 2 Threats: 1. Points issued to a mobile device are redeemed by an attacker’s device. ⇒ Requirement: Confidentiality of loyalty points. 2. Points issued to a mobile device are corrupted or lost and thus not redeemable by the device. ⇒ Requirement: Authenticity of loyalty points. Remaining Problem: Transmit Loyalty Points from Server to Mobile Device authentically and confidentially. 6

  13. Communication Topology [BRS15] What assumptions can we make about ◮ the communication channels between the four parties? ◮ the capabilities of the four parties? ◮ the honesty of the four parties? 7

  14. Communication Channels •− →◦ •− →◦ Authentic Channel between Customer and Vendor, due to context and location. 8

  15. Communication Channels ◦− →◦ •− →◦ •− →◦ •− →◦ Authentic Channel from Device to Customer: Customer knows his device. Insecure Channel from Customer to Device: Anybody could input information into Device. 9

  16. Communication Channels ◦− →◦ •− →◦ ◦− →◦ •− →◦ •− →◦ •− →◦ Insecure Channel from Device to Server: Any Device can send information to Server. Authentic Channel from Server to Device: Server’s public key can be distributed authentically in the shop. 10

  17. Communication Channels ◦− →◦ •− →◦ ◦− →◦ •− →◦ •− →• •− →• •− →◦ •− →◦ Secure Channel between Vendor and Server due to physical access control. 11

  18. Honesty and Capabilities ◦− →◦ •− →◦ ◦− →◦ •− →◦ •− →• •− →• •− →◦ •− →◦ ◮ We assume all four agents are honest. ◮ Customer and Vendor are computationally restricted. 12

  19. Coffee Shop Topology ◦− →◦ D S •− →◦ Customer C Customer’s Mobile Device D ◦− →◦ •− →◦ •− →• •− →• Vendor V Vendor’s Server S •− →◦ →◦ Insecure Channel ◦− C V →◦ Authentic Channel •− •− →◦ →• Secure Channel •− 13

  20. Coffee Shop Topology ◦− →◦ D S •− →◦ Customer C Customer’s Mobile Device D ◦− →◦ •− →◦ •− →• •− →• Vendor V Vendor’s Server S •− →◦ →◦ Insecure Channel ◦− C V →◦ Authentic Channel •− •− →◦ →• Secure Channel •− How to transmit Loyalty Points from Server S to Mobile Device D authentically and confidentially? 13

  21. First Protocol ◦− →◦ D S 1. C → V : money •− →◦ 2. V → S : money S → V : points / QR 3. ◦− →◦ •− →◦ •− →• •− →• 4. V → C : QR •− →◦ C → D : QR / points 5. C V •− →◦ Are the points transmitted from S to D confidential? 14

  22. First Protocol ◦− →◦ D S 1. C → V : money •− →◦ 2. V → S : money S → V : points / QR 3. ◦− ◦− →◦ →◦ •− →◦ •− →• •− →• 4. V → C : QR •− →◦ C → D : QR / points 5. C V •− •− →◦ →◦ Are the points transmitted from S to D confidential? - No! 14

  23. First Protocol ◦− →◦ D S 1. C → V : money •− →◦ 2. V → S : money S → V : points / QR 3. ◦− ◦− →◦ →◦ •− →◦ •− →• •− →• 4. V → C : QR •− →◦ C → D : QR / points 5. C V •− •− →◦ →◦ Are the points transmitted from S to D confidential? - No! Options: (1) Change assumptions, (2) Improve protocol. 14

  24. Second Protocol ◦− →◦ D → S : D S ?. key •− →◦ 1. C → V : money V → S : money 2. ◦− →◦ •− →◦ •− →• •− →• 3. S → V : { points } key / QR 4. V → C : QR •− →◦ 5. C → D : QR / { points } key C V •− →◦ ◮ Idea: S encrypts points for D . Server needs a key for D . 15

  25. Second Protocol Not authentic ◦− →◦ ◦− →◦ D → S : D S ?. key •− →◦ 1. C → V : money V → S : money 2. ◦− →◦ •− →◦ •− →• •− →• 3. S → V : { points } key / QR 4. V → C : QR •− →◦ 5. C → D : QR / { points } key C V •− →◦ ◮ Idea: S encrypts points for D . Server needs a key for D . ◮ Problem: How to send information authentically from D to S ? 15

  26. Second Protocol Not authentic ◦− →◦ ◦− →◦ D → S : D S ?. key •− →◦ 1. C → V : money V → S : money 2. •− →◦ •− →• ◦− →◦ •− →◦ •− →• •− →• 3. S → V : { points } key / QR 4. V → C : QR •− •− →◦ →◦ 5. C → D : QR / { points } key C V •− →◦ ◮ Idea: S encrypts points for D . Server needs a key for D . ◮ Problem: How to send information authentically from D to S ? Information can be sent authentically along path [ D , C , V , S ]. 15

  27. Second Protocol ◦− →◦ C → D : GetPoints 1. D S •− →◦ 2. D → C : key C → V : money , key 3. 4. V → S : money , key ◦− →◦ •− →◦ •− →• •− →• 5. S → V : { points } key / QR •− →◦ 6. V → C : QR 7. C → D : QR / { points } key C V •− →◦ Are the points transmitted from S to D authentic? 16

  28. Second Protocol ◦− →◦ C → D : GetPoints 1. D S •− →◦ 2. D → C : key C → V : money , key 3. 4. V → S : money , key ◦− ◦− →◦ →◦ •− →◦ •− →• •− →• 5. S → V : { points } key / QR •− →◦ 6. V → C : QR 7. C → D : QR / { points } key C V •− →◦ Are the points transmitted from S to D authentic? - No! 16

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend