Formal security analysis of PKCS#11 and proprietary extensions

  • Authors:
  • Sté/phanie Delaune;Steve Kremer;Graham Steel

  • Affiliations:
  • -;-;(Correspd. Tel.: +33 1 47 40 77 80/ Fax: +33 1 47 40 75 21/ E-mail: graham.Steel@lsv.ens-cachan.fr) LSV, ENS Cachan & CNRS & INRIA, France

  • Venue:
  • Journal of Computer Security - 7th International Workshop on Issues in the Theory of Security (WITS'07)
  • Year:
  • 2010

Quantified Score

Hi-index 0.00

Visualization

Abstract

PKCS#11 defines an API for cryptographic devices that has been widely adopted in industry. However, it has been shown to be vulnerable to a variety of attacks that could, for example, compromise the sensitive keys stored on the device. In this paper, we set out a formal model of the operation of the API, which differs from previous security API models notably in that it accounts for non-monotonic mutable global state. We give decidability results for our formalism, and describe an implementation of the resulting decision procedure using the model checker NuSMV. We report some new attacks and prove the safety of some configurations of the API in our model. We also analyse proprietary extensions proposed by nCipher (Thales) and Eracom (Safenet), designed to address the shortcomings of PKCS#11.