skip to main content
10.1145/168588.168615acmconferencesArticle/Chapter ViewAbstractPublication PagesccsConference Proceedingsconference-collections
Article
Free Access

Why cryptosystems fail

Published:01 December 1993Publication History

ABSTRACT

Designers of cryptographic systems are at a disadvantage to most other engineers, in that information on how their systems fail is hard to get: their major users have traditionally been government agencies, which are very secretive about their mistakes.

In this article, we present the results of a survey of the failure modes of retail banking systems, which constitute the next largest application of cryptology. It turns out that the threat model commonly used by cryptosystem designers was wrong: most frauds were not caused by cryptanalysis or other technical attacks, but by implementation errors and management failures. This suggests that a paradigm shift is overdue in computer security; we look at some of the alternatives, and see some signs that this shift may be getting under way.

References

  1. A1.D Austin, "Marking the Cards", in Banking Technology, Dec 91/Jan 92, pp 18- 21Google ScholarGoogle Scholar
  2. A2.RJ Anderson, "UEPS- A Second Generation Electronic Wallet". in Computer Security - ES- ORICS 92, Springer LNCS 648, pp 411 - 418 Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. B.M Buckler MP, letter to plaintiff's solicitor, 8 June 1992Google ScholarGoogle Scholar
  4. BAB."Card Fraud: Banking's Boom Sector", in Banking Automation Bulletin for Europe, Mar 92, pp 1-5Google ScholarGoogle Scholar
  5. BAN.M Burrows, M Abadi and RM Needham, 'A Logic of Authentication', DEC SRC Research Report 39Google ScholarGoogle Scholar
  6. BB."Cash Dispenser Security", Bar'clays Briefing (press release) 12/9/92Google ScholarGoogle Scholar
  7. BGS.JA Bull, L Gong, K Sollins, "Towards Security in an Open Systems Federation", in Proceedings of ESORICS 9~, Springer LNCS 648 pp 3- 20 Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. BMD.A Burns, JA McDermid, JE Dobson, 'On the meaning of safety and security', University of Newcastle upon Tyne Computer Laboratory TR 382 (5/92)Google ScholarGoogle Scholar
  9. C1.A Collins, "Bank worker guilty of ATM fraud", in Sunday Times, 22 Mar 1992Google ScholarGoogle Scholar
  10. C2.A Collins, "The Machines That Never Go Wrong", in Computer Weekly, 27 June 1992, pp 24- 25Google ScholarGoogle Scholar
  11. C3.D Coppersmith, "The Data Encryption Standard (DES) and its strength against attacks", IBM Thomas J Watson Research Center technical report RC 18613 (81421), 22 December 1992Google ScholarGoogle Scholar
  12. C4.J Cullyer, "Safety-critical systems", in Computing and Control Engineering Journal 2 no 5 (Sep 91) pp 202- 210Google ScholarGoogle Scholar
  13. C5.B Christianson, "Document Integrity in CSCW", in Proc. Cambridge Workshop on Formal Methods (1993, to appear)Google ScholarGoogle Scholar
  14. CR.Boeing News Digest, quoted in usenet newsgroup 'comp.risks' 14 no 5 (29 April 1993)Google ScholarGoogle Scholar
  15. CW.J Cullyer, W Wong, "Application of formal methods to railway signalling - a case study", in Computing and Control Engineering Journal 4 no 1 (Feb 93) pp 15- 22Google ScholarGoogle Scholar
  16. DP.DW Davies and WL Price, 'Security for Computer Networks ', John Wiley and Sons 1984. Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. E.J Essinger, 'A TM Networks - Their Oryanisation, Security and Future', Elsevier 1987Google ScholarGoogle Scholar
  18. GO.G Garon and R Outerbridge, "DES Watch: An examination of the Sufficiency of the Data Encryption Standard for Financial Institution Information Security in the 1990's, in Cryptologia, XV, no. 3 (July 1991) pp 177- 193 Google ScholarGoogle Scholar
  19. H.HJ Highland, "Perspectives in Information Technology Security", in Proceedings of the 1992 IFIP Congress, 'Education and Society ', IFIP A-13 vol II (1992) pp 440 - 446 Google ScholarGoogle ScholarDigital LibraryDigital Library
  20. ITSEC.'Information Technology Security Evaluation Criteria', June 1991, EC document COM(90) 314Google ScholarGoogle Scholar
  21. J1.RB Jack (chairman), 'Banking services: law and practice report by the Review Committee ', HMSO, London, 1989Google ScholarGoogle Scholar
  22. J2.K Johnson, "One Less Thing to Believe In: Fraud at Fake Cash Machine", in New York Times 13 May 1993 p 1Google ScholarGoogle Scholar
  23. JAJP.HL Johnson, C Arvin, E Jenkinson, R Pierce, "Integrity and assurance of service protection in a large, multipurpose, critical system" in proceedings of the 15th National Computer Security Conference, NIST (1992) pp 252- 261Google ScholarGoogle Scholar
  24. JC.Dorothy Judd v Citibank, 435 NYS, 2d series, pp 210 - 212, 107 Misc.2d 526Google ScholarGoogle Scholar
  25. JDKLM.DB Johnson, GM Dolan, MJ Kelly, AV Le, SM M atyas, "Common Cryptographic Architecture Application Programming Interface", in IBM Systems Journal 30 no 2 (1991) pp 130 - 150 Google ScholarGoogle ScholarDigital LibraryDigital Library
  26. K1.D Kahn, 'The Codebreakers', Macmillan 1967Google ScholarGoogle Scholar
  27. K2.TS Kuhn, 'The Structure of Scientific Revolutions', Chicago 1970Google ScholarGoogle Scholar
  28. L1.B Lewis, "How to rob a bank the cashcard way", in Sunday Telegraph 25th April 1992 p 5Google ScholarGoogle Scholar
  29. L2.D Lane, "Where Cash is King", in Banking Technolo9y, October 1992, pp 38 - 41Google ScholarGoogle Scholar
  30. M1.S M cConnell, "Barclays defends its cash machines", in The Times, 7 November 1992Google ScholarGoogle Scholar
  31. M2.R Morris, invited lecture given at Cambridge 1993 formal methods workshop (proceedings to appear)Google ScholarGoogle Scholar
  32. M3.JA McDermid, "Issues in the Development of Safety Critical Systems", public lecture, 3rd February 1993Google ScholarGoogle Scholar
  33. MB.McConville & others v Barclays Bank & others, High Court of Justice Queen's Bench Division 1992 ORB no.812Google ScholarGoogle Scholar
  34. MBW.McConville & others v Barclays Bank & others cit, affidavit by D WhalleyGoogle ScholarGoogle Scholar
  35. MM.CH Meyer and SM Matyas, 'Cryptography: A New Dimension in Computer Data Security', John Wiley and Sons 1982.Google ScholarGoogle Scholar
  36. N.I Newton, 'Philosophiae Naturalis Principia Mathematica', University of California Press 1973Google ScholarGoogle Scholar
  37. NSM.'Network security Module - Application Devel. oper's Manual', Computer Security Associates, 1990Google ScholarGoogle Scholar
  38. NSP.New Security Paradigms Workshop, 2-5 August 1993, proceedings to be published by the ACM.Google ScholarGoogle Scholar
  39. P.WR Price, "Issues to Consider When Using Evaluated Products to Implement Secure Mission Systems", in Proceedings of the 15th National Computer Security Conference, National Institute of Standards and Technology (1992) pp 292 - 299Google ScholarGoogle Scholar
  40. R.RA Rueppel, "Criticism of ISO CD 11166 Banking: Key Management by Means of Asymmetric Algorithms", in Proceedings of 3rd Symposium of State and Progress of Research in Cryptography, Fondazione Ugo Bordoni, Rome 1993Google ScholarGoogle Scholar
  41. RM.R v Moon, Hastings Crown Court, Feb 92Google ScholarGoogle Scholar
  42. RSH.R v Stone and Hider, Winchester Crown Court July 1991Google ScholarGoogle Scholar
  43. S.A Stone, "ATM cards & fraud", manuscript 1993Google ScholarGoogle Scholar
  44. SSWDC.L Sutterfield, T Schell, G White, K Doster and D Cuiskelly, "A Model for the Measurement of Computer Security Posture", in Proceedings of the 15th National Computer Security Conference, NIST (1992) pp 379 - 388Google ScholarGoogle Scholar
  45. TCSEC.'Trusted Computer System Evaluation Criteria, US Department of Defense, 5200.28-STD, December 1985Google ScholarGoogle Scholar
  46. VSM.'VISA Security Module Operations Manual', VISA, 1986Google ScholarGoogle Scholar
  47. W1.G Welchman, The Hut Siz Story, McGraw-Hill, 1982Google ScholarGoogle Scholar
  48. W2.MA Wright, 'Security Controls in ATM Systems', in Computer Fraud and Security Bulletin, November 1991, pp 11 - 14Google ScholarGoogle Scholar
  49. W3.K Wong, 'Data security ~ watch out for the new computer criminals", in Computer Fraud and Security Bulletin, April 1987, pp 7- 13Google ScholarGoogle ScholarCross RefCross Ref

Index Terms

  1. Why cryptosystems fail

              Recommendations

              Comments

              Login options

              Check if you have access through your login credentials or your institution to get full access on this article.

              Sign in
              • Published in

                cover image ACM Conferences
                CCS '93: Proceedings of the 1st ACM conference on Computer and communications security
                December 1993
                250 pages
                ISBN:0897916298
                DOI:10.1145/168588

                Copyright © 1993 ACM

                Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

                Publisher

                Association for Computing Machinery

                New York, NY, United States

                Publication History

                • Published: 1 December 1993

                Permissions

                Request permissions about this article.

                Request Permissions

                Check for updates

                Qualifiers

                • Article

                Acceptance Rates

                Overall Acceptance Rate1,261of6,999submissions,18%

                Upcoming Conference

                CCS '24
                ACM SIGSAC Conference on Computer and Communications Security
                October 14 - 18, 2024
                Salt Lake City , UT , USA

              PDF Format

              View or Download as a PDF file.

              PDF

              eReader

              View online with eReader.

              eReader