Skip to main content

Analyzing Security of Korean USIM-Based PKI Certificate Service

  • Conference paper
  • First Online:

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 8909))

Abstract

This paper analyzes security of Korean USIM-based PKI certificate service. Korean PKI certificate consists of public key and password encrypted private key on disk. Due to insufficient security provided by single password, Korean mobile operators introduced USIM-based PKI system. We found several vulnerabilities inside the system, including private key’s RSA prime number leakage during certificate installation. We also suggest possible improvments on designing secure authentication system (Preliminary work of this paper was published previously [1]. This work was responsibly disclosed to the vendor and associated government organizations.).

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

References

  1. Park, S., Park, S., Yun, I., Kim, D., Kim, Y.: Security analysis of USIM-based certificate service in Korea. In: Conference on Information Security and Cryptography (2014)

    Google Scholar 

  2. ASi Sertifitseerimiskeskus, About SK - History. https://www.sk.ee/en/about/history/

  3. Vaata Maailma, NutiKaitse 2017. http://www.vaatamaailma.ee/en/nutikaitse

  4. KISA, Operational Programs (in Korean). http://www.rootca.or.kr/kor/hsm/hsm.jsp

  5. Laud, P., Roos, M.: Formal analysis of the estonian mobile-ID protocol. In: Jøsang, A., Maseng, T., Knapskog, S.J. (eds.) NordSec 2009. LNCS, vol. 5838, pp. 271–286. Springer, Heidelberg (2009)

    Google Scholar 

  6. Raonsecure Inc., Digital Signature System Using Mobile Device (in Korean), Patent KR 10–2013-0 065 149, 30 December 2013

    Google Scholar 

  7. Paros. http://sourceforge.net/projects/paros/

  8. Marlinspike, M.: SSLstrip. http://www.thoughtcrime.org/software/sslstrip/

  9. Android Open Source Project, Android Developers: Log. http://developer.android.com/reference/android/util/Log.html

  10. Android Open Source Project, Android Developers: logcat. http://developer.android.com/tools/help/logcat.html

  11. dex2jar. https://code.google.com/p/dex2jar/

  12. smali/baksmali. https://code.google.com/p/smali/

  13. apktool. https://code.google.com/p/android-apktool/

  14. OsmocomBB Project, SIMtrace. http://bb.osmocom.org/trac/wiki/SIMtrace

  15. Secure Element Evaluation Kit for the Android platform. https://code.google.com/p/seek-for-android/

  16. Whitten, A., Tygar, J.D.: Why Johnny can’t encrypt: a usability evaluation of PGP 5.0. In: Proceedings of the 8th USENIX Security Symposium, vol. 99, p. 16. McGraw-Hill (1999)

    Google Scholar 

  17. Themida. http://www.oreans.com/themida.php

  18. Hodges, J., Jackson, C., Barth, A.: HTTP Strict Transport Security (HSTS), RFC 6797 (Proposed Standard), Internet Engineering Task Force, November 2012. http://www.ietf.org/rfc/rfc6797.txt

  19. Android Open Source Project, Android Developers: ProGuard. http://developer.android.com/tools/help/proguard.html

  20. Android Open Source Project, Android Open Source: SIM Toolkit Application. http://www.kandroid.org/online-pdk/guide/stk.html

  21. ARM Inc., TrustZone. http://www.arm.com/products/processors/technologies/trustzone/index.php

  22. Samsung, Samsung KNOX. http://www.samsung.com/global/business/mobile/platform/mobile-platform/knox/

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Shinjo Park .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2015 Springer International Publishing Switzerland

About this paper

Cite this paper

Park, S., Park, S., Yun, I., Kim, D., Kim, Y. (2015). Analyzing Security of Korean USIM-Based PKI Certificate Service. In: Rhee, KH., Yi, J. (eds) Information Security Applications. WISA 2014. Lecture Notes in Computer Science(), vol 8909. Springer, Cham. https://doi.org/10.1007/978-3-319-15087-1_8

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-15087-1_8

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-15086-4

  • Online ISBN: 978-3-319-15087-1

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics