Skip to content

tomkabel/skid-security-research

Repository files navigation

Smart-ID Security Research of electronic identification security

A technical analysis in the context of Estonian digital identity infrastructure.


Overview

This repository contains security research examining authentication architectures, vulnerability patterns, and regulatory compliance considerations for electronic identification systems. The research focuses on technical analysis of Smart-ID as a case study for examining broader questions in trust service provider security.


Research Focus Areas

Technical Analysis

  • Cryptographic origin binding in cross-device authentication flows
  • QR-based authentication security models
  • Comparison with FIDO2/WebAuthn standards
  • Man-in-the-middle attack vectors in out-of-band authentication

Regulatory Framework

  • eIDAS Regulation (EU) 910/2014 compliance requirements
  • NIST SP 800-63-4 authentication assurance levels
  • GDPR data protection obligations for trust service providers
  • Estonian EUTS implementation requirements

Strategic Considerations

  • Migration paths from proprietary authentication to standards-based solutions
  • Public awareness effectiveness in fraud mitigation
  • Liability frameworks for relying parties

Repository Structure

.
├── 01-core-analysis/              # Primary technical research
├── 02-opinion-editorials/         # External analysis and commentary
├── 03-technical-analysis/         # Implementation guidance
├── 04-supplementary-research/     # Supporting research materials
├── 07-regulatory-reference/       # Laws, acts, and regulations
└── README.md

Key Findings

Authentication Security

The research examines how cross-device authentication flows handle cryptographic binding between the browser session and the mobile authenticator. Key technical considerations include:

  1. Origin Binding: Cryptographic binding of authentication credentials to the specific relying party origin
  2. Channel Binding: Linking the authentication operation to the underlying TLS session
  3. User Intent Verification: Mechanisms to verify user presence and intent beyond passive confirmation

Standards Alignment

Comparison with established standards reveals areas where current implementations may diverge from industry best practices:

  • FIDO2/WebAuthn provides cryptographic origin binding at the protocol level
  • NIST SP 800-63-4 defines phishing resistance requirements for Authenticator Assurance Level 3
  • eIDAS Article 24 requires trust service providers to use trustworthy systems

Regulatory Considerations

Relevant regulatory instruments include:

  • eIDAS Regulation: Requirements for qualified trust service providers
  • GDPR Articles 25 & 32: Data protection by design and security of processing
  • Estonian EUTS: National implementation of eIDAS requirements

Recommendations

For Service Providers

  1. Implement cryptographic origin binding for high-assurance authentication
  2. Evaluate FIDO2/WebAuthn as standards-based alternatives
  3. Conduct regular security assessments aligned with NIST frameworks

For Policymakers

  1. Clarify liability frameworks for authorized push payment fraud
  2. Establish minimum security requirements beyond visual verification
  3. Align national requirements with EU eIDAS implementation guidance

Methodology

The research employs standard security analysis methodologies including:

  • Comparative standards analysis
  • Architecture review against established frameworks
  • Offensive security testing in controlled environments

References

  • NIST SP 800-63-4 (Digital Identity Guidelines)
  • FIDO Alliance Phishing-Resistant Authentication Standards
  • eIDAS 2.0 / EUDI Wallet Architecture Reference Framework
  • ENISA Cybersecurity Guidelines for Trust Services

Disclaimer

This research is provided for educational and informational purposes. All findings have been disclosed through appropriate responsible disclosure channels.


Security Researcher
This repository represents independent security research.

About

A Case Study in Negating Smart-ID+ "Enhanced" Anti-MiTM Measures via Dynamic BITB and Exploiting Missing Origin Binding Architectural Gap to Aggregate Data

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

 
 
 

Contributors