The preliminary analysis of the existing Open-eID architecture change design includes the formulation of system security requirements, review and verification of the protocol set in terms of fixed requirements, and the evaluation of design decisions made, and the formulation of possible alternatives.
As a first step, we need to fix the system security requirements regardless of the solution. It provided us with a framework on the basis of which we can assess the optimality of the design options of the solution design. In addition, we reviewed the protocol at the model level, mapped the security measures applied in the solution and verify their compliance with the set security requirements, and evaluated the optimality of the design choices made.
Where possible, we used formal verification of system sub-modules. The formal evidence obtained provides a stronger guarantee that the system meets the required security requirements. It is possible that there are no sub-modules in the system suitable for formal verification.
The study was commissioned by the Republic of Estonia Information System Authority.