JLR, Tozny, and DHS Isaac Potoczny-Jones

Slides:



Advertisements
Similar presentations
Smart Certificates: Extending X.509 for Secure Attribute Service on the Web October 1999 Joon S. Park, Ph.D. Center for Computer High Assurance Systems.
Advertisements

Authentication Applications. will consider authentication functions will consider authentication functions developed to support application-level authentication.
A responsibility based model EDG CA Managers Meeting June 13, 2003.
Public Key Management and X.509 Certificates
Report on Attribute Certificates By Ganesh Godavari.
Authentication Cristian Solano. Cryptography is the science of using mathematics to encrypt and decrypt data. Public Key Cryptography –Problems with key.
Public Key Infrastructure (PKI) Providing secure communications and authentication over an open network.
Public Key Management Brent Waters. Page 2 Last Time  Saw multiple one-way function candidates for sigs. OWP (AES) Discrete Log Trapdoor Permutation.
Public Key Distribution and X.509 Wade Trappe. Distribution of Public Keys There are several techniques proposed for the distribution of public keys:
Copyright © Clifford Neuman - UNIVERSITY OF SOUTHERN CALIFORNIA - INFORMATION SCIENCES INSTITUTE CSci530: Computer Security Systems Authentication.
CAMP - June 4-6, Copyright Statement Copyright Robert J. Brentrup and Mark J. Franklin This work is the intellectual property of the authors.
Computer Science Public Key Management Lecture 5.
14 May 2002© TrueTrust Ltd1 Privilege Management in X.509(2000) David W Chadwick BSc PhD.
Digital Certificates Public Key Deception Digital Certificates Certificate Authorities Public Key Infrastructures (PKIs)
Digital Certificates With Chuck Easttom. Digital Signatures  Digital Signature is usually the encryption of a message or message digest with the sender's.
Part Two Network Security Applications Chapter 4 Key Distribution and User Authentication.
Cryptography and Network Security Chapter 14 Fifth Edition by William Stallings Lecture slides by Lawrie Brown.
Sanzi-1 CSE5 810 CSE5810: Intro to Biomedical Informatics Dynamically Generated Adaptive Credentials for Health Information Exchange Eugene Sanzi.
02/22/2005 Joint Seminer Satoshi Koga Information Technology & Security Lab. Kyushu Univ. A Distributed Online Certificate Status Protocol with Low Communication.
Chapter 9: Using and Managing Keys Security+ Guide to Network Security Fundamentals Second Edition.
In-Band Access Control Framework Group Name: WG4 SEC Source: Qualcomm Meeting Date: Agenda Item:
SECURITY MANAGEMENT Key Management in the case of public-key cryptosystems, we assumed that a sender of a message had the public key of the receiver at.
10. Key Management. Contents Key Management  Public-key distribution  Secret-key distribution via public-key cryptography.
National Institute of Advanced Industrial Science and Technology Brief status report of AIST GRID CA APGridPMA Singapore September 16 Yoshio.
Digital Signatures A Brief Overview by Tim Sigmon April, 2001.
Revocation in MICS §4.4 May 11-13, 2009 Zürich, Switzerland.
CMSC 414 Computer and Network Security Lecture 16 Jonathan Katz.
Insert Your Name Insert Your Title Insert Date Client Registration Open Issues Update 5/27/2011 Denis Pochuev (original proposal by Alan Frindell)
HEPSYSMAN UCL, 26 Nov 2002Jens G Jensen, CLRC/RAL UK e-Science Certification Authority Status and Deployment.
Who’s watching your network The Certificate Authority In a Public Key Infrastructure, the CA component is responsible for issuing certificates. A certificate.
Security fundamentals Topic 5 Using a Public Key Infrastructure.
Key Management. Authentication Using Public-Key Cryptography  K A +, K B + : public keys Alice Bob K B + (A, R A ) 1 2 K A + (R A, R B,K A,B ) 3 K A,B.
WLCG Authentication & Authorisation LHCOPN/LHCONE Rome, 29 April 2014 David Kelsey STFC/RAL.
December 14, 2000Securely Available Credentails (SACRED) - Framework Draft 1 Securely Available Credentials (SACRED) Protocol Framework, Draft Specification.
1 Chapter 3-3 Key Distribution. 2 Key Management public-key encryption helps address key distribution problems have two aspects of this: –distribution.
Supports the development & implementation of a IPPC Global ePhyto Hub to: Utilize modern Cloud technology. Ensure there is a secure folder for each countries’
 Attacks and threats  Security challenge & Solution  Communication Infrastructure  The CA hierarchy  Vehicular Public Key  Certificates.
Academia Sinica Grid Computing Certification Authority F2F interview (Malaysia )
Cryptography and Network Security Chapter 14 Fifth Edition by William Stallings Lecture slides by Lawrie Brown.
AAVS Middleware Security Group Bob Cowles CERN – September 14, 2005.
and File Security With GnuPG Matt Brodeur
Application Authentication using Azure AD
Key management issues in PGP
Alternative Governance Models for PKI
Trust Profiling for Adaptive Trust Negotiation
Computer and Network Security
Chapter 5 Network Security Protocols in Practice Part I
Cryptography and Network Security
Timeline - ATIS Involvement
EDC Process Proposal Brian Brandaw Manager of IT Common Platforms
Cryptography and Network Security
Authentication.
Assignment #5 – Solutions
Authentication Applications
THE STEPS TO MANAGE THE GRID
Chris Wendt, David Hancock (Comcast)
Timeline - ATIS Involvement
KMIP Client Registration Ideas for Discussion
Update on EDG Security (VOMS)
Using SSL – Secure Socket Layer
Public-Key Certificates
SSL (Secure Socket Layer)
CS 465 Certificates Last Updated: Oct 14, 2017.
Certificates An increasingly popular form of authentication
Architecture Competency Group
刘振 上海交通大学 计算机科学与工程系 电信群楼3-509
Microsoft Ignite NZ October 2016 SKYCITY, Auckland.
Kai Bu 05 Secure Connection The topic to be covered this week is secure connection. Apparently, the.
刘振 上海交通大学 计算机科学与工程系 电信群楼3-509
Cryptography and Network Security
Presentation transcript:

JLR, Tozny, and DHS 2016-05-18 Isaac Potoczny-Jones ijones@tozny.com http://tozny.com

Design Approach Standards: Existing open standards wherever possible Best practices where open standards aren’t available Level of detail: Overall approach agreed on for the purpose of proposal Low level and detailed design once funding is available

Initial ideas to spur discussion and surface requirements About Straw Man Ideas: Caveats Initial ideas to spur discussion and surface requirements You’ve already done a lot of thinking about this! We may be duplicating your ideas We might misunderstand your needs We may be suggesting things you’ve already rejected

Straw Man for User Auth

User Auth and Onboarding Goals Flexible for verification approaches Email, SMS, in-person, in-vehicle Flexible for authentication approaches Key-based, password-based, etc. Support multiple key authorities Decentralized identity management Demo system with easy to use, password-free experience Onboarding with SMS and login with keys

User Authentication Focus on IdM, not just authentication OpenID Connect (OIDC) Lean on OIDC to build a standard approach to IdM OIDC is widely deployed and well understood It’s flexible enough to support a wide variety of auth Specify a set of attributes that are required for use cases Attesting authority (e.g. JLR, others) User unique identifier (e.g. unique ID) User verified attributes (e.g. phone number) How attributes verified (e.g. SMS one-time password)

Agenda

Straw Man for Key Exchange

Disconnected Claim & Key Exchange Between 2 phones, between phone & vehicle, etc. Protected resource has public/private key pair Use JWTs as claims signed by protected resource Vehicle can create a “claim” - signed by private key Not by identity – any entity carrying claim has authz Claim can be used to enroll identity

Disconnected Claim Exchange Example 1a. Vehicle signs “unlock doors” claim – sends to phone 1b. Owner signs “operate vehicle” claim – sends to phone 2. Friend can now operate vehicle

Disconnected Key Exchange Example Vehicle signs “enroll key” claim Phone sends claim along with public key (now has identity) Vehicle signs key and returns it

Straw Man for CRLs

Vehicle is parked for an extended period without net connection Certificate Revocation List - Problems Vehicle is parked for an extended period without net connection De-authorized friend’s Key Owner authorizes friend to operate vehicle Owner revokes friend’s authorization Friend can still operate vehicle because its CRL isn’t updated Compromised root key Attacker signs their own key to operate the vehicle Key is revoked, but CRL in vehicle isn’t updated Attacker can still operate vehicle

Certificate Revocation List - Approach CRL is signed by root cert and signature is updated daily CRLs can include root and per-vehicle / protected resource keys Phone connects periodically and receives relevant CRLs CRL expires after fixed time window (e.g. 1 week) Phone relays CRL to vehicle from various authenticated actions If phone has been connected within window, CRL is updated Example Owner authorizes friend to operate (disconnected) vehicle Owner revokes authorization, friend’s key added to CRL Friend’s phone connects and gets CRL Authenticated action includes revocation for its own key!

Thank You! Isaac Potoczny-Jones ijones@tozny.com http://tozny.com