Integrated Solutions for Secure Identity Técnicas ctiptográficas para la Protección de Datos Biométricos en el E-Passport / E-DNI f-ID Security Technologies.

Slides:



Advertisements
Similar presentations
Public Key Infrastructure and Applications
Advertisements

1 ABCs of PKI TAG Presentation 18 th May 2004 Paul Butler.
Technical Report PKI for Machine Readable Travel Documents offering ICC read-only access TAG_15 Montreal, Tom Kinneging.
Public Key Infrastructure A Quick Look Inside PKI Technology Investigation Center 3/27/2002.
Spring 2000CS 4611 Security Outline Encryption Algorithms Authentication Protocols Message Integrity Protocols Key Distribution Firewalls.
Cryptography Chapter 7 Part 4 Pages 833 to 874. PKI Public Key Infrastructure Framework for Public Key Cryptography and for Secret key exchange.
SECURITY IN E-COMMERCE VARNA FREE UNIVERSITY Prof. Teodora Bakardjieva.
Confidentiality and Privacy Controls
Cryptographic Security Presented by: Josh Baker October 9 th, CS5204 – Operating Systems.
Cryptography Usage in TWIC (Draft v4 8Dec06)
1 Pertemuan 12 Authentication, Encryption, Digital Payments, and Digital Money Matakuliah: M0284/Teknologi & Infrastruktur E-Business Tahun: 2005 Versi:
Grid Security. Typical Grid Scenario Users Resources.
Department of Information Engineering1 Major Concerns in Electronic Commerce Authentication –there must be proof of identity of the parties in an electronic.
Dr. Kim Nguyen, ECC Workshop, Bochum, , 1 Identity in the digital age Travel documents & Cryptography Dr. Kim Nguyen Bundesdruckerei GmbH, Berlin.
Lesson 12 Cryptography for E-Commerce. Approaches to Network Security Separate Security Protocol--SSL Application-Specific Security--SHTTP Security with.
Principles of Information Security, 2nd edition1 Cryptography.
Client/Server Computing Model of computing in which very powerful personal computers (clients) are connected in a network with one or more server computers.
70-293: MCSE Guide to Planning a Microsoft Windows Server 2003 Network, Enhanced Chapter 9: Planning and Managing Certificate Services.
Introduction to PKI Seminar What is PKI? Robert Brentrup July 13, 2004.
November 1, 2006Sarah Wahl / Graduate Student UCCS1 Public Key Infrastructure By Sarah Wahl.
Apr 22, 2003Mårten Trolin1 Agenda Course high-lights – Symmetric and asymmetric cryptography – Digital signatures and MACs – Certificates – Protocols Interactive.
Mar 4, 2003Mårten Trolin1 This lecture Diffie-Hellman key agreement Authentication Certificates Certificate Authorities.
Presented by Xiaoping Yu Cryptography and PKI Cosc 513 Operating System Presentation Presented to Dr. Mort Anvari.
Introduction to PKI Mark Franklin September 10, 2003 Dartmouth College PKI Lab.
Information Security of Embedded Systems : Algorithms and Measures Prof. Dr. Holger Schlingloff Institut für Informatik und Fraunhofer FIRST.
E-Government Security and necessary Infrastructures Dimitrios Lekkas Dept. of Systems and Products Design Engineering University of the Aegean
Chapter 9 Information Systems Controls for System Reliability— Part 2: Confidentiality and Privacy Copyright © 2012 Pearson Education, Inc. publishing.
Introduction to Public Key Infrastructure (PKI) Office of Information Security The University of Texas at Brownsville & Texas Southmost College.
Overview of Digital Signatures Introduction To Networks and Communications (CS 555) Presented by Bharath Kongara.
Cryptographic Security Cryptographic Mechanisms 1Mesbah Islam– Operating Systems.
Digital Signature Xiaoyan Guo/ Xiaohang Luo/
Controller of Certifying Authorities PKI Technology - Role of CCA Assistant Controller (Technology) Controller of Certifying Authorities Ministry of Communications.
31.1 Chapter 31 Network Security Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Securing Data in ePassports Policy Issues ICAO/NTWG.
Chapter 10: Authentication Guide to Computer Network Security.
Introduction to Secure Messaging The Open Group Messaging Forum April 30, 2003.
SSL / TLS in ITDS Arun Vishwanathan 23 rd Dec 2003.
E-Commerce Security Technologies : Theft of credit card numbers Denial of service attacks (System not availability ) Consumer privacy (Confidentiality.
Cryptography, Authentication and Digital Signatures
E-Commerce Security Professor: Morteza Anvari Student: Xiaoli Li Student ID: March 10, 2001.
©The McGraw-Hill Companies, Inc., 2000© Adapted for use at JMU by Mohamed Aboutabl, 2003Mohamed Aboutabl1 1 Chapter 29 Internet Security.
Risks of data manipulation and theft Gateway Average route travelled by an sent via the Internet from A to B Washington DC A's provider Paris A.
Secure Messaging Workshop The Open Group Messaging Forum February 6, 2003.
Digital Envelopes, Secure Socket Layer and Digital Certificates By: Anthony and James.
Key Management. Session and Interchange Keys  Key management – distribution of cryptographic keys, mechanisms used to bind an identity to a key, and.
Internet-security.ppt-1 ( ) 2000 © Maximilian Riegel Maximilian Riegel Kommunikationsnetz Franken e.V. Internet Security Putting together the.
Encryption. What is Encryption? Encryption is the process of converting plain text into cipher text, with the goal of making the text unreadable.
Advanced Database Course (ESED5204) Eng. Hanan Alyazji University of Palestine Software Engineering Department.
Digital Signatures, Message Digest and Authentication Week-9.
Security Many secure IT systems are like a house with a locked front door but with a side window open -somebody.
Traditional Security Issues Confidentiality –Prevent unauthorized access or reading of information Integrity –Insure that writing or operations are allowed.
Lecture 11 Overview. Digital Signature Properties CS 450/650 Lecture 11: Digital Signatures 2 Unforgeable: Only the signer can produce his/her signature.
Chapt. 10 – Key Management Dr. Wayne Summers Department of Computer Science Columbus State University
Trusted identities | secure transactions™
CRYPTOGRAPHY Cryptography is art or science of transforming intelligible message to unintelligible and again transforming that message back to the original.
Nikita Maria Department of Applied Informatics University of Macedonia - Greece.
TAG Presentation 18th May 2004 Paul Butler
Key management issues in PGP
Technical Report PKI for
Security Outline Encryption Algorithms Authentication Protocols
Grid Security.
Computer Communication & Networks
TAG Presentation 18th May 2004 Paul Butler
Technical Report PKI for
The Secure Sockets Layer (SSL) Protocol
e-Security Solutions Penki Kontinentai Vladas Lapinskas
Presentation transcript:

Integrated Solutions for Secure Identity Técnicas ctiptográficas para la Protección de Datos Biométricos en el E-Passport / E-DNI f-ID Security Technologies GmbH Dr. Yuri Grigorenko, Biometria 2007, Buenos-Aires, Dr. Yuri Grigorenko Nov 07’

Services About US Basic Cryptography PKI & ePassports Best Practices f-ID Security Technologies GmbH Dr. Yuri Grigorenko, Biometria 2007, Buenos-Aires, In an Nutshell is a security consultancy company and OEM solution provider specializing in the field of identity management is based on a managing team of IT veterans with a combined experience of over 30 years in the smart card business and information security sector provides a wide portfolio of consulting services and integrated solutions in the field of identity security for governments worldwide Integrated Solutions for Secure Identity Contact US

In an Nutshell About US Basic Cryptography PKI & ePassports f-ID Security Technologies GmbH Dr. Yuri Grigorenko, Biometria 2007, Buenos-Aires, We focus on the combination of Identity Management with IT Security Technologies  Smart Cards  Public Key Infrastructure  Hardware Security Modules Our services include:  Threat analysis  Technological gaps identification  Available products survey and QA  Provision of tailored technological solutions  Second-tier technical support  Training program s Integrated Solutions for Secure Identity Best Practices Contact US Services

CertificatesTrust ModelsDigital SignatureSigning ProcessEncryption ProcessHash FunctionsSymmetric vs. AsymmetricEncryption Basics Basic Cryptography About Us PKI & ePassports f-ID Security Technologies GmbH Dr. Yuri Grigorenko, Biometria 2007, Buenos-Aires, Encrypting a message is like locking your house An encryption algorithm ~ Lock mechanism An encryption key ~ Lock key / combination Lock Integrated Solutions for Secure Identity Best Practices Contact US

Lock About US Basic Cryptography PKI & ePassports f-ID Security Technologies GmbH Dr. Yuri Grigorenko, Biometria 2007, Buenos-Aires, A riddle: How do two people lock a room without sharing the secret code? A hint: skcol owt esU ! Symmetric - same key Asymmetric - public and private keys Lock CertificatesTrust ModelsDigital SignatureSigning ProcessEncryption ProcessHash FunctionsEncryption BasicsSymmetric vs. Asymmetric Integrated Solutions for Secure Identity Best Practices Contact US

About US Basic Cryptography PKI & ePassports f-ID Security Technologies GmbH Dr. Yuri Grigorenko, Biometria 2007, Buenos-Aires, A function that digests the message and provides a unique (and short) representation Irreversible Public algorithms Yuri Marcel To: Marcel CC: Yuri From: Yuri This is the original message Hash To: Marcel CC: Yuri From: Yuri This is the original message ADS#$#$%3ffr4 Hash ? CertificatesTrust ModelsDigital SignatureSigning ProcessEncryption ProcessEncryption BasicsSymmetric vs. AsymmetricHash Functions Integrated Solutions for Secure Identity Best Practices Contact US

About US Basic Cryptography PKI & ePassports f-ID Security Technologies GmbH Dr. Yuri Grigorenko, Biometria 2007, Buenos-Aires, Symmetric / Asymmetric Confidentiality Yuri To: Marcel CC: Yuri From: Yuri This is a secret message Encryption To: Marcel CC: Yuri From: Yuri SDF#$%8SDFD Decryption Marcel’s public key Marcel’s private key CertificatesTrust ModelsDigital SignatureSigning ProcessEncryption BasicsSymmetric vs. AsymmetricHash FunctionsEncryption Process Integrated Solutions for Secure Identity Best Practices Contact US Marcel Same mutual key

About US Basic Cryptography PKI & ePassports f-ID Security Technologies GmbH Dr. Yuri Grigorenko, Biometria 2007, Buenos-Aires, Asymmetric Authenticity Yuri To: Marcel CC: Yuri From: Yuri This is an authenticated message Encryption To: Marcel CC: Yuri From: Yuri SDF#$%8SDFD Decryption Yuri’s private key Yuri’s public key CertificatesTrust ModelsDigital SignatureEncryption BasicsSymmetric vs. AsymmetricHash FunctionsEncryption ProcessSigning Process Integrated Solutions for Secure Identity Best Practices Contact US Marcel

About US Basic Cryptography PKI & ePassports f-ID Security Technologies GmbH Dr. Yuri Grigorenko, Biometria 2007, Buenos-Aires, Yuri Marcel To: Marcel CC: Yuri From: Yuri This is a signed message Encryption To: Marcel CC: Yuri From: Yuri This is a signed message SDF#$%8SDFD Decryption Yuri’s private key Yuri’s public key Hash AD4543$%DF Hash AD4543$%DF ? CertificatesTrust ModelsEncryption BasicsSymmetric vs. AsymmetricHash FunctionsEncryption ProcessSigning ProcessDigital Signature Integrated Solutions for Secure Identity Best Practices Contact US

About US Basic Cryptography PKI & ePassports f-ID Security Technologies GmbH Dr. Yuri Grigorenko, Biometria 2007, Buenos-Aires, Yuri Marcel Yuri’s public key K pu = 0xff132483ab FFK$#%5534FSAB To: Marcel CC: Yuri From: Yuri This is a signed message SDF#$%8SDFD CertificatesEncryption BasicsSymmetric vs. AsymmetricHash FunctionsEncryption ProcessSigning ProcessDigital SignatureTrust Models Q: How does Marcel know that Yuri’s (K pu,K pr ) wasn’t forged ? A: It has to be digitally signed by someone Marcel trusts (TTP)! Encrypt with trusted party K pr Decrypt with trusted party K pu Hash ? GR%3HJT$6 Integrated Solutions for Secure Identity Best Practices Contact US

About US Basic Cryptography PKI & ePassports f-ID Security Technologies GmbH Dr. Yuri Grigorenko, Biometria 2007, Buenos-Aires, Yuri’s public key K pu = 0xff132483ab98 additional information Issuer, Validity, privileges… FFK$#%5534FSAB Encryption BasicsSymmetric vs. AsymmetricHash FunctionsEncryption ProcessSigning ProcessDigital SignatureTrust ModelsCertificates X.509 Certificate Standard Card Verifiable Certificates Hash signed by a trusted party Integrated Solutions for Secure Identity Best Practices Contact US

Active AuthenticationExtended Access ControlBasic Access Control PA Trust LevelsPassive AuthenticationLogical Data Structure Basic Cryptography About Us PKI & ePassports f-ID Security Technologies GmbH Dr. Yuri Grigorenko, Biometria 2007, Buenos-Aires, What should we protect? Authenticity of personal data Privacy of personal and biometric data Passport uniqueness An ICAO TAG/MRTD recomendation General Passive Authentication Basic Access Control Extended Access Control Active Authentication Integrated Solutions for Secure Identity Best Practices Contact US

Active Authentication Basic Cryptography About Us PKI & ePassports f-ID Security Technologies GmbH Dr. Yuri Grigorenko, Biometria 2007, Buenos-Aires, Logical Data Structure: Mandatory - personal details, face picture, digital signature. Optional - Fingerprint, iris, signature picture… Data group 1 (MRZ) Data group 2 (Encoded Face) Data group 3 (Encoded Finger) Data group 4 (Encoded IRIS) Data group 5 (Displayed Face) Data group 6 (Future Use) Data group 7-15 Data group 16 (Persons to notify) LDS Extended Access ControlBasic Access Control PA Trust LevelsPassive AuthenticationGeneralLogical Data Structure Integrated Solutions for Secure Identity Best Practices Contact US

Active AuthenticationGeneral Basic Cryptography About Us PKI & ePassports f-ID Security Technologies GmbH Dr. Yuri Grigorenko, Biometria 2007, Buenos-Aires, Data group 1 (MRZ) Data group 2 (Encoded Face) Data group 3 (Encoded Finger) Data group 4 (Encoded IRIS) Data group 5 (Displayed Face) Data group 6 (Future Use) Data group 7-15 Data group 16 (Persons to notify) LDSSO D Hash DG_1 Hash DG_2 Hash DG_5 Digital Signature Protects against data alternation: Personal data Hash values Extended Access ControlBasic Access Control PA Trust LevelsLogical Data StructurePassive Authentication Only issuer could have signed this passport! Integrated Solutions for Secure Identity Best Practices Contact US

Active AuthenticationGeneral Basic Cryptography About Us PKI & ePassports f-ID Security Technologies GmbH Dr. Yuri Grigorenko, Biometria 2007, Buenos-Aires, DSCA Environments CSCA Environment HSM Backup HSM CA managemen t software HSM Backup HSM Document Signer Software Personalization equipment DB ePassport Management System Extended Access ControlBasic Access ControlPassive AuthenticationLogical Data Structure PA Trust Levels 2 level PKI Integrated Solutions for Secure Identity Best Practices Contact US

Active Authentication Basic Cryptography About Us PKI & ePassports f-ID Security Technologies GmbH Dr. Yuri Grigorenko, Biometria 2007, Buenos-Aires, Extended Access ControlGeneralLogical Data StructurePassive Authentication PA Trust LevelsBasic Access Control Who can read my personal and biometric data? Skimming - secretly reading the data from small distance Eavesdropping - passive observation of “legal” communication Solution: If I can see your passport - I am allowed to read it! Establishment of a symmetric encryption key based on the optically readable MRZ, thus encrypting the connection between the passport and the reader P<D<< GRIGORENKO<YURI<<<< D<<123M <<<<<0 Symmetric key establishment Hash ENCRYPTION Integrated Solutions for Secure Identity Best Practices Contact US

Active Authentication Basic Cryptography About Us PKI & ePassports f-ID Security Technologies GmbH Dr. Yuri Grigorenko, Biometria 2007, Buenos-Aires, GeneralLogical Data StructurePassive Authentication PA Trust LevelsBasic Access ControlExtended Access Control Only a face picture is a mandatory biometric data! Additional biometric data must be protected from unauthorized access Number of possible cryptographic solutions: Data encryption using dedicated Master Key(s), as well as additional information (such as MRZ details) Inspection system authorization, introducing additional PKI scheme (CVCA, DVCA, IS). A reader must be digitally verified in order to read sensitive data from the passport Issuing country is always in control: sharing of secret keys, signing certificates… Integrated Solutions for Secure Identity Best Practices Contact US

General Basic Cryptography About Us PKI & ePassports f-ID Security Technologies GmbH Dr. Yuri Grigorenko, Biometria 2007, Buenos-Aires, Data group 1 (MRZ) Data group 2 (Encoded Face) Data group 3 (Encoded Finger) Data group 4 (Encoded IRIS) Data group 5 (Displayed Face) Data group 6 (Future Use) Data group 7-14 Data group 15 (AA Public Key) LDSSO D Hash DG_1 Hash DG_2 Hash DG_5 Digital Signature Protects against data coping: AA private key is secretly stored on chip and is unreadable A challenge-response protocol Data group 16 (Persons to notify) Hash DG_15 AA Private Key Logical Data StructurePassive Authentication PA Trust LevelsBasic Access ControlExtended Access ControlActive Authentication Integrated Solutions for Secure Identity Best Practices Contact US

Questions Basic Cryptography About Us PKI & ePassports f-ID Security Technologies GmbH Dr. Yuri Grigorenko, Biometria 2007, Buenos-Aires, Integrated Solutions for Secure Identity Best Practices Contact US Modern cryptographic techniques, e.g. PKI provide the suitable framework for protection of sensitive biometrical data Deployment of a Public Key Infrastructure, being a highly complicated issue combining delicate technological aspects, requires unique specialization Being the heart part of your e-passport security, it is highly recommended to treat the Public Key Infrastructure separately from the deployment of the passport production system We offer our clients an integrated PKI solutions to fit their passport production process Best Practices

Basic Cryptography About Us PKI & ePassports f-ID Security Technologies GmbH Dr. Yuri Grigorenko, Biometria 2007, Buenos-Aires, Integrated Solutions for Secure Identity Best Practices Contact US Best PracticesQuestions

Basic Cryptography About Us PKI & ePassports f-ID Security Technologies GmbH Dr. Yuri Grigorenko, Biometria 2007, Buenos-Aires, Visit Us: Rosa Hoffman Strasse 33 A-5020 Salzburg, Austria Call Us: Us: Integrated Solutions for Secure Identity Best Practices Contact US