Update on WS eAuthentication status Jan van Arkel Co-Chairman eEurope Smart Card Charter Ambassador CEN/ISSS WS eAuthentication.

Slides:



Advertisements
Similar presentations
Universal Electronic Signatures Tarvi Martens ESTONIA.
Advertisements

1 ABCs of PKI TAG Presentation 18 th May 2004 Paul Butler.
European Electronic Identity Practices Country Update of Finland Speaker: Päivi Pösö Date:
Public Key Infrastructure A Quick Look Inside PKI Technology Investigation Center 3/27/2002.
Practical Digital Signature Issues. Paving the way and new opportunities. Juan Carlos Cruellas – DSS-X co-chair Stefan Drees - DSS-X.
Digital Identity Group May GIXEL  GIXEL is the professional association of electronic component and system industries in France. It brings together.
Telia Research AB György Endersz European Electronic Signature Standardisation Initiative EESSI Budapest Seminar at the Hungarian Communication.
Policy interoperability in electronic signatures Andreas Mitrakas EESSI International event, Rome, 7 April 2003.
© Southampton City Council Sean Dawtry – Southampton City Council The Southampton Pathfinder for Smart Cards in public services.
1 1 A Synopsis of Federal Information Processing Standard (FIPS) 201 for Personal Identity Verification (PIV) of Federal Employees and Contractors Presentation.
Setting Processes for Electronic Signature 1 The ”W-SPES Project” and the “Leuven Report on the Electronic Signatures Directive” – Putting the Project.
FIPS 201 Personal Identity Verification For Federal Employees and Contractors National Institute of Standards and Technology Information Technology Laboratory.
European Electronic Identity Practices Country Update of …………… Speaker: Date:
European Electronic Identity Practices Country Update of Belgium Speaker: Maes F. Date: 25 May 2005.
1st Expert Group Meeting (EGM) on Electronic Trade-ECO Cooperation on Trade Facilitation May 2012, Kish Island, I.R.IRAN.
Certification Authority. Overview  Identifying CA Hierarchy Design Requirements  Common CA Hierarchy Designs  Documenting Legal Requirements  Analyzing.
PKI Implementation in the Real World
Update on European Citizen Card: Part 4 Kristina Unverricht Consumer Council of DIN, Germany Chairperson of ANEC Information Society Working Group October.
ESign-Online Digital Signature Service February 2015 Controller of Certifying Authorities Department of Electronics and Information Technology Ministry.
Jaroslav Pinkava May 2001 Certification Authority in Praxis. Security Aspects. Conference Security and Protection of Information Ing. Jaroslav Pinkava,
Implementation of Electronic Signature Law Kęstutis Andrijauskas Information Society Development Committee under the Government of the Republic.
1 Bridge/Gateway CA Project Status Gzim OCAKOGLU European Commission – DG ENTR / IDABC Reykjavik – 27 May 2005.
HIT Standards Committee: Digital Certificate Trust – Policy Question for HIT Policy Committee March 29, 2011.
Respecting Privacy in Global Networks/ Guernsey, Wednesday 11 th April, Paula Ortiz López Spanish Data Protection Agency.
Joint workshop of Porvoo and GCF hosted by the Porvoo 7 meeting May , Reykjavik, Iceland moderated by Jan van Arkel, co–chair Porvoo acting chair.
Information security An introduction to Technology and law with focus on e-signature, encryption and third party service Yue Liu Feb.2008.
Federal Information Processing Standard (FIPS) 201, Personal Identity Verification for Federal Employees and Contractors Tim Polk May.
European Electronic Identity Practices Country Update of Norway Speaker: Sverre Bauck Date:
Introduction to PKI Seminar What is PKI? Robert Brentrup July 13, 2004.
E-Government Security and necessary Infrastructures Dimitrios Lekkas Dept. of Systems and Products Design Engineering University of the Aegean
Geneva, Switzerland, September 2014 Introduction of ISO/IEC Identity Proofing Patrick Curry Director, British Business Federation Authority.
TrustPort Public Key Infrastructure. Keep It Secure Table of contents  Security of electronic communications  Using asymmetric cryptography.
Key Management Guidelines. 1. Introduction 2. Glossary of Terms and Acronyms 3. Cryptographic Algorithms, Keys and Other Keying Material 4. Key Management.
European Electronic Identity Practices Country Update of Spain Date: 26 May 2005.
National Smartcard Project Work Package 8 – Security Issues Report.
COUNTRY XXX European Electronic Identity Practices Country Update of XXX Speaker: Date: 11 May 2006.
European Electronic Identity Practices Country Update of Austria Peter F Brown Office of the CIO, Austrian Federal Chancellery Chair, CEN eGov Focus Group.
Securing Data in ePassports Policy Issues ICAO/NTWG.
Vilnius, October 21st, 2002 © eEurope SmartCards Securing a Telework Infrastructure: Smart.IS - Objectives and Deliverables Dr. Lutz Martiny Co-Chairman,
8 Nob 06 / CEN/ISSS ETSI STF 305: Procedures for Handling Advanced Electronic Signatures on Digital Accounting CEN/ISSS Workshop.
Secure Electronic Transaction (SET)
Harmonisation of electronic Identities for the European Citizen Jan van Arkel, co- chair Porvoo group, May 11, 2006 Ljubljana.
Cryptography and Network Security Chapter 14 Fifth Edition by William Stallings Lecture slides by Lawrie Brown.
Introduction to Secure Messaging The Open Group Messaging Forum April 30, 2003.
Conformity Assessment and Accreditation Mike Peet Chief Executive Officer South African National Accreditation System.
Special Publication : Interfaces for Personal Identity Verification Jim Dray NIST NPIVP Workshop March 3, 2006.
Introduction to Secure Messaging Issues Russ Chung, American Eagle Group The Open Group Messaging Forum July 24, 2003.
Certificate-Based Operations. Module Objectives By the end of this module participants will be able to: Define how cryptography is used to secure information.
The Porvoo Group Tapio Aaltonen Director, CA-services, co- chair Porvoo Group Population Register Centre Finland.
Riccardo Genghini - Ws E-Sign Chairman – IETF PKIX San Francisco March Electronic Signature infrastructure for Europe Riccardo Genghini Cen/Isss.
1 UNECE Capacity Building Workshop on Trade Facilitation Implementation: October 2004 Electronic PostMark (EPM) Security & Authentication for eTrade Documents.
28 th International Traffic Records Forum Biometrics/SmartCard Workshop 28 th International Traffic Records Forum August 4, 2002 Orlando, Florida.
European Electronic Identity Practices CEN TC224 WG15 European Citizen Card Standard Speaker: L. Gaston AXALTO Date: 26 May 05.
© 2003 The MITRE Corporation. All rights reserved For Internal MITRE Use Addressing ISO-RTO e-MARC Concerns: Clarifications and Ramifications Response.
EESSI June 2000Slide 1 European Electronic Signature Standardization Hans Nilsson, iD2 Technologies, Sweden.
DIGITAL SIGNATURE.
European Electronic Identity Practices Country Update of Estonia Speaker: Ivar Jung Date:
Harmonised use of accreditation for assessing the competence of various Conformity Assessment Bodies Dr Andreas Steinhorst, EA ERA workshop 13 April 2016,
The Federal E-Authentication Initiative David Temoshok Director, Identity Policy GSA Office of Governmentwide Policy February 12, 2004 The E-Authentication.
Digital Certificates Presented by: Matt Weaver. What is a digital certificate? Trusted ID cards in electronic format that bind to a public key; ex. Drivers.
Frank Schipplick Work Package Coordinator WP1 - eSignatures.
TAG Presentation 18th May 2004 Paul Butler
Securing Data in ePassports
TAG Presentation 18th May 2004 Paul Butler
Public Key Infrastructure (PKI)
Securing Data in ePassports
European Citizens’ Initiative, Commission regulation proposal Focus on IT aspects Jérôme Stefanini DIGIT.B.2 05/06/2018.
PKI (Public Key Infrastructure)
E-identities (and e-signatures)
Presentation transcript:

Update on WS eAuthentication status Jan van Arkel Co-Chairman eEurope Smart Card Charter Ambassador CEN/ISSS WS eAuthentication

 consolidate OSCIE eAuthentication GIF content and search for maintenance  offer a European Forum on eAuthentication  seek wider involvement and consensus  harmonise eAut with Japan and US  harmonise eAut with WS e-sign i.e. Area K  harmonise with eEpoch development  relate with Porvoo group eGov/eID requirements  prepare a harmonised Glossary of Terms Objectives of the Workshop eAuthentication/eID

 CWA eAut Part 1: Architecture for a European interoperable eID system within a smart card infrastructure  CWA eAut Part 2: Best Practice Manual for card scheme operators exploiting a multi-application card scheme incorporating interoperable IAS services  CWA eAut Part 3: User Requirements for a European interoperable eID system within a smart card infrastructure  WP 4: eID Strategic Vision Report Deliverables of WSeAut

 The WS started September 16, 2003  Draft CWA documents were approved (with some comments) on September 20, 2004  Revised drafts distributed for 60 days public comment period on October 18, 2004  Disposition of comments ready by December 31  Final documents distributed by January 15, 2005  Workshop closing meeting on February 11, 2005  Official publication of CWA eAuthentication by CEN Status WS eAut

 CWA eAut Part 1: Architecture for a European interoperable eID system within a smart card infrastructure Deliverables of WSeAut Table of Content  Introduction  Contextual Model for IAS interoperability  Conceptual model for IAS interoperability  The IAS functional model  IAS system architecture  The functional model in the IAS system architecture  High level description of the primary processes - formal description  IAS interoperability  Securing interoperability  Common requirements for IAS interoperability  Annex A Mandatory fields in certificates

content e-Service access card access IAS / eID card application certificate content e-Service access card access IAS / eID card application certificate on us not on us Closed eID scheme

content e-Service access card access IAS / eID card application certificate content e-Service access card access IAS / eID card application certificate on us not on us IOP #3 IOP #2 eService interoperability

IAS Smart card information system architecture

 CWA eAut Part 2: Best Practice Manual for card scheme operators exploiting a multi-application card scheme incorporating interoperable IAS services Deliverables of WSeAut Table of Content  Multi-application smart card schemes (including Government issued eID driven MA Schemes)  Risk analysis and Policy management  Service implementation and legal /adminstrative guidelines  Business case analysis  Peer support mechanisms and recommendations

 CWA eAut Part 3: User Requirements for a European interoperable eID system within a smart card infrastructure Deliverables of WSeAut Table of Content  General User requirements for smart card based systems - common elements in support of user req - doing things with a smart card - doing things to a smart card  User requirements for Authenticatioin within an eID system - identification - authentication - signature services - eID processes

 Strategic eID Vision report Table of Content  The Vision - Rationale for a common eID approach - Drivers and inhibirtors for a common apporach  How can the vision be realised  Conditions for mass deployment - minimum requirements - Architectural model - The legal issue - Standardisation  Deployment of eID in Europe and beyond  Recommendations Deliverables of WSeAut

Deployment of eID  Group 1: the no-not for us- group  Group 2: Early adopters  Group 3: Middle of the road group

 Group 1: the no-not for us- group Anglo-saxon countries - US - Canada - Australia - New Zealand - UK ??? Deployment of eID

 Group 2: Early adopters Malaysia South East Asia Middle East Japan

Deployment of eID  Group 3: Middle of the road group Europe China, India South America Africa

Europe’s leading examples  Estonia 650K  Italy 400K  Belgium 85K  Finland 55K  Spain  Austria

eID deployment worldwide  Overall conclusions: - strong regional differences - a number of European countries is on the move - smart cards prevail - PIN is omnipresent, biometrics are emerging as preferred CHV - PKI is taking off - patchy solutions

 Approach eID as an infrastructure which needs to come into place at least in the European domain  Provide a legal basis for a common European eID  Organise a stronger participation in Standardisation  Organise a pan-European demonstrator  European Coordination on eID development is needed Recommendations

Common Requirements (WS-eAut, CEN 224-WG 15, Porvoo group)

 electronic identification & authentication of the cardholder to public and private services  electronic signature for legal proof of non repudiation Optional functions:  confidentiality services, enabling encryption of data transmitted over a network ( , documents transfer)  official travel document Basic Functionalities

 The system shall support different security profiles/classes  The system shall be trustworthy for the cardholder, the system as such shall be reliable and it shall protect the cardholders data present in the card  The IAS functionality shall be executed in a secure and controllable way  The execution of the eID and eAuthentication function shall be convenient and fast  The system shall be future proof: - based on international standards (ISO/IEC 7810, 7816, ISO/IEC 14443, JavaCard/GP, ISO/IEC (ICAO) - post issuance secure updating of data as well as application downloading supported as an option - Multi-vendor support Overall system requirements

 The system shall support a secure and reliable cardholder identification function:  Personal data of the cardholder shall be held in an electronic form  The Personal data set shall contain as a minimum for interoperability: - (optional) national identification number - family name(s), given name - sex - date of birth - (optional) place of birth - (optional) nationality This file is (optionally) PIN/Biometric protected  The Card related data set shall contain as a minimum for interoperability: - card issuer name/reference - card number - country name, - date of issuance - expiration date Cardholder identification requirements

 The system shall support a secure and reliable cardholder authentication function  A PIN is mandatory and shall be compliant with ISO/IEC  Biometrics are optional If biometrics are included the following applies: - 1:1 verification compliant to ISO/IEC a Biometric OID in support of multiple biometric technologies must be present compliant to ISO/IEC (under development) - Fingerprint minutia data is recommended. Implementation shall be compliant to ISO/IEC (under development) - Biometric template storage shall be on the card - Biometric matching on the card is recommended  A Signature key for authentication purposes - shall be present - shall occur only once and shall be protected so it cannot be derived - shall be protected against unauthorized usage by PIN and optionally by biometrics Cardholder authentication requirements

 The system shall support a secure and reliable cardholder electronic signature funtion for the purpose of legal validaty of the signature  For Europe the PKI system elements of the system shall be in complicance with the qualified digital signature as per article 5.1 of the EU directive 1999/93/EC on a Community framework for electronic signatures  The PKI system elements shall be in compliance with ETSI QCP (under revision)  The PKI system elements shall be in compliance with CWA parts 1 –2 Electronic signature requirements

 The PKI system elements shall be in compliance with ETSI QCP The main issues being: - registration procedures - information content of a certificate - liability of the certificate authority - responsibility for protecting the eID card and its content - loading of other applications on the card - renewal of an eID card - prevention of use of eID card and its certificates - cancellation of an eID card - requirements for the supporting PKI (i.e. CWA 14171) - obtaining and protecting the CA certificate - obtaining certificate status information Electronic signature requirements (2)

 Compliance with CWA (area K) part 1 and 2: - key pair generation on board card - storage of keys on board card - compliance with 7816/15 (PKCS 15) and Crypto Objects - signing function will be PIN and/or Bio protected - data to be signed cannot be altered - the format for electronic signatures and their certificates shall be interoperable - secure messaging shall be supported (symmetric crypto) - algorithms as in EU WS eSign algo document shall be supported - public available certificate status verifying function for relying parties  PKI shall be implemented in the following way: - minimum of 2 certificates (1 for signing; 1 for other functions) - compliant with X509 V3 minimum profile: name of CA, name of Cert holder, unique identifier of Card Holder /Certholder, period of validity of certificate, serial number of certificate, pointer to info on CA certificate policy Electronic signature requirements (3)