Download presentation
Presentation is loading. Please wait.
Published byRafe Hill Modified over 8 years ago
1
Nikita Maria Department of Applied Informatics University of Macedonia - Greece
2
e-Passport Layout e-Passport Technologies e-Passport Generations e-Passport Vulnerabilities Proposed Measures Legal Efforts Conclusions and Proposals 5th International Conference on Information Law 2
3
The layout 5th International Conference on Information Law 3
4
Biometric Data powerful identifiers used for authentication and stored on a RFID chip R.F.I.D. contactless IC chip meets all three considerations of usability, data capacity and performance [ICAO Technical Report, 2004] embedded in the paper passport and communicates wirelessly with the passport reader using an antenna 5th International Conference on Information Law 4
5
The International Civil Aviation Organization (ICAO) is a specialized agency that issues passport standards as recommendations to the national governments Introduced the biometrics and the technology of contactless chips (RFID) and the communication protocols The 3 e-Passport generations.. 5th International Conference on Information Law 5
6
1 st generation Passive Authentication Protocol (mandatory) ▪ proves to the reader authenticity of the data ▪ cannot detect cloning Active Authentication Protocol (optional) ▪ chip authentication ▪ Prevents cloning What about the reader? Is he authentic? Is anyone else “listening” through the communication channel? 5th International Conference on Information Law 6
7
Skimming attacks occur from distance when an unauthorized reader gains access to the stored data the attacker communicates directly with the RFID chip (reader authentication needed) 5th International Conference on Information Law 7
8
Eavesdropping occurs when the attacker intercepts the communication between the RFID chip and the border control reader (secure messaging) 5th International Conference on Information Law 8
9
1 st generation Basic Access Control (optional) ▪ Reader authentication ▪ Secure messaging 5th International Conference on Information Law9 The reader optically reads the MRZ and derives an access key The RFID chip also knows this key Cryptographic Session Key derived (Secure messaging) Mutual authentication
10
2 nd generation Extended Access Control Protocol (optional) ▪ Chip and Terminal authentication ▪ Stronger encryption Its disadvantage is that it depends on BAC! BAC turned out to be a very successful protocol because of its simplicity Now is implemented in almost every e-passport BUT the security that it provides is limited by the design of the protocol - the keys are cryptographically weak 5th International Conference on Information Law 10
11
3 rd generation Supplemental Access Control (replace BAC) ▪ implements asymmetric cryptography ▪ data encryption is based on a shared key, unlike BAC which generates the key based on the MRZ Data is protected both when stored on the chip and when transmitted to the reader Higher level of protection is succeeded 5th International Conference on Information Law 11
12
Faraday cage is a metal jacket prevents any electric or magnetic fields to pass through A metal surface on an adjacent page Both are vulnerable to eavesdropping when they are expressly presented by their holders! 5th International Conference on Information Law 12
13
ICAO In 1980 issued the first edition of the Doc 9303 as a guideline for issuing machine-readable passports Introduced the biometrics and the technology of contactless chips (RFID) and the communication protocols The Doc 9303 evolved through time and separate volumes were published Doc 9303 part 1 volume 2 (2006) ▪ specifications for electronically enabled passports with biometric identification capability were presented 5th International Conference on Information Law 13
14
European Level E-passports introduced with Council Regulation (EC) No 2252/2004 standards for security features and biometrics in passports issued by Member States, taking into account the specifications of ICAO the data subject’s right of verification is recognized access, rectify, erase Commission Decision C(2005) 409 issue passports with a digital facial image stored in the RFID chip by 2006 fingerprints by 2008 implement the BAC communication protocol 5th International Conference on Information Law 14
15
The widespread of privacy concerns used to originate mainly in the fields of law Now has obviosly expanded into the information technologies Since biometric data was stored on the RFID chip… Privacy Threats arose The RFID technology’s infrastructure is responsible for these problems The EU Commission suggested to enhance RFID with privacy enhancing technologies (PETs) (anonymisation, coding, encryption and authentication) 5th International Conference on Information Law 15
16
Intensive proposed methods to enhance protection of privacy are vital Fundamental changes are required even to the physical design of the RFID Or second thoughts should be done about replacing the RFID technology with another that follows data protection principles and applies privacy by design Cooperation between computer and law scientists is vital for implementing a privacy enhancing technology for e-passports that entails the advantages of the RFID. 5th International Conference on Information Law 16
17
Thank you for your attention! Any questions? 5th International Conference on Information Law17
Similar presentations
© 2024 SlidePlayer.com. Inc.
All rights reserved.