2 Electronic Passports and Identity Cards
|
|
- Jerome Boyd
- 6 years ago
- Views:
Transcription
1
2 2
3
4 Picture source: Paper based Passport Radio Frequency (RF) Chip Electronic Passport (E Pass) Biographic data Human readable Partially machine readable (optically) Conventional (visual) security features Biographic and biometric data Machine readable via RF interface Cryptographic security features Objectives Uniform interoperable security standard for machine readable travel documents (MRTDs) Improved security against forgery, cloning and manipulation of MRTDs Binding MRTDs to their holders (via biometrics) 4
5 Printed Data Machine readable zone See below Owner related data First and last name Birth date Gender Nationality Birth name Academic title Birth and living place Body height and eye color Biometric facial photo Owner s signature Passport related data Pass Type Country code Expiry date Serial number Issuing date Issuing authority Machine Readable Zone (MRZ) (optically readable) Electronically Stored Data All printed data Biometric data Biometric facial photo Fingerprints of both forefingers (alternatively of thumbs, middle finger or ring finger) Cryptographic keys and certificates Symmetric encryption key Symmetric authentication key (MAC) Signature key pair Certificate of the document signer (DS Certificate) Certificate of the Country Signing Certification Authority (CSCA Certificate) Pass Type Country Last name First name P<D<<MUSTERMANN<<ERIKA<<<<<<< D<< F < 5 Serial number Checksum Nationality Birth date Gender Checksum Expiry date Checksum
6 ? Passport holder epass Verifier Passport scanner ()?? 1. Manual verification of visual security features 2. Automatic verification of electronic security features and reading out of stored data 3. Manual comparison of printed and stored data 4. Automatic verification of stored and recorded biometric photo Videocamera Fingerprintreader Blacklist database? 5. Automatic comparison of stored and scanned fingerprints 6. Automatic comparison with blacklist database 6
7 Passive Authentication Digital signature of the passport manufacturer over the electronically stored data Protection against forgery and manipulation of the electronically stored data No protection against copying/cloning of the chip (signed data can be copied to another chip) Active Authentication Challenge response protocol to authenticate the chip to the terminal Protection against copying/cloning of the chip Assumption: Authentication key securely stored in the chip Access Control Protection of the electronically stored data against unauthorized access Basic Access Control (BAC) protocol for access control to less sensitive data (e.g., facial photo) Extended Access Control (EAC) protocol for access control to sensitive data (e.g., fingerprint) 7
8 Basic Access Control (BAC) Mutual authentication of passport and terminal (based on knowledge of MRZ) Authenticated key establishment between passport and terminal Extended Access Control (EAC) Strong mutual authentication of passport and terminal (based on digital certificates) Authenticated key establishment between passport and terminal Assumption: Knowledge of MRZ requires optically reading out the passport (i.e., physical access to passport) Based on symmetric cryptography Encryption Message Authentication Code (MAC) Assumption: Public key infrastructure for terminals exists Based on public key cryptography Digital certificates Diffie Hellman key exchange Digital signatures Mandatory for all electronic passports Up to now not mandatory on international level 8
9 Passport manufacturer (Document Signer, DS) e.g., Bundesdruckerei DS certifies CSCA Country Signing Certification Authority (CSCA) e.g., Bundesamt für Sicherheit in der IT certifies Stored in the passport: MRTD DS CSCA MRTD Data and keys electronically stored in the passport Authentically distributed to all terminals: (e.g., by electronic data transmission or by diplomatic mail) CSCA 9
10 Access rights of DV DV Document Verifier (DV) e.g., border control certifies CVCA Country Verifying Certification Authority (CVCA) e.g., an authority (can be identical to the CSCA) certifies To read foreign passports, DV must obtain a DV certificate from the CVCA of the corresponding country. Access rights of terminals Stored in the passport: (can be updated after deployment) CVCA e.g., passport reader 10
11 epass MRZ Optical read out of the MRZ (requires interaction of passport holder) MRZ data is used in key establishment protocol CSCA Encryption key Message authentication (MAC) key Authenticated key establishment e.g., using Basic Access Control (BAC) or Extended Access Control (EAC) Stored in the passport Establishment of a confidential and authentic channel MRTD DS Verification of the signature of the Document Signer (DS) on the passport data using the certificate of the Country Signing Certification Authority (CSCA) 11
12 epass MRZ 1. Optical read out of the MRZ 3. Read keys from secure storage of passport 2. Derive encryption and authentication key from MRZ Mutual authentication and key establishment Derive one time keys from long term keys 12
13 epass MRZ 1. Optical read out of MRZ? 2b. Read cryptographic keys from secure memory 3b. Create random nonce and partial session key 6. Verification of MAC 7. Decryption 2a. Derive encryption and signature key from MRZ 3a. Create random nonce and partial session key 4. Symmetric encryption 5. Message authentication (MAC)? 8. Verification of N p 9. Symmetric encryption 10. MAC 11. Verification of MAC 12. Decryption 13. Verification of N T 14. Create mutual session keys from K P, K T, N P and N T to encrypt and authenticate the passport data 13
14 epass Two protocol phases Authentication (TA) Strong authentication of the terminal to the passport Chip Authentication (CA) Strong authentication of the passport to the terminal Authenticated session key establishment 14
15 epass CVCA Access rights of terminal DV MRZ 1b. Read CVCA Zertifikats from passport memory 3. Verify certificate and extract public terminal authentication key 1a. Read certificates and secret authentication key from secure memory of terminal 2. Optical read out of MRZ 4. Create ephemeral DH key pair for Chip Authentiation (CA) protocol Access rights of terminal DV Hash Hash 6. Create random nonce 7. Hash public DH key Hash Hash authenticated 9. Verify signature with pk T 8. Sign with sk T Hash Use hash of public DH key and DH key pair in Chip Authentication (CA) protocol (see next slide) 15
16 Hash epass Use hash of public DH key and DH key pair from terminal Authentication (CA) protocol MRTD DS 1a. Read certificates and secret passport authentication key from secure passport memory 3. Create random nonce 1a. Read CSCA Certificate from terminal memory 2. Verify certificates and extract public passport authentication key MRTD CSCA DS 4. Create mutual session key from N P, sk P, pk P, ske T and pke T to encrypt and authenticate the passport data 5. Message authentication (MAC) 6. Verify MAC epass authenticated 16
17 Privacy Violations Unnoticed and unintended read out of the RF chip is possible Adversary directly reads out the passport (Skimming) Adversary eavesdrops on the communication of passport and terminal Security problems in Basic Access Control (BAC) Keys derived from MRZ, which can be guessed (MRZ is not random!) Only certain symbols allowed Includes public data (e.g., issuing date, nationality or holder s last name) Not statistically independent (e.g., sequential serial numbers or expiry date) Keys can be found in only minutes (exhaustive search) Communication between terminal and passport can be decrypted Particularly vulnerable are Belgian, Dutch and German electronic passports 17
18 Identity Theft Copying/Cloning of electronic passports possible BAC keys can be derived from MRZ and copied to blank chip (clone) Passport data can be copied to the blank chip (clone) as well Clone successfully bypasses electronic passport verification Cloning resistance depends only on classical (visual) security features Forgery resilient EAC requires complex and expensive public key infrastructure require authentic CSCA Certificates of each country (otherwise identity theft is possible) Exchange of CSCA Certificates often problematic in practice (these are typically exchanged electronically or by diplomatic mail) 18
19
20 Identity Verification (as with electronic passport) Improved security against forgery, cloning and manipulation Binding holder to identity card Proof of Identity over the Internet (eid) Mutual authentication of passport holder and service provider Pseudonymous authentication (protection of personal data) Age and residence verification (no disclosure of exact age and residence location) Legally Valid Digital Signatures As smartcard based signature 20
21 Identity Card Holder 5. PACE Browser eid Client 3. Start eid Client 6. EAC 7. Secure Channel 1. Start eid based authentication 2. Parameters 8. eid based authentication 4. Establish secure channel (e.g., SSL) E Business / E Government Service Provider Authentication completed Web Server eid Server 10. Data exchange 9. Comparison Blacklist database; public key infrastructure 21
22 Deactivated by default Must be activated on holder s request No disclosure of biometric data to service providers Access control on biographic data Service providers must be authorized by state Access restrictions to biographic data regulated by law Identity card holder can restrict access to biographic data Access to biographic data must be authorized by card holder Requires entering the holder s PIN 22
23 Electronically Stored Data Biographic Data First and last name Birth place and location Address and zip code Biometric Data Biometric facial photo Optionaly: Fingerprints of both forefingers (alternatively fingerprints of the thumbs, middle fingers or ring fingers) Identity card specific data Issuing and expiry date Issuing country Cryptographic keys and certificates Authentication key pair Document Signer (DS) certificate Country Signing Certification Authority (CSCA) certificate Checksum Serial number epa of BRD Birth date Checksum Expiry date Checksum Issuing country Machine Readable Zone (MRZ) Serial number Card Access Number (CAN) 23
24 Password Authenticated Connection Establishment (PACE) Authorization of terminal access to RF Chip by scanning/entering Machine Readable Zone (MRZ), Card Access Number (CAN) or Personal Identification Number (PIN) Extended Access Control (EAC) (as for epass) Strong mutual authentication of identity card and terminal based on certificates Session key establishment Passive Authentication (as for epass) Digital signature of the passport manufacturer on the data stored on the chip Protection against forgery and manipulation of the data stored in the chip 24
25 Electronic Identity Card PIN / CAN / MRZ Password Authenticated Connection Establishment (PACE) Establishment of a confidential and integrity protected channel Extended Access Control (EAC) und Chip Authentication Session key establishment PIN / CAN / MRZ used in the PACE protocol Confidential and authentic channel MRTD DS Verify the signature on the passport data 25
26 Electronic Identity Card PIN Card Holder 1. Read PIN key from secure memory of card 2. Create random challenge 3. Encrypt 8. Create random partial DH session key 4. Enter PIN 5. Derive PIN key from PIN 6. Decrypt 7. Create random partial DH session key 9. Create session keys 26 authenticated 10. Message authentication (MAC) 13. Verify MAC 11. Verify MAC 12. Message authentication (MAC) K V ánd K A are used to establish an authentic and confidential channel between terminal and card Card authenticated
27 Identity Card Holder Malware can eavesdrop on PIN: Simulate eid Client to deceive holder (Phishing) Eavesdrop on keyboard input (Key Logger) Standard without key pad to enter PIN PIN must be entered into eid Client software First version of German eid Client software was faulty: Adversary could use the update function of the eid client to install malware No weakness of the identity card but the infrastructure 27
Advanced Security Mechanisms for Machine Readable Travel Documents and eidas Token
Technical Guideline TR-03110-1 Advanced Security Mechanisms for Machine Readable Travel Documents and eidas Token Part 1 emrtds with BAC/PACEv2 and EACv1 Version 2.20 26. February 2015 History Version
More informationSecurity of Biometric Passports ECE 646 Fall Team Members : Aniruddha Harish Divya Chinthalapuri Premdeep Varada
Security of Biometric Passports ECE 646 Fall 2013 Team Members : Aniruddha Harish Divya Chinthalapuri Premdeep Varada CONTENTS Introduction to epassports Infrastructure required for epassports Generations
More informationBiometric Passport from a Security Perspective
Biometric Passport from a Security Perspective Gildas Avoine INSA Rennes/IRISA Institut Universitaire de France SUMMARY Passport Primer Memory Content Cryptographic Mechanisms defined by ICAO Additional
More informationEU Passport Specification
Biometrics Deployment of EU-Passports EU Passport Specification (EN) 28/06/2006 (As the United Kingdom and Ireland have not taken part in the adoption of this measure, an authentic English version of the
More informationThe EAC for MRTD. 26 January 2010
The EAC for MRTD Rafik Chaabouni Serge Vaudenay 26 January 2010 Outline MRTD? Standards - RFID - ICAO and BAC - EAC Solutions? 2 MRTD? Machine Readable Travel Document 3 Standards RFID ICAO and BAC EAC
More informationAn Overview of Electronic Passport Security Features
An Overview of Electronic Passport Security Features Zdeněk Říha Faculty of Informatics, Masaryk University, Botanická 68A, 602 00 Brno, Czech Republic zriha@fi.muni.cz Abstract. Electronic passports include
More informationCan eid card make life easier and more secure? Michal Ševčík Industry Solution Consultant Hewlett-Packard, Slovakia ITAPA, November 9 th, 2010
Can eid card make life easier and more secure? Michal Ševčík Industry Solution Consultant Hewlett-Packard, Slovakia ITAPA, November 9 th, 2010 Content eid Primary Functions eid Privacy Features and Security
More informationHow To Secure Electronic Passports. Marc Witteman & Harko Robroch Riscure 02/07/07 - Session Code: IAM-201
How To Secure Electronic Passports Marc Witteman & Harko Robroch Riscure 02/07/07 - Session Code: IAM-201 Other personal info on chip Other less common data fields that may be in your passport Custody
More informationIntroduction to Electronic Identity Documents
Tutorial Introduction to Electronic Identity Documents Klaus Schmeh cryptovision I'm Klaus Schmeh, Chief Editor Marketing at cryptovision. I have published a number of books. Identity Documents Conventional
More informationSecurity Mechanism of Electronic Passports. Petr ŠTURC Coesys Research and Development
Security Mechanism of Electronic Passports Petr ŠTURC Coesys Research and Development Smartcard CPU 16/32 bit 3.57MHz (20MHz) 1.8 / 3/ 5 V ROM 16-300 kb RAM 1-8 kb EEPROM 8-128kB Contactless communication
More informationVerifying emrtd Security Controls
Blackhat Europe 2010 Verifying emrtd Security Controls Raoul D Costa 1 3M 2010. All Rights Reserved. Agenda Overview of ICAO / EU Specifications emrtds decomposed emrtd Infrastructure (PKI) Inspecting
More informationChip Authentication for E-Passports: PACE with Chip Authentication Mapping v2
v.2 Chip Authentication for s: with Chip Authentication Mapping v2 Lucjan Mirosław Wrocław University of Science and Technology, Poland ISC 2016, Honolulu Electronic Passport v.2 e-passport and ebooth:
More informationAn Overview of Electronic Passport Security Features
An Overview of Electronic Passport Security Features Zdeněk Říha Faculty of Informatics, Masaryk University, Botanická 68A, 602 00 Brno, Czech Republic zriha@fi.muni.cz Abstract. Electronic passports include
More informationSecurity Mechanisms and Access Control Infrastructure for e-passports and General Purpose e-documents
Journal of Universal Computer Science, vol. 15, no. 5 (2009), 970-991 submitted: 1/8/08, accepted: 28/2/09, appeared: 1/3/09 J.UCS Security Mechanisms and Access Control Infrastructure for e-passports
More informationSecurity Target Lite SK e-pass V1.0
Ref.: Security Target Lite SK e-pass V1.0 Table of Contents 1 INTRODUCTION... 6 1.1 ST AND ST-LITE IDENTIFICATION... 6 1.2 TOE IDENTIFICATION... 6 1.3 CC AND PP CONFORMANCE... 6 1.4 CONVENTIONS... 7 1.5
More informationSecurity Target Bundesdruckerei Document Application
Security Target Bundesdruckerei Document Application Bundesdruckerei GmbH Author: Bundesdruckerei GmbH Version: 3.7 Date: 11.12.2012 Abstract This document is the Security Target (ST) for the Common Criteria
More informationConformity and Interoperability Key Prerequisites for Security of eid documents. Holger Funke, 27 th April 2017, ID4Africa Windhoek
Conformity and Interoperability Key Prerequisites for Security of eid documents Holger Funke, 27 th April 2017, ID4Africa Windhoek Agenda 1. About secunet Security Networks AG 2. Timeline of interoperability
More informationThe epassport: What s Next?
The epassport: What s Next? Justin Ikura LDS2 Policy Sub-Group Co-chair Tom Kinneging Convenor of ISO/IEC JTC1 SC17 WG3 International Organization for Standardization (ISO) Strengthening Aviation Security
More informationCommon Criteria Protection Profile. Machine Readable Travel Document with ICAO Application, Extended Access Control BSI-CC-PP-0056
Common Criteria Protection Profile Machine Readable Travel Document with ICAO Application, Extended Access Control BSI-CC-PP-0056 Foreword This Protection Profile Machine Readable Travel Document with
More informationThis paper focuses on the issue of increased biometric content. We have also published a paper on inspection systems.
White Paper 1 INTRODUCTION As ICAO 1 -compliant epassports come into widespread use in Q4 of 2006, it is an appropriate moment to review some of the initiatives required for the next stage of development.
More informationCommon Criteria Protection Profile
Common Criteria Protection Profile Machine-Readable Electronic Documents based on BSI TR-03110 for Official Use [MR.ED-PP] BSI-CC-PP-0087 Document history Version 1.01, May 20th, 2015 Federal Office for
More informationElectronic passports
Electronic passports Zdeněk Říha, Václav Matyáš, Petr Švenda Faculty of Informatics, Masaryk University, Brno, Czech Republic {zriha,matyas,svenda}@fi.muni.cz February 2008 A number of countries have been
More informationHash-based Encryption Algorithm to Protect Biometric Data in e-passport
Hash-based Encryption Algorithm to Protect Biometric Data in e-passport 1 SungsooKim, 2 Hanna You, 3 Jungho Kang, 4 Moonseog Jun 1, First Author Soongsil University, Republic of Korea, indielazy@ssu.ac.kr
More informationSecurity Target Lite for CEITEC epassport Module CTC21001 with EAC
Security Target Lite for CEITEC epassport Module CTC21001 with EAC Version 2.0 12/Dec/2016 Document History 1.0 First version 2.0 Clarifications to section 7.1 CEITECSA 5.410.052 1 Table of contents 1
More informationFuture Expansion for emrtd PKI Mark Joynes, Entrust
Future Expansion for emrtd PKI Mark Joynes, Entrust 2013 MRTD Symposium 1 What are we trying to achieve Prevent: Production of credible false documents Tampering with legitimate documents Breach of sovereignty
More informationMACHINE READABLE TRAVEL DOCUMENTS
MACHINE READABLE TRAVEL DOCUMENTS TECHNICAL REPORT Supplemental Access Control for Machine Readable Travel Documents Version 1.1 Date 15 April 2014 Published by authority of the Secretary General ISO/IEC
More informationCommon Criteria Protection Profile
Common Criteria Protection Profile Machine-Readable Electronic Documents based on BSI TR-03110 for Official Use [MR.ED-PP] BSI-CC-PP-0087-V2 Version 2.0.2 Document history Version 2.0.2, April 4th, 2016
More informationAn emrtd inspection system on Android. Design, implementation and evaluation
An emrtd inspection system on Android Design, implementation and evaluation Halvdan Hoem Grelland Master s Thesis Spring 2016 An emrtd inspection system on Android Halvdan Hoem Grelland 2nd May 2016 ii
More informationDer elektronische Personalausweis Mehr oder weniger Sicherheit?
Der elektronische Personalausweis Mehr oder weniger Sicherheit? Lukas Grunwald DN-Systems GmbH Germany CeBIT 2010- Heise Forum 2010 Hannover The Government s Dream Multi biometric, double gates, anti-tailgating,
More informationPast & Future Issues in Smartcard Industry
Past & Future Issues in Smartcard Industry Ecrypt 2 Summer School Guillaume Dabosville Oberthur Technologies Oberthur Technologies the group its divisions payment, mobile, transport and digital TV markets
More informationCommon Criteria Protection Profile. Machine Readable Travel Document using Standard Inspection Procedure with PACE (PACE PP)
Machine Readable Travel Document using Standard Inspection Procedure with PACE (PACE PP) Version 1.0, 2nd November 2011 Foreword This Protection Profile Electronic Passport using Standard Inspection procedure
More informationUNIT - IV Cryptographic Hash Function 31.1
UNIT - IV Cryptographic Hash Function 31.1 31-11 SECURITY SERVICES Network security can provide five services. Four of these services are related to the message exchanged using the network. The fifth service
More informationAuthentication Technologies
Authentication Technologies 1 Authentication The determination of identity, usually based on a combination of something the person has (like a smart card or a radio key fob storing secret keys), something
More information(2½ hours) Total Marks: 75
(2½ hours) Total Marks: 75 N. B.: (1) All questions are compulsory. (2) Makesuitable assumptions wherever necessary and state the assumptions made. (3) Answers to the same question must be written together.
More informationTest plan for eid and esign compliant smart card readers with integrated EACv2
Technical Guideline BSI TR-03105 Part 5.2 Test plan for eid and esign compliant smart card readers with integrated EACv2 Version: 2.0 Date: 2015-05-22 Bundesamt für Sicherheit in der Informationstechnik
More informationE-PASSPORT SCHEME USING AUTHENTICATION PROTOCOLS ALONG WITH FACE, FINGERPRINT, PALMPRINT AND IRIS BIOMETRICS
E-PASSPORT SCHEME USING AUTHENTICATION PROTOCOLS ALONG WITH FACE, FINGERPRINT, PALMPRINT AND IRIS BIOMETRICS 1 V.K. Narendira Kumar and 2 B. Srinivasan 1 Assistant Professor, Department of Information
More informationLegal Regulations and Vulnerability Analysis
Legal Regulations and Vulnerability Analysis Bundesamt für Sicherheit in der Informationstechnik (BSI) (Federal Office for Information Security) Germany Introduction of the BSI National Authority for Information
More informationCristina Nita-Rotaru. CS355: Cryptography. Lecture 17: X509. PGP. Authentication protocols. Key establishment.
CS355: Cryptography Lecture 17: X509. PGP. Authentication protocols. Key establishment. Public Keys and Trust Public Key:P A Secret key: S A Public Key:P B Secret key: S B How are public keys stored How
More informationDocument reader Regula 70X4M
Document reader Regula 70X4M Full page passport reader with no moving parts inside. Automatic reading and authenticity verification of passports, IDs, visas, driver s licenses and other identification
More informationA Trust Infrastructure for epassports
A Trust Infrastructure for epassports Building reliable, timely and cost-effective trust links for electronic travel document verification +1-888-690-2424 entrust.com Table of contents Trust in government
More informationXSmart e-passport V1.2
KECS-CR-11-27 XSmart e-passport V1.2 LG CNS Certification Report Certification No : KECS-ISIS-0319-2011 National Intelligence Service IT Security Certification Center Revision Number Establishment & Revision
More informationCS530 Authentication
CS530 Authentication Bill Cheng http://merlot.usc.edu/cs530-s10 1 Identification vs. Authentication Identification associating an identity (or a claimed identity) with an individual, process, or request
More informationE-Passport: Cracking Basic Access Control Keys with COPACOBANA
E-Passport: Cracking Basic Access Control Keys with COPACOBANA Yifei Liu, Timo Kasper, Kerstin Lemke-Rust and Christof Paar Communication Security Group Ruhr University Bochum, Germany http://www.crypto.rub.de
More informationECE596C: Handout #9. Authentication Using Shared Secrets. Electrical and Computer Engineering, University of Arizona, Loukas Lazos
ECE596C: Handout #9 Authentication Using Shared Secrets Electrical and Computer Engineering, University of Arizona, Loukas Lazos Abstract. In this lecture we introduce the concept of authentication and
More informationMULTIAPP V2 PACE - SAC PUBLIC SECURITY TARGET
MultiApp v2 Pace SAC Common Criteria / ISO 15408 Security Target Public version EAL4+ Copyright Gemalto SA 2012. Page : 1/50 CONTENT 1. ST INTRODUCTION... 4 1.1 ST IDENTIFICATION... 4 1.2 ST OVERVIEW...
More informationSECURITY TARGET LITE FOR IDEAL PASS V2.0.1 EAC WITH PACE APPLICATION
SECURITY TARGET LITE FOR IDEAL PASS V2.0.1 EAC WITH PACE APPLICATION Reference: 2016_2000023040 Page: 2/141 Date Version Revision 01/12/2016 1.0 Document creation Page: 3/141 Table of contents 1.1 SECURITY
More informationPublic-key Cryptography: Theory and Practice
Public-key Cryptography Theory and Practice Department of Computer Science and Engineering Indian Institute of Technology Kharagpur Chapter 1: Overview What is Cryptography? Cryptography is the study of
More informationGerman eid based on Extended Access Control v2
German eid based on Extended Access Control v2 Overview of the German eid system Version 1.2 21. August 2017 Federal Office for Information Security Post Box 20 03 63 D-53133 Bonn Phone: +49 22899 9582-0
More informationHOST Authentication Overview ECE 525
Authentication Overview Authentication refers to the process of verifying the identity of the communicating principals to one another Usually sub-divided into Entity authentication Authentication in real-time
More informationUser Authentication. Modified By: Dr. Ramzi Saifan
User Authentication Modified By: Dr. Ramzi Saifan Authentication Verifying the identity of another entity Computer authenticating to another computer Person authenticating to a local/remote computer Important
More informationLecture 5: Protocols - Authentication and Key Exchange* CS 392/6813: Computer Security Fall Nitesh Saxena
Lecture 5: Protocols - Authentication and Key Exchange* CS 392/6813: Computer Security Fall 2009 Nitesh Saxena *Adopted from a previous lecture by Gene Tsudik Course Admin HW3 Problem 3 due Friday midnight
More informationSeptember OID: Public Document
THE UNITED KINGDOM S NATIONAL CERTIFICATE POLICY for Extended Access Control Infrastructure for machine readable travel documents and biometric residence permits issued and read within the UK September
More informationTechnology Advances in Authentication. Mohamed Lazzouni, SVP & CTO
Technology Advances in Authentication Mohamed Lazzouni, SVP & CTO Outline Optical Authentication Complexity of security features and their evolution Computing and optics Document analysis techniques Automation
More informationSecurity Target Lite
Security Target Lite for the PEACOS Extended Access Control MRTD Common Criteria version 3.1 revision 3 ISO/IEC 15408 Assurance Level EAL 4+ Developer Gep S.p.A. Corso Salvatore D Amato, 90 80022 Arzano
More informationElements of Cryptography and Computer and Network Security Computer Science 134 (COMPSCI 134) Fall 2016 Instructor: Karim ElDefrawy
Elements of Cryptography and Computer and Network Security Computer Science 134 (COMPSCI 134) Fall 2016 Instructor: Karim ElDefrawy Homework 3 Due: Monday, 11/28/2016 at 11:55pm PT Solution: Will be posted
More informationVALIDATING E-PASSPORTS AT THE BORDER: THE ROLE OF THE PKD R RAJESHKUMAR CHIEF EXECUTIVE AUCTORIZIUM PTE LTD
VALIDATING E-PASSPORTS AT THE BORDER: THE ROLE OF THE PKD R RAJESHKUMAR CHIEF EXECUTIVE AUCTORIZIUM PTE LTD THE TRUST IMPERATIVE E-Passports are issued by entities that assert trust Trust depends on the
More informationSecurity & Privacy. Web Architecture and Information Management [./] Spring 2009 INFO (CCN 42509) Contents. Erik Wilde, UC Berkeley School of
Contents Security & Privacy Contents Web Architecture and Information Management [./] Spring 2009 INFO 190-02 (CCN 42509) Erik Wilde, UC Berkeley School of Information Abstract 1 Security Concepts Identification
More informationElements of Cryptography and Computer and Network Security Computer Science 134 (COMPSCI 134) Fall 2016 Instructor: Karim ElDefrawy
Elements of Cryptography and Computer and Network Security Computer Science 134 (COMPSCI 134) Fall 2016 Instructor: Karim ElDefrawy Homework 3 Due: Monday, 11/28/2016 at 11:55pm PT Solution: Will be posted
More informationBCA III Network security and Cryptography Examination-2016 Model Paper 1
Time: 3hrs BCA III Network security and Cryptography Examination-2016 Model Paper 1 M.M:50 The question paper contains 40 multiple choice questions with four choices and student will have to pick the correct
More informationImplementation Based Security Analysis of the Electronic Passport
Diploma Thesis Implementation Based Security Analysis of the Electronic Passport Liu, Yifei 15.05.2007 Ruhr-Universität Bochum Lehrstuhl für Kommunikationssicherheit Prof. Dr.-Ing. Christof Paar 2 Erklärung
More informationWhitepaper: GlobalTester Prove IS
Whitepaper: GlobalTester Prove IS Testing of EAC inspection systems By HJP Consulting GmbH Introduction There have been a lot of activities in standardization to define conformity tests for e-passports.
More informationCOMPGA12 1 TURN OVER
Applied Cryptography, COMPGA12, 2009-10 Answer ALL questions. 2 hours. Marks for each part of each question are indicated in square brackets Calculators are NOT permitted 1. Multiple Choice Questions.
More informationPRIVACY ISSUES OF ELECTRONIC PASSPORTS 1. INTRODUCTION
JOURNAL OF MEDICAL INFORMATICS & TECHNOLOGIES Vol. 17/2011, ISSN 1642-6037 access control, biometrics, electronic passport, privacy, skimming, tracking Zdeněk ŘÍHA 1, Vashek MATYÁŠ 1 PRIVACY ISSUES OF
More informationAuthentication Technology for a Smart eid Infrastructure.
Authentication Technology for a Smart eid Infrastructure. www.aducid.com One app to access all public and private sector online services. One registration allows users to access all their online accounts
More informationExperiences of w S itz w e itz rland
Joining the PKD why? Experiences of Switzerland State of Play Switzerland The first generation e passport is being issued since 4 September 2006 Name, first name Passport number Date and place of issue,
More informationEvolution of Electronic Passport Scheme using Cryptographic Protocol along with Biometrics Authentication System
I. J. Computer Network and Information Security, 2012, 2, 50-58 Published Online March 2012 in MECS (http://www.mecs-press.org/) DOI: 10.5815/ijcnis.2012.02.08 Evolution of Electronic Passport Scheme using
More informationSecurity analysis of OpenID, followed by a reference implementation of an npabased OpenID provider
Security analysis of OpenID, followed by a reference implementation of an npabased OpenID provider Sebastian Feld, Norbert Pohlmann Institute for Internet-Security, if(is) Gelsenkirchen University of Applied
More informationISACA CISA. ISACA CISA ( Certified Information Systems Auditor ) Download Full Version :
ISACA CISA ISACA CISA ( Certified Information Systems Auditor ) Download Full Version : http://killexams.com/pass4sure/exam-detail/cisa QUESTION: 390 Applying a digital signature to data traveling in a
More informationCERN Certification Authority
CERN Certification Authority Emmanuel Ormancey (IT/IS) What are Certificates? What are Certificates? Digital certificates are electronic credentials that are used to certify the identities of individuals,
More informationT Cryptography and Data Security
T-79.159 Cryptography and Data Security Lecture 10: 10.1 Random number generation 10.2 Key management - Distribution of symmetric keys - Management of public keys Kaufman et al: Ch 11.6; 9.7-9; Stallings:
More informationCOMPUTER NETWORK SECURITY
COMPUTER NETWORK SECURITY Prof. Dr. Hasan Hüseyin BALIK (3 rd Week) 3. User Authentication 3.Outline Electronic User Authentication Principles Password-Based Authentication Token-Based Authentication Biometric
More informationLecture 9. Authentication & Key Distribution
Lecture 9 Authentication & Key Distribution 1 Where are we now? We know a bit of the following: Conventional (symmetric) cryptography Hash functions and MACs Public key (asymmetric) cryptography Encryption
More informationCONFORMITY TESTING OF EAC INSPECTION SYSTEMS
CONFORMITY TESTING OF EAC INSPECTION SYSTEMS By Dr. Michael Jahnich, Technical Director, HJP Consulting GmbH Testing the conformance of inspection systems for epassports is an ongoing and open issue. One
More informationUser Authentication. Modified By: Dr. Ramzi Saifan
User Authentication Modified By: Dr. Ramzi Saifan Authentication Verifying the identity of another entity Computer authenticating to another computer Person authenticating to a local/remote computer Important
More informationHY-457 Information Systems Security
HY-457 Information Systems Security Recitation 1 Panagiotis Papadopoulos(panpap@csd.uoc.gr) Kostas Solomos (solomos@csd.uoc.gr) 1 Question 1 List and briefly define categories of passive and active network
More informationBut where'd that extra "s" come from, and what does it mean?
SSL/TLS While browsing Internet, some URLs start with "http://" while others start with "https://"? Perhaps the extra "s" when browsing websites that require giving over sensitive information, like paying
More informationLecture 9a: Secure Sockets Layer (SSL) March, 2004
Internet and Intranet Protocols and Applications Lecture 9a: Secure Sockets Layer (SSL) March, 2004 Arthur Goldberg Computer Science Department New York University artg@cs.nyu.edu Security Achieved by
More informationBiometrics. Overview of Authentication
May 2001 Biometrics The process of verifying that the person with whom a system is communicating or conducting a transaction is, in fact, that specific individual is called authentication. Authentication
More informationAthena IDProtect Duo v5 ICAO EAC optional AA. Public Security Target
Athena IDProtect Duo v5 ICAO EAC optional AA - Athena IDProtect Duo v5 Java Card on Inside Secure AT90SC28880RCFV Microcontroller embedding ICAO applet - Public Security Target Version 2.2 January 6, 2014
More informationCertificateless Public Key Cryptography
Certificateless Public Key Cryptography Mohsen Toorani Department of Informatics University of Bergen Norsk Kryptoseminar November 9, 2011 1 Public Key Cryptography (PKC) Also known as asymmetric cryptography.
More informationComputer Security. 08r. Pre-exam 2 Last-minute Review Cryptography. Paul Krzyzanowski. Rutgers University. Spring 2018
Computer Security 08r. Pre-exam 2 Last-minute Review Cryptography Paul Krzyzanowski Rutgers University Spring 2018 March 26, 2018 CS 419 2018 Paul Krzyzanowski 1 Cryptographic Systems March 26, 2018 CS
More informationKey Management. Digital signatures: classical and public key Classic and Public Key exchange. Handwritten Signature
Key Management Digital signatures: classical and public key Classic and Public Key exchange 1 Handwritten Signature Used everyday in a letter, on a check, sign a contract A signature on a signed paper
More informationKey Management and Distribution
Key Management and Distribution Raj Jain Washington University in Saint Louis Saint Louis, MO 63130 Jain@cse.wustl.edu Audio/Video recordings of this lecture are available at: http://www.cse.wustl.edu/~jain/cse571-14/
More informationA SECURE PASSWORD-BASED REMOTE USER AUTHENTICATION SCHEME WITHOUT SMART CARDS
ISSN 1392 124X INFORMATION TECHNOLOGY AND CONTROL, 2012, Vol.41, No.1 A SECURE PASSWORD-BASED REMOTE USER AUTHENTICATION SCHEME WITHOUT SMART CARDS Bae-Ling Chen 1, Wen-Chung Kuo 2*, Lih-Chyau Wuu 3 1
More informationSecurity Digital Certificate Manager
System i Security Digital Certificate Manager Version 6 Release 1 System i Security Digital Certificate Manager Version 6 Release 1 Note Before using this information and the product it supports, be sure
More informationNetwork Security and Cryptography. December Sample Exam Marking Scheme
Network Security and Cryptography December 2015 Sample Exam Marking Scheme This marking scheme has been prepared as a guide only to markers. This is not a set of model answers, or the exclusive answers
More informationSystem-Level Failures in Security
System-Level Failures in Security Non linear offset component (ms) 0.0 0.5 1.0 1.5 2.0 Variable skew De noised Non linear offset Temperature 26.4 26.3 26.2 26.1 26.0 25.9 25.8 Temperature ( C) Fri 11:00
More informationPublic Key Infrastructure PKI. National Digital Certification Center Information Technology Authority Sultanate of Oman
Public Key Infrastructure PKI National Digital Certification Center Information Technology Authority Sultanate of Oman Agenda Objectives PKI Features etrust Components Government eservices Oman National
More informationChipDoc P60 on JCOP 3 SECID P60 (OSA) ICAO BAC Security Target Lite
ChipDoc P60 on JCOP 3 SECID P60 (OSA) ICAO BAC Rev. 1.0 28 September 2017 Final Document information Info Keywords Abstract Content Common Criteria,, ChipDoc P60 on JCOP 3 SECID P60 (OSA) ICAO BAC of ChipDoc
More informationCrypto Background & Concepts SGX Software Attestation
CSE 5095 & ECE 4451 & ECE 5451 Spring 2017 Lecture 4b Slide deck extracted from Kamran s tutorial on SGX, presented during ECE 6095 Spring 2017 on Secure Computation and Storage, a precursor to this course
More informationCryptography and Network Security Chapter 14
Cryptography and Network Security Chapter 14 Fifth Edition by William Stallings Lecture slides by Lawrie Brown Chapter 14 Key Management and Distribution No Singhalese, whether man or woman, would venture
More informationT Cryptography and Data Security
T-79.4501 Cryptography and Data Security Lecture 10: 10.1 Random number generation 10.2 Key management - Distribution of symmetric keys - Management of public keys Stallings: Ch 7.4; 7.3; 10.1 1 The Use
More informationGrenzen der Kryptographie
Microsoft Research Grenzen der Kryptographie Dieter Gollmann Microsoft Research 1 Summary Crypto does not solve security problems Crypto transforms security problems Typically, the new problems relate
More informationLecture 30. Cryptography. Symmetric Key Cryptography. Key Exchange. Advanced Encryption Standard (AES) DES. Security April 11, 2005
Lecture 30 Security April 11, 2005 Cryptography K A ciphertext Figure 7.3 goes here K B symmetric-key crypto: sender, receiver keys identical public-key crypto: encrypt key public, decrypt key secret Symmetric
More informationSecurity Target lite. Machine Readable Travel Document with ICAO Application, Basic Access Control MTCOS Pro 2.1 BAC/ST23YR80
Security Target lite Machine Readable Travel Document with ICAO Application, Basic Access Control MTCOS Pro 2.1 BAC/ST23YR80 MASKTECH INTERNATIONAL GMBH Document number: BSI-DSZ-CC-0671, ST lite, Version
More informationCPSC 467: Cryptography and Computer Security
CPSC 467: Cryptography and Computer Security Michael J. Fischer Lecture 11 October 4, 2017 CPSC 467, Lecture 11 1/39 ElGamal Cryptosystem Message Integrity and Authenticity Message authentication codes
More informationE-commerce security: SSL/TLS, SET and others. 4.1
E-commerce security: SSL/TLS, SET and others. 4.1 1 Electronic payment systems Purpose: facilitate the safe and secure transfer of monetary value electronically between multiple parties Participating parties:
More informationCompTIA Security+ (2008 Edition) Exam
CompTIA SY0-201 CompTIA Security+ (2008 Edition) Exam Version: 7.20 Topic 1, Volume A QUESTION NO: 1 Which of the following cryptography types provides the same level of security but uses smaller key sizes
More informationSecurity Analysis of the Extended Access Control Protocol for Machine Readable Travel Documents
Security Analysis of the Extended Access Control Protocol for Machine Readable Travel Documents Özgür Dagdelen 1 and Marc Fischlin 2 1 Center for Advanced Security Research Darmstadt - CASED oezguer.dagdelen@cased.de
More informationECEN 5022 Cryptography
Introduction University of Colorado Spring 2008 Historically, cryptography is the science and study of secret writing (Greek: kryptos = hidden, graphein = to write). Modern cryptography also includes such
More information