Electronic Passports in a Nutshell
|
|
|
- Brendan Kennedy
- 10 years ago
- Views:
Transcription
1 Electronic Passports in a Nutshell Wojciech Mostowski and Erik Poll Radboud University, Nijmegen, The Netherlands {woj,erikpoll}@cs.ru.nl Abstract. This document tries to give concise, (semi)formal specifications for the second generation electronic passports as used by most EU countries, and for the closely related ISO18013 standard for electronic driving licenses. We developed these specifications as a follow-up to making open source Java Card implementations of these standards. Our aim is to provide useful information implicit in the official specification, but crucial for the overall security in a simple format that could be useful to anyone implementing these standards, performing security tests, or doing code reviews. More generally, we want to explore useful formats for rigorously specifying the typical complex combinations of security protocols that arise in real applications. In particular, we provide state diagrams which describe the state that are largely implicit in the official specifications, but which have to be explicit in any implementation, and which also provide a basis for systematic modelbased testing. 1 Introduction Electronic passports, or e-passports for short, contain a contactless smartcard that stores digitally signed data and implements several security protocols to control access to this data. The international standard for e-passports has been specified by the International Civil Aviation Organization (ICAO), in Doc 9303 [5]. The EU has decided to implement additional security checks in second generation e- passports, as specified by the German BSI [1]. These protocols, their shortcomings, or shortcomings in their particular implementations, are discussed in for instance [4, 7, 10, 3]. More recently an ISO standard, ISO18013, has been developed for electronic driving licenses. This standard is very similar to the ICAO and BSI standards for e-passports. The differences are mainly in naming, but also there are minor functional modifications. Since we consider the differences marginal, we will only discuss specifics of the ISO18013 standard in Section 7 towards the end of the paper and concentrate on e-passports in the rest. The e-passport protocols are sufficiently complex to make understanding them, and correctly implementing them, a non-trivial task. The standards in fact give detailed descriptions of several protocols with some possible variations (e.g. using either RSA or Elliptic Curve Cryptography). In the end every passport implements a particular configuration of a protocol. Understanding the combination and interaction of the various protocols is not so easy. This was our experience when we added Extended Access Control (EAC) functionality to the open source Java Card implementation for the e-passport 1 and when we developed an open source implementation for the ISO18013 e-driving license 2. For terminal software, which has to interact with smartcards implementing any version of the standards, it is even more complicated. 1 Available from 2 Available from 1
2 To better understand the standards, we developed state diagram models to specify the combined protocols, which we present in this document in sections 4 and 5. For completeness, we also provide Message Sequence Diagrams for all the protocols in Section 6 in the standard abstract security-protocol notation. Essential differences of these state diagrams with the specifications as given in the official standards are that (i) these models consider the full combination of protocols that have to be implemented, and (ii) the models are state-based, i.e. they make explicit which different states any implementation will have to distinguish. We believe that these models are a useful addition to the official standards. They facilitate good understanding of the protocols and their interaction, and should be useful when developing implementations, in suggesting testing scenarios, and for performing code reviews. Indeed, the models helped to uncover some bugs in our own implementations 3. We also used the models for model-based testing [8]; this allowed easy experimentation to discover which implementation choices (allowed by the underspecification in the official specs) were made in a particular e-passport implementation. It would not surprise us if similar diagrams as presented here have been drawn on whiteboards in many places, or appear in (confidential) design documents, test plans or security reviews of e-passports. In fact, anyone implementing the standards will effectively construct a state diagram; given the way a smartcard works, any implementation has to explicitly keep track of state information. We therefore hope that the specifications given here can be of use to others. In fact, it would be nice if official specification documents produced by ICAO, ISO, or BSI would include similar information, even if only as informative rather than normative appendices. 4 While we try to abstract from the very low-level workings of the particular e- passport protocols in this paper, we also include a detailed, but still lightweight, descriptions of the internals of all e-passport protocols for informative purposes. AA APDU BAC BAP CA DG EAC EAP MAC PA RFID SM TA Active Authentication Application Protocol Data Unit Basic Access Control (e-passports) Basic Access Protection (ISO18013) Chip Authentication Datagroup (a.k.a. a file) Extended Access Control (e-passports) Extended Access Protection (ISO18013) Message Authentication Code Passive Authentication Radio Frequency Identification Secure Messaging Terminal Authentication Table 1. List of abbreviations used in the paper 3 To be precise, the possibility to send commands unprotected by Secure Messaging after Secure Messaging have been established. 4 Currently, state diagrams seem to be used only in the supplement to the official specification [6, page 19] for the behaviour of the terminal software. 2
3 2 Electronic Identity Documents An e-passport is a particular case of an electronic identity document. Typically such an e-id document is implemented on a smartcard, either contact (commonly called chip card) or contactless (an RFID tag). Smartcards communicate with the outside world with Application Protocol Data Units (APDUs). APDUs are standardised in the ISO7618 specifications, and for contactless cards the ISO14443 specification defines the lower level contactless protocol. Information requests are sent to the card by an inspection terminal (or, in general, any software with access to a suitable card reader) in so-called command APDUs, and the card provides the requested information and the operation status (so-called status word, which may e.g. indicate insufficient security conditions to complete the request) by sending back a response APDU. Both command and response APDUs are simple, relatively short byte sequences. One kind of an electronic identity document is one that stores (usually signed and integrity protected) personal data of the holder: names, date of birth, picture, signature, etc., segregated in separate files, in case of e-passports called datagroups. Here e-passports, driving licenses, or national identity cards are notable examples. For instance, on the electronic side, the current Dutch national identity card is practically identical to the Dutch e-passport. A driving license stores very similar data to a passport, but also includes driving specific information, like vehicle categories or limitations. All electronic identity documents in this category are mostly passive, in the sense that they provide read-only data as high level output and internally perform active computations related to access control, protocol integrity checks, and document authenticity control. Another kind of an electronic identity document are PKI cards used for electronic signatures. Their functionality is of an active nature their core application is to sign, encrypt, or decrypt input data and return the result. They may or may not store personal data, like name or picture, but they always store private cryptographic keys for internal use and corresponding (state issued) signing certificates. Obviously a combination of the two categories is possible, or at least a card can be issued with two applications on it, one for passive identity, and one for electronic signatures. More interestingly, some passive identity documents provide enough computing power and functionality to be partly applicable in PKI applications as described in [9]. In particular, the active authentication passport protocol (see below) involves signing of data with a private key stored securely in the passport. 3 e-passport Protocols Communication with e-passports involves several dedicated protocols, which run on top of the APDU protocol: 1. PA (Passive Authentication): This is not really a protocol, but refers to the use of digital signatures of data on the passports; for PA the reader has to read several datagroups and check the hashes and digital signatures. 2. BAC (Basic Access Control): The protocol to start communication with the passport chip, in which the reader proves knowledge of the MRZ information physically printed in the passport. 3. SM (Secure Messaging): The protocol to protect the integrity and confidentiality of the communication between the reader and the e-passport. The keys used for SM are established by the BAC protocol, and they are refreshed by the Chip Authentication protocol, see below. 4. AA (Active Authentication): A challenge-response protocol to prove authenticity of the passport chip, in which the e-passport proves knowledge of a private 3
4 key for which it has a certificate signed by the issuing country. This protocol is effectively redundant if a passport supports Extended Access Control, as authenticity of the passport chip can then also be established by Chip Authentication, see below. 5. EAC (Extended Access Control): EAC consists of two protocols: (a) CA (Chip Authentication): a protocol for the terminal to authenticate the chip. CA is based on a secret key agreement and establishes new SM keys. (b) TA (Terminal Authentication): a protocol for the chip to authenticate the terminal, and possibly increase access rights. TA is performed by actively verifying certificates and an authentication request sent to the passport by the inspection system. Both these protocols rely on a PKI, where each country issues certificates to its passports (for CA) and certificates to other countries for letting them read the more sensitive data from the passports (for TA). Currently, EAC protects access to the fingerprint and iris scan possibly stored on the passport. PA, BAC, SM, and AA are specified by ICAO in [5]; only PA is mandatory, the others are optional, but practically all new passports implement BAC, SM, and many passports implement AA. EAC is specified in [1] and it is implemented in all new generation EU passports. For a passport that supports BAC and EAC, BAC must be performed first, and then EAC is performed by first doing CA and then TA. A typical run would combine the protocols as follows: BAC; (select; read) ; CA; TA; (select; read) where after BAC and after TA the passport reads some datagroups, by first choosing a datagroup with the select command and then reading them with a read command. At the end of BAC SM is started, and all subsequent protocols are run under SM, which can be schematically illustrated as in Figure 1. BAC (select; read) CA TA (select; read) SM ISO7816 ISO14443 Fig. 1. Protocol stack for the e-passport Other combinations than those suggested by the regular expression above or the diagram in Figure 1 are possible. For instance: AA could be done after BAC; AA could be done after CA or TA (even though this would be pointless, as CA already authenticates the chip); selecting or reading could happen between CA and TA; and, since TA consists of several steps, AA or reads could even happen during TA, i.e. between individual steps of the TA protocol. The BAC, CA and TA protocols could also be executed in other orders, or possibly multiple times. The official specifications leave it largely underspecified or implicit if these combinations are allowed and what the response should be. Many of these combinations do not really make sense. Section of [1] describes the standard e-passport inspection procedure, giving a high-level description of the order in which the various protocols are typically run. Of course, there are no guarantees that any buggy or malicious inspection systems actually stick to normal order. Any secure implementation of the e-passport has to ensure that strange combinations do not lead to 4
5 unwanted behaviour. This is why we explore systematic ways of describing wanted and unwanted behaviour more precisely in the following sections. In Section 5 we will come back to the underspecification issues. A more precise description of the passport architecture and internal workings of the protocols is given in Section 6. 4 State Diagrams for the e-passport First we sketch the basic issue on how to specify the e-passport by means of a state diagram supplemented with an access control matrix, then we look at a precise and detailed specification. 4.1 Basic State Diagram and Access Control Matrix On the high level, the e-passport can be in three states, as illustrated by this diagram: By performing BAC the passport enters a state in which basic datagroups can be read, or AA can be performed. By subsequently performing EAC the passport enters a state in which additional datagroups e.g. also the fingerprint information can be read. The SM guard in brackets indicates communication that is encrypted using Secure Messaging. A diagram like the one above could be supplemented with an access control matrix saying for every state which operations are allowed: State Operation INIT BAC complete EAC complete access DG1, DG2 no yes yes access DG3, DG4 no no yes do AA no yes yes... One could also draw the operations in the table as arrows in the diagram, with labels indicating whether the operation should succeed or fail. However, such additional arrows quickly clutter the diagram, especially when more fine grained state set is used as we present below. Also, many of the operations in the access control table will not change the current state, so the diagram would be full of self arrows. Conversely, one could record the diagram arrows in the table, by including the result state from the diagram. In the following our approach is to use both a diagram to define security status change after different protocol steps and a corresponding access control table indexed by possible operations and diagram states. 5
6 4.2 More Detailed State Diagrams On a lower level of abstraction we distinguish CA and TA as individual steps within EAC: We can go to lower levels of abstraction still. For instance, BAC consists of two communication steps, which could be distinguished. TA consists of at least 7 steps, and possibly more, depending on the length of the certificate chain that the inspection system provides to the passport. 5 Figure 2 specifies such a more detailed state diagram for the protocol. Most arrows in the diagram correspond to a single communication from the terminal to the card (with a command APDU) and the resulting response (response APDU) of the card. Only exceptions here are the (re)set SM key transitions, which are internal actions of the card we make explicit to keep the diagram more structured (note that the number of the state is unchanged), and the various error transitions, which correspond to the card reporting an error by an appropriate status word in response to a incorrect command APDU sent by the terminal. The diagram includes an (unreachable) Personalisation state, as a reminder that the e-passport must have had additional functionality for initialising the passport. This functionality should of course never be available after the passport has been issued, which is why the state is unreachable. A passport inspection system can be expected to issue read instructions in state 3 (to read the datagroups protected by BAC), to do AA in state 3 (to check authenticity of the chip), and to read instructions in state 5 (to read the additional datagroups protected by TA). Figure 3 gives the full access control table for the diagram in Figure 2. 5 Underspecification In the following we discuss some aspects of the passport behaviour that are underspecified in the official documentation. 5.1 Failed Commands For many errors (e.g. unexpected commands or commands with incorrect information, say an incorrect response to a challenge) it is not clear if the passport should simply ignore them, or abort and go back to the initial state. For instance, an attempt to read a datagroup in state 2 could be ignored, or lead to a transition to state 1. The same goes for an attempt to read a inaccessible datagroup, say DG3 containing the fingerprint, in state 3. For errors during TA a forgiving implementation might allow a second try at TA (as indicated in Figure 2), but a more restrictive one might abort. For the overall security it does not seem to matter, if we assume that brute force attacks to break SM or to produce fake certificate chains for TA are not feasible. Two things are explicitly stated in the specs w.r.t. failed commands. The first is that any error in SM must result in aborting the SM session. The second one is that 5 According to the specification, a single successful certification chain always contains two certificates, but invalid certificates can be presented for verification during the process effectively lengthening the chain of verification operations, we will come back to this later. 6
7 Fig. 2. Detailed state diagram for e-passport implementing BAC and EAC 7
8 pre-bac post-bac post-ca post-ta do BAC, without SM yes no no no read basic DGs no yes yes yes read EAC DGs no no no yes do AA no yes yes yes do CA no yes no no do TA no no yes no Only getchallenge is not SM protected during BAC. A non-sm getchallenge after BAC could be accepted and treated as the start of a fresh BAC session. Only when the terminal certificates gives the right to do this. Repeated CAs or multiple EACs (TA+CA) could be allowed, but would be pointless. Fig. 3. Access control matrix, describing (dis)allowed operations at various stages a single failed certificate verification does not break the whole chain of certificates verified so far during TA, i.e. you can e.g. send one correct certificate and then try 5 different ones if you are not sure which one should be next. Certificate signature is only one of the validity checks performed by the passport on a certificate, the other one is date expiry check. This is why more than one certificate may have to be checked Unexpected getchallenge An unexpected getchallenge sent without SM, coming at any point, could be treated as the start of a new attempt to do BAC, meaning we go to state 2. A less accommodating implementation would go to state 1. Similarly, after receiving a getchallenge command in state 2 (which would be second getchallenge in a row) the passport could go to state 1 or stay in state Operations Interleaving TA TA takes several steps the chain of two certificates has to be verified by the card (selectkey, verifycert) and a finalising authentication step is performed (getchallenge, selectkey, mutualauthenticate). A successful TA takes at least 7 APDU commands. It is not clear whether other operations could be interleaved with TA, e.g. reading datagroups, doing AA, or even CA again. For example, a very strict passport implementation might insist that TA is performed directly after CA. A more liberal one reading datagroups directly after CA, but no longer allow once the first step of TA is taken. An even more liberal one might allow selecting and reading datagroups at any point once BAC has been completed. None of this has any impact on security, assuming of course the access control on reading the datagroups is done correctly. In fact, an EAC passport that we tested allowed such intermediate DG reads. 5.4 Multiple BAC The specs are not clear about multiple BACs. More specifically: a non-sm getchallenge, at any stage, could be interpreted by the applet as the first step in a new BAC procedure. In this case one can imagine that the passport should bring the read access rights down in case the second (new) BAC procedure fails. Another approach could be simply to ignore such getchallenge and keep the BAC session active. 6 On the other hand, the passport provides necessary information for the terminal to try only one, most likely to be valid, chain of two certificates. 8
9 5.5 Multiple EAC It is unclear if repeated CAs (CA one after another before continuing with TA) or whole multiple EACs are allowed. There seems no harm in allowing either, moreover, the CA operation always refreshes SM keys, so e.g. the terminal software may wish to perform CA twice to refresh SM keys two times for additional security (regardless of how pointless this is in practice). Even more, one can imagine that EAC is performed twice with two different sets of certificates, one for reading a fingerprint and one for reading the iris scan. Again, similarly to BAC, one has to be very careful with multiple EACs a second failed EAC after a first successful one should bring down the read rights. 6 Passport Architecture and Protocols By specification, the passport can store up to 19 datagroups, with different information about the holder. Only the first two datagroups are mandatory: DG1 MRZ info (mandatory) DG11 Additional Personal Details DG2 Face image (mandatory) DG12 Additional Document Details DG3 Encoded fingerprint DG13 Optional Details DG4 Encoded iris scan DG14 Chip Authentication Keys DG5 Displayed Portrait DG15 Active Authentication Keys DG6 Displayed Single Digit Fingerprint DG16 Persons to notify DG7 Handwritten signature or Usual Mark DG17 Automatic Border Clearance DG8 Data Features DG18 Electronic Visas DG9 Structure Features DG19 Travel Records DG10 Substance Features If present DG5 contains merely a JPEG image of the holder s face. So does DG2, but it also contains additional face metrics, like eye or hair color. Additionally the passport contains up to three special elementary files: EF.DIR EF.SOD EF.CVCA the table of contents file the Security Object Directory Terminal Authentication root certificate information The EF.DIR file merely tells what other files are stored in the passport. The EF.SOD files is somewhat special and crucial for the document integrity checks. It stores the hashes of all the datagroups, and a signature over all these hashes along with the corresponding country certificate. Checking these stored hashes against the actual datagroup hashes and verifying the signature establishes that the data on the passport had not been tampered with. Verifying the signing certificate against country s issuing authority certificate proves that the passport was indeed issued by the given country. This process is called Passive Authentication (PA). Note that PA cannot prove passport authenticity cloned passports still pass PA. To prove authenticity one has to perform AA or CA with the passport to establish presence of a genuine private key in the passport. Finally, the EF.CVCA file stores some information necessary for TA, see below. In the following we give an in-depth description of the passport authentication protocols, abstracting away the concrete crypto that is used (3DES, RSA, ECC) or the concrete message format. Moreover we used (also in the rest of the paper) reader friendly names for passport APDUs. The actual mapping between our names and proper ISO7816 APDU names [?] is given in Table 2. 9
10 select read getchallenge mutualauthenticate keyag selectkey verifycert SELECT FILE READ BINARY GET CHALLENGE EXTERNAL AUTHENTICATE MSE:Set KAT MSE:Set DST, MSE:Set AT PSO:Verify Certificate Table 2. ISO7816 APDU names 6.1 BAC The Basic Access Control protocol is used to establish secure messaging between the passport and the terminal, that is to establish in a secure way session keys sk enc and sk mac for encryption and MAC-ing respectively, as well as the initial value of the sequence counter ssc. The sequence diagram for this protocol is given in Figure 4. Terminal Passport k enc = der enc(mrz ) k mac = der mac(mrz ) getchallenge fresh nonce n P Terminal Passport fresh nonce n T, new key k T c = enc(k enc, n T n P k T ) m = mac(k mac, c) n P mutualauthenticate(c, m) All communication is protected by SM established during BAC read DG15 PK AA check mac(k mac, m, c) (n P, n T, k P ) = dec(k enc, c) check n T (c, m) check mac(k mac, m, c) (n T, n P, k T ) = dec(k enc, c) check n P ; new key k P c = enc(k enc, n P n T k P ) m = mac(k mac, c) fresh nonce n T internalauthenticate(n T ) s = sign(prk AA, n T ) s verify(pk AA, s, n T ) sk enc = der enc(k P k T ) sk mac = der mac(k P k T ) ssc = init(n P, n T ) Fig. 5. AA Protocol Fig. 4. BAC Protocol To derive the initial static SM keys the terminal has to know the MRZ data of the passport printed on its photo page. This guarantees that the passport is visually accessible to the inspecting party (the terminal) and the chip is not being accessed without the owner s consent. During the protocol, the passport and the terminal exchange their nonces (n P, n T ) and random key seeds (k P, k T ) using encryption and integrity protection provided by the initial static keys k enc and k mac. After the exchange new session keys are derived and the sequence counter is initialized. From this point on the secure messaging is performed with the new encryption and MAC keys sk enc and sk mac. 10
11 6.2 AA The Active Authentication protocol (Figure 5) can be used to check passports authenticity with a simple challenge-response protocol. The terminal chooses a message n T to be signed with the passport s public AA key PK AA, which is first retrieved from the passport s datagroup 15. The passport then signs the message with its securely stored private key PrK AA and sends it back to the terminal for verification. It is now known that this protocol is prone to traceability attacks [4]: there are no limits on the message to be signed by the passport, so e.g. presence of the passport at a certain time and place can be proved by making the passport sign an appropriate message. The Chip Authentication protocol subsumes AA and it rules out such traceability. 6.3 EAC The Extended Access Control protocol [1, Section 3.1] is somewhat more complicated and, as already mentioned, consists of two steps: Chip Authentication (CA) and Terminal Authentication (TA). During CA, the passport proves its authenticity to the terminal with a Diffie-Hellman key exchange protocol. During TA the terminal then proves to the passport that it has the right to access sensitive biometric data i.e. the fingerprint or iris scan by presenting a valid certificate chain. The passport has a root certificate to check validity of the certificate chain. Terminal Passport All communication is protected by SM established during BAC read DG14 PK P,CA read CVCA Cert Root.id read DG1 docid find Cert Root.id certificates and key: Cert DF, Cert T, PrK T,TA All EAC information is available Fig. 6. Preparatory EAC steps Certificates are issued on a per-country basis. A terminal will typically hold several certificate chains, and it is the nationality of the passport that determines which of these the terminal should provide. So as a preparatory step for EAC, terminal reads the root certificate identifier from the passport s CVCA (Card Verifiable Certification Authority) file, to see if it has a corresponding certificate. The terminal also has to read the passport s document number from datagroup 1 (alternatively from the printed MRZ data) and the passport s public CA key PK P,CA from datagroup 14. These steps are presented in Figure 6. 11
12 CA During Chip Authentication [1, Section 3.2] (Figure 7) a single step is used to establish both the chip authenticity and new secure messaging session keys. The underlying cryptographic primitive is Diffie-Hellman key exchange protocol that enables both parties to establish a shared secret (and hence prove to each other the possession of an appropriate private key PrK,CA ) to derive new session keys. After CA is complete, the sequence counter is reset and also both parties record the hash PK h of the terminal public key PK T,CA to be used during Terminal Authentication. Terminal Passport Chip Authentication is complete selectkey(certdf.parentid) Terminal All communication is protected by SM established during BAC All EAC information is available: PK P,CA, Cert DF, Cert T, PrK T,TA, docid new DH key pair PK T,CA, PrK T,CA PK h = hash(pk T,CA) chipauthentication(pk T,CA) Passport PK h = hash(pk T,CA) s = keyag(pk T,CA, PrK P,CA) check param = CertRoot.id verifycert(cert DF) verifysig(cert Root.key, Cert DF.sig) selectkey(certt.parentid) check param = CertDF.id verifycert(cert T) verifysig(cert DF.key, Cert T.sig) getchallenge s = keyag(pk P,CA, PrK T,CA) np fresh np New SM with: skenc = der enc(s), skmac = der mac(s), ssc = 0 selectkey(certt.id) check param = CertT.id Fig. 7. CA Protocol sig = sign(prkt,ta, docid np PKh) mutualauthenticate(sig) verifysig(cert T.key, sig) Fig. 8. TA Protocol TA During Terminal Authentication [1, Section 3.3] the passport receives a chain of certificates from the terminal for verification. Normally two certificates are presented by the terminal. First, the terminal provides a domestic or foreign certificate Cert DF signed by the issuing country s Certification Authority with the root certificate Cert Root ; the root certificate data (its identifier and the public key) 7 is stored in the passport. Second, the terminal provides a terminal certificate Cert T, signed with the domestic/foreign certificate, for which it holds a corresponding terminal private key PrK T,TA. Before any certificates or signature is presented for verification the terminal selects the corresponding certificate public key on the passport with selectkey. This step is actually redundant, because the passport implicitly knows the key identifier beforehand, it merely serves as an additional consistency check (in fact in the 7 The TA protocol also allows the terminal to update the current root certificate and current date stored in the passport using special terminal certificates. Accounting for this would complicate our description even more, we refer the reader to [1] for further details. 12
13 edl specification this step is made optional, see below). Then the corresponding certificate signature is verified. Once the validity of the certificates is established, the terminal authenticates to the passport with a challenge response protocol using its private key PrK T,TA corresponding to the terminal certificate Cert T. First a fresh challenge n P is received from the passport and then the terminal signs this challenge along with the passport document number and the hash of its public key used during Chip Authentication. A successful completion of all the above steps grants the terminal the data read rights defined in its terminal certificate Cert T. Note that this does not mean that reading out e.g. a fingerprint from the passport will necessarily be possible, only if the Cert T access rights say so. The presence of these access rights in this certificate is necessary to issue a certificate that would have a selective right to read out e.g. a fingerprint, but not the iris scan, or vice-versa. A complete TA run, for the case the certificate chain consists of just two certificates, is shown in Figure 8. 7 e-driving Licenses The electronic driving license defined in the ISO18013 standard is very similar to the e-passport and our work also applies to driving licenses. The differences from the e-passport are the following. Some of them slightly change the picture presented so far. 7.1 Naming Conventions, Identifiers The BAC and EAC passport protocols are respectively named Basic Access Protection (BAP) and Extended Access Protection (EAP) in ISO The main distinction between BAP and BAC is that: BAP offers more cryptographic configurations. While BAC is offered only in one crypto configuration supporting 3DES encryption and SHA1 hashing, BAP has 4 possible configurations, the strongest one supporting AES-256 encryption and SHA-256 hashing. This difference has no impact on the protocol transitions or access rights. The ASN.1 8 object identifiers used in ISO18013 are different from the ones used in ICAO specs. This has no impact on any part of the protocol definitions either. 7.2 More General EAP Access Options In e-passports the EAC protocol controls access to datagroups 3 (fingerprint) and 4 (iris scan). The values 3 and 4 are hard coded into the specification. That is, in the passport no other datagroups can be EAC protected. In the driving license specification this mechanism is made more general. Any valid datagroup (1 24) can be protected by EAP. Here, the consequence is that access control tables, as given in Figure 3 for the passport, have to be more general. 7.3 Optional EAP APDUs The TA key selection APDU selectkey that is sent to the passport during EAC provide information that is already implicitly known by the passport, namely the identifiers of the certificate with which validity of the next certificate has to be checked. Because of this these steps are optional in the EAP protocol. That is, they can be skipped altogether, or can be sent to the card nevertheless, in which case the
14 card checks that provided data matches with what it should be. The consequence for our state diagrams is that the steps labelled selectkey in Figure 2 are optional and can be skipped. 8 Conclusions and Future Work This paper gives an overview of the electronic passport protocols and proposed a way to describe the protocols using state chart diagrams and access control matrices. We believe this provides a useful supplement to the official specs, and might in fact be provided as part of these specs. We ourselves have used these state diagrams to test e-passports using model-based testing [8]. The paper also identifies a number of issues and open questions in the official specifications. Most notably, how an attempt to do a multiple BAC or EAC should be treated is not clear, or how certain failed operations should be handled. For us the main (practice oriented) methodology in resolving issues like this is to test the product in question, i.e. the passport, to see what the actual implementation does, and consequently what is the common understanding of the specification among the implementors. However, we stress that this should not be used to state what the specification should be, but rather to make statistics on how underspecifications are resolved by implementors. Based on the specification and the security objectives one should determine which freedom is safe for passports to implement, not the other way around. So far we only had a chance to test one EAC enabled passport. Since we were given access to the TA certificates we could test the whole EAC procedure thoroughly, e.g. we found out that on this particular passport one can interleave TA operations with other ones. Without the certificates one can only test the passport until a successful CA. Obviously, we would like to get more opportunities to fully test different EAC implementations in future. As for the e-driving license, because the standard is very recent (it has been finalised at the beginning of 2009) it seems that our open source implementation is the only one available for inspection. Another ongoing project is automatic development of our state diagrams using automatic learning techniques [2]. Here a passport is probed with different commands and by interpreting the passport responses a state chart diagram for the protocol is build. This will allow fast and automatic discovery of particular choices in a given passport implementation. Acknowledgement Thanks to Deni Vangjeli for spotting a flaw in our BAC description. References 1. Advanced security mechanisms for machine readable travel documents Extended Access Control (EAC) Version Technical Report TR-03110, German Federal Office for Information Security (BSI), Bonn, Germany, Fides Aarts, Bengt Jonsson, and Johan Uijen. Generating models of infinite-state communication protocols using regular inference with abstraction. Submitted. 3. Tom Chothia and Vitaliy Smirnov. A Traceability Attack Against e-passports. In 14th International Conference on Financial Cryptography and Data Security 2010, LNCS. Springer, To appear. 4. Jaap-Henk Hoepman, Engelbert Hubbers, Bart Jacobs, Martijn Oostdijk, and Ronny Wichers Schreur. Crossing borders: Security and privacy issues of the European e-passport. In Proc. IWSEC 2006: Advances in Information and Computer Security, number 4266 in LNCS, pages Springer,
15 5. Doc 9303 Machine readable travel documents Part 1 2. Technical report, ICAO, Sixth edition. 6. Supplement to Doc Technical report, ICAO, november Release 7 - Final. 7. Jean Monnerat, Serge Vaudenay, and Martin Vuagnoux. About machine-readable travel documents: Privacy enhancement using (weakly) non-transferable data authentication. In International Conference on RFID Security 2007, pages 15 28, W. Mostowski, E. Poll, J. Schmaltz, J. Tretmans, and R. Wichers Schreur. Modelbased testing of electronic passports. In M. Alpuente, B. Cook, and C. Joubert, editors, Formal Methods for Industrial Critical Systems 2009, Proceedings, volume 5825 of LNCS, pages Springer, November Martijn Oostdijk, Dirk-Jan van Dijk, and Maarten Wegdam. Usercentric identity using epassports. In Security and Privacy in Communication Networks, volume 19 of LNICST, pages Springer, H. Richter, W. Mostowski, and E. Poll. Fingerprinting passports. In NLUUG Spring Conference on Security, pages 21 30,
Keep Out of My Passport: Access Control Mechanisms in E-passports
Keep Out of My Passport: Access Control Mechanisms in E-passports Ivo Pooters June 15, 2008 Abstract Nowadays, over 40 different countries issue biometric passports to increase security on there borders.
Implementation of biometrics, issues to be solved
ICAO 9th Symposium and Exhibition on MRTDs, Biometrics and Border Security, 22-24 October 2013 Implementation of biometrics, issues to be solved Eugenijus Liubenka, Chairman of the Frontiers / False Documents
Security by Politics - Why it will never work. Lukas Grunwald DN-Systems GmbH Germany DefCon 15 Las Vegas USA
Security by Politics - Why it will never work Lukas Grunwald DN-Systems GmbH Germany DefCon 15 Las Vegas USA Agenda Motivation Some basics Brief overview epassport (MRTD) Why cloning? How to attack the
Preventing fraud in epassports and eids
Preventing fraud in epassports and eids Security protocols for today and tomorrow by Markus Mösenbacher, NXP Machine-readable passports have been a reality since the 1980s, but it wasn't until after 2001,
MACHINE READABLE TRAVEL DOCUMENTS
MACHINE READABLE TRAVEL DOCUMENTS (Logo) TECHNICAL REPORT PKI for Machine Readable Travel Documents offering ICC Read-Only Access Version - 1.1 Date - October 01, 2004 Published by authority of the Secretary
A Note on the Relay Attacks on e-passports
A Note on the Relay Attacks on e-passports The Case of Czech e-passports Martin Hlaváč 1 and Tomáš Rosa 1,2 [email protected] and [email protected] 1 Department of Algebra, Charles University
Caught in the Maze of Security Standards
Caught in the Maze of ΓΝΩΘΙΣ Know Thyself ΑΥΤΟΝ Security Standards Dieter Gollmann Hamburg University of Technology What this talk is not about 1. Designing security protocols is difficult and error prone
Electronic machine-readable travel documents (emrtds) The importance of digital certificates
Electronic machine-readable travel documents (emrtds) The importance of digital certificates Superior security Electronic machine-readable travel documents (emrtds) are well-known for their good security.
Operational and Technical security of Electronic Passports
European Agency for the Management of Operational Cooperation at the External Borders of the Member States of the European Union Operational and Technical security of Electronic Passports Warsaw, Legal
Joeri de Ruiter Sicco Verwer
Automated reverse engineering of security protocols Learning to fuzz, fuzzing to learn Fides Aarts Erik Poll Joeri de Ruiter Sicco Verwer Radboud University Nijmegen Fuzzing 1. Plain fuzzing, with long
Best Practices for the Use of RF-Enabled Technology in Identity Management. January 2007. Developed by: Smart Card Alliance Identity Council
Best Practices for the Use of RF-Enabled Technology in Identity Management January 2007 Developed by: Smart Card Alliance Identity Council Best Practices for the Use of RF-Enabled Technology in Identity
ETSI TS 102 176-2 V1.2.1 (2005-07)
TS 102 176-2 V1.2.1 (2005-07) Technical Specification Electronic Signatures and Infrastructures (ESI); Algorithms and Parameters for Secure Electronic Signatures; Part 2: Secure channel protocols and algorithms
Advanced Security Mechanisms for Machine Readable Travel Documents
Technical Guideline TR-03110-3 Advanced Security Mechanisms for Machine Readable Travel Documents Part 3 Common Specifications Version 2.10 20. March 2012 History Version Date Comment 1.00 2006-02-08 Initial
Test plan for eid and esign compliant terminal software with EACv2
Technical Guideline BSI TR-03105 Part 5.3 Test plan for eid and esign compliant terminal software with EACv2 Version: 2.0 Date: 2015-05-22 Bundesamt für Sicherheit in der Informationstechnik Postfach 20
Biometrics for Public Sector Applications
Technical Guideline TR-03121-2 Biometrics for Public Sector Applications Part 2: Software Architecture and Application Profiles Version 2.3 Bundesamt für Sicherheit in der Informationstechnik Postfach
Full page passport/document reader Regula model 70X4M
Full page passport/document reader Regula model 70X4M Full page passport reader with no moving parts inside. Automatic reading and authenticity verification of passports, IDs, visas, driver s licenses
eidas as blueprint for future eid projects cryptovision mindshare 2015 HJP Consulting Holger Funke
eidas as blueprint for future eid projects cryptovision mindshare 2015 HJP Consulting Holger Funke Agenda eidas Regulation TR-03110 V2.20 German ID card POSeIDAS Summary cryptovision mindshare 2015: eidas
Using etoken for SSL Web Authentication. SSL V3.0 Overview
Using etoken for SSL Web Authentication Lesson 12 April 2004 etoken Certification Course SSL V3.0 Overview Secure Sockets Layer protocol, version 3.0 Provides communication privacy over the internet. Prevents
Advanced Security Mechanisms for Machine Readable Travel Documents and eidas Token
Technical Guideline TR-03110-4 Advanced Security Mechanisms for Machine Readable Travel Documents and eidas Token Part 4 Applications and Document Profiles Version 2.20 3. February 2015 History Version
RFID Guardian Back-end Security Protocol
Master Thesis RFID Guardian Back-end Security Protocol Author: Hongliang Wang First Reader: Bruno Crispo Second Reader: Melanie Reiback Department of Computer Science Vrije Universiteit, Amsterdam The
Formal analysis of EMV
Formal analysis of EMV Erik Poll Joeri de Ruiter Digital Security group, Radboud University Nijmegen Overview The EMV standard Known issues with EMV Formalisation of the EMV standard in F# Formal analysis
Moving to the third generation of electronic passports
Moving to the third generation of electronic passports A new dimension in electronic passport security with Supplemental Access Control (SAC) > WHITE PAPER 2 Gemalto in brief Gemalto is the world leader
EPASSPORT WITH BASIC ACCESS CONTROL AND ACTIVE AUTHENTICATION
COMMON CRITERIA PROTECTION PROFILE EPASSPORT WITH BASIC ACCESS CONTROL AND ACTIVE AUTHENTICATION Draft Version 1.0 TURKISH STANDARDS INSTITUTION TABLE OF CONTENTS Common Criteria Protection Profile...
Discover Germany s Electronic Passport
Discover Germany s Electronic Passport Starting 1 Nov. 2007 E-Passport 2nd Generation www.epass.de 1 Introducing Germany s e-passport If you want to know why there are electronic passports and how to recognize
FAQs Electronic residence permit
FAQs Electronic residence permit General 1) When was the electronic residence permit introduced? Since 1 September 2011, foreigners in Germany have been issued with the new electronic residence permit
RF-Enabled Applications and Technology: Comparing and Contrasting RFID and RF-Enabled Smart Cards
RF-Enabled Applications and Technology: Comparing and Contrasting RFID and RF-Enabled Smart Cards January 2007 Developed by: Smart Card Alliance Identity Council RF-Enabled Applications and Technology:
Protection Profile for UK Dual-Interface Authentication Card
Protection Profile for UK Dual-Interface Authentication Card Version 1-0 10 th July 2009 Reference: UNKT-DO-0002 Introduction This document defines a Protection Profile to express security, evaluation
E-Visas Verification Schemes Based on Public-Key Infrastructure and Identity Based Encryption
Journal of Computer Science 6 (7): 723-727, 2010 ISSN 1549-3636 2010 Science Publications E-Visas Verification Schemes Based on Public-Key Infrastructure and Identity Based Encryption Najlaa A. Abuadhmah,
Biometrics, Tokens, & Public Key Certificates
Biometrics, Tokens, & Public Key Certificates The Merging of Technologies TOKENEER Workstations WS CA WS WS Certificate Authority (CA) L. Reinert S. Luther Information Systems Security Organization Biometrics,
Fighting product clones through digital signatures
Paul Curtis, Katrin Berkenkopf Embedded Experts Team, SEGGER Microcontroller Fighting product clones through digital signatures Product piracy and forgery are growing problems that not only decrease turnover
CS 356 Lecture 28 Internet Authentication. Spring 2013
CS 356 Lecture 28 Internet Authentication Spring 2013 Review Chapter 1: Basic Concepts and Terminology Chapter 2: Basic Cryptographic Tools Chapter 3 User Authentication Chapter 4 Access Control Lists
50 ways to break RFID privacy
50 ways to break RFID privacy Ton van Deursen 1 University of Luxembourg [email protected] 1 Financial support received from the Fonds National de la Recherche (Luxembourg). RFID privacy 1 / 40 Outline
E-Passport Testing. Ensuring Global Acceptance. Jos Chehin Date: 17 November 2006 Location: ASML
E-assport Testing Ensuring Global Acceptance By: Jos Chehin Date: 17 ovember 2006 Location: ASML Global Acceptance of the e-assport Global Acceptance Interoperability Functionality Security Test Standards
Modular biometric architecture with secunet biomiddle
Version 2.1 Modular biometric architecture with secunet biomiddle White Paper Version 2.0, 25/03/10 secunet Security Networks AG Copyright 2010 by secunet Security Networks AG This document is for information
How To Hack An Rdi Credit Card
RFID Payment Card Vulnerabilities Technical Report Thomas S. Heydt-Benjamin 1, Daniel V. Bailey 2, Kevin Fu 1, Ari Juels 2, and Tom O'Hare 3 Abstract 1: University of Massachusetts at Amherst {tshb, kevinfu}@cs.umass.edu
Advanced Authentication
White Paper Advanced Authentication Introduction In this paper: Introduction 1 User Authentication 2 Device Authentication 3 Message Authentication 4 Advanced Authentication 5 Advanced Authentication is
Formal models of bank cards for free
Formal models of bank cards for free Fides Aarts, Joeri de Ruiter and Erik Poll Digital Security, Radboud University Nijmegen Introduction Active learning on bank cards Learn state machines of implementations
Part I. Universität Klagenfurt - IWAS Multimedia Kommunikation (VK) M. Euchner; Mai 2001. Siemens AG 2001, ICN M NT
Part I Contents Part I Introduction to Information Security Definition of Crypto Cryptographic Objectives Security Threats and Attacks The process Security Security Services Cryptography Cryptography (code
FAQs - New German ID Card. General
FAQs - New German ID Card General 1) How to change from the old ID card to the new one? The new Law on Identification Cards came into effect on 1 November 2010. Since then, citizens can apply for the new
Chapter 11 Security+ Guide to Network Security Fundamentals, Third Edition Basic Cryptography
Chapter 11 Security+ Guide to Network Security Fundamentals, Third Edition Basic Cryptography What Is Steganography? Steganography Process of hiding the existence of the data within another file Example:
OpenADR 2.0 Security. Jim Zuber, CTO QualityLogic, Inc.
OpenADR 2.0 Security Jim Zuber, CTO QualityLogic, Inc. Security Overview Client and server x.509v3 certificates TLS 1.2 with SHA256 ECC or RSA cipher suites TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 TLS_RSA_WITH_AES_128_CBC_SHA256
Statewatch Briefing ID Cards in the EU: Current state of play
Statewatch Briefing ID Cards in the EU: Current state of play Introduction In March 2010, the Council Presidency sent out a questionnaire to EU Member States and countries that are members of the socalled
IT Networks & Security CERT Luncheon Series: Cryptography
IT Networks & Security CERT Luncheon Series: Cryptography Presented by Addam Schroll, IT Security & Privacy Analyst 1 Outline History Terms & Definitions Symmetric and Asymmetric Algorithms Hashing PKI
Security in Android apps
Security in Android apps Falco Peijnenburg (3749002) August 16, 2013 Abstract Apps can be released on the Google Play store through the Google Developer Console. The Google Play store only allows apps
Common Criteria Protection Profile for Inspection Systems (IS) BSI-CC-PP-0064. Version 1.01 (15 th April 2010)
Common Criteria Protection Profile for BSI-CC-PP-0064 Version 1.01 (15 th April 2010) Federal Office for Information Security Postfach 20 03 63 53133 Bonn Phone: +49 228 99 9582-0 e-mail: [email protected]
CERTIFICATION REPORT
REF: 2011-11-INF-837 v1 Target: Público Date: 17.04.2012 Created by: CERT8 Revised by: CALIDAD Approved by: TECNICO CERTIFICATION REPORT File: 2011-11 KONA 102J1 epassport EAC v1.1 Applicant: KEBTechnology
COMMON CERTIFICATE POLICY FOR THE EXTENDED ACCESS CONTROL INFRASTRUCTURE FOR PASSPORTS AND TRAVEL DOCUMENTS ISSUED BY EU MEMBER STATES
COMMON CERTIFICATE POLICY FOR THE EXTENDED ACCESS CONTROL INFRASTRUCTURE FOR PASSPORTS AND TRAVEL DOCUMENTS ISSUED BY EU MEMBER STATES BSI TR-03139 Version 2.1 27 May 2013 Foreword The present document
Digital Certificates (Public Key Infrastructure) Reshma Afshar Indiana State University
Digital Certificates (Public Key Infrastructure) Reshma Afshar Indiana State University October 2015 1 List of Figures Contents 1 Introduction 1 2 History 2 3 Public Key Infrastructure (PKI) 3 3.1 Certificate
Testing the Java Card Applet Firewall
Testing the Java Card Applet Firewall Wojciech Mostowski and Erik Poll Security of Systems (SoS) group Department of Computing Science Radboud University Nijmegen The Netherlands {woj,[email protected]
CSC 474 -- Network Security. User Authentication Basics. Authentication and Identity. What is identity? Authentication: verify a user s identity
CSC 474 -- Network Security Topic 6.2 User Authentication CSC 474 Dr. Peng Ning 1 User Authentication Basics CSC 474 Dr. Peng Ning 2 Authentication and Identity What is identity? which characteristics
Entrust Smartcard & USB Authentication
Entrust Smartcard & USB Authentication Technical Specifications Entrust IdentityGuard smartcard- and USB-based devices allow organizations to leverage strong certificate-based authentication of user identities
Chapter 15 User Authentication
Chapter 15 User Authentication 2015. 04. 06 Jae Woong Joo SeoulTech ([email protected]) Table of Contents 15.1 Remote User-Authentication Principles 15.2 Remote User-Authentication Using Symmetric
Using EMV Cards to Protect E-commerce Transactions
Using EMV Cards to Protect E-commerce Transactions Vorapranee Khu-Smith and Chris J. Mitchell Information Security Group, Royal Holloway, University of London, Egham, Surrey, TW20 0EX, United Kingdom {V.Khu-Smith,
Contactless Smart Cards vs. EPC Gen 2 RFID Tags: Frequently Asked Questions. July, 2006. Developed by: Smart Card Alliance Identity Council
Contactless Smart Cards vs. EPC Gen 2 RFID Tags: Frequently Asked Questions July, 2006 Developed by: Smart Card Alliance Identity Council Contactless Smart Cards vs. EPC Gen 2 RFID Tags: Frequently Asked
NISTIR 7676 Maintaining and Using Key History on Personal Identity Verification (PIV) Cards
NISTIR 7676 Maintaining and Using Key History on Personal Identity Verification (PIV) Cards David A. Cooper NISTIR 7676 Maintaining and Using Key History on Personal Identity Verification (PIV) Cards David
Network Security. Gaurav Naik Gus Anderson. College of Engineering. Drexel University, Philadelphia, PA. Drexel University. College of Engineering
Network Security Gaurav Naik Gus Anderson, Philadelphia, PA Lectures on Network Security Feb 12 (Today!): Public Key Crypto, Hash Functions, Digital Signatures, and the Public Key Infrastructure Feb 14:
I N F O R M A T I O N S E C U R I T Y
NIST Special Publication 800-78-3 DRAFT Cryptographic Algorithms and Key Sizes for Personal Identity Verification W. Timothy Polk Donna F. Dodson William E. Burr Hildegard Ferraiolo David Cooper I N F
Contents. Identity Assurance (Scott Rea Dartmouth College) IdM Workshop, Brisbane Australia, August 19, 2008
Identity Assurance (Scott Rea Dartmouth College) IdM Workshop, Brisbane Australia, August 19, 2008 Contents Authentication and Identity Assurance The Identity Assurance continuum Plain Password Authentication
Patterns for Secure Boot and Secure Storage in Computer Systems
Patterns for Secure Boot and Secure Storage in Computer Systems Hans Löhr, Ahmad-Reza Sadeghi, Marcel Winandy Horst Görtz Institute for IT Security, Ruhr-University Bochum, Germany {hans.loehr,ahmad.sadeghi,marcel.winandy}@trust.rub.de
New Attacks against RFID-Systems. Lukas Grunwald DN-Systems GmbH Germany
New Attacks against RFID-Systems Lukas Grunwald DN-Systems GmbH Germany Agenda What is RFID? How to exploit and attack RFID systems Attacks against the middleware Reader-emulation, soft-tags Unexpected
Authenticity of Public Keys
SSL/TLS EJ Jung 10/18/10 Authenticity of Public Keys Bob s key? private key Bob public key Problem: How does know that the public key she received is really Bob s public key? Distribution of Public Keys!
Recommendation for Pair-Wise Key Establishment Schemes Using Discrete Logarithm Cryptography (Revised)
NIST Special Publication 800-56A Recommendation for Pair-Wise Key Establishment Schemes Using Discrete Logarithm Cryptography (Revised) Elaine Barker, Don Johnson, and Miles Smid C O M P U T E R S E C
NIST Test Personal Identity Verification (PIV) Cards
NISTIR 7870 NIST Test Personal Identity Verification (PIV) Cards David A. Cooper http://dx.doi.org/10.6028/nist.ir.7870 NISTIR 7870 NIST Text Personal Identity Verification (PIV) Cards David A. Cooper
A Digital Signature Scheme in Web-based Negotiation Support System
A Digital Signature Scheme in Web-based Negotiation Support System Yuxuan Meng 1 and Bo Meng 2 1 Department of Computer Science, University of Saskatchewan, Saskatoon, Saskatchewan, S7N 5C9, Canada [email protected]
Best Solutions for Biometrics and eid
Best Solutions for Biometrics and eid In times of virtual communication even a person s identity is converted into an electronic form with the help of biometrics and then organised through intricate technical
Asymmetric cryptosystems fundamental problem: authentication of public keys
Network security Part 2: protocols and systems (a) Authentication of public keys Università degli Studi di Brescia Dipartimento di Ingegneria dell Informazione 2014/2015 Asymmetric cryptosystems fundamental
Combatting Counterfeit Identities: The Power of Pairing Physical & Digital IDs
Combatting Counterfeit Identities: The Power of Pairing Physical & Digital IDs 1 GOVERNMENTS ADOPTING DIGITAL STRATEGIES Governments designing/operating digital ecosystems to create, transform and optimize
Smart Card- An Alternative to Password Authentication By Ahmad Ismadi Yazid B. Sukaimi
Smart Card- An Alternative to Password Authentication By Ahmad Ismadi Yazid B. Sukaimi Purpose This paper is intended to describe the benefits of smart card implementation and it combination with Public
Common security requirements Basic security tools. Example. Secret-key cryptography Public-key cryptography. Online shopping with Amazon
1 Common security requirements Basic security tools Secret-key cryptography Public-key cryptography Example Online shopping with Amazon 2 Alice credit card # is xxxx Internet What could the hacker possibly
Attestation and Authentication Protocols Using the TPM
Attestation and Authentication Protocols Using the TPM Ariel Segall June 21, 2011 Approved for Public Release: 11-2876. Distribution Unlimited. c 2011. All Rights Reserved. (1/28) Motivation Almost all
Facts about the new identity card
Facts about the new identity card Contents The new identity card At a glance... 4 In detail... 6 Photographs... 8 New ID card, new possibilities...10 Special functions... 11 The online function...12 Reader
Security. Learning Objectives. This module will help you...
Security 5-1 Learning Objectives This module will help you... Understand the security infrastructure supported by JXTA Understand JXTA's use of TLS for end-to-end security 5-2 Highlights Desired security
CERTIFICATION REPORT
REF: 2011-12-INF-1089 v1 Target: Expediente Date: 17.12.2012 Created by: CERT8 Revised by: CALIDAD Approved by: TECNICO CERTIFICATION REPORT File: 2011-12 POLYMNIE LDS BAC applet Applicant: B340709534
Web Security. Mahalingam Ramkumar
Web Security Mahalingam Ramkumar Issues Phishing Spreading misinformation Cookies! Authentication Domain name DNS Security Transport layer security Dynamic HTML Java applets, ActiveX, JavaScript Exploiting
CS155. Cryptography Overview
CS155 Cryptography Overview Cryptography Is n A tremendous tool n The basis for many security mechanisms Is not n The solution to all security problems n Reliable unless implemented properly n Reliable
GT 6.0 GSI C Security: Key Concepts
GT 6.0 GSI C Security: Key Concepts GT 6.0 GSI C Security: Key Concepts Overview GSI uses public key cryptography (also known as asymmetric cryptography) as the basis for its functionality. Many of the
Chapter 9 Key Management 9.1 Distribution of Public Keys 9.1.1 Public Announcement of Public Keys 9.1.2 Publicly Available Directory
There are actually two distinct aspects to the use of public-key encryption in this regard: The distribution of public keys. The use of public-key encryption to distribute secret keys. 9.1 Distribution
A Secure RFID Ticket System For Public Transport
A Secure RFID Ticket System For Public Transport Kun Peng and Feng Bao Institute for Infocomm Research, Singapore Abstract. A secure RFID ticket system for public transport is proposed in this paper. It
SecureStore I.CA. User manual. Version 2.16 and higher
User manual Version 2.16 and higher Contents SecureStore I.CA 1. INTRODUCTION...3 2. ACCESS DATA FOR THE CARD...3 2.1 Card initialisation...3 3. MAIN SCREEN...4 4. DISPLAYING INFORMATION ABOUT THE PAIR
Cryptography and Network Security Chapter 14. Key Distribution. Key Management and Distribution. Key Distribution Task 4/19/2010
Cryptography and Network Security Chapter 14 Fifth Edition by William Stallings Lecture slides by Lawrie Brown Chapter 14 Key Management and Distribution No Singhalese, whether man or woman, would venture
Authentication requirement Authentication function MAC Hash function Security of
UNIT 3 AUTHENTICATION Authentication requirement Authentication function MAC Hash function Security of hash function and MAC SHA HMAC CMAC Digital signature and authentication protocols DSS Slides Courtesy
I N F O R M A T I O N S E C U R I T Y
NIST Special Publication 800-78-2 DRAFT Cryptographic Algorithms and Key Sizes for Personal Identity Verification W. Timothy Polk Donna F. Dodson William. E. Burr I N F O R M A T I O N S E C U R I T Y
A Vulnerability in the Song Authentication Protocol for Low-Cost RFID Tags
A Vulnerability in the Song Authentication Protocol for Low-Cost RFID Tags Sarah Abughazalah, Konstantinos Markantonakis, and Keith Mayes Smart Card Centre-Information Security Group (SCC-ISG) Royal Holloway,
Message authentication and. digital signatures
Message authentication and " Message authentication digital signatures verify that the message is from the right sender, and not modified (incl message sequence) " Digital signatures in addition, non!repudiation
Securing Host Operations with a Dedicated Cryptographic IC - CryptoCompanion
Securing Host Operations with a Dedicated Cryptographic IC - CryptoCompanion By Kerry Maletsky, Business Unit Director Crypto Products Summary There is a growing need for strong hardware security devices
Analyzing the Security Schemes of Various Cloud Storage Services
Analyzing the Security Schemes of Various Cloud Storage Services ECE 646 Project Presentation Fall 2014 12/09/2014 Team Members Ankita Pandey Gagandeep Singh Bamrah Pros and Cons of Cloud Storage Services
Cryptography & Digital Signatures
Cryptography & Digital Signatures CS 594 Special Topics/Kent Law School: Computer and Network Privacy and Security: Ethical, Legal, and Technical Consideration Prof. Sloan s Slides, 2007, 2008 Robert H.
Overview of Cryptographic Tools for Data Security. Murat Kantarcioglu
UT DALLAS Erik Jonsson School of Engineering & Computer Science Overview of Cryptographic Tools for Data Security Murat Kantarcioglu Pag. 1 Purdue University Cryptographic Primitives We will discuss the
CS 758: Cryptography / Network Security
CS 758: Cryptography / Network Security offered in the Fall Semester, 2003, by Doug Stinson my office: DC 3122 my email address: [email protected] my web page: http://cacr.math.uwaterloo.ca/~dstinson/index.html
NIST ITL July 2012 CA Compromise
NIST ITL July 2012 CA Compromise Prepared for: Intelligent People [email protected] 1 NIST ITL Bulletin on CA Compromise http://csrc.nist.gov/publications/nistbul/july-2012_itl-bulletin.pdf These
Introducing etoken. What is etoken?
Introducing etoken Nirit Bear September 2002 What is etoken? Small & portable reader-less Smartcard Standard USB connectivity Logical and physical protection Tamper evident (vs. tamper proof) Water resistant
Client Server Registration Protocol
Client Server Registration Protocol The Client-Server protocol involves these following steps: 1. Login 2. Discovery phase User (Alice or Bob) has K s Server (S) has hash[pw A ].The passwords hashes are
PKD Board ICAO PKD unclassified B-Tec/37. Procedures for the ICAO Public Key Directory
Procedures for the ICAO Public Key Directory last modification final 1/13 SECTION 1 INTRODUCTION 1.1 As part of the MRTD initiative by ICAO, the Participants will upload to and download from the PKD, their
Counter Expertise Review on the TNO Security Analysis of the Dutch OV-Chipkaart. OV-Chipkaart Security Issues Tutorial for Non-Expert Readers
Counter Expertise Review on the TNO Security Analysis of the Dutch OV-Chipkaart OV-Chipkaart Security Issues Tutorial for Non-Expert Readers The current debate concerning the OV-Chipkaart security was
Cryptography and Network Security Chapter 14
Cryptography and Network Security Chapter 14 Fifth Edition by William Stallings Lecture slides by Lawrie Brown Chapter 14 Key Management and Distribution No Singhalese, whether man or woman, would venture
WiMAX Public Key Infrastructure (PKI) Users Overview
WiMAX Public Key Infrastructure (PKI) Users Overview WiMAX, Mobile WiMAX, Fixed WiMAX, WiMAX Forum, WiMAX Certified, WiMAX Forum Certified, the WiMAX Forum logo and the WiMAX Forum Certified logo are trademarks
