Biometrics, Tokens, & Public Key Certificates



Similar documents
A Security Flaw in the X.509 Standard Santosh Chokhani CygnaCom Solutions, Inc. Abstract

NISTIR 7676 Maintaining and Using Key History on Personal Identity Verification (PIV) Cards

Prepared By: P Lichen. P Xulu

Public-Key Infrastructure

NIST Test Personal Identity Verification (PIV) Cards

Smart Card- An Alternative to Password Authentication By Ahmad Ismadi Yazid B. Sukaimi

TechNote 0006: Digital Signatures in PDF/A-1

PRIME IDENTITY MANAGEMENT CORE

Digital Certificates (Public Key Infrastructure) Reshma Afshar Indiana State University

CS 356 Lecture 28 Internet Authentication. Spring 2013

Certification Practice Statement

Digital Signatures in a PDF

Ciphire Mail. Abstract

What Does it Mean to be PIVish in PACS ICAM PIV in E-PACS Guidance v2.0.2 the short form. December 3, 2012

Network Security. Gaurav Naik Gus Anderson. College of Engineering. Drexel University, Philadelphia, PA. Drexel University. College of Engineering

White Paper. Digital signatures from the cloud Basics and Applications

Understanding digital certificates

Managed Portable Security Devices

ETSI TS V1.1.1 ( )

How To Encrypt Data With Encryption

SBClient SSL. Ehab AbuShmais

Authentication Applications

Grid Computing - X.509

OpenADR 2.0 Security. Jim Zuber, CTO QualityLogic, Inc.

TELSTRA RSS CA Subscriber Agreement (SA)

NEMA Standards Publication PS 3 Supplement 41. Digital Imaging and Communications in Medicine (DICOM) Digital Signatures

The DoD Public Key Infrastructure And Public Key-Enabling Frequently Asked Questions

Cryptography and Network Security Chapter 14. Key Distribution. Key Management and Distribution. Key Distribution Task 4/19/2010

PKI NBP Certification Policy for ESCB Encryption Certificates. OID: version 1.2

Introduction to Public Key Technology and the Federal PKI Infrastructure 26 February 2001

Overview of CSS SSL. SSL Cryptography Overview CHAPTER

Certificate Policy for. SSL Client & S/MIME Certificates

DEPARTMENT OF DEFENSE PUBLIC KEY INFRASTRUCTURE EXTERNAL CERTIFICATION AUTHORITY MASTER TEST PLAN VERSION 1.0

Chapter 4. Authentication Applications. COSC 490 Network Security Annie Lu 1

An Introduction to Cryptography as Applied to the Smart Grid

Neutralus Certification Practices Statement

Authentication Application

Overview of Cryptographic Tools for Data Security. Murat Kantarcioglu

Introduction to Network Security Key Management and Distribution

National Security Agency Perspective on Key Management

Key Management and Distribution

Mobile OTPK Technology for Online Digital Signatures. Dec 15, 2015

Enabling SSL and Client Certificates on the SAP J2EE Engine

Connected from everywhere. Cryptelo completely protects your data. Data transmitted to the server. Data sharing (both files and directory structure)

Cryptography and Network Security Chapter 14

CALIFORNIA SOFTWARE LABS

Using etoken for SSL Web Authentication. SSL V3.0 Overview

I N F O R M A T I O N S E C U R I T Y

PKI NBP Certification Policy for ESCB Signature Certificates. OID: version 1.5

Cryptography and Network Security Digital Signature

Certification Authority. The X.509 standard, PKI and electronic documents. X.509 certificates. X.509 version 3. Critical extensions.

Authentication Types. Password-based Authentication. Off-Line Password Guessing

Introducing etoken. What is etoken?

Certification Report

Chapter 9 Key Management 9.1 Distribution of Public Keys Public Announcement of Public Keys Publicly Available Directory

Guide to Data Field Encryption

YubiKey PIV Deployment Guide

Chapter 15 User Authentication

Moving to Multi-factor Authentication. Kevin Unthank

Part III-a. Universität Klagenfurt - IWAS Multimedia Kommunikation (VK) M. Euchner; Mai Siemens AG 2001, ICN M NT

2.4: Authentication Authentication types Authentication schemes: RSA, Lamport s Hash Mutual Authentication Session Keys Trusted Intermediaries

PUBLIC Secure Login for SAP Single Sign-On Implementation Guide

Authentication Applications

ETSI TS V1.1.1 ( ) Technical Specification

GlobalPlatform. Card Specification. Version 2.2

eid Security Frank Cornelis Architect eid fedict All rights reserved

OFFICE OF THE CONTROLLER OF CERTIFICATION AUTHORITIES TECHNICAL REQUIREMENTS FOR AUDIT OF CERTIFICATION AUTHORITIES

JTC 1/SC 27Security Techniques - Översikt arbetsgrupper och standarder

I N F O R M A T I O N S E C U R I T Y

How To Understand And Understand The Security Of A Key Infrastructure

Recommendation for Pair-Wise Key Establishment Schemes Using Discrete Logarithm Cryptography (Revised)

DRAFT Standard Statement Encryption

Technical Description. DigitalSign 3.1. State of the art legally valid electronic signature. The best, most secure and complete software for

SMPTE Standards Transition Issues for NIST/FIPS Requirements v1.1

MACHINE READABLE TRAVEL DOCUMENTS

Authentication requirement Authentication function MAC Hash function Security of

RF-Enabled Applications and Technology: Comparing and Contrasting RFID and RF-Enabled Smart Cards

Digital Signatures. Meka N.L.Sneha. Indiana State University. October 2015

Chapter 7 Managing Users, Authentication, and Certificates

Asymmetric cryptosystems fundamental problem: authentication of public keys

Multi-Factor Authentication of Online Transactions

WiMAX Public Key Infrastructure (PKI) Users Overview

[MS-GPEF]: Group Policy: Encrypting File System Extension. Intellectual Property Rights Notice for Open Specifications Documentation

Overview. SSL Cryptography Overview CHAPTER 1

Application Security: Threats and Architecture

CryptoNET: Security Management Protocols

HIPAA Security Regulations: Assessing Vendor Capabilities and Negotiating Agreements re: PKI and Security

Security Yokogawa Users Group Conference & Exhibition Copyright Yokogawa Electric Corporation Sept. 9-11, 2014 Houston, TX - 1 -

associate professor BME Híradástechnikai Tanszék Lab of Cryptography and System Security (CrySyS)

Lecture 9: Application of Cryptography

Computer Networks. Network Security 1. Professor Richard Harris School of Engineering and Advanced Technology

Common Security Protocol (CSP) ACP 120. June 1998

White Paper 2 Factor + 2 Way Authentication to Criminal Justice Information Services. Table of Contents. 1. Two Factor and CJIS

(n)code Solutions CA A DIVISION OF GUJARAT NARMADA VALLEY FERTILIZERS COMPANY LIMITED P ROCEDURE F OR D OWNLOADING

Key Management and Distribution

CERTIFICATION PRACTICE STATEMENT UPDATE

Transcription:

Biometrics, Tokens, & Public Key Certificates The Merging of Technologies TOKENEER Workstations WS CA WS WS Certificate Authority (CA) L. Reinert S. Luther Information Systems Security Organization

Biometrics, Tokens, & Public Key Certificates The Merging of Technologies Topics Authentication Background (Tokens, Public Keys, Certificates, and Biometrics) Combining Tokens, Public Key, and Certificates X.509 Certificate Background Public Key Infrastructure (PKI) Overview X.509 Attribute Certificates A Proposed Authentication Information Attribute An Example Implementation (Tokeneer)

User Identification Verification Principles What you have (Tokens) TOKENEER What you know (passwords, memory phrases, etc.) What you are (Biometrics) Any data used to support these is considered Authentication Information (AI) How to glue them together? This is one possible solution, but first some background... Last Modified: 6/2/98 Page 1

Tokens (Smartcards) TOKENEER Small, portable, and potentially cost effective Typically have a primitive OS which supports a password login feature Capable of providing Public Key and Symmetric Key Encryption RSA, Elliptic Curve, DES, etc. And some support a Hashing function (DES, SHA1, etc.) Can protect stored data via encryption and reverse engineering techniques Relatively slow, however improvements will be relatively rapid Capable of storing (relatively small amounts of) Data Can support Multiple Applications (via MultOS or Card Java) Growing Market: Wide variety of applications. Last Modified: 6/2/98 Page 2

Public Key Can be used to provide Confidentiality (via Key Exchange) Can be used to support Authentication (via Digital signatures) Can be generated on the Token or at a Trusted source (i.e. a CA) Secret Component must be held securely by the Entity to which it belongs RSA is the current standard commercial implementation KEA/DSA are the government (standards?) Typically the strength of the algorithm is implied by the bit length associated with the key (i.e. 1024 bit RSA is harder to break than 512 RSA) The larger the bit length, the more storage space the key takes, and the longer the processing time. Last Modified: 6/2/98 Page 3

Certificates Can be used to provide an authenticated Identity Requires a Trusted (Certificate) Authority (CA) to sign the certificate Can be public key or signature certificates Typically managed by having the CA produce Certificate Revocation Lists (CRLs) Certificates typically contain the following information: Name (identity) of the entity it s associated with Issuers name (i.e. the CA) Version Serial Number Validity dates (from.. to.., typically valid one year or more) Algorithm identifier Public Key Encryption Key or Public Signature Key Data CA s Signature Last Modified: 6/2/98 Page 4

Tokens + Public Key + Certificates TOKENEER + + Capable of providing mutual verification per FIPS Pub 196 [8] (i.e. challenge/response) TOKENEER Challenge Response Challenge Response User Capable of securely holding User Authentication Information (Passwords, Biometrics, etc.) (Data)Kn TOKENEER Capable of securely transferring the Authentication Information to authenticated entities TOKENEER (Data)Key1 User Last Modified: 6/2/98 Page 5

Biometrics Many different types (Fingerprint, Facial, Retinal, Voice, etc.) All have pros and cons which fit into differing system requirements. None are (by themselves) perfect I&A Most follow this scenario: Image Biometric Processing Livescan Biometric Template Biometric Matching Stored Biometric Template Storage Device Biometric Scanner Matching Score To application specific calling routine. Last Modified: 6/2/98 Page 6

Biometrics (Continued) Current systems are typically small, isolated, and proprietary Work is being done towards commonality Needs a support infrastructures Infrastructures required could parallel Public Key Infrastructures (PKI) But would a Biometric Infrastructures (or AI Infrastructures) Work??? BA Biometric Authority? SSO User Last Modified: 6/2/98 Page 7

Public Key Infastructures Built on a hierarchical Trust model Mature technology Maturing Business Model (E-Cash/Internet financial transactions) Keys can be generated locally (in the Token) or at the CA. CA must sign Certificates, Users must verify the CA s Signature Revocation Certificates are placed on a Certificate Revocation List (CRL) Fairly complex key management Security Policy Management added to handle differing systems CA Root Certification Authority (CA) CA CA John Doe Secure Token Card User SSO User Certificate Users User User Last Modified: 6/2/98 Page 8

X.509 Public Key Certificates Of the several types, X.509 is most prevalent in current systems X.509 is an International Telecommunication Union (ITU) Specification It is equivalent to ISO/IEC 9598-8 [5], an International Standards Organization Specification Public Key Certificates are meant to be public i.e. not Confidential Claimed Identity provided by the subject field Identity and Public key are validated by verifying the CA signature, however... Identity proven only after successful Challenge/Response V3 extensions were meant to add addition fields (attributes) without modifying the base definition [5]: Authentication Information could go here, but... Are you concerned about Confidentiality? X.509 Public Key Cert version serialnumber issuer (CA) validity dates subject subjectpublickeyinfo algorithmidentifier signaturevalue (CA) V3 Extensions Last Modified: 6/2/98 Page 9

Attributes Describe a characteristic of the object to which it references [3] Basic Type (id) and Value construct Assign a unique identifier Register with an ISO registered approval authority (ASNI) X.501 ANS.1 definition[2] AttributeTypeandValue::=SEQUENCE type ATTRIBUTE.&id ({SupportedAttributes}); value ({ATTRIBUTE.&Type({SupportedAttributes}){@type})} Some currently defined attributes[4] Name Address Phone Email address Company Name Role Clearance[5] What is not clearly defined Authentication Information (AI), including Biometrics AI Identifiers AI Parameters Last Modified: 6/2/98 Page 10

X.509 Attribute Certificates[5] Attribute certificates are used to convey a set of attributes along with a Public Key Certificate identifier or entity name. [5] The attributes were placed in a separate structure to maintain conformance with existing international standards (X.509) [5] Also described in X9.57 an ABA/ANSI specification[8]. Attribute Cert version subject (basecertificateid) issuer (AA) signature serialnumber validity clearance role Authentication Information algorithmidentifier signaturevalue (AA) Construct is similar to the X.509 Public Key Certificate, except is specifically set up to hold attributes without the public key Introduces an Attribute Authority to create/control Attribute Certificates Last Modified: 6/2/98 Page 11

Authentication Information Attribute for the Attribute Certificate Authentication Information (AI) properties: Flexible Open Generic Support different AI s Support multiple AI s Support unique parameters Expandable for future technologies Support compatibility determination Last Modified: 6/2/98 Page 12

One Possible Authentication Information Attribute Solution The AI Attribute should define[14]: Authentication Method (ECMA 2.19 [1]) Passwords Token Immutable Characteristics (Biometrics) Trusted Third Party Context (Location) Processing Information Process Identifier Version Parameters Matching Information Matching Identifier Version Parameters Authentication Data Last Modified: 6/2/98 Page 13

Possible Authentication Information ASN.1[2] Description [14] authenticationinfo ATTRIBUTE::={WITH SYNTAX AuthenticationInfo,ID id-at-tbd} AuthenticationInfo::=SEQUENCE{ authenticationmethod[0] AuthenticationMethod, -- defined in ECMA.219 exchangeai[1]authmparm, -- the data, as defined in ECMA.219 biometricinfo BiometricInfo OPTIONAL -- defined in section 5.2.2 of this document} BiometricInfo::=SEQUENCE{ ProcessingInfo::=SEQUENCE{ processinginfo ProcessingInfo OPTIONAL, matchinginfo MatchingInfo} processingid OBJECT IDENTIFIER, -- Registered by implementation processingparmsauthmparm OPTIONAL, -- Defined in ECMA.219 processingversionversion} -- Defined inx.509 MatchingInfo::=SEQUENCE{ --- ECMA.219 definitions AuthMparm::=CHOICE{ matchingid OBJECT IDENTIFIER, -- Registered by implementation matchingparmauthmparm OPTIONAL, -- Defined in ECMA.219 matchingversionversion} -- Defined inx.509 printablevalue [0] Printable String, integervalue [1] INTEGER, octetvalue[2] OCTET STRING, bitstringvalue[3] BIT STRING, othervalue [4] ANY} -- defined by authenticationmethod (i.e. the AI) -- X.509 Definitions [5] Version::=INTEGER{v1(0)} -- Add versions as needed -- Last Modified: 6/2/98 Page 14

Attribute Authorities[15] Attribute Authorities perform similar functions as Certificate Authorities, but specifically are meant to support Attribute Certificates. May or may not be the same physical entity as the CA. Attribute Authority (AA) AA CA Certificate Authority (CA) SSO User Last Modified: 6/2/98 Page 15

Using Attribute Certificates to provide Confidentiality A Token Based Scenario (Based upon the Tokeneer system [15]) Step1: The System Enrollment Process Biometric Info Token Serial No. X.509 Cert PrivCert IDACert Attribute Authority (AA) PrivCert IDACert X.509 Cert Public Key Biometric Data Certificate Authority (CA) Public Key Serial No. Enrollment Station (the host ) Biometric Scanner TOKENEER Last Modified: 6/2/98 Page 16

Step2: The Local Enrollment Process Local Enrollment Station (the host ) Biometric Scanner Mutual Authentication Protocol Biometric Data Login AI TOKENEER Last Modified: 6/2/98 Page 17

FIPS Pub 196[8] based Mutual Authentication Protocol Token [Authentication Request] Host [TokenID] Token SH1 [TokenID] [Cert H ] Token HS [TokenID] [Cert S ] Token SH2 Note: Attribute certificate can be encrypted as Text2 and sent here, only after the host is authenticated to the token. Responder Initiator Items in [] are optional Where: Token SH1 = R S [Text 1 ] Token HS =R H [R S ] [S] [Text 3 ] ss H (R H R S [S] [Text 2 ]) Token SH2 =[R S ] [R H ] [H] [Text 5 ] ss S (R S R H [H] [Text 4 ] Text: Other data to be appended, such as an attribute certificate (e.g. Text 2) Last Modified: 6/2/98 Page 18

Step3: The Domain Entry: Process User Verification ID Station (the host ) Biometric Scanner Mutual Authentication Protocol Biometric Livescan Timestamp/ Privilege Certificate TOKENEER Last Modified: 6/2/98 Page 19

Step4: User Verification: Workstation Login Mutual Authentication Protocol Work Station (the host ) Login Token Password from User Timestamp TOKENEER Last Modified: 6/2/98 Page 20

Variations on the Token Based Scenario Trusted Registry Biometric template response is sent to a central Trusted Registry. Biometric verification performed at the registry. Challenge/Response could be between token and the Trusted Registry. Similar to the Trusted Third Party (TTP) scenario. Local Verification Attribute certificate is stores in a local database. Local host verifies the signature on the attribute certificate before verification. Local Host performs biometric verification and token challenge/response. Token Verification Host sends biometric scan to token, token performs biometric verification. This scenario assumes the token can be trusted more than the host. Not feasible now, but newer generation of token may be capable. Last Modified: 6/2/98 Page 21

Issues Token s cost for large scale deployment Token processing time (Total processing time should be < 2 seconds) Token storage (Attribute Certificate could be stored in Host system) Infrastructure s cost and complexity Workstation Trust Consensus on a Authentication Information Attribute Register the AI Attribute with ANSI Last Modified: 6/2/98 Page 22

Conclusions Combining Biometrics, Tokens, and Certificates is possible with today s technology A new attribute should be created to handle Authentication Information An Infrastructure must be created to support Authentication Information The Tokeneer system is a testbed specifically designed to prototype this functionality Last Modified: 6/2/98 Page 23

Reference Documents [1] ECMA. ECMA-219, Authentication and Privilege Attribute Security Application with related key destruction functions. second edition, 1996. [2] ISO/IEC. ISO/IEC 8825, Information technology - ASN.1 encoding rules: Specification of Basic Encoding Rules (BER), Canonical Encoding Rules (CER) and Distinguished Encoding Rules (DER). first edition, 1995-10-15. [3] ISO/IEC. ISO/IEC 9594-2, Information technology - Open Systems Interconnection -The Directory: Models. 1995. [4] ISO/IEC. ISO/IEC 9594-6, Information technology - Open Systems Interconnection -The Directory: Selected attribute types. 1995-09-15. [5] ISO/IEC. ISO/IEC 9594-8, Information technology - Open Systems Interconnection -The Directory: Authentication framework. 06/97. [6] ABA, X9.57-199x, Public Key Cryptography For the Financial Service Industry: Certificate Management, Working draft, June 21,1996. [7] NIST. FIPS Pub 190, Guideline for the use of Advanced Authentication Technology Alternatives. September 28, 1994. [8] NIST. FIPS Pub 196, Entity Authentication Using Public Key Cryptography. February 18, 1997. [9] NSA R223. TOKENEER Operational Concept Description. Build 1: version 1.0, November 25, 1996. [10] NSA R223. TOKENEER System/Subsystem Specification (Requirements Document). Build 1: version 1.0, November 24, 1997. [11] NSA R223. TOKENEER Authentication Protocol for Smartcards, version 1.0, 1998. [12] NCSC. NCSC-TG004-88, "Glossary of Computer Security Terms." 21 October 1988. [13] Reinert, L. and S. Luther. User Authentication Techniques Using Public Key Certificates Part1: Certificate Options. 24 December 1997. [14] Reinert, L. and S. Luther. User Authentication Techniques Using Public Key Certificates Part2: Authentication Information Including Biometrics. 31 December 1997. [15] Reinert, L. and S. Luther. User Authentication Techniques Using Public Key Certificates Part 3: An Example Implementation. 27 February 1998. Last Modified: 6/2/98 Page 24