An Introduction to Digital Identity



Similar documents
Anonymity, Unlinkability, Unobservability, Pseudonymity, and Identity Management A Consolidated Proposal for Terminology

Device-Centric Authentication and WebCrypto

Anonymity, Unobservability, Pseudonymity, and Identity Management A Proposal for Terminology

Contents. Identity Assurance (Scott Rea Dartmouth College) IdM Workshop, Brisbane Australia, August 19, 2008

Accordion. Anonymous Peer-to-Peer File Storage

Anonymity, Unlinkability, Unobservability, Pseudonymity, and Identity Management A Consolidated Proposal for Terminology

Opinion and recommendations on challenges raised by biometric developments

Multi-Factor Authentication Core User Policy and Procedures

Multi-Factor Authentication

FIDO Trust Requirements

SERIES Y: GLOBAL INFORMATION INFRASTRUCTURE, INTERNET PROTOCOL ASPECTS AND NEXT-GENERATION NETWORKS Next Generation Networks Security

CSC Network Security. User Authentication Basics. Authentication and Identity. What is identity? Authentication: verify a user s identity

5 FAM 140 ACCEPTABILITY AND USE OF ELECTRONIC SIGNATURES

Crypho Security Whitepaper

Public Auditing & Automatic Protocol Blocking with 3-D Password Authentication for Secure Cloud Storage

Leveraging Authentication

The Convergence of IT Security and Physical Access Control

The Disadvantages of Free MIX Routes and How to Overcome Them

Part I. Universität Klagenfurt - IWAS Multimedia Kommunikation (VK) M. Euchner; Mai Siemens AG 2001, ICN M NT

Briefly describe the #1 problem you have encountered with implementing Multi-Factor Authentication.

NIST E-Authentication Guidance SP and Biometrics

Network Security Technology Network Management

CONNECTICUT IDENTITY THEFT RANKING BY STATE: Rank 19, 68.8 Complaints Per 100,000 Population, 2409 Complaints (2007) Updated November 28, 2008

Identity and Access Management Policy

Digital Identity & Authentication Directions Biometric Applications Who is doing what? Academia, Industry, Government

The virtual safe: A user-focused approach to data encryption

VIDEO Intypedia012en LESSON 12: WI FI NETWORKS SECURITY. AUTHOR: Raúl Siles. Founder and Security Analyst at Taddong

Module 8. Network Security. Version 2 CSE IIT, Kharagpur

The Convergence of IT Security and Physical Access Control

WISCONSIN IDENTITY THEFT RANKING BY STATE: Rank 15, Complaints Per 100,000 Population, 9852 Complaints (2007) Updated January 16, 2009

Information Security Basic Concepts

Computer Networks. Network Security 1. Professor Richard Harris School of Engineering and Advanced Technology

Scalable Authentication

Connected from everywhere. Cryptelo completely protects your data. Data transmitted to the server. Data sharing (both files and directory structure)

Digital identity: Toward more convenient, more secure online authentication

Alternative authentication what does it really provide?

Security. Contents. S Wireless Personal, Local, Metropolitan, and Wide Area Networks 1

SWIFT: Advanced identity management

ELECTRONIC SIGNATURE REQUIREMENTS FOR LENDERS

Glossary of Key Terms

It s All About Authentication

Certified Cyber Security Analyst VS-1160

MINISTRY OF COMMUNICATIONS AND INFORMATION TECHNOLOGY (Department of Information Technology) NOTIFICATION New Delhi, the 11th April, 2011

CHAPTER 4 DEPLOYMENT OF ESGC-PKC IN NON-COMMERCIAL E-COMMERCE APPLICATIONS

STATE OF WYOMING WOLFS-109(a)

Understanding Digital Certificates and Wireless Transport Layer Security (WTLS)

IDRBT Working Paper No. 11 Authentication factors for Internet banking

Group Management Server User Guide

Multi-Factor Authentication of Online Transactions

Key Management Interoperability Protocol (KMIP)

Checklist and guidance for a Data Management Plan

Biometrics and National Strategy for Trusted Identities in Cyberspace Improving the Security of the Identity Ecosystem September 19

More effective protection for your access control system with end-to-end security

What is Auditing? IT 4823 Information Security Administration. Problems. Uses. Logger. Audit System Structure. Logging. Auditing. Auditing November 7

Application Intrusion Detection

Key Management. CSC 490 Special Topics Computer and Network Security. Dr. Xiao Qin. Auburn University

Advanced Authentication Methods: Software vs. Hardware

SCB Access Single Sign-On PC Secure Logon

State of Arkansas Policy Statement on the Use of Electronic Signatures by State Agencies June 2008

Data Security Incident Response Plan. [Insert Organization Name]

9 Simple steps to secure your Wi-Fi Network.

Signing and Encryption with GnuPG

Using etoken for SSL Web Authentication. SSL V3.0 Overview

7 Key Management and PKIs

APPENDIX G ASP/SaaS SECURITY ASSESSMENT CHECKLIST

BehavioSec participation in the DARPA AA Phase 2

Comodo Disk Encryption

October 2014 Issue No: 2.0. Good Practice Guide No. 44 Authentication and Credentials for use with HMG Online Services

eidas as blueprint for future eid projects cryptovision mindshare 2015 HJP Consulting Holger Funke

Evaluation of different Open Source Identity management Systems

An NSTIC-Compliant Identity Ecosystem For Preventing Consumer Identity Theft

Bendigo and Adelaide Bank Ltd Security Incident Response Procedure

NetIQ Advanced Authentication Framework. Maintenance Guide. Version 5.1.0

Communication Systems 16 th lecture. Chair of Communication Systems Department of Applied Sciences University of Freiburg 2009

State of Wisconsin DET File Transfer Protocol Service Offering Definition (FTP & SFTP)

PGP Whole Disk Encryption Training

KEY STEPS FOLLOWING A DATA BREACH

EVALUATION GUIDE. Evaluating a Self-Service Password Reset Tool. Usability. The password reality

Transcription:

1 An Introduction to Digital Identity Andreas Pfitzmann Dresden University of Technology, Department of Computer Science, D-01062 Dresden Nöthnitzer Str. 46, Room 3071 Phone: +49 351 463-38277, e-mail: pfitza@inf.tu-dresden.de, http://dud.inf.tu-dresden.de/ Keynote presentation at OECD Workshop on Digital Identity Management Trondheim, Norway, May 8, 2007

An Introduction to Digital Identity 2 Digital identity of what? is set of attributes Partial Identities (pids) for privacy how to use? Attributes: Important kinds of Possible classifications Example: How to (not) use biometrics How to represent identity online? How to manage your identity online? Identity management framework needed

Digital identity of what? 3 Digital identity of Natural person, Legal person, or Computer

Digital identity is? 4 Digital identity is much more than Names (easy to remember), Identifiers (unique), and Means of authentication (secure).

Digital identity is... 5 Digital identity primarily is a set of attributes, where some might change over time and some may be certified by third parties. Given that it is very hard if not impossible to erase widely used digital data, a digital identity is only growing never shrinking. This is true both for a global observer as well as for each party (or set of parties pooling their information) interacting with a digital identity.

Partial Identities (pids) 6 Achieving security and privacy requires users to subset their digital identity in so-called Partial Identities (pids), where each pid might have its own name, own identifier, and own means of authentication.

Using pids requires... 7 Basic understanding by users (and by government and businesses), At least one personal computer administrating personal data and executing cryptographic protocols fully controlled by the user (otherwise no way to validate privacy properties, i.e. unlinkable pids), Digital pseudonyms for secure authentication (otherwise no way to achieve accountability), Anonymous credentials to transfer certified attributes from one pid to another pid of the same digital identity (otherwise no transfer of certified attributes between pids, which drastically reduces their applicability).

Important kinds of attributes 8 Names (easy to remember), Identifiers (unique), Means of authentication (secure) Digital pseudonyms are unique identifiers suited to test authentication (e.g. public keys of PGP) Biometrics (binding to natural person) Addresses (useful for communication) Bank account (payment) Credit card number (payment and creditworthiness)

Possible classifications of attributes 9 Authenticated by third parties or not? If authenticated by third parties, third parties trusted by whom wrt what? Easy to change or not? Varying over time or not? Given attributes vs. chosen attributes Pure attributes vs. attributes containing side information Characterizing a single entity per se or an entity only in its relationship to other entities?

How much protection for which attributes? 10 Some attributes need much more protection than others, e.g. those which are not easy to change, do not vary over time, are given attributes, or contain side information. These attributes are part of the core-identity. Advancements and use of technology may shift some attributes from core-identity to non-core identity, e.g. the address of your house or flat is core, the current address of your laptop maybe not.

An eternal core-identity attribute: Biometrics 11 Biometrics is an important example of an eternal coreidentity attribute How to (not) use biometrics therefore is an interesting case study http://dud.inf.tu-dresden.de/literatur/duesseldorf2005.10.27biometrics.pdf Main result: Biometrics between data subject and his/her devices only Authentication by possession and/or knowledge and biometrics No devaluation of classic forensic techniques (e.g. by foreign devices reading fingerprints, digital copies will make it into databases of foreign secret services and organized crime, enabling them to leave dedicated false fingerprints at the scenes of crime) No privacy problems caused by biometrics (measurements may contain medical or psychological side information) But: Safety problem remains unchanged Provide possibility to switch off biometrics after successful biometric authentication.

How to represent identity online? 12 Only partial identities otherwise Big Brother (or Little Sisters) will be quite happy (Digital) Pseudonyms as identifiers for partial identities How to establish and use (digital) pseudonyms Initial linking between the pseudonym and its holder Linkability due to the use of the pseudonym in different contexts

Pseudonyms: Initial linking to holder 13 Public pseudonym: The linking between pseudonym and its holder may be publicly known from the very beginning. Phone number with its owner listed in public directories Initially non-public pseudonym: The linking between pseudonym and its holder may be known by certain parties (trustees for identity), but is not public at least initially. Bank account with bank as trustee for identity, Credit card number... Initially unlinked pseudonym: The linking between pseudonym and its holder is at least initially not known to anybody (except the holder). Biometric characteristics; DNA (as long as no registers)

Pseudonyms: Use in different contexts => partial order 14 number of an identity card, social security number, person pseudonym bank account linkable role pseudonym pen name, employee identity card number relationship pseudonym role-relationship pseudonym contract number transaction pseudonym one-time password, TAN customer number increasing unlinkability of transactions! increasing available anonymity unlinkable A B stands for B enables stronger anonymity than A

Trustee for values vs. Trustee for identities 15 Accountability of digital pseudonyms (by depositing money to cover claims against damage caused under that pseudonym) vs. Accountability of holders of digital pseudonyms (by identifying holders in case of uncovered damage) Cf. Holger Bürk, Andreas Pfitzmann: Value Exchange Systems Enabling Security and Unobservability; Computers & Security 9/8 (1990) 715-721. http://dud.inf.tu-dresden.de/sirenelit.shtml#pay.fair

How to manage your identity online? 16 Get attentive to managing your identity, i.e. your pids (otherwise others will manage you) Consider both, reputation and privacy, make a compromise Get the right tools Privacy-enhancing identity management tools, cf. FP6 EU-Project PRIME https://prime-project.eu/ Communication infrastructure, which does not define permanent identifiers attached to you (your network address) making privacy-enhancing identity management at the application layer void Choose the right communication partners (including: avoid those which are unnecessarily privacy-invasive)

Identity management framework needed 17 Now, we have an identity management patchwork. As security is only as good as the weakest link of the chain, privacy is at most as good as the most privacy-invasive layer you are using. Therefore, an identity management patchwork will not lead to secure and privacy-enhancing identity management. An identity management framework is needed addressing both, security and privacy.

Further reading 18 http://dud.inf.tu-dresden.de/anon_terminology.shtml The following backup slides are taken from: http://www.inf.tu-dresden.de/index.php?node_id=510&ln=en

Authenticated anonymous declarations between business partners that can be de-anonymized trusted third party A trusted third party B 19 identification user X confirmation document know p G (X,g) for p G (Y,g) p A p G (X,g) confirmation document for p G (X,g) p G (Y,g) know p G (Y,g) p B identification user Y

Authenticated anonymous declarations between business partners that can be de-anonymized trusted third party A trustees for identities trusted third party B 20 identification user X confirmation document know p G (X,g) for p G (Y,g) p A p G (X,g) confirmation document for p G (X,g) p G (Y,g) know p G (Y,g) p B identification user Y

Security for completely anonymous business partners using active trustee who can check the goods 21 [ 1 ] order merchant is p L (Y,g) + money for merchant trustee T [ 4 ] delivery to customer [ 3 ] delivery to trustee p L (Y,g) [ 2 ] order of the customer (money is deposited) p T p K (X,g) checked by T p T [ 5 ] money p T customer X merchant Y

Security for completely anonymous business partners using active trustee who can not check the goods 22 [ 1 ] order delivery is p L (Y,g) + money for distributor trustee T [4.1] wait [ 4 ] delivery to customer [ 3 ] delivery to trustee p L (Y,g) [ 2 ] order of the customer (money is deposited) p T p K (X,g) checked by T p T [ 5 ] money p T customer X merchant Y

Security for completely anonymous business partners using active trustee who can (not) check the goods 23 trustee for values [ 1 ] order delivery is p L (Y,g) + money for distributor trustee T ([4.1] wait) [ 4 ] delivery to customer [ 3 ] delivery to trustee p L (Y,g) [ 2 ] order of the customer (money is deposited) p T p K (X,g) checked by T [ 5 ] p T money p T customer X merchant Y

Personal identifier 24 845 authorizes A: A notifies 845: 845 pays B B certifies 845: C pays 845

Role-relationship and transaction pseudonyms 25 762 authorizes A: A notifies 762: 451 pays B B certifies 451: B certifies 314: C pays 314

Encryption in layer models 26 In the OSI model it holds: Layer n doesn t have to look at Data Units (DUs) of layer n+1 to perform its service. So layer n+1 can deliver (n+1)-dus encrypted to layer n. For packet-oriented services, the layer n typically furnishes the (n+1)-dus with a n-header and possibly with an n- trailer, too, and delivers this as n-du to layer n-1. This can also be done encrypted again. layer n+1 layer n n-header (n+1)-du encryption n-du n- trailer encryption and so on. All encryptions are independent with respect to both the encryption systems and the keys. layer n-1 (n-1)-du

Arranging it into the OSI layers (1) 27 user station exchange exchange user station OSI layers 7 application 6 presentation 5 session 4 transport end-to-end encryption end-to-end encryption 3 network 2 data link 1 physical link encryption link encryption link encryption link encryption 0 medium

Arranging it into the OSI layers (2) 28 OSI layers broadcast query MIX-network DC-network RINGnetwork 7 application 6 presentation 5 session 4 transport implicit addressing implicit addressing 3 network broadcast query and superpose buffer and re-encrypt 2 data link anonymous access anonymous access 1 physical channel selection superpose keys and messages digital signal regeneration 0 medium ring has to preserve anonymity against the communication partner end-to-end encryption has to preserve anonymity realizable without consideration of anonymity