Rajat Moona CSE, IIT Kanpur · Key management system design for the Indian ... Driving License and...
Transcript of Rajat Moona CSE, IIT Kanpur · Key management system design for the Indian ... Driving License and...
Identity Establishment Problem Smart Card Technology
b IIT Kanpur Contribution ID related applications DL/RC, MNIC, e‐Passport
Protection against Phishing ATM Enabler for Micro‐financing
The issue of giving “right information” to “right person” The issue of giving “right information” to “right person”. Problem: Am I talking to the right person/equipment?
O t l h li th t th th id i i ht On a telephone line: the party on the other side is right person or not?
For ATM transactions: is it a genuine ATM? Simple schemes: Simple schemes: Voice recognition? Face recognition? Secret sharing? Secret sharing? Shared trust?
Simple schemes are not robust. Not secure.
l ld h b ld l h Real world is however build over simple things. Password based login
h d▪ The passwords are easy to guess.
Web logins (bank account/credit cards etc.)▪ Identity loss (lost passwords from sites)▪ Identity loss (lost passwords from sites)
Fingerprint based identifications.▪ Detective movies are full of ideas on how to crack them.
Credit cards based frauds. 3‐digit CVV protection?▪ Try only 900 times to crack a card.
Is it worthwhile to use such mechanisms?
Mechanism Password or PIN (“What you know”)▪ Secret information shared between two parties
Cryptographic challenge Response (“What you )carry”)
▪ Entity authentication
Bi t i i f ti (“Wh t i t f ”) Biometric information (“What is part of you”)▪ Person’s identification
A bi ti f A combination of one or more
Device asks the user (person or a device) to provide a password.
d h d f f h Password is matched for verification with a reference one.
l For example: ATM
Enter PINEnter PIN
2344Withdraw Rs. 1000.00
Rs 1000 00 given Bank Rs. 1000.00 given. Bank Server informed for keeping transaction record.
Enter PIN
23442344
No Authentication with Bank!!!Withdraw Rs 1000 00Bank!!!Withdraw Rs. 1000.00
User Given the amount or told “ATM out of money.”
Secret Key Cryptography Two communicating sides share the same secret
Public Key Cryptography Public key is used for encryption while private key is used for decryption. Private key is secret.
Authentication is based on proving the i f k b i possession of secret key by its use.
Challenge‐Response Authentication
Cryptanalyst/Attacker
p’
K’Attacker K
EncryptionAlgorithm
p c DecryptionAlgorithm
c p
Sender Secure ChannelK
Receiver
Key Source
Cryptanalyst/Attacker
p’
Pr’Attacker Pr
EncryptionAlgorithm
p c DecryptionAlgorithm
c p
Sender ReceiverPr
Pu
Key GenPuKnown to the
world
Password based Identification Password based Identification Where to store passwords securely? Password Guessability Prone to Identity theft
Address based Identification Assumes that the identity of a person can be inferred ssu es t at t e de t ty o a pe so ca be e edacross the network.
Prone to identity attacks. Symmetric key cryptography based Identification Sy et c ey c yptog ap y based de t cat o Challenge Response based Identification (authentication)
Public key cryptography based identification Cryptographic techniques are immune to identity Cryptographic techniques are immune to identity
theft provided keys are not leaked.
Vi l id tit li ti Visual identity application Plain plastic card is enough
Magnetic strip (e.g. credit cards) Visual data also available in machine readable form No security of data
Electronic memory cardsy Machine readable data Some security (vendor specific)
Processor cards (and therefore memory too) Processor cards (and therefore memory too) Cards have an operating system that provides
▪ A standard way of interchanging informationA i t t ti f th d d d t▪ An interpretation of the commands and data
6 b t t KB RAM 256 bytes to 4KB RAM. 8KB to 0.5MB ROM. 1KB to 1MB EEPROM. Crypto‐coprocessors (implementing AES, 3DES, RSA
etc., in hardware) are optional. 8‐bit to 16‐bit CPU. 8051 based designs are common.8 bit to 16 bit CPU. 8051 based designs are common.
The price of a mid‐level chip when produced in bulk is about US$0 50about US$0.50.
Computer based readersConnect through USB or COM (Serial) portsCOM (Serial) ports
Dedicated terminalsUsually with a small screen, keypad printer often alsokeypad, printer, often alsohave biometric devices such as thumb print scanner.
Electronics Technology
Memory Processor
olog
y
Electronics Technology
tact
n T
ech
no
Memory Contact Cards
Processor Contact Cards
Con
t) nic
atio
nCards Contact Cards
Memory
Rad
io (
RF
Com
mu
nyContact-less Cards
(aka RFID)
Processor Contact-less Cards
R C(aka RFID)
S d d l d i Smart cards can store and control access to data in most flexible manner. To specific users who know the passwords To a specific devices who know the secret
▪ Cryptography based operations
Data stored can includeP l i f ti d Bi t i f d t ( fi i t Personal information and Biometric reference data (e.g. fingerprint template)
Keys and passwords Capabilities include Capabilities include Data storage (persistent) Cryptography (encryption/decryption/digital signatures etc.) Auxiliary mechanisms (hash computations random number Auxiliary mechanisms (hash computations, random number
generation)
Smart Card group had developed the Indian National Smart Card group had developed the Indian National Standard for the OS SCOSTA and SCOSTA‐CL Certification process and mechanisms
Key management system design for the Indian Driving License and Vehicle Registration, National ID
f Card data layout and processes for DL/RC, National ID (MNIC), Indian ePassport
Defined the standard for the Indian ePassport (a step p pover the ICAO standards)
Card Readers and programming interfaces for application development. pp p
ID A li i ID Applications National ID, Driving License, Electronic Passports, Health Care Health Care …
Electronic Cash Payment e‐Purse Toll Tax Credit cards purse to Payment, e Purse, Toll Tax, Credit cards, purse to purse transactions …
Loyalty Banking Cards, Membership cards …
Authenticity Security Tokens, Resource Access …
Can store information such as Can store information such as Personal Information
▪ Name, Name in local language, Sex, Names of parents, spouse, marital status, Date and place of birth, aliases, National ID, Issuer’s , p , , ,Name/designation, Issue date, address …
Validity checks▪ “Valid up to” information, validity keys, Digital signature mechanismsmechanisms
Biometric information▪ Photograph, finger print (machine verifiable)
Possible applicationspp Electronic tax filing, electronic authenticated voting, irrefutable proof
of citizenship, social security … Access Control (read‐write control based on the entity) Certain information is record once (national ID number Sex ) Certain information is record‐once (national ID number, Sex ...) Certain information is modifiable (such as address …)
Electronic Passport is passport with smart card chip in the Electronic Passport is passport with smart card chip in the binding (e.g. cover page) Chip stores the personal information.Additi ll th d t i di it ll i d b th d t Additionally the data is digitally signed by the document signer (such as a passport issuing officer).▪ Non‐repudiation is possible.
f Passport data can be verified at immigration control world wide.▪ Provided the country specific public keys are exchanged b h i h h bi l l h between the countries through bi‐lateral exchange mechanism
Personal information may include the biometric which can be verified at the home immigration counters for entry/exitbe verified at the home immigration counters for entry/exit.
Authentic photograph of the owner is stored on‐chip.
Security IssueFake outlet attackShoulder attackFake pad overlay attackFake pad overlay attack
Network Issue Dedicated network is requiredk l bl
e o ssueNetwork is unreliable
Display / Input device requiredCost Issue
p y p qCost for Network ConnectivityCooling costs
S l i Several scenarios are possible. Case I: Use of Mobile and Card.▪ Ultimate protection
Case II: Use of card only Case II: Use of card only.▪ Protection against keyboard overlay or shoulder attack not possible.ot poss b e
Case III: Protection against lost mobile possiblepossible.
Smart cards are the devices for the future Smart cards are the devices for the future Can be used for several applications.
▪ Document signing (for example tax returns)▪ Identification and authentication
▪ Such as Driving License, National ID (MNIC), Voter Card, e‐Passports etc.▪ Bank Transactions
▪ E‐cash and e‐purse application.▪ Ticketing and Toll
▪ Metro Ticketing and Toll gate operations.▪ Access Control
▪ Access to rooms/facilities, Club memberships, vending applications. Secure, robust and dependable storage of data, keys and
P dPasswords. Data can be protected against tampering and can be made reliable
and dependable. Innovations are possible in the use of the technology and the p gy
technology itself.
http //www scosta gov in/ http://www.scosta.gov.in/ http://en.wikipedia.org/wiki/Multipurpose_National_Identity_Card
_(India)/ http://www.cse.iitk.ac.in/~moona/scosta/ Nitin Munjal and Rajat Moona, “Secure and Cost Effective
Transaction Model for Financial Services”, ICUMT 2009, St. Petersburg.
Nitin Munjal, Ashish Paliwal, Rajat Moona, “Low Cost Secure Nitin Munjal, Ashish Paliwal, Rajat Moona, Low Cost Secure Transaction Model for Financial Services”, Security and Identity Management (SIM), Ahmedabad, 2009.
Abhishek Gaurav, Ankit Sharma, Vikas Gelara, Rajat Moona, “Using Personal Electronic Device for Authentication based “Using Personal Electronic Device for Authentication‐based Service Access”, IEEE International Conference on Communications (ICC2008), Beijing, 19‐23 May 2008.
BT h S d BTech Students Abhishek Gaurav, Ankit Sharma, Vikas Gelara
MTech Students MTech Students S Ravinder, Aditi Gupta, Deepak Nagawade, Anshul Data Nitin Munjal N Karthik Nikhil Anshul Data, Nitin Munjal, N Karthik, Nikhil Khande
Faculty Members Deepak Gupta, Manindra Agrawal
Funding Agencies and collaborators MCIT, NIC, RGI, MoRST, MEA