SlideShare a Scribd company logo
1 of 34
Download to read offline
An On-line Secure
E-Passport Protocol
Vijayakrishnan Pasupathinathan
with, Josef Pieprzyk and Huaxiong Wang
Centre for Advanced Computing - Algorithms and Cryptography (ACAC)
Macquarie University, Australia

1
Outline
•
•
•
•

Overview of E-passport
First Generation - some known weaknesses
Second Generation

•

Working and Problems

An Online E-passport Proposal

2
E-passport Overview
•

Integration of a biometric enabled contact-less smart
card microchip.

•

E-passport guideline (DOC 9303) developed by
International Civil Aviation Organisation (ICAO).

•

Describes communication protocol

•

•

Provides details on establishing a secure
communication channel between an e-passport and
an e-passport reader

•

Authentication mechanisms.

Uses existing approved standard such as ISO14443,
ISO11770, ISO/IEC 7816, ISO 9796.
3
E-passport Overview

4
E-passport Overview
•

Yesterday: Machine
readable passport with
MRZ

Image courtesy of DFAT Australia

4
E-passport Overview
•

Yesterday: Machine
readable passport with
MRZ

•

Today: Electronic Passport
with digital Image

4
E-passport Overview
•

Yesterday: Machine
readable passport with
MRZ

•

Today: Electronic Passport
with digital Image

•

Tomorrow: Passports with
secondary biometric
information

4
E-passport Operation
First Generation
•

Basic Access Control - enables encrypted
communication.

•

Passive Authentication - provides integrity of epassport data.

•

Active Authentication - provides authentication of
chip contents.
E-passport Holder

Border Security

Visits a check point

Scan MRZ
BAC
Passive Auth
Active Auth
5
First generation PKI
Country CSCA

Country CSCA
PKD
(ICAO)
DS

...

DS

.
.
.
Country CSCA

E-passport

As of Dec. 2007 - 4 countries are actively upload to PKD.
(Australia, Japan, New Zealand and Singapore)
By early 2009, 20 countries are expected to join PKD
Known Attacks (Problems) in
First Generation E-passports

•
•

BAC is optional! So, encryption is optional.
Low entropy (3DES, max. 112b, BAC max
56/74b, in practice 30-50b)[Jules et. al. 2005]

•
•

The authentication key is derived from
document#, DoB, DoE.

No protection against cloning. [G S. Kc et. al. 2005]

7
Known Attacks (Problems) in
First Generation E-passports

•

Formal verification of the complete protocol
[V. Pasupathinathan et. al 2008]

•
•
•

No data origin authentication.

•

Can be exploited because of weakness in
facial biometric.

Subject to replay and Grand master attacks.
Vulnerable to Certificate Manipulation.

And there are others too!
8
Second Take!

Second Generation E-passports

•
•
•

Proposed by BSI Germany [Kluger 2005]

•

Adds extra biometric identifiers - finger
prints (optionally, Iris scan).

•

June 2009 all EU members will implement.

Adopted by EU in June 2006
New protocols to enhance security for
Extended Access Control (EAC).

9
EAC Mechanisms
•

Based on Diffie-Hellman Key Pair (PKCS #3 or
ISO 15946)

•

Chip Authentication - replaces active
authentication

•

Terminal Authentication
E-passport Holder
Visits a check point

Border Security
Scan MRZ
BAC
Chip Auth
Passive Auth
Terminal Auth
10
EAC Mechanisms
Chip Authentication

Chip

PKI Structure

IS

PKc SKc Dc

Send PKc
Generate ephemeral
key-pair
Send PK’

K= KA(Pk’ SKc)

PK’ SK’
K = KA(PKc SK’)

Terminal Authentication

Chip
RNDc

IS
Send RNDc
z = IDc || RNDc || H(PK’)
S = SIGN{ z }

Verify {S}

Send S

Photo Courtesy ICAO MRTD Report November 2007
Problems with EAC - PKI
Certify{PKc}

E-passport

Send Public
Key
Check ALL
Certificates

Document
Signer

Certify{PKds}

E-passport’s Home Country

(CSCA)

Certify ALL
IS systems

Chip Auth - PKc

CERT{IS}{DV}{VCSCA}

Visiting Country
Inspection System

DV

.....

DV

Visiting Country’s
Document Verifier

12
Problems with EAC - PKI
Certify{PKc}

E-passport

Send Public
Key
Check ALL
Certificates

Document
Signer

Certify{PKds}

E-passport’s Home Country

(CSCA)

Certify ALL
IS systems

Chip Auth - PKc

NOT Useful
CERT{IS}{DV}{VCSCA}

Visiting Country
Inspection System

DV

.....

DV

Visiting Country’s
Document Verifier

E-passports DONT have an internal clock!!
How does it now if the certificate is valid?
12
Problems with EAC - PKI
Certify{PKc}

E-passport

Send Public
Key
Check ALL
Certificates

Document
Signer

Certify{PKds}

E-passport’s Home Country

(CSCA)

Certify ALL
IS systems

Chip Auth - PKc

CERT{IS}{DV}{VCSCA}

Visiting Country
Inspection System

DV

.....

DV

Visiting Country’s
Document Verifier

12
Problems with EAC - PKI
Certify{PKc}

E-passport

Send Public
Key
Check ALL
Certificates

Document
Signer

Certify{PKds}

E-passport’s Home Country

(CSCA)

Certify ALL
IS systems

Chip Auth - PKc

CERT{IS}{DV}{VCSCA}

Visiting Country
Inspection System

How Many??

DV

.....

DV

Visiting Country’s
Document Verifier

What is the Limit?
Vulnerable to Denial of Service when combined
with first generation weaknesses!
12
Problems with EAC - PKI
Certify{PKc}

E-passport

Send Public
Key
Check ALL
Certificates

Document
Signer

Certify{PKds}

E-passport’s Home Country

(CSCA)

Certify ALL
IS systems

Chip Auth - PKc

CERT{IS}{DV}{VCSCA}

Visiting Country
Inspection System

DV

.....

DV

Visiting Country’s
Document Verifier

12
Problems with EAC - PKI
Certify{PKc}

E-passport

Document
Signer

Certify{PKds}

E-passport’s Home Country

(CSCA)

How Long is this valid?
Send Public
Key
Check ALL
Certificates

Certify ALL
IS systems

Chip Auth - PKc

CERT{IS}{DV}{VCSCA}

Visiting Country
Inspection System

DV

.....

DV

Visiting Country’s
Document Verifier

Passports are normally valid for 5 or 10 years!!! Document
Issuer need to be around 15 years CSCA around 20 years!
We can have passport with expired certificates!!
12
Problems with EAC - PKI
Certify{PKc}

E-passport

Send Public
Key
Check ALL
Certificates

Document
Signer

Certify{PKds}

E-passport’s Home Country

(CSCA)

Certify ALL
IS systems

Chip Auth - PKc

CERT{IS}{DV}{VCSCA}

Visiting Country
Inspection System

DV

.....

DV

Visiting Country’s
Document Verifier

12
Problems with EAC - PKI
Certify{PKc}

E-passport

Document
Signer

Certify{PKds}

E-passport’s Home Country

(CSCA)

Identity Revealed
Send Public
Key
Check ALL
Certificates

Certify ALL
IS systems

Chip Auth - PKc

CERT{IS}{DV}{VCSCA}

Visiting Country
Inspection System

DV

.....

DV

Visiting Country’s
Document Verifier

Identity of the Passport revealed before terminal is
authenticated!
12
Problems with EAC - PKI
Certify{PKc}

E-passport

Send Public
Key
Check ALL
Certificates

Document
Signer

Certify{PKds}

E-passport’s Home Country

(CSCA)

Certify ALL
IS systems

Chip Auth - PKc

CERT{IS}{DV}{VCSCA}

Visiting Country
Inspection System

DV

.....

DV

Visiting Country’s
Document Verifier

12
EAC other Problems
•
•
•
•

IS requires write access to E-passports.

•

Border Control terminal need to update CSCA
certificates when they pass through.

Terminal Authentication is weak.

•

Can authenticate who is writing to e-passport.

Only semi-forward secrecy [Monnerat et al 2007]
Leakage of Digest [Monnerat et al 2007]

•

Security objects in the chip
13
Online Secure E-passport
Protocol
•

•

Why Online?

•
•

Use the same PKI as in First Generation.
Eliminate the need to send long certificate
chains.

Provide security guarantees for

•

Identification and authentication of both epassport and inspection systems. (i.e. Mutual)

•
•

Privacy protection to e-passport holders.
Confidentiality of information (session-key
security and e-passport data)
14
Online Secure E-passport
Protocol
E-passport

Visiting Country
Inspection System

15

DV
Online Secure E-passport
Protocol
E-passport

Visiting Country
Inspection System

create and send session key part

15

DV
Online Secure E-passport
Protocol
Visiting Country

E-passport

Inspection System

create and send session key part
Read MRZ and send signed
message to DV

15

DV
Online Secure E-passport
Protocol
Visiting Country

E-passport

Inspection System

DV

create and send session key part
Read MRZ and send signed
message to DV

DV may choose to send
e-passport ID

15

Verify IS
Sign session key
and IS public key
Online Secure E-passport
Protocol
Visiting Country

E-passport

Inspection System

DV

create and send session key part
Read MRZ and send signed
message
All Message from hereon isto DV
encrypted

Send Information back from DV
encrypted using session key formed

Verify signature
Only DV public key

15

Verify IS
Sign session key
and IS public key
Online Secure E-passport
Protocol
Visiting Country

E-passport

Inspection System

DV

create and send session key part
Read MRZ and send signed
message to DV
Send Information back from DV
encrypted using session key formed

Verify signature
Only DV public key

Send Certificate and ID

Verify ID and certificate
Compare with DV information
15

Verify IS
Sign session key
and IS public key
OSEP Characteristics
•
•
•

The protocol is SK-secure. [Canetti 2001]

•

Tamper detectable integrity check protects
against passport forgery. (data in e-passport is
hashed and signed by document signer

•

Same PKI as first generation.

Minimal computation by e-passport.
Passport identity is released only to
authenticated Inspection Systems.

16
What needs to be done?
•
•
•

Online nature can induce delays.

•

Fallback to off-line authentication.

But current passport systems use online
communication.
Integrate with SMART GATE system. (An
automated processing system)
17
Thank you
krishnan@ics.mq.edu.au

18

More Related Content

What's hot

Вопросы балансировки трафика
Вопросы балансировки трафикаВопросы балансировки трафика
Вопросы балансировки трафикаSkillFactory
 
Poll mode driver integration into dpdk
Poll mode driver integration into dpdkPoll mode driver integration into dpdk
Poll mode driver integration into dpdkVipin Varghese
 
Hosting Your Own OTA Update Service
Hosting Your Own OTA Update ServiceHosting Your Own OTA Update Service
Hosting Your Own OTA Update ServiceQuinlan Jung
 
Presentation on - Processors
Presentation on - Processors Presentation on - Processors
Presentation on - Processors The Avi Sharma
 
DPDK: Multi Architecture High Performance Packet Processing
DPDK: Multi Architecture High Performance Packet ProcessingDPDK: Multi Architecture High Performance Packet Processing
DPDK: Multi Architecture High Performance Packet ProcessingMichelle Holley
 
Kernel Recipes 2019 - XDP closer integration with network stack
Kernel Recipes 2019 -  XDP closer integration with network stackKernel Recipes 2019 -  XDP closer integration with network stack
Kernel Recipes 2019 - XDP closer integration with network stackAnne Nicolas
 
Understanding DPDK algorithmics
Understanding DPDK algorithmicsUnderstanding DPDK algorithmics
Understanding DPDK algorithmicsDenys Haryachyy
 
Kernel Recipes 2019 - Marvels of Memory Auto-configuration (SPD)
Kernel Recipes 2019 - Marvels of Memory Auto-configuration (SPD)Kernel Recipes 2019 - Marvels of Memory Auto-configuration (SPD)
Kernel Recipes 2019 - Marvels of Memory Auto-configuration (SPD)Anne Nicolas
 
LF_DPDK_Mellanox bifurcated driver model
LF_DPDK_Mellanox bifurcated driver modelLF_DPDK_Mellanox bifurcated driver model
LF_DPDK_Mellanox bifurcated driver modelLF_DPDK
 
CCNA CDP LLDP NTP
CCNA CDP LLDP NTP CCNA CDP LLDP NTP
CCNA CDP LLDP NTP Networkel
 
Large BGP Communities
Large BGP CommunitiesLarge BGP Communities
Large BGP CommunitiesAPNIC
 
Pakistan Education & Research Network
Pakistan Education & Research NetworkPakistan Education & Research Network
Pakistan Education & Research NetworkRaheel Raza
 
Linux device driver
Linux device driverLinux device driver
Linux device driverchatsiri
 
monitors,vga and svga
monitors,vga and svgamonitors,vga and svga
monitors,vga and svgamafiavish
 
Introduction to DPDK
Introduction to DPDKIntroduction to DPDK
Introduction to DPDKKernel TLV
 
P4/FPGA, Packet Acceleration
P4/FPGA, Packet AccelerationP4/FPGA, Packet Acceleration
P4/FPGA, Packet AccelerationLiz Warner
 
Intel(r) Quick Assist Technology Overview
Intel(r) Quick Assist Technology OverviewIntel(r) Quick Assist Technology Overview
Intel(r) Quick Assist Technology OverviewMichelle Holley
 

What's hot (20)

Вопросы балансировки трафика
Вопросы балансировки трафикаВопросы балансировки трафика
Вопросы балансировки трафика
 
Poll mode driver integration into dpdk
Poll mode driver integration into dpdkPoll mode driver integration into dpdk
Poll mode driver integration into dpdk
 
Hosting Your Own OTA Update Service
Hosting Your Own OTA Update ServiceHosting Your Own OTA Update Service
Hosting Your Own OTA Update Service
 
Presentation on - Processors
Presentation on - Processors Presentation on - Processors
Presentation on - Processors
 
DPDK: Multi Architecture High Performance Packet Processing
DPDK: Multi Architecture High Performance Packet ProcessingDPDK: Multi Architecture High Performance Packet Processing
DPDK: Multi Architecture High Performance Packet Processing
 
Kernel Recipes 2019 - XDP closer integration with network stack
Kernel Recipes 2019 -  XDP closer integration with network stackKernel Recipes 2019 -  XDP closer integration with network stack
Kernel Recipes 2019 - XDP closer integration with network stack
 
Understanding DPDK algorithmics
Understanding DPDK algorithmicsUnderstanding DPDK algorithmics
Understanding DPDK algorithmics
 
Kernel Recipes 2019 - Marvels of Memory Auto-configuration (SPD)
Kernel Recipes 2019 - Marvels of Memory Auto-configuration (SPD)Kernel Recipes 2019 - Marvels of Memory Auto-configuration (SPD)
Kernel Recipes 2019 - Marvels of Memory Auto-configuration (SPD)
 
LF_DPDK_Mellanox bifurcated driver model
LF_DPDK_Mellanox bifurcated driver modelLF_DPDK_Mellanox bifurcated driver model
LF_DPDK_Mellanox bifurcated driver model
 
CCNA CDP LLDP NTP
CCNA CDP LLDP NTP CCNA CDP LLDP NTP
CCNA CDP LLDP NTP
 
Large BGP Communities
Large BGP CommunitiesLarge BGP Communities
Large BGP Communities
 
Linux DMA Engine
Linux DMA EngineLinux DMA Engine
Linux DMA Engine
 
EOIP Deep Dive
EOIP Deep DiveEOIP Deep Dive
EOIP Deep Dive
 
Pakistan Education & Research Network
Pakistan Education & Research NetworkPakistan Education & Research Network
Pakistan Education & Research Network
 
Linux device driver
Linux device driverLinux device driver
Linux device driver
 
eBPF maps 101
eBPF maps 101eBPF maps 101
eBPF maps 101
 
monitors,vga and svga
monitors,vga and svgamonitors,vga and svga
monitors,vga and svga
 
Introduction to DPDK
Introduction to DPDKIntroduction to DPDK
Introduction to DPDK
 
P4/FPGA, Packet Acceleration
P4/FPGA, Packet AccelerationP4/FPGA, Packet Acceleration
P4/FPGA, Packet Acceleration
 
Intel(r) Quick Assist Technology Overview
Intel(r) Quick Assist Technology OverviewIntel(r) Quick Assist Technology Overview
Intel(r) Quick Assist Technology Overview
 

Similar to An Online secure ePassport Protocol

OpenID Connect 4 SSI (DIFCon F2F)
OpenID Connect 4 SSI (DIFCon F2F)OpenID Connect 4 SSI (DIFCon F2F)
OpenID Connect 4 SSI (DIFCon F2F)Torsten Lodderstedt
 
Digital certificates
Digital certificates Digital certificates
Digital certificates Sheetal Verma
 
Eurosmart presentation on the eidas regulation
Eurosmart presentation on the eidas regulationEurosmart presentation on the eidas regulation
Eurosmart presentation on the eidas regulationStefane Mouille
 
OpenID for Verifiable Credentials @ IIW 36
OpenID for Verifiable Credentials @ IIW 36OpenID for Verifiable Credentials @ IIW 36
OpenID for Verifiable Credentials @ IIW 36Torsten Lodderstedt
 
Machine Readable Travel Documents (MRTD) - Biometric Passport
Machine Readable Travel Documents (MRTD) - Biometric PassportMachine Readable Travel Documents (MRTD) - Biometric Passport
Machine Readable Travel Documents (MRTD) - Biometric PassportTariq Tauheed
 
How to secure electronic passports
How to secure electronic passportsHow to secure electronic passports
How to secure electronic passportsRiscure
 
OpenID for Verifiable Credentials
OpenID for Verifiable CredentialsOpenID for Verifiable Credentials
OpenID for Verifiable CredentialsTorsten Lodderstedt
 
The Hong Kong Public Key Infrastruture 2010
The Hong Kong Public Key Infrastruture 2010The Hong Kong Public Key Infrastruture 2010
The Hong Kong Public Key Infrastruture 2010SC Leung
 
How to Easily Upgrade to a Next-Generation Transit Payment System
How to Easily Upgrade to a Next-Generation Transit Payment SystemHow to Easily Upgrade to a Next-Generation Transit Payment System
How to Easily Upgrade to a Next-Generation Transit Payment SystemFEIG Electronics
 
Kerberos survival guide
Kerberos survival guideKerberos survival guide
Kerberos survival guideJ.D. Wade
 
How to Build Interoperable Decentralized Identity Systems with OpenID for Ver...
How to Build Interoperable Decentralized Identity Systems with OpenID for Ver...How to Build Interoperable Decentralized Identity Systems with OpenID for Ver...
How to Build Interoperable Decentralized Identity Systems with OpenID for Ver...Torsten Lodderstedt
 

Similar to An Online secure ePassport Protocol (20)

OpenID Connect 4 SSI (DIFCon F2F)
OpenID Connect 4 SSI (DIFCon F2F)OpenID Connect 4 SSI (DIFCon F2F)
OpenID Connect 4 SSI (DIFCon F2F)
 
EMV 201 EMF June 2016
EMV 201 EMF June 2016EMV 201 EMF June 2016
EMV 201 EMF June 2016
 
Digital certificates
Digital certificates Digital certificates
Digital certificates
 
Eurosmart presentation on the eidas regulation
Eurosmart presentation on the eidas regulationEurosmart presentation on the eidas regulation
Eurosmart presentation on the eidas regulation
 
Session 1. e-ID_esign
Session 1. e-ID_esignSession 1. e-ID_esign
Session 1. e-ID_esign
 
OpenID for Verifiable Credentials @ IIW 36
OpenID for Verifiable Credentials @ IIW 36OpenID for Verifiable Credentials @ IIW 36
OpenID for Verifiable Credentials @ IIW 36
 
Machine Readable Travel Documents (MRTD) - Biometric Passport
Machine Readable Travel Documents (MRTD) - Biometric PassportMachine Readable Travel Documents (MRTD) - Biometric Passport
Machine Readable Travel Documents (MRTD) - Biometric Passport
 
How to secure electronic passports
How to secure electronic passportsHow to secure electronic passports
How to secure electronic passports
 
OpenID for Verifiable Credentials
OpenID for Verifiable CredentialsOpenID for Verifiable Credentials
OpenID for Verifiable Credentials
 
Fiduciary Documents
Fiduciary DocumentsFiduciary Documents
Fiduciary Documents
 
The Hong Kong Public Key Infrastruture 2010
The Hong Kong Public Key Infrastruture 2010The Hong Kong Public Key Infrastruture 2010
The Hong Kong Public Key Infrastruture 2010
 
karsof systems e-visa
karsof systems e-visakarsof systems e-visa
karsof systems e-visa
 
Blockchain Poc for Certificates and Degrees
Blockchain Poc for Certificates and DegreesBlockchain Poc for Certificates and Degrees
Blockchain Poc for Certificates and Degrees
 
Key Management
Key Management Key Management
Key Management
 
globalsign-131113043043-phpapp01
globalsign-131113043043-phpapp01globalsign-131113043043-phpapp01
globalsign-131113043043-phpapp01
 
How to Easily Upgrade to a Next-Generation Transit Payment System
How to Easily Upgrade to a Next-Generation Transit Payment SystemHow to Easily Upgrade to a Next-Generation Transit Payment System
How to Easily Upgrade to a Next-Generation Transit Payment System
 
Kerberos survival guide
Kerberos survival guideKerberos survival guide
Kerberos survival guide
 
How to Build Interoperable Decentralized Identity Systems with OpenID for Ver...
How to Build Interoperable Decentralized Identity Systems with OpenID for Ver...How to Build Interoperable Decentralized Identity Systems with OpenID for Ver...
How to Build Interoperable Decentralized Identity Systems with OpenID for Ver...
 
EMV chip cards
EMV chip cardsEMV chip cards
EMV chip cards
 
Secure Electronic Transaction (SET)
Secure Electronic Transaction (SET)Secure Electronic Transaction (SET)
Secure Electronic Transaction (SET)
 

Recently uploaded

SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?XfilesPro
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphNeo4j
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptxLBM Solutions
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 

Recently uploaded (20)

SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptx
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 

An Online secure ePassport Protocol

  • 1. An On-line Secure E-Passport Protocol Vijayakrishnan Pasupathinathan with, Josef Pieprzyk and Huaxiong Wang Centre for Advanced Computing - Algorithms and Cryptography (ACAC) Macquarie University, Australia 1
  • 2. Outline • • • • Overview of E-passport First Generation - some known weaknesses Second Generation • Working and Problems An Online E-passport Proposal 2
  • 3. E-passport Overview • Integration of a biometric enabled contact-less smart card microchip. • E-passport guideline (DOC 9303) developed by International Civil Aviation Organisation (ICAO). • Describes communication protocol • • Provides details on establishing a secure communication channel between an e-passport and an e-passport reader • Authentication mechanisms. Uses existing approved standard such as ISO14443, ISO11770, ISO/IEC 7816, ISO 9796. 3
  • 5. E-passport Overview • Yesterday: Machine readable passport with MRZ Image courtesy of DFAT Australia 4
  • 6. E-passport Overview • Yesterday: Machine readable passport with MRZ • Today: Electronic Passport with digital Image 4
  • 7. E-passport Overview • Yesterday: Machine readable passport with MRZ • Today: Electronic Passport with digital Image • Tomorrow: Passports with secondary biometric information 4
  • 8. E-passport Operation First Generation • Basic Access Control - enables encrypted communication. • Passive Authentication - provides integrity of epassport data. • Active Authentication - provides authentication of chip contents. E-passport Holder Border Security Visits a check point Scan MRZ BAC Passive Auth Active Auth 5
  • 9. First generation PKI Country CSCA Country CSCA PKD (ICAO) DS ... DS . . . Country CSCA E-passport As of Dec. 2007 - 4 countries are actively upload to PKD. (Australia, Japan, New Zealand and Singapore) By early 2009, 20 countries are expected to join PKD
  • 10. Known Attacks (Problems) in First Generation E-passports • • BAC is optional! So, encryption is optional. Low entropy (3DES, max. 112b, BAC max 56/74b, in practice 30-50b)[Jules et. al. 2005] • • The authentication key is derived from document#, DoB, DoE. No protection against cloning. [G S. Kc et. al. 2005] 7
  • 11. Known Attacks (Problems) in First Generation E-passports • Formal verification of the complete protocol [V. Pasupathinathan et. al 2008] • • • No data origin authentication. • Can be exploited because of weakness in facial biometric. Subject to replay and Grand master attacks. Vulnerable to Certificate Manipulation. And there are others too! 8
  • 12. Second Take! Second Generation E-passports • • • Proposed by BSI Germany [Kluger 2005] • Adds extra biometric identifiers - finger prints (optionally, Iris scan). • June 2009 all EU members will implement. Adopted by EU in June 2006 New protocols to enhance security for Extended Access Control (EAC). 9
  • 13. EAC Mechanisms • Based on Diffie-Hellman Key Pair (PKCS #3 or ISO 15946) • Chip Authentication - replaces active authentication • Terminal Authentication E-passport Holder Visits a check point Border Security Scan MRZ BAC Chip Auth Passive Auth Terminal Auth 10
  • 14. EAC Mechanisms Chip Authentication Chip PKI Structure IS PKc SKc Dc Send PKc Generate ephemeral key-pair Send PK’ K= KA(Pk’ SKc) PK’ SK’ K = KA(PKc SK’) Terminal Authentication Chip RNDc IS Send RNDc z = IDc || RNDc || H(PK’) S = SIGN{ z } Verify {S} Send S Photo Courtesy ICAO MRTD Report November 2007
  • 15. Problems with EAC - PKI Certify{PKc} E-passport Send Public Key Check ALL Certificates Document Signer Certify{PKds} E-passport’s Home Country (CSCA) Certify ALL IS systems Chip Auth - PKc CERT{IS}{DV}{VCSCA} Visiting Country Inspection System DV ..... DV Visiting Country’s Document Verifier 12
  • 16. Problems with EAC - PKI Certify{PKc} E-passport Send Public Key Check ALL Certificates Document Signer Certify{PKds} E-passport’s Home Country (CSCA) Certify ALL IS systems Chip Auth - PKc NOT Useful CERT{IS}{DV}{VCSCA} Visiting Country Inspection System DV ..... DV Visiting Country’s Document Verifier E-passports DONT have an internal clock!! How does it now if the certificate is valid? 12
  • 17. Problems with EAC - PKI Certify{PKc} E-passport Send Public Key Check ALL Certificates Document Signer Certify{PKds} E-passport’s Home Country (CSCA) Certify ALL IS systems Chip Auth - PKc CERT{IS}{DV}{VCSCA} Visiting Country Inspection System DV ..... DV Visiting Country’s Document Verifier 12
  • 18. Problems with EAC - PKI Certify{PKc} E-passport Send Public Key Check ALL Certificates Document Signer Certify{PKds} E-passport’s Home Country (CSCA) Certify ALL IS systems Chip Auth - PKc CERT{IS}{DV}{VCSCA} Visiting Country Inspection System How Many?? DV ..... DV Visiting Country’s Document Verifier What is the Limit? Vulnerable to Denial of Service when combined with first generation weaknesses! 12
  • 19. Problems with EAC - PKI Certify{PKc} E-passport Send Public Key Check ALL Certificates Document Signer Certify{PKds} E-passport’s Home Country (CSCA) Certify ALL IS systems Chip Auth - PKc CERT{IS}{DV}{VCSCA} Visiting Country Inspection System DV ..... DV Visiting Country’s Document Verifier 12
  • 20. Problems with EAC - PKI Certify{PKc} E-passport Document Signer Certify{PKds} E-passport’s Home Country (CSCA) How Long is this valid? Send Public Key Check ALL Certificates Certify ALL IS systems Chip Auth - PKc CERT{IS}{DV}{VCSCA} Visiting Country Inspection System DV ..... DV Visiting Country’s Document Verifier Passports are normally valid for 5 or 10 years!!! Document Issuer need to be around 15 years CSCA around 20 years! We can have passport with expired certificates!! 12
  • 21. Problems with EAC - PKI Certify{PKc} E-passport Send Public Key Check ALL Certificates Document Signer Certify{PKds} E-passport’s Home Country (CSCA) Certify ALL IS systems Chip Auth - PKc CERT{IS}{DV}{VCSCA} Visiting Country Inspection System DV ..... DV Visiting Country’s Document Verifier 12
  • 22. Problems with EAC - PKI Certify{PKc} E-passport Document Signer Certify{PKds} E-passport’s Home Country (CSCA) Identity Revealed Send Public Key Check ALL Certificates Certify ALL IS systems Chip Auth - PKc CERT{IS}{DV}{VCSCA} Visiting Country Inspection System DV ..... DV Visiting Country’s Document Verifier Identity of the Passport revealed before terminal is authenticated! 12
  • 23. Problems with EAC - PKI Certify{PKc} E-passport Send Public Key Check ALL Certificates Document Signer Certify{PKds} E-passport’s Home Country (CSCA) Certify ALL IS systems Chip Auth - PKc CERT{IS}{DV}{VCSCA} Visiting Country Inspection System DV ..... DV Visiting Country’s Document Verifier 12
  • 24. EAC other Problems • • • • IS requires write access to E-passports. • Border Control terminal need to update CSCA certificates when they pass through. Terminal Authentication is weak. • Can authenticate who is writing to e-passport. Only semi-forward secrecy [Monnerat et al 2007] Leakage of Digest [Monnerat et al 2007] • Security objects in the chip 13
  • 25. Online Secure E-passport Protocol • • Why Online? • • Use the same PKI as in First Generation. Eliminate the need to send long certificate chains. Provide security guarantees for • Identification and authentication of both epassport and inspection systems. (i.e. Mutual) • • Privacy protection to e-passport holders. Confidentiality of information (session-key security and e-passport data) 14
  • 26. Online Secure E-passport Protocol E-passport Visiting Country Inspection System 15 DV
  • 27. Online Secure E-passport Protocol E-passport Visiting Country Inspection System create and send session key part 15 DV
  • 28. Online Secure E-passport Protocol Visiting Country E-passport Inspection System create and send session key part Read MRZ and send signed message to DV 15 DV
  • 29. Online Secure E-passport Protocol Visiting Country E-passport Inspection System DV create and send session key part Read MRZ and send signed message to DV DV may choose to send e-passport ID 15 Verify IS Sign session key and IS public key
  • 30. Online Secure E-passport Protocol Visiting Country E-passport Inspection System DV create and send session key part Read MRZ and send signed message All Message from hereon isto DV encrypted Send Information back from DV encrypted using session key formed Verify signature Only DV public key 15 Verify IS Sign session key and IS public key
  • 31. Online Secure E-passport Protocol Visiting Country E-passport Inspection System DV create and send session key part Read MRZ and send signed message to DV Send Information back from DV encrypted using session key formed Verify signature Only DV public key Send Certificate and ID Verify ID and certificate Compare with DV information 15 Verify IS Sign session key and IS public key
  • 32. OSEP Characteristics • • • The protocol is SK-secure. [Canetti 2001] • Tamper detectable integrity check protects against passport forgery. (data in e-passport is hashed and signed by document signer • Same PKI as first generation. Minimal computation by e-passport. Passport identity is released only to authenticated Inspection Systems. 16
  • 33. What needs to be done? • • • Online nature can induce delays. • Fallback to off-line authentication. But current passport systems use online communication. Integrate with SMART GATE system. (An automated processing system) 17