About Machine Readable Travel Documents Privacy Enhancement Using - - PowerPoint PPT Presentation

about machine readable travel documents
SMART_READER_LITE
LIVE PREVIEW

About Machine Readable Travel Documents Privacy Enhancement Using - - PowerPoint PPT Presentation

About Machine Readable Travel Documents Privacy Enhancement Using (Weakly) Non-Transferable Data Authentication Jean Monnerat, Serge Vaudenay , Martin Vuagnoux COLE POLYTECHNIQUE FDRALE DE LAUSANNE http://lasecwww.epfl.ch/ SV 2007 About


slide-1
SLIDE 1

About Machine Readable Travel Documents

Privacy Enhancement Using (Weakly) Non-Transferable Data Authentication Jean Monnerat, Serge Vaudenay, Martin Vuagnoux

ÉCOLE POLYTECHNIQUE FÉDÉRALE DE LAUSANNE

http://lasecwww.epfl.ch/

SV 2007 About MRTD RFID Security 2007 1 / 41

slide-2
SLIDE 2

1

ICAO-MRTD

2

Non-Transferable Proofs

SV 2007 About MRTD RFID Security 2007 2 / 41

slide-3
SLIDE 3

1

ICAO-MRTD

2

Non-Transferable Proofs

SV 2007 About MRTD RFID Security 2007 3 / 41

slide-4
SLIDE 4

1

ICAO-MRTD ICAO-MRTD Overview Data Structures and PKI MRTD Cryptography Security and Privacy Issues

2

Non-Transferable Proofs

SV 2007 About MRTD RFID Security 2007 4 / 41

slide-5
SLIDE 5

Objectives

to enable inspecting authorities to securely identify visitors with the help of machine-readable digital information

→ biometrics → contactless IC chip → digital signature + PKI

maintained by UN/ICAO (International Civil Aviation Organization)

SV 2007 About MRTD RFID Security 2007 5 / 41

slide-6
SLIDE 6

MRTD History

1968: ICAO starts working on MRTD 1980: first standard (OCR-B Machine Readable Zone (MRZ)) 1997: ICAO-NTWG (New Tech. WG) starts working on biometrics 2001 9/11: US want to speed up the process 2004: version 1.1 of standard with ICC 2006: extended access control under development in the EU

SV 2007 About MRTD RFID Security 2007 6 / 41

slide-7
SLIDE 7

How to Distinguish a Compliant MRTD

SV 2007 About MRTD RFID Security 2007 7 / 41

slide-8
SLIDE 8

MRTD in a Nutshell

MRTD MRZ LDS

❄ ❄ ❄ ❄ ❄ ❄

  • ptical access

radio access

data authentication by digital signature + PKI aka passive authentication access control + key agreement based on MRZ info aka basic access control (BAC) chip authentication by public-key cryptgraphy aka active authentication (AA)

SV 2007 About MRTD RFID Security 2007 8 / 41

slide-9
SLIDE 9

1

ICAO-MRTD ICAO-MRTD Overview Data Structures and PKI MRTD Cryptography Security and Privacy Issues

2

Non-Transferable Proofs

SV 2007 About MRTD RFID Security 2007 9 / 41

slide-10
SLIDE 10

MRZ Example

document type issuing country holder name

  • doc. number + CRC

nationality date of birth + CRC gender date of expiry + CRC

  • ptions + CRC

SV 2007 About MRTD RFID Security 2007 10 / 41

slide-11
SLIDE 11

LDS Structure

DG1 (mandatory): same as MRZ DG2 (mandatory): encoded face DG3: encoded finger(s) DG4: encoded eye(s) DG5: displayed portrait DG6: (reserved) DG7: displayed signature DG8: data feature(s) DG9: structure feature(s) DG10: substance feature(s) DG11: add. personal detail(s) DG12: add. document detail(s) DG13: optional detail(s) DG14: (reserved) DG15: KPuAA DG16: person(s) to notify DG17: autom. border clearance DG18: electronic visa DG19: travel record(s) SOD (mandatory)

SV 2007 About MRTD RFID Security 2007 11 / 41

slide-12
SLIDE 12

SOD Structure

list of hash for data groups DG1–DG15 formatted signature by DS (include: information about DS) (optional) CDS

SV 2007 About MRTD RFID Security 2007 12 / 41

slide-13
SLIDE 13

Hierarchy

LDS21 LDS22 SOD DS1 DS2 CDS CSCA

✲ other countries

CCSCA

  • ne PKI per country
  • ne CSCA (Country Signing Certificate Authority)

CCSCA: self-signed CSCA public key KPuCSCA CCSCA distributed to other countries by diplomatic means possibly many DS (Document Signer) per country CDS: certificate for a DS public key KPuDS SOD: signature of (part of) LDS in MRTD

SV 2007 About MRTD RFID Security 2007 13 / 41

slide-14
SLIDE 14

1

ICAO-MRTD ICAO-MRTD Overview Data Structures and PKI MRTD Cryptography Security and Privacy Issues

2

Non-Transferable Proofs

SV 2007 About MRTD RFID Security 2007 14 / 41

slide-15
SLIDE 15

Basic Access Control

goal prevent from unauthorized access by the holder (privacy) read MRZ (OCR-B) extract MRZ info run an authenticated key exchange based on MRZ info

  • pen secure messaging based on the exchanged symmetric key

→ proves that reader knows MRZ info

SV 2007 About MRTD RFID Security 2007 15 / 41

slide-16
SLIDE 16

MRZ info

PMFRADUPONT<<<<JEAN<<<<<<<<<<<<<<<<<<<<<<<<< 74HK8215<6CHE7304017M0705121<<<<<<<<<<<<<<03 document type issuing country holder name

  • doc. number + CRC

nationality date of birth + CRC gender date of expiry + CRC

  • ptions + CRC

SV 2007 About MRTD RFID Security 2007 16 / 41

slide-17
SLIDE 17

Secure Messaging

goal authentication, integrity, confidentiality of communication message ❄ Enc ❄ ❄ KSENC ✲ MAC ❄ ❄ KSMAC ✻ ☛ ✕

Adversary

✲ MAC ✲ = ✻ ❄ KSMAC Dec ✻ ✻ message ❄ KSENC

→ secure channel based on 3DES

SV 2007 About MRTD RFID Security 2007 17 / 41

slide-18
SLIDE 18

Passive Authentication

goal authenticate LDS after getting SOD, check the included certificate CDS and the signature when loading a data group from LDS, check its hash with what is in SOD

→ stamp by DS on LDS

SV 2007 About MRTD RFID Security 2007 18 / 41

slide-19
SLIDE 19

Active Authentication

goal authenticate the chip proves that ICC knows some secret key KPrAA linked to a public key KPuAA by a challenge-response protocol (KPuAA in LDS authenticated by passive authentication)

→ prove that the chip is not a clone

SV 2007 About MRTD RFID Security 2007 19 / 41

slide-20
SLIDE 20

Active Authentication Protocol

IFD ICC pick RND.IFD

RND.IFD

− − − − − − − − − − − − − − − − − →

F ← nonce||RND.IFD check

Σ

← − − − − − − − − − − − − − − − − − Σ ← SignKPrAA(F)

SV 2007 About MRTD RFID Security 2007 20 / 41

slide-21
SLIDE 21

Sequence of Steps for Identification

read MRZ (OCR-B)

resolve collisions to ICC

access denied?

passive authentication

yes no BAC + open sec. messaging

✛ ❄

MRZ matches?

check AA (if supplied)

check biometrics

SV 2007 About MRTD RFID Security 2007 21 / 41

slide-22
SLIDE 22

1

ICAO-MRTD ICAO-MRTD Overview Data Structures and PKI MRTD Cryptography Security and Privacy Issues

2

Non-Transferable Proofs

SV 2007 About MRTD RFID Security 2007 22 / 41

slide-23
SLIDE 23

Coming From Wireless Technology

(claimed to be possible at a distance of 10m) detecting the proximity of an e-passport threat: giving valuable information to passport theafs threat: privacy (in some cases) by tracking people data skimming threat: privacy unauthorized access threat: privacy

SV 2007 About MRTD RFID Security 2007 23 / 41

slide-24
SLIDE 24

Coming From IC Chip

too much trust in automated process, lazzy identification threat: identity theft malicious cookies put in MRTD threat: privacy dependence on the technology: DoS attack could kill the IC chip threat: waste of time at border controls abuse of automatic recognition threat: privacy leakage of digital evidence threat: privacy

SV 2007 About MRTD RFID Security 2007 24 / 41

slide-25
SLIDE 25

Digital Evidence: Challenge Semantics Attack

challenge semantics in AA: evidence that D existed when MRTD was queried RND.IFD

=

H(D) evidence

= (D||LDS||Σ)

evidence that MRTD was accessed at time t RND.IFD

=

H(social(t − 1)) evidence

=

timestampt(social(t − 1)||LDS||Σ)

SV 2007 About MRTD RFID Security 2007 25 / 41

slide-26
SLIDE 26

Digital Evidence: Transferable LDS Authentication

signed personal data (name, age, gender, face, etc) can no longer hide/deny name, age, gender... when DG11 is used: more personal data (place of birth etc) personal profiles can be sold if they come with a proof

SV 2007 About MRTD RFID Security 2007 26 / 41

slide-27
SLIDE 27

1

ICAO-MRTD

2

Non-Transferable Proofs

SV 2007 About MRTD RFID Security 2007 27 / 41

slide-28
SLIDE 28

1

ICAO-MRTD

2

Non-Transferable Proofs Notions of Non-Transferability ZK Protocols for MRTD

SV 2007 About MRTD RFID Security 2007 28 / 41

slide-29
SLIDE 29

Mafia Fraud + Fully Non-Transferable Proof

Prover knowledge

✲ ✛

Verifier Kp

✲ ✛

Mafia

  • (does P know?)

proof of knowledge

proof of knowledge or of knowing a secret key attached to Kp

→ need PKI for verifiers: maybe an overkill

SV 2007 About MRTD RFID Security 2007 29 / 41

slide-30
SLIDE 30

Zero-Knowledge: Offline Non-Transferability

Prover

✲ ✛

Verifier proof of knowledge leaks nothing that can later be used Prover

✲ ✛

Cheater

data of distribution D Simulator Cheater

✲ data of distribution D

SV 2007 About MRTD RFID Security 2007 30 / 41

slide-31
SLIDE 31

Sigma Protocols

Prover Verifier secret: x

commitment

− − − − − − − − − − − − − →

challenge

← − − − − − − − − − − − − −

response

− − − − − − − − − − − − − →

check

SV 2007 About MRTD RFID Security 2007 31 / 41

slide-32
SLIDE 32

Example: GPS Identification

Prover Verifier parameters: g,A,B,S public key: I (I = gs) input: I,g,A,B,S secret key: s ∈ [0,S] pick r ∈ [0,A− 1] pick c ∈ [0,B − 1] x ← gr

x

− − − →

c

← − − −

y ← r + cs

y

− − − →

check gy = xIc and 0 ≤ y < A+(B − 1)(S − 1)

SV 2007 About MRTD RFID Security 2007 32 / 41

slide-33
SLIDE 33

Fiat-Shamir Signature

Basic Fiat-Shamir identification protocol: Prover Verifier pick r, x = r2 mod n

v,x

− − − − − − − − − − − − − →

e

← − − − − − − − − − − − − −

e = 0 or 1 y = rse mod n

y

− − − − − − − − − − − − − →

check y2ve ≡ x Conversion into a signature: use random coins from H(message,previously seen transcript) simulate the verifier using these coins the signature is the final transcript

SV 2007 About MRTD RFID Security 2007 33 / 41

slide-34
SLIDE 34

Honest vs Malicious Verifier

for Sigma-protocols: the signature is unforgeable malicious verifier that simulates the previous conversion: it produces a signature consequences: Sigma-protocols are not ZK maybe honest-verifier ZK verifiers playing the challenge semantics are not honest challenge semantics in GPS identification: c = H(semantics,x) UDVSP [Baek et al. Asiacrypt05]: same

SV 2007 About MRTD RFID Security 2007 34 / 41

slide-35
SLIDE 35

1

ICAO-MRTD

2

Non-Transferable Proofs Notions of Non-Transferability ZK Protocols for MRTD

SV 2007 About MRTD RFID Security 2007 35 / 41

slide-36
SLIDE 36

Converting Sigma Protocols into ZK Protocols

Prover Verifier secret: x pick cP pick cV

γ

← − − − − − − − − − − − − − (γ,δ) ← commit(cV)

commitment,cP

− − − − − − − − − − − − − →

δ,cV

← − − − − − − − − − − − − −

check(cV,γ,δ)

response

− − − − − − − − − − − − − →

check (challenge is cP ⊕ cV)

SV 2007 About MRTD RFID Security 2007 36 / 41

slide-37
SLIDE 37

Proof of Signature Knowledge based on GQ

Prover Verifier formated digest: X public key: N,e formated digest: X signature: x pick y ∈ Z∗

N

pick cV ∈ {0,1}ℓ pick cP ∈ {0,1}ℓ

γ

← − − − − − − − − − − − − − (γ,δ) ← commit(cV)

Y ← ye mod N

Y,cP

− − − − − − − − − − − − − →

check(cV,γ,δ)

δ,cV

← − − − − − − − − − − − − −

z ← yxc mod N

z

− − − − − − − − − − − − − →

check ze = YX c (mod N) (c = cP ⊕ cV)

SV 2007 About MRTD RFID Security 2007 37 / 41

slide-38
SLIDE 38

Easy AA from Previous Passive Authentication

proof of holding a signature of SOD

proof of holding a secret signature of SOD

SV 2007 About MRTD RFID Security 2007 38 / 41

slide-39
SLIDE 39

AA based on GPS

Prover Verifier parameters: g,A,B,S public key: I (I = gs) input: I,g,A,B,S secret key: s ∈ [0,S] pick r ∈ [0,A− 1] pick cV ∈ [0,B − 1] pick cP ∈ [0,B − 1]

γ

← − − − (γ,δ) ← commit(cV)

x ← gr

x,cP

− − − →

check(cV,γ,δ)

δ,cV

← − − −

y ← r + cs

y

− − − →

check gy = xIc and 0 ≤ y < A+(B − 1)(S − 1) (c = cP + cV mod B)

SV 2007 About MRTD RFID Security 2007 39 / 41

slide-40
SLIDE 40

Conclusion

privacy threat of MRTD coming from wireless channel privacy threat of MRTD coming from leakage of evidence weakly non-transferable proofs proof of signature knowledge based on GQ fix of AA

SV 2007 About MRTD RFID Security 2007 40 / 41

slide-41
SLIDE 41

Q & A