How To Secure Electronic Passports
Marc Witteman & Harko Robroch Riscure 02/07/07 - Session Code: IAM-201
How To Secure Electronic Passports Marc Witteman & Harko Robroch - - PowerPoint PPT Presentation
How To Secure Electronic Passports Marc Witteman & Harko Robroch Riscure 02/07/07 - Session Code: IAM-201 Other personal info on chip Other less common data fields that may be in your passport Custody Information Travel Record
How To Secure Electronic Passports
Marc Witteman & Harko Robroch Riscure 02/07/07 - Session Code: IAM-201
Other personal info on chip
Other less common data fields that may be in your passport
—
Custody Information
—
Travel Record Detail(s)
—
Endorsements/Observations
—
Tax/Exit Requirements
—
Contact Details of Person(s) to Notify
—
Visa
Our involvement in electronic passports
technology
— smart cards — embedded devices
Overview
— Inspection terminal configuration — Access control to personal data — Contactless chip
What to protect against?
Available protection mechanisms under ICAO
Store a certificate with passport holder data Store a private key on a smart card Active Authentication offers this under ICAO
Add personal biometric data Biometric software should reduce false accepts
Overview of protection mechanisms in ICAO
Authentication (Passive, Active, Biometrics) Access Control (None, Basic or Extended) Who can access my data? Does this passport belong to this person?
Test your own passport at Amsterdam Airport
Overview
— Inspection terminal configuration — Access control to personal data — Contactless chip
Inspection terminal configuration
Risk
Challenges and solutions
How would you detect a false acceptance?
— Basic Access Control — Active Authentication — Extended Access Control — Document signer key on passport — Biometrics
— Passive Authentication: RSA (PSS / PKCS1), DSA, ECDSA — Hashing: SHA-1, 224, 256, 384, 512
An example in Passive Authentication
PKCS1 implementations (with exponent 3) Exploit prerequisites
Then, you may fool a terminal with a self-made PKCS1 RSA certificate
Overview
— Inspection terminal configuration — Access control to personal data — Contactless chip
Access control to personal data
Risks to protect against
Challenges and solutions
Weakness in Basic Access Control
Static access key is derived from MRZ data
Predictability & dependency reduce entropy to 35 bits
50000000 100000000 150000000 200000000 250000000 7/24/1998 12/6/1999 4/19/2001 9/1/2002 1/14/2004 5/28/2005 10/10/2006 2/22/2008 7/6/2009 11/18/2010 4/1/2012
Publication in July 2005
Improve Basic Access Control
Solution
visible for any person who had access to the passport Example: In Aug 2006, Dutch passport moved to unpredictable numbers to reach entropy of 66 bits Is 35 bit sufficient to protect personal data?
UID is another challenge
— UID very shortly after power up — On-board random generator
Broadcast 2A73B9F0
Extended Access Control
Access Control (Extended) Who can access my data?
Certificate infrastructure
Short validity period
Foreign country Your country Inspection terminal Document Verifier Country CA signed verify issued But a chip does not know what time it is
Certificate validation problem
Two solutions can be used for lost or stolen terminals
Overview
— Inspection terminal configuration — Access control to personal data — Contactless chip
Contactless chip
Use of contactless technology appropriate?
issues
Overview
— Inspection terminal configuration — Access control to personal data — Contactless chip
Conclusion (1)
— Maximize passport number entropy — Randomize UID
inherent weakness
Conclusion (2) – The electronic passport ...
— Each passport has a chip — Inspecting officer knows it should have a chip
— Reliable biometrics are added to passports
— Contactless (RF) is used — Easy way to fill a country’s database — Adding biometrics also challenges privacy requirements
Thank you. Questions?
Marc Witteman Chief Technology Officer witteman@riscure.com Harko Robroch Managing Director robroch@riscure.com
Riscure B.V. Rotterdamseweg 183c 2629 HD Delft The Netherlands Phone: +31 (0)15 2682664 Http://www.riscure.com
Visit us at the smart card pavilion booth 1742
References
http://www.riscure.com/2_news/passport.html
http://www.fidis.net/press-events/press-releases/budapest-declaration/
http://www.imc.org/ietf-openpgp/mail-archive/msg14307.html
http://www.bsi.bund.de/fachthem/epass/EACTR03110_v101.pdf
http://www.securitydocumentworld.com/client_files/eac_white_paper_210706.pdf
Appendix A: protection mechanisms & shortcomings
Mechanism Protection Shortcoming None
Personal data readable BAC Privacy info Can be cracked EAC + BAC Most sensitive info Certificate validation Passive Auth Content OK Can make clone of chip Active Auth Passport OK Minor: abuse of signing feature + Biometrics Passp holder OK Mass deployment?
Appendix B: Bleichenbacher’s PKCS-1 attack
the Hash will not detect the forgery
Appendix C: false passport detection