Information Security and Privacy Board Background and current status - - PowerPoint PPT Presentation

information security and privacy board
SMART_READER_LITE
LIVE PREVIEW

Information Security and Privacy Board Background and current status - - PowerPoint PPT Presentation

Information Security and Privacy Board Background and current status Use of Hashing Algorithms in the U.S. Federal Personal Identity Verification Program Biometrics Storage Format Selection for the U.S. Federal Personal Identity


slide-1
SLIDE 1

1 1

Background and current status

Use of Hashing Algorithms in the U.S. Federal

Personal Identity Verification Program

Biometrics Storage Format Selection for the U.S.

Federal Personal Identity Verification Program

Curt Barker December 2005

Information Security and Privacy Board

slide-2
SLIDE 2

2 2

Topics

General Status of U.S. Federal Personal Identity

Verification Program

Use of Hashing Algorithms in the U.S. Federal

Personal Identity Verification Program

Processing Concept Programmed Changes in Key/Hash Size Requirements Other Uses of Hashes

Biometrics Decision for Special Publication 800-76

Minutiae-based vs Image-based Storage SP 800-76 Biometrics Storage Formats Conformance Determination

slide-3
SLIDE 3

3 3

Topics

General Status of U.S. Federal Personal Identity

Verification Program

Use of Hashing Algorithms in the U.S. Federal

Personal Identity Verification Program

Processing Concept Programmed Changes in Key/Hash Size Requirements Other Uses of Hashes

Biometrics Decision for Special Publication 800-76

Minutiae-based vs Image-based Storage SP 800-76 Biometrics Storage Formats Conformance Determination

slide-4
SLIDE 4

FIPS 201 REQUIREMENTS

Phased-Implementation

In Two Parts

Part 1 – Common Identification and Security

Requirements

HSPD 12 Control Objectives Identity Proofing, Registration and Issuance Requirements Effective October 2005

Part 2 - Common Interoperability Requirements

Detailed Technical Specifications Office of Management and Budget made Effective October

2006 (OMB M-05-24)

Migration Timeframe (i.e., Phase I to II)

Agency implementation plans have been provided to OMB OMB has issued schedule for full implementation in 2009

4 4

slide-5
SLIDE 5

5 5 FIPS 201

Implementation Status and Current Actions

Revision to FIPS 201 (FIPS 201-1)

  • Interim Issuance Based on National Criminal History

Check

  • Electronic Indication of Interim Status

Conformance Testing of Cards Built to FIPS 201/SP 800-73

Currently Underway

  • Card Interfaces
  • Card Storage Formats
  • Middleware Interfaces

Formal NVLAP Accreditation of NPIVP Laboratories

Underway

slide-6
SLIDE 6

6 6

Topics

General Status of U.S. Federal Personal Identity

Verification Program

Use of Hashing Algorithms in the U.S. Federal

Personal Identity Verification Program

Processing Concept Programmed Changes in Key/Hash Size Requirements Other Uses of Hashes

Biometrics Decision for Special Publication 800-76

Minutiae-based vs Image-based Storage SP 800-76 Biometrics Storage Formats Conformance Determination

slide-7
SLIDE 7

7 7 Special Publication 800-78

Cryptographic Algorithms and Key Sizes for Personal Identity Verification

SP 800-78 specifies:

  • Mandatory PIV Authentication Data (asymmetric key pair and

corresponding PKI certificate)

  • Optional Keys
  • Asymmetric key pair and corresponding certificate for digital

signatures

  • Asymmetric key pair and corresponding certificate for key

management

  • Asymmetric or symmetric card authentication keys for supporting

additional physical access applications

  • Cryptographic Algorithms and Key Sizes
  • Authentication Information Stored on the PIV Card
slide-8
SLIDE 8

Personal Identity Verification

Hashing Concept (Data Stored on Card)

_________________ _________________ _________________ _________________ _________________ _________________ _________________

Hash Function

_________________

Hash RSA Signature Function Digital Signature

_________________

Data

Issuance System

Card Card

8 8

_________________

Digital Signature RSA Verification Function

_________________

Hash Hash Function

_________________

Hash Compare

Access System

_________________ _________________ _________________ _________________ _________________ _________________ _________________

Data

slide-9
SLIDE 9

9 9 Personal Identity Verification

Hashing Concept (Card Signs Data)

_________________ _________________ _________________ _________________ _________________ _________________ _________________

Hash Function

_________________

Hash RSA Signature Function Digital Signature

_________________

Data

Originating System

Card

_________________

Digital Signature

RSA Verification Function

_________________

Hash

Hash Function

_________________

Hash Compare

Receiving System

_________________ _________________ _________________ _________________ _________________ _________________ _________________

Data

slide-10
SLIDE 10

SP 800-78 specifies:

Digital Signatures for Card Holder-Unique ID,

Stored Biometric Information, X.509 Certificates, “Security Object” that Includes these Identifying Information

Expiration of SHA-1 Hash Algorithm and 1024 bit

RSA After 12/31/2010

Special Publication 800-78

Cryptographic Algorithms and Key Sizes for Personal Identity Verification

10 10

slide-11
SLIDE 11

Broader use of SHA-1 by the Federal PKI for the implementation of digital signatures. Default hash algorithm used in the creation of signatures on all certificates issued by Federal PKI CAs. SHA-1 is used (along with MD5) in the NIST National Software Reference Library. Hash algorithm used for certificates and other signed objects on CAC cards. SHA-1 is used in many other Federal applications, since it has been the recommended, FIPS-approved hash function for years.

Other SHA-1 Uses

11 11

slide-12
SLIDE 12

12 12

Topics

General Status of U.S. Federal Personal Identity

Verification Program

Use of Hashing Algorithms in the U.S. Federal

Personal Identity Verification Program

Processing Concept Programmed Changes in Key/Hash Size Requirements Other Uses of Hashes

Biometrics Decision for Special Publication 800-76

Minutiae-based vs Image-based Storage SP 800-76 Biometrics Storage Formats Conformance Determination

slide-13
SLIDE 13

Biometrics Decision for Special Publication 800-76

Minutiae-based Rather Than Image-based Storage SP 800-76 Biometrics Storage Formats

ANSI/INCITS 378 EER Compatible With TSA Requirement

Conformance Determination

MINEX? NPIVP?

Special Publication 800-76

Biometric Data Specification for Personal Identity Verification

13 13

slide-14
SLIDE 14

14 14

Thank you. Questions….

Contact Information:

Curt Barker wbarker@nist.gov 301-975-8443