Top Banner
AUTHENTICATION REDEFINED ISSE 2016 16.11.2016 Libor Neumann | ADUCID s.r.o. “ON-THE-FLY” MIGRATION OF EID TO ELLIPTIC CURVES CRYPTOGRAPHY
16

“on-the-fly” migration of eid to elliptic curves cryptography

Feb 12, 2017

Download

Documents

dangtuyen
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: “on-the-fly” migration of eid to elliptic curves cryptography

AUTHENTICATION REDEFINED

ISSE 2016 16.11.2016

Libor Neumann | ADUCID s.r.o.

“ON-THE-FLY” MIGRATION OF EID TO ELLIPTIC CURVES CRYPTOGRAPHY

Page 2: “on-the-fly” migration of eid to elliptic curves cryptography

Long-term sustainability of eID ecosystem

• It is impossible to:

• expect usability of current cryptography in following decades

• accept a blackout of any widely used eID ecosystem during its upgrade to new cryptography

Why?

Agenda

• Authentication protocol modification

• Deployment limits

• On-the-fly deployment support

Page 3: “on-the-fly” migration of eid to elliptic curves cryptography

• External authentication service

• Fully automated identifiers management

• Fully automated life-cycle of cyber-identities

• Mutual authentication using asymmetric cryptography

• Universal Cryptographic Protocol

• Independent cryptographic layer

• Built-in security management

• Integrated data channel binding with binding control

Assets

Personal Electronic Identity Guardian

Service Provider Identity Machine

ADUCID external interfaces

Target application or other ICT system

ADUCID

User

ADUCID foundation

Page 4: “on-the-fly” migration of eid to elliptic curves cryptography

‐ Only one framework with provable security features 

‐ Repeated use of the framework for different operations

‐ Security features of the framework are independent on  cryptography

One Abstract Framework

General cryptographic operations

- Encryption E (& Decryption D)- Sign S (& Signature Verification V)

General variables‐ RS – Random String ‐ X  ‐ new secret‐ Y, Z – variables including specified items

Precondition‐ ATS – Authorized Information and Secret (e.g. authorised public keys of 

both sites & private key of the specific site – asymmetric cryptography, authorized shared secret – symmetric cryptography)

UCP Main Principles – published 2011

Page 5: “on-the-fly” migration of eid to elliptic curves cryptography

t

Universal Cryptographic Protocol Note

Site(A) Site(B)

OI0 → Step 1:

← OI1OIx → Optional number

← OIy of (OIx,OIy) pairs

…. ….OI2, RS → Step 2:

← OI3, E(X), S(Y)OI4, S(Z) →

The following communication between A and B is encrypted (andoptionally authenticated)

Step 3:

← UIbUIa → Optional number

…. …. of (UIb, UIa) pairs

← OIend End

UCP sequence description

Page 6: “on-the-fly” migration of eid to elliptic curves cryptography

‐ Random string 

‐ Entropy is defined by implementation and by configuration

‐ Authentication challengeRS

X

‐ Random string ‐ Entropy is defined by implementation and by configuration‐ Authentication challenge ‐ New  authenticated shared secret

Y‐ Y = {authID, OI0, OI1, OIx and OIy pairs, OI2, RS, OI3, E(X), and optional 

values }‐ Authentication & Important values integrity check 

Z‐ Z = {authID, OI0, OI1, OIx and OIy pairs, OI2, RS, OI3, E(X), S(Y), OI4, and 

optional values }‐ Authentication & Important values integrity check 

UCP Variables t

Page 7: “on-the-fly” migration of eid to elliptic curves cryptography

t

‐ Only one framework with provable security features 

‐ Repeated use of the framework for different operations

‐ Security features of the framework are independent on  cryptography

One Abstract Framework

General cryptographic operations

‐ EC Key Agreement

‐ EC Sign S (& Signature Verification V)

General variables‐ DHSS – ECDH Shared Secret‐ X  ‐ new secret‐ Y, Z – variables including specified items

Precondition‐ ATS – Authorized Information and Secret (e.g. authorised public keys of 

both sites & private key of the specific site – asymmetric cryptography)

UCP2 Main Principles - EC

Page 8: “on-the-fly” migration of eid to elliptic curves cryptography

Universal Cryptographic Protocol 2 Note

Site(A) Site(B)

OI0 → Step 1:

← OI1OIx → Optional number

← OIy of (OIx,OIy) pairs

…. ….OI2, DHPuK1 → Step 2:

← OI3, DHPuK2, S(Y) DHSS & X

OI4, S(Z) → calculation

The following communication between A and B is encrypted (andoptionally authenticated)

Step 3:

← UIbUIa → Optional number

…. …. of (UIb, UIa) pairs

← OIend End

tUCP2 sequence description

Page 9: “on-the-fly” migration of eid to elliptic curves cryptography

‐ Elliptic Curve Diffie‐Hellmann (ECDH) Shared Secret

‐ Entropy is defined by EC configurationDHSS

X

‐ X = DHSS

‐ Authentication challenge 

‐ New  authenticated shared secret

Y‐ Y = {authID, OI0, OI1, OIx and OIy pairs, OI2, OI3, DHPuK1, DHPuK2, 

DHSS and optional values }‐ Authentication & Important values integrity check 

Z‐ Z = {authID, OI0, OI1, OIx and OIy pairs, OI2, OI3, DHPuK1, DHPuK2, 

DHSS, S(Y), OI4, and optional values }‐ Authentication & Important values integrity check 

9

tUCP2 Variables

Page 10: “on-the-fly” migration of eid to elliptic curves cryptography

Topology limits• Reused key issue

• Server certificate update

• User certificate update

Situation

• Many users, many service providers

• Server site & client site cryptography migration

• No service blackout

How to deploy?

Protocol update

• Known methods – version identifier

Page 11: “on-the-fly” migration of eid to elliptic curves cryptography

Deploy sequence

• Update of all clients

• Verify if all clients are updated - how?

• Server certificate migration

Server certificate

Page 12: “on-the-fly” migration of eid to elliptic curves cryptography

Smart card ID• New ID card has to be issued and delivered

to every citizen

• Usual ID validity period – 10 years

Deploying sequence

• Update of all relying parties

• Verify if all relying parties support old and new cryptography used by different clients

• Issue and delivery of new certificates to all clients

Client certificate – certification authority with many relying parties

Page 13: “on-the-fly” migration of eid to elliptic curves cryptography

On-the-fly deployment - architecture

Peer-to-peer topology

No reused key

User authenticator – different key set for every service provider

Server site – different key set for every user authenticator

Built-in multi-version support

Version identification

Multi-version backward compatibility

Update from cloud – Apple AppStore, Google Play,…

BYOD support

Page 14: “on-the-fly” migration of eid to elliptic curves cryptography

On-the-fly deployment - tools

Parameter agreement

Parameter check by authenticator

Optional parameter sets

Built-in managementProtocol/parameter enforcement controlled by security management console

On-the-fly enforcement

• Planned

• Event driven

Page 15: “on-the-fly” migration of eid to elliptic curves cryptography

• UCP UCP2 - Different cryptographic operation support (encryption + signature <-> key-agreement + signature)

• Protocol modification is needed -> Multi-protocol environment

• Reused keys complicate/disables on-the-fly deployment

• On-the-fly deployment solution

• Independent paired key sets topology

• Built-in multi-protocol support & parameter agreement

• BYOD + cloud upgrade

• Built-in security management

• Planned deployment

• Emergency deployment

Conclusion

Page 16: “on-the-fly” migration of eid to elliptic curves cryptography

AUTHENTICATION REDEFINED