Top Banner
Reach 2010 @ IIT K Rajat Moona CSE, IIT Kanpur October 11, 2010
28

Rajat Moona CSE, IIT Kanpur · Key management system design for the Indian ... Driving License and Vehicle Registration ... Nitin Munjal and Rajat Moona, “Secure and Cost ...

Apr 05, 2018

Download

Documents

ngomien
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: Rajat Moona CSE, IIT Kanpur · Key management system design for the Indian ... Driving License and Vehicle Registration ... Nitin Munjal and Rajat Moona, “Secure and Cost ...

Reach 2010 @ IIT K

Rajat MoonajCSE, IIT KanpurOctober 11, 2010

Page 2: Rajat Moona CSE, IIT Kanpur · Key management system design for the Indian ... Driving License and Vehicle Registration ... Nitin Munjal and Rajat Moona, “Secure and Cost ...

Identity Establishment Problem Smart Card Technology

b IIT Kanpur Contribution ID related applications DL/RC, MNIC, e‐Passport

Protection against Phishing ATM Enabler for Micro‐financing

Page 3: Rajat Moona CSE, IIT Kanpur · Key management system design for the Indian ... Driving License and Vehicle Registration ... Nitin Munjal and Rajat Moona, “Secure and Cost ...

The issue of giving “right information” to “right person” The issue of giving “right information” to “right person”. Problem: Am I talking to the right person/equipment?

O    t l h  li  th   t    th   th   id  i   i ht    On a telephone line: the party on the other side is right person or not?

For ATM transactions: is it a genuine ATM? Simple schemes: Simple schemes: Voice recognition? Face recognition? Secret sharing? Secret sharing? Shared trust?

Simple schemes are not robust. Not secure.

Page 4: Rajat Moona CSE, IIT Kanpur · Key management system design for the Indian ... Driving License and Vehicle Registration ... Nitin Munjal and Rajat Moona, “Secure and Cost ...

l ld h b ld l h Real world is however build over simple things. Password based login

h d▪ The passwords are easy to guess.

Web logins (bank account/credit cards etc.)▪ Identity loss (lost passwords from sites)▪ Identity loss (lost passwords from sites)

Fingerprint based identifications.▪ Detective movies are full of ideas on how to crack them.

Credit cards based frauds. 3‐digit CVV protection?▪ Try only 900 times to crack a card.

Is it worthwhile to use such mechanisms?

Page 5: Rajat Moona CSE, IIT Kanpur · Key management system design for the Indian ... Driving License and Vehicle Registration ... Nitin Munjal and Rajat Moona, “Secure and Cost ...

Mechanism Password or PIN (“What you know”)▪ Secret information shared between two parties

Cryptographic challenge Response (“What you )carry”)

▪ Entity authentication

Bi t i  i f ti  (“Wh t i   t  f  ”) Biometric information (“What is part of you”)▪ Person’s identification

A  bi ti   f      A combination of one or more

Page 6: Rajat Moona CSE, IIT Kanpur · Key management system design for the Indian ... Driving License and Vehicle Registration ... Nitin Munjal and Rajat Moona, “Secure and Cost ...

Device asks the user (person or a device) to provide a password.

d h d f f h Password is matched for verification with a reference one.

l For example: ATM

Page 7: Rajat Moona CSE, IIT Kanpur · Key management system design for the Indian ... Driving License and Vehicle Registration ... Nitin Munjal and Rajat Moona, “Secure and Cost ...

Enter PINEnter PIN

2344Withdraw Rs. 1000.00

Rs 1000 00 given Bank Rs. 1000.00 given. Bank Server informed for keeping transaction record.

Page 8: Rajat Moona CSE, IIT Kanpur · Key management system design for the Indian ... Driving License and Vehicle Registration ... Nitin Munjal and Rajat Moona, “Secure and Cost ...

Enter PIN

23442344

No Authentication with Bank!!!Withdraw Rs 1000 00Bank!!!Withdraw Rs. 1000.00

User Given the amount or told “ATM out of money.”

Page 9: Rajat Moona CSE, IIT Kanpur · Key management system design for the Indian ... Driving License and Vehicle Registration ... Nitin Munjal and Rajat Moona, “Secure and Cost ...

Secret Key Cryptography Two communicating sides share the same secret

Public Key Cryptography Public key is used for encryption while private key is used for decryption. Private key is secret.

Authentication is based on proving the i   f   k  b  i  possession of secret key by its use.

Challenge‐Response Authentication 

Page 10: Rajat Moona CSE, IIT Kanpur · Key management system design for the Indian ... Driving License and Vehicle Registration ... Nitin Munjal and Rajat Moona, “Secure and Cost ...

Cryptanalyst/Attacker

p’

K’Attacker K

EncryptionAlgorithm

p c DecryptionAlgorithm

c p

Sender Secure ChannelK

Receiver

Key Source

Page 11: Rajat Moona CSE, IIT Kanpur · Key management system design for the Indian ... Driving License and Vehicle Registration ... Nitin Munjal and Rajat Moona, “Secure and Cost ...

Cryptanalyst/Attacker

p’

Pr’Attacker Pr

EncryptionAlgorithm

p c DecryptionAlgorithm

c p

Sender ReceiverPr

Pu

Key GenPuKnown to the 

world

Page 12: Rajat Moona CSE, IIT Kanpur · Key management system design for the Indian ... Driving License and Vehicle Registration ... Nitin Munjal and Rajat Moona, “Secure and Cost ...

Password based Identification  Password based Identification  Where to store passwords securely? Password Guessability Prone to Identity theft

Address based Identification  Assumes that the identity of a person can be inferred ssu es t at t e de t ty o a pe so ca be e edacross the network.

Prone to identity attacks. Symmetric key cryptography based Identification Sy et c ey c yptog ap y based de t cat o Challenge Response based Identification (authentication)

Public key cryptography based identification  Cryptographic techniques are immune to identity Cryptographic techniques are immune to identity 

theft provided keys are not leaked.

Page 13: Rajat Moona CSE, IIT Kanpur · Key management system design for the Indian ... Driving License and Vehicle Registration ... Nitin Munjal and Rajat Moona, “Secure and Cost ...

Vi l id tit   li ti Visual identity application Plain plastic card is enough

Magnetic strip (e.g. credit cards) Visual data also available in machine readable form No security of data

Electronic memory cardsy Machine readable data Some security (vendor specific)

Processor cards (and therefore memory too) Processor cards (and therefore memory too) Cards have an operating system that provides

▪ A standard way of interchanging informationA  i t t ti   f th   d   d d t▪ An interpretation of the commands and data

Page 14: Rajat Moona CSE, IIT Kanpur · Key management system design for the Indian ... Driving License and Vehicle Registration ... Nitin Munjal and Rajat Moona, “Secure and Cost ...

VCC

Reset

GND

VPP

I/OClock

I/O

Reserved

Page 15: Rajat Moona CSE, IIT Kanpur · Key management system design for the Indian ... Driving License and Vehicle Registration ... Nitin Munjal and Rajat Moona, “Secure and Cost ...

Contact CardContactless (RF) Card

VccRSTCLK

RFU

RF Antenna

GND

VppI/O

RFU

Page 16: Rajat Moona CSE, IIT Kanpur · Key management system design for the Indian ... Driving License and Vehicle Registration ... Nitin Munjal and Rajat Moona, “Secure and Cost ...

6 b t  t   KB RAM 256 bytes to 4KB RAM. 8KB to 0.5MB ROM. 1KB to 1MB EEPROM. Crypto‐coprocessors (implementing AES, 3DES, RSA 

etc., in hardware) are optional. 8‐bit to 16‐bit CPU.  8051 based designs are common.8 bit to 16 bit CPU.  8051 based designs are common.

The price of a mid‐level chip when produced in bulk is about US$0 50about US$0.50.

Page 17: Rajat Moona CSE, IIT Kanpur · Key management system design for the Indian ... Driving License and Vehicle Registration ... Nitin Munjal and Rajat Moona, “Secure and Cost ...

Computer based readersConnect through USB or COM (Serial) portsCOM (Serial) ports

Dedicated terminalsUsually with a small screen, keypad  printer  often alsokeypad, printer, often alsohave biometric devices such as thumb print scanner.

Page 18: Rajat Moona CSE, IIT Kanpur · Key management system design for the Indian ... Driving License and Vehicle Registration ... Nitin Munjal and Rajat Moona, “Secure and Cost ...

Electronics Technology

Memory Processor

olog

y

Electronics Technology

tact

n T

ech

no

Memory Contact Cards

Processor Contact Cards

Con

t) nic

atio

nCards Contact Cards

Memory

Rad

io (

RF

Com

mu

nyContact-less Cards

(aka RFID)

Processor Contact-less Cards

R C(aka RFID)

Page 19: Rajat Moona CSE, IIT Kanpur · Key management system design for the Indian ... Driving License and Vehicle Registration ... Nitin Munjal and Rajat Moona, “Secure and Cost ...

S   d       d  l     d  i     Smart cards can store and control access to data in most flexible manner. To specific users who know the passwords To a specific devices who know the secret

▪ Cryptography based operations

Data stored can includeP l i f ti    d Bi t i   f  d t  (  fi i t  Personal information  and Biometric reference data (e.g. fingerprint template)

Keys and passwords Capabilities include Capabilities include Data storage (persistent) Cryptography (encryption/decryption/digital signatures etc.) Auxiliary mechanisms (hash computations  random number  Auxiliary mechanisms (hash computations, random number 

generation)

Page 20: Rajat Moona CSE, IIT Kanpur · Key management system design for the Indian ... Driving License and Vehicle Registration ... Nitin Munjal and Rajat Moona, “Secure and Cost ...

Smart Card group had developed the Indian National  Smart Card group had developed the Indian National Standard for the OS SCOSTA and SCOSTA‐CL Certification process and mechanisms

Key management system design for the Indian Driving License and Vehicle Registration, National ID

f Card data layout and processes for DL/RC, National ID (MNIC), Indian ePassport

Defined the standard for the Indian ePassport (a step p pover the ICAO standards)

Card Readers and programming interfaces for application development. pp p

Page 21: Rajat Moona CSE, IIT Kanpur · Key management system design for the Indian ... Driving License and Vehicle Registration ... Nitin Munjal and Rajat Moona, “Secure and Cost ...

ID A li i ID Applications National ID, Driving License, Electronic Passports, Health Care Health Care …

Electronic Cash Payment  e‐Purse  Toll Tax  Credit cards  purse to Payment, e Purse, Toll Tax, Credit cards, purse to purse transactions …

Loyalty  Banking Cards, Membership cards …

Authenticity  Security Tokens, Resource Access …

Page 22: Rajat Moona CSE, IIT Kanpur · Key management system design for the Indian ... Driving License and Vehicle Registration ... Nitin Munjal and Rajat Moona, “Secure and Cost ...

Can store information such as Can store information such as Personal Information

▪ Name, Name in local language, Sex, Names of parents, spouse, marital status, Date and place of birth, aliases, National ID, Issuer’s , p , , ,Name/designation, Issue date, address …

Validity checks▪ “Valid up to” information, validity keys, Digital signature mechanismsmechanisms

Biometric information▪ Photograph, finger print (machine verifiable)

Possible applicationspp Electronic tax filing, electronic authenticated voting, irrefutable proof 

of citizenship, social security … Access Control (read‐write control based on the entity) Certain information is record once (national ID number  Sex  ) Certain information is record‐once (national ID number, Sex ...) Certain information is modifiable (such as address …)

Page 23: Rajat Moona CSE, IIT Kanpur · Key management system design for the Indian ... Driving License and Vehicle Registration ... Nitin Munjal and Rajat Moona, “Secure and Cost ...

Electronic Passport is passport with smart card chip in the  Electronic Passport is passport with smart card chip in the binding (e.g. cover page) Chip stores the personal information.Additi ll  th  d t  i  di it ll   i d b  th  d t  Additionally the data is digitally signed by the document signer (such as a passport issuing officer).▪ Non‐repudiation is possible.

f Passport data can be verified at immigration control world wide.▪ Provided the country specific public keys are exchanged b   h   i   h h bi l l  h  between the countries through bi‐lateral exchange mechanism

Personal information may include the biometric which can be verified at the home immigration counters for entry/exitbe verified at the home immigration counters for entry/exit.

Authentic photograph of the owner is stored on‐chip.

Page 24: Rajat Moona CSE, IIT Kanpur · Key management system design for the Indian ... Driving License and Vehicle Registration ... Nitin Munjal and Rajat Moona, “Secure and Cost ...

Security IssueFake outlet attackShoulder attackFake pad overlay attackFake pad overlay attack

Network Issue Dedicated network is requiredk l bl

e o ssueNetwork is unreliable

Display / Input device requiredCost Issue

p y p qCost for Network ConnectivityCooling costs

Page 25: Rajat Moona CSE, IIT Kanpur · Key management system design for the Indian ... Driving License and Vehicle Registration ... Nitin Munjal and Rajat Moona, “Secure and Cost ...

S l  i     Several scenarios are possible. Case I: Use of Mobile and Card.▪ Ultimate protection

Case II: Use of card only Case II: Use of card only.▪ Protection against keyboard overlay or shoulder attack not possible.ot poss b e

Case III: Protection against lost mobile possiblepossible.

Page 26: Rajat Moona CSE, IIT Kanpur · Key management system design for the Indian ... Driving License and Vehicle Registration ... Nitin Munjal and Rajat Moona, “Secure and Cost ...

Smart cards are the devices for the future Smart cards are the devices for the future Can be used for several applications.

▪ Document signing (for example tax returns)▪ Identification and authentication

▪ Such as Driving License, National ID (MNIC), Voter Card, e‐Passports etc.▪ Bank Transactions

▪ E‐cash and e‐purse application.▪ Ticketing and Toll

▪ Metro Ticketing and Toll gate operations.▪ Access Control

▪ Access to rooms/facilities, Club memberships, vending applications. Secure, robust and dependable storage of data, keys and 

P dPasswords. Data can be protected against tampering and can be made reliable 

and dependable. Innovations are possible in the use of the technology and the p gy

technology itself.

Page 27: Rajat Moona CSE, IIT Kanpur · Key management system design for the Indian ... Driving License and Vehicle Registration ... Nitin Munjal and Rajat Moona, “Secure and Cost ...

http //www scosta gov in/ http://www.scosta.gov.in/ http://en.wikipedia.org/wiki/Multipurpose_National_Identity_Card

_(India)/ http://www.cse.iitk.ac.in/~moona/scosta/  Nitin Munjal and Rajat Moona, “Secure and Cost Effective 

Transaction Model for Financial Services”, ICUMT 2009, St. Petersburg.

Nitin Munjal, Ashish Paliwal, Rajat Moona, “Low Cost Secure Nitin Munjal, Ashish Paliwal, Rajat Moona,  Low Cost Secure Transaction Model for Financial Services”, Security and Identity Management (SIM), Ahmedabad, 2009.

Abhishek Gaurav, Ankit Sharma, Vikas Gelara, Rajat Moona, “Using Personal Electronic Device for Authentication based “Using Personal Electronic Device for Authentication‐based Service Access”, IEEE International Conference on Communications (ICC2008), Beijing, 19‐23 May 2008. 

Page 28: Rajat Moona CSE, IIT Kanpur · Key management system design for the Indian ... Driving License and Vehicle Registration ... Nitin Munjal and Rajat Moona, “Secure and Cost ...

BT h S d BTech Students Abhishek Gaurav, Ankit Sharma, Vikas Gelara

MTech Students MTech Students S Ravinder, Aditi Gupta, Deepak Nagawade, Anshul Data  Nitin Munjal  N Karthik  Nikhil Anshul Data, Nitin Munjal, N Karthik, Nikhil Khande

Faculty Members Deepak Gupta, Manindra Agrawal

Funding Agencies and collaborators MCIT, NIC, RGI, MoRST, MEA