supplemental access control · similar to basic access control –enforces authorized access...

15
Supplemental Access Control Tom Kinneging ISO/IEC JTC1 SC17 WG3/TF5 New Technology Working Group (NTWG) TAG/MRTD 19 19 th Meeting of the Technical Advisory Group on Machine Readable Travel Documents

Upload: dohuong

Post on 11-Apr-2018

218 views

Category:

Documents


1 download

TRANSCRIPT

Page 1: Supplemental Access Control · Similar to Basic Access Control –Enforces Authorized Access –Secure Communications Less influence of entropy on strength –6 digits number sufficient

Supplemental Access Control

Tom Kinneging

ISO/IEC JTC1 SC17 WG3/TF5

New Technology Working Group (NTWG)

TAG/MRTD 1919th Meeting of the Technical Advisory Group on Machine Readable Travel Documents

Page 2: Supplemental Access Control · Similar to Basic Access Control –Enforces Authorized Access –Secure Communications Less influence of entropy on strength –6 digits number sufficient

2

Specifications celebrate 5th anniversary– Technology evolution

– Increasing computer power

Technical Report “LDS and PKI Maintenance”– Preserve level of accuracy and security

– Next TAG

IP02: “LDS and PKI Maintenance”

Doc 9303 Volume 2 Evaluation

Page 3: Supplemental Access Control · Similar to Basic Access Control –Enforces Authorized Access –Secure Communications Less influence of entropy on strength –6 digits number sufficient

3

Document Number– Numeric: 109 possibilities 30 bits

– Alpha Numeric: 369 poss. 46 bits

Date of Birth– Oldest traveler 100 years: 365*100 poss. 15 bits

Date of Expiry– 5 years validity: 365*5 poss. 11 bits

– 10 years validity: 365*10 poss. 12 bits

Basic Access Control Entropy

Page 4: Supplemental Access Control · Similar to Basic Access Control –Enforces Authorized Access –Secure Communications Less influence of entropy on strength –6 digits number sufficient

4

Limitation– Sequential Document Numbers

– Correlation Document Number – Expiry Date

– Limitation Expiry Dates

– Guessing the age of the bearer

Practical entropy estimation– 50 bits – random alphanumeric Document Number

– 40 bits – sequential numeric Document Number

Basic Access Control Entropy

Page 5: Supplemental Access Control · Similar to Basic Access Control –Enforces Authorized Access –Secure Communications Less influence of entropy on strength –6 digits number sufficient

5

Skimming– Short distance

– Chip is slow

– Delay on false attempts

Eavesdropping– Longer distance

– Off line attack

Strong or Weak?

Page 6: Supplemental Access Control · Similar to Basic Access Control –Enforces Authorized Access –Secure Communications Less influence of entropy on strength –6 digits number sufficient

6

Every 18 months– Double speed

or

– Half the price

1998: Deep Crack– $250,000 – 88,000,000,000 DES keys/s

2006: Copacobana– $10,000 – 65,000,000,000 DES keys/s

Moore’s Law

Page 7: Supplemental Access Control · Similar to Basic Access Control –Enforces Authorized Access –Secure Communications Less influence of entropy on strength –6 digits number sufficient

7

Entropy– 40 – 50 bits

Validity period– 5 or 10 years

– 2009 2014 2019

Moore’s Law and BAC

Page 8: Supplemental Access Control · Similar to Basic Access Control –Enforces Authorized Access –Secure Communications Less influence of entropy on strength –6 digits number sufficient

8

0

500000

1000000

1500000

2000000

2500000

3000000

3500000

4000000

4500000

2009 2014 2019

50 bits

Moore’s Law and BAC

1 hour

$ 4,128,509 $ 409,600 $ 40,637

Page 9: Supplemental Access Control · Similar to Basic Access Control –Enforces Authorized Access –Secure Communications Less influence of entropy on strength –6 digits number sufficient

9

0

1000

2000

3000

4000

5000

6000

7000

8000

9000

2009 2014 2019

41 bits

Moore’s Law and BAC

1 hour

$ 8,063 $ 800 $ 79

Page 10: Supplemental Access Control · Similar to Basic Access Control –Enforces Authorized Access –Secure Communications Less influence of entropy on strength –6 digits number sufficient

10

Based on PACE V2– Password Authenticated Connection Establishment

Similar to Basic Access Control– Enforces Authorized Access

– Secure Communications

Less influence of entropy on strength– 6 digits number sufficient

Supplemental Access Control

Page 11: Supplemental Access Control · Similar to Basic Access Control –Enforces Authorized Access –Secure Communications Less influence of entropy on strength –6 digits number sufficient

11

MRZ– Document Number, Date-of-Birth, Date-of-Expiry

– Mandatory

CAN– Card Access Number

– On data page or front side of td1 card

– Optional

Supplemental Access Control

Page 12: Supplemental Access Control · Similar to Basic Access Control –Enforces Authorized Access –Secure Communications Less influence of entropy on strength –6 digits number sufficient

12

Generic mapping– Diffie Hellmann

– Elliptic Curve Diffie Hellmann

Integrated mapping– Diffie Hellmann

– Elliptic Curve Diffie Hellmann patent pending

IP01: “SAC Patent Consideration”

Patent Consideration

Page 13: Supplemental Access Control · Similar to Basic Access Control –Enforces Authorized Access –Secure Communications Less influence of entropy on strength –6 digits number sufficient

13

BAC default access control mechanism

SAC optional and supplemental– Inspection systems SHOULD use SAC if present on

MRTD

Gradual change over in 10-20 years

Implementation strategy

Page 14: Supplemental Access Control · Similar to Basic Access Control –Enforces Authorized Access –Secure Communications Less influence of entropy on strength –6 digits number sufficient

14

The TAG-MRTD is invited to– Recognize the necessity to specify an access control

mechanism supplementary to Basic Access Control

– Mandate the NTWG to negotiate the solutions with respect to

the mentioned patent consideration and incorporate the

conclusion in the final version of the Technical Report

– Approve the Technical Report “Supplemental Access Control”

containing this specification for inclusion into Document 9303

– Promote the implementation of “Supplemental Access Control”

in eMRTDs and Inspection Systems within a period of 5 years

from the date of this Working Paper

Working Paper

Page 15: Supplemental Access Control · Similar to Basic Access Control –Enforces Authorized Access –Secure Communications Less influence of entropy on strength –6 digits number sufficient

15

Thank you

for your attention

Tom Kinneging

ISO/IEC JTC1 SC17 WG3/TF5

New Technology Working Group (NTWG)

TAG/MRTD 1919th Meeting of the Technical Advisory Group on Machine Readable Travel Documents