220 likes | 494 Views
FIT3105 Crypto-based identification. Lecture 6. Outline. The importance of crypto-based identification. Secret key crypto based identification. Public key crypto based identification. Performance of crypto-based identification. Challenges of crypto-based identification.
E N D
FIT3105Crypto-based identification Lecture 6
Outline • The importance of crypto-based identification. • Secret key crypto based identification. • Public key crypto based identification. • Performance of crypto-based identification. • Challenges of crypto-based identification. FIT3105 - Security and Identity Management
The need for crypto-based identification • Smart cards and biometrics can be useful for authenticating and identifying people but not very efficient for computer components. • Crypto based methods can be used for authenticating and identifying any entity’s representation which can be digitally stored and processed. • your car • your laptop • your mobile phone • your MP3 player • A program • A computer component FIT3105 - Security and Identity Management
The importance of crypto-based identification • Cryptography can be used to identify most entities including users. However, there are limitations. • It can be used to identify most hardware and software components effectively: • a digital certificate can be used to identify a web server. • a digital certificate can be used to identify a client software contacting a server for sensitive information. • a shared secret key can be used to identify a client or server of a client/server application. FIT3105 - Security and Identity Management
The importance of crypto-based identification systems • It can be used to identify other servers by an authentication server effectively: • An authentication shares secret keys with other servers and can identify other servers by the shared secret keys. • A good example is the Kerberos authentication systems. • A MAC address and secret key can be combined to identify a client computer. FIT3105 - Security and Identity Management
Identification using certificates (e.g) Client Server ClientHello --------> ServerHello Certificate* ServerKeyExchange* CertificateRequest* <-------- ServerHelloDone Certificate* ClientKeyExchange CertificateVerify* [ChangeCipherSpec] Finished --------> [ChangeCipherSpec] <-------- Finished Application Data <-------> Application Data * Indicates optional or situation-dependent messages that are not always sent. FIT3105 - Security and Identity Management Borrowed from rft2246
Advanced techniques for identification with shared secret keys. • A key distribution centre is created which contains all registered entities that want to identify each other before communicating with each other. • Each entity is given a unique secret key which can be used to communicate with the key distribution centre. • The ID of an entity is its secret key and its personal detail, eg. MAC address, name and address of the person, date and time or a universal number associated with the entity that was created. FIT3105 - Security and Identity Management
Identification with shared secret key – more examples • A smart card can be used to store the key as the id of a person. • A software package’s details are associated with a secrete key as its id. • Details of a piece of hardware/(hybrid h/s) such as product number can be associated with a secret key and the result is its id. This approach can be used to identify: • A router • A firewall • A VPN • A computer network user with her/his personal details can be combined with a secret key and the combination is her/his id. FIT3105 - Security and Identity Management
Can one identify another using shared secret key based approach? • If A wants to identify B and via versus using only shared secret key crypto system. • Is it possible? • How many messages need to be exchanged between A and B and the key distribution centre? • Is it a reliable process? FIT3105 - Security and Identity Management
Advantages and disadvantages of shared secret key identification • Disadvantages: • Key distribution can be a problem without relying on public key system for the distribution. • How can we distribute all the keys to users securely? • Not reliable in associating people with keys. • Keys can be stolen and people can be misidentified because the system identifies people by their key. • Advantages: • Simple to set up and maintain. • Easy to update and extend. • Fast in processing and retrieving. FIT3105 - Security and Identity Management
The advantages and disadvantages in using digital certificates for identification • Advantages • Non-repudiation. • Widely accepted by government organizations and industries. • Well researched and easily verified • Disadvantages • Suffer a similar problem as secret key method when associating a certificate to a person. The system identifies a person by his/her certificate and this can be incorrect even his/her certificate is valid. • Who is the reliable CA? • When dealing with court cases and national identification, certificate method is arguable. FIT3105 - Security and Identity Management
Hybrid approach of crypto-based and smart card based identification • Smart cards can be used to store secret keys or certificates for identification. • Useful for identifying non-human entities and in some human cases. • Smart cards can be used to carry encrypted personal information for identification. • Useful for identifying people. • Smart cards can also be used to carry some data for generating keys which are used to identify an entity. • Useful for users’ initial identification before the complete identification. FIT3105 - Security and Identity Management
Hybrid approach of crypto-based and biometric based identification • A strong identification system may employ different methods separately for each case or combine two or more methods to provide better identification: • Smart cards carrying biometric and cryptographic information. • Biometric information is used to create unique crypto information such as secret keys or hash values for identification. FIT3105 - Security and Identity Management
Challenges of crypto-based identification • There are many challenges to the crypto-based identification method and some of them are: • Association of a key to a user. • Should a new version of a software package be given a new key? • Should hardware upgrade or maintenance affect the identification of the hardware? • key distribution and loss when dealing with secret keys or question of a reliable CA when dealing with certificates. FIT3105 - Security and Identity Management
Research in crypto-based identification • Unique number generated by an individual • Research focuses on the method that maps collected data such as biometric features into a unique number that can identify an entity (e.g one-way hash functions). The method has t be fast, accurate and reliable. • Combine the number (a key or a hash value) with other data to uniquely identify that person • Research to provide accurate techniques for combining more than one form of data to achieve reliable identification. • Combined data must be unique, accurate and easy to collect. • How to quickly collect data such as biometrics? • How to combine biometrics with cryptography for identification accurately? FIT3105 - Security and Identity Management
Research in crypto-based identification • A good method for identifying entities must be extremely difficult to forge or tampered (many existing methods are easy to be forged or tampered). • Cryptography can be strong but by itself is not a reliable method to identify people. • Biometric method is not always reliable. • Combination of both methods is useful but not always possible. • It must be non-repudiation. • Secret key method for identification is not always non-repudiation. • Using digital certificates is a more effective way but it is not always a preferable method for identifying people. FIT3105 - Security and Identity Management
Other Research related to crypto-based identification • The advancement of nano-technology and its support in identification. • A tiny chip carrying personal details embedded in human’s body. • Chips can be used to collect unique feature(s) of human being. • Special devices for reading human features quickly and accurately. • The advancement of real time video and face recognition technology is needed. • The emergence of human brain reading using computer technology should be looked at. FIT3105 - Security and Identity Management