Vous êtes sur la page 1sur 101

Chapter 3

Algorithms and Architecture for Security

Protocols for Secure Electronic


© M. H. Sherif
Commerce (2nd ed.) 1
Outline
• Security of commercial transactions
• OSI Model for cryptographic security
• Security Services
– Confidentiality
– Data Integrity
– Identification
– Authentication
– Access control and denial of service attacks
– Non repudiation
• Key management
– Kerberos
• Certification and privilege management

Protocols for Secure Electronic


© M. H. Sherif
Commerce (2nd ed.) 2
E-Commerce Security

• Security is an important consideration in EC:


– Buyers are concerned about sending their private
information on the Internet.
– Sellers are concerned about their systems being
compromised and their data being stolen.
• Security of the Internet is an afterthought
• In 1999, half of card payment disputes and frauds in
the EU are related to Internet transactions (1% of the
turn over) - FT 4/12/99

Protocols for Secure Electronic


© M. H. Sherif
Commerce (2nd ed.) 3
Security of Electronic Exchanges
• Network Protection
– Access
– Routing
– Service continuity
• Protection of individual transactions
• Protection of the merchandise:
– physical goods
– virtual goods: protection of the intellectual property
• Protection of the records
– legal requirements
– privacy

Protocols for Secure Electronic


© M. H. Sherif
Commerce (2nd ed.) 4
Network Security

• Aspects
– Physical connectivity -> sabotage or outages
– Availability -> Denial of service attacks
– Correct routing -> address spoofing
• Encryption is not always necessary (Minitel/i-Mode, First
Virtual, micropayments, etc.)
• Encryption is more important in open or decentralized
networks co-managed by distinct administrative entities

Protocols for Secure Electronic


© M. H. Sherif
Commerce (2nd ed.) 5
Security of a Transaction

• Verification of person's identity (address) and credit


worthiness
• Threshold for calling the authorization server
• Ceiling for allowed expenses or withdrawals
• Fraud detection and management
– surveillance of activities at the points of sale
– surveillance of short-term events
– surveillance of long-term events

Protocols for Secure Electronic


© M. H. Sherif
Commerce (2nd ed.) 6
Security of Payment Mechanisms

• Security depends on
– nature of money
– instrument of payment
– legal requirements
– value,
– support (container) of the value
– location of the value store
• Architecture of the payment system must reflect the
security needs

Protocols for Secure Electronic


© M. H. Sherif
Commerce (2nd ed.) 7
Threats and Attacks (X.509 and
X.800)
• Passive Attacks (Sniffing or eavesdropping)
– Interception of identity
– Data interception
– Data analysis
• Active Attacks (involve some data alteration or
falsification)
– Masquerading
– Manipulation of content
• Repudiation of participation

Protocols for Secure Electronic


© M. H. Sherif
Commerce (2nd ed.) 8
Passive Attacks

• Intruder logs on to the network and tries to gather information


by monitoring and copying data transmissions.
• Passive attacks are difficult to detect since they do not involve
any alteration of the data.

Info. source Info. destination


Normal flow

Intruder
Protocols for Secure Electronic
© M. H. Sherif
Commerce (2nd ed.) 9
Active Attacks
– Masquerade and message modification
¤ Intruder obtains the user ID and password of a legitimate user
and logs on to the network to obtain additional privileges or to
modify the data being transmitted.
¤ Denial of service (DoS)
¤ Rendering a server unavailable to others
¤ DoS attacks can be done by flooding a server with multiple bogus
connection requests.
Info. source Info. destination
Normal flow

Intruder

Protocols for Secure Electronic


© M. H. Sherif
Commerce (2nd ed.) 10
Cost of Security Breaches
200%
Percentage of companies experiencing attacks 168%

Percentage change in average loss since 2000


150% 137%

93%
100% 85%
73%
57%
47%
50% 35%
28%
16% 21% 21% 20%
13% 12% 12%
5% 3%
0%

Virus
abuse service
-50% Network Denial of System
Theft of access penetraion Sabotage
Laptop theft
Unauthorized Telecom fraud
proprieary info Financial fraud
-75% -79%
-100%

Source: Computer Security Institute - Survey of 500 correspondents


Note: While 344 acknowledged financial losses, only 186 could quantify those losses

Protocols for Secure Electronic


© M. H. Sherif
Commerce (2nd ed.) 11
Security Services

• Confidentiality
– Symmetric cryptography
– Public key cryptography (for small messages, e.g,
symmetric key)
• Data Integrity (through a "fingerprint" or "signature" of
the message)
• Blind-signature is a special type of signature of a
message without knowing the content (used for digital
money)

Protocols for Secure Electronic


© M. H. Sherif
Commerce (2nd ed.) 12
Security Mechanisms

• Encryption
– to ensure confidentiality
• Authentication
– Verification of user's identity
– Access control lists for authorized access to network
resources
– Dynamic password assignment
• Message Authentication
• Non repudiation
– Digital signature, time stamping, etc.

Protocols for Secure Electronic


© M. H. Sherif
Commerce (2nd ed.) 13
OSI Model for Cryptographic
Services
• Physical and Link layers: All traffic is protected. Only
confidentiality can be assured (frequency hopping,
spread spectrum, etc.)
• Network Layer: bulk protection from one end system to
another: Firewalls, IPSEC (RFC 1825)-SKIP-S/WAN-
FreeS/WAN)
• Transport Layer: when network is not reliable (SSL) or
for protection after a fault
• Application layer (high granularity and non repudiation)
– SET for Bank Cards
– EDI Security

Protocols for Secure Electronic


© M. H. Sherif
Commerce (2nd ed.) 14
Tunneling

Tunnel Endpoints

Transit
Internetwork
Header

Payload Payload

Transit Internetwork
Tunnel
Tunneled
Payload

Protocols for Secure Electronic


© M. H. Sherif
Commerce (2nd ed.) 15
Tunneling Protocols

• Point-to-Point Tunneling Protocol (PPTP), Microsoft’s


extension to Point-to-Point Protocol (PPP)
• Layer Two Forwarding (L2F, proposed by Cisco)
• IP Security (IPSec): an IETF standard, RFCs 2402 and
2406
• Layer Two Tunneling Protocol (L2TP), another IETF
standard for tunneling over IP, X.25, FR, or ATM
networks

Protocols for Secure Electronic


© M. H. Sherif
Commerce (2nd ed.) 16
Layer 2 Tunneling Protocol (L2TP)

• Used to tunnel data using the point-to-point protocol (PPP)


• IPSec used in the transport mode for protection

IPSec IP header UDP L2TP PPP IP header TCP/UDP


Payload
header (new) header (new) header header (original) header

Address assigned by
the ISP

Protocols for Secure Electronic


© M. H. Sherif
Commerce (2nd ed.) 17
IP Security (IPSec)
• IPSec operates below the transport layer (TCP, UDP),
therefore transparent to applications and end users
• IPSec provides three security services:
– authentication: with certificates using the AH
(Authentication Header) protocol
– confidentiality: encapsulates an IP datagram in a new
encrypted packet using the ESP (Encapsulating Security
Payload) protocol
– key management: concerned with the secure exchange of
keys using the IKE (Internet Key Exchange) protocol

Protocols for Secure Electronic


© M. H. Sherif
Commerce (2nd ed.) 18
IPSEC Modes

• Transport mode
– Encapsulates just the payload
– Typically used for end-to-end communication between two
hosts
• Tunnel Mode
– Encapsulates the whole packet
– Used when one or both ends of the connection is a security
gateway, such as a firewall router.

Protocols for Secure Electronic


© M. H. Sherif
Commerce (2nd ed.) 19
IPSec Modes
Network
Public IPSec Server
Server(s) Manager
(HTTP, FTP,
Remote Client …)

Public
Networ
k
IPSec Host

Firewall Firewall

Tunnel Mode DMZ

Transport Mode

DMZ: Demilitarized Zone

Protocols for Secure Electronic


© M. H. Sherif
Commerce (2nd ed.) 20
Overhead for IPSEC Modes
IP header IPSec IP header TCP/UDP
Tunnel mode (new) header (original) header
Payload

(ESP)
outer IP header with inner IP header
gateway IP address

Transport mode IP Header IPSec TCP/UDP


Payload
(original) (header) header
(AH and/or
ESP)

Protocols for Secure Electronic


© M. H. Sherif
Commerce (2nd ed.) 21
Security Services for IPSec Modes
IP header IPSec IP header TCP/UDP
Payload
(new) header (original) header

AH

IP header IPSec IP header TCP/UDP


Payload
(new) header (original) header

authenticated
ESP encrypted

IP header IPSec IP header TCP/UDP ESP


Payload
(new) header (original) header trailer

authenticated

Protocols for Secure Electronic


© M. H. Sherif
Commerce (2nd ed.) 22
Symmetric Encryption

Encryption Key

Ciphertext
Encryption Decryption

Clear Text Clear Text

Sender Receiver

Protocols for Secure Electronic


© M. H. Sherif
Commerce (2nd ed.) 23
Secret-Key (or Symmetric)
Encryption
• The same key is used to encrypt and decrypt messages.
• The two sides must coordinate to send an encrypted
message, and key security is essential.
• Many algorithms exist:
– Data Encryption Standard (DES)
– RC2, RC4, RC5 (from RSA Data Security)
– IDEA (International Data Encryption Algorithm)
– AES (Advanced Encryption Standard)

Protocols for Secure Electronic


© M. H. Sherif
Commerce (2nd ed.) 24
Data Encryption Standard (DES)
• DES blocks are 64 bits; the key is 56 bits.
• DES was adopted by NBS (now NIST) in 1977 (FIPS
PUB 81) and updated in 1993, for non-military data
communication (ANSI X3.92)
• Applying 64-bit ciphertext to a DES block with the same
key recovers the 64-bit plaintext.

k k
64-bit 64- bit 64-bit
plaintext ciphertext plaintext
DES DES

Protocols for Secure Electronic


© M. H. Sherif
Commerce (2nd ed.) 25
DES Chaining

• Electronic Codebook Mode (ECB) is susceptible to replay


attacks
• DES chaining (Cipher Block Chaining or CBC) breaks the
direct relationship between ciphertext and plaintext
blocks
• CBC used for non-real time encryption and to calculate
message authentication codes (MAC)

Protocols for Secure Electronic


© M. H. Sherif
Commerce (2nd ed.) 26
DES Chaining - CBC Mode

Source Destination

64 -bit E0 E1 E2
plaintext M0 M1 M2 Key

IV XOR XOR XOR .. D D D ..


. .
IV XOR XOR XOR
Key E E E

64 bits
ciphertext
E0 E1 E2 M0 M1 M2

IV = initialization vector

Protocols for Secure Electronic


© M. H. Sherif
Commerce (2nd ed.) 27
Other DES Chaining Modes

• Cipher feed-back mode (CFB)


– Encryption of a block of m bits is done in sub-blocks of n
bits
– A new sub-block is combined with the encrypted bits
before encryption
– Used for MAC calculation
• Output feedback mode (OFB)
– Similar to the CFB but the bits used in the computation are
not transmitted
– Useful in case of transmission errors
– A mechanism for resynchronization is needed

Protocols for Secure Electronic


© M. H. Sherif
Commerce (2nd ed.) 28
DES Chaining - CFB Mode
Source Destination

Shift register (m bits) Shift register (m bits)

Clear text (m bits) n bits


eliminated
n bits
eliminated e il
mil
XOR Kil Encryption XOR Kil Encryption

e il
The The
leftmost leftmost
n bits mil
n bits

Protocols for Secure Electronic


© M. H. Sherif
Commerce (2nd ed.) 29
DES Chaining- OFB Mode
Source Destination

Shift register (m bits) Shift register (m bits)

Clear text (m bits)


n bits
n bits eliminated
eliminated e il
mil
XOR Kil Encryption XOR Kil Encryption

e il
The The
leftmost leftmost
n bits mil
n bits

Protocols for Secure Electronic


© M. H. Sherif
Commerce (2nd ed.) 30
Extending DES Useful Life

• DES with 56-bit key is considered insecure (8-byte


blocks can be switched).
• Triple DES (3DES) is a 1999 NIST standard for Point-to-
Point Protocol (PPP):
• Uses DES three consecutive times using a different key
each time.

Protocols for Secure Electronic


© M. H. Sherif
Commerce (2nd ed.) 31
Triple DES
K1 K2 K1
Source

E D E

Clear text Encrypted text

K1 K2 K1

Destination

D E D

Encrypted text Clear text

Protocols for Secure Electronic


© M. H. Sherif
Commerce (2nd ed.) 32
AES (Advanced Encryption System)

• New Federal standard (2001)


• AES offers better security than DES
– Uses 128-bit secret key; can also use 192-bit and 256-bit
keys if necessary
– Based on Rijndael algorithm which uses a lot of
parallelism, making efficient use of processor resources
– Can be implemented efficiently on smart cards

Protocols for Secure Electronic


© M. H. Sherif
Commerce (2nd ed.) 33
Public-Key (or Asymmetric)
Encryption
• In Public Key encryption, each user has two keys: a
public key k1 and a private key k2
• The pubic key is available to anyone but the private
key remains a secret know to the user only
• Public-key encryption reduces the problem of key
distribution among pairs of communicants

Protocols for Secure Electronic


© M. H. Sherif
Commerce (2nd ed.) 34
Confidentiality with Public-Key
Cryptography
Sender Recipient

Plaintext message Plaintext message


M M

Public
key of Private
recipient Encrypted message E key of
E=Ek1(M) M=Dk2(E) recipient
(k1)
(k2)

Encryption Decryption

Protocols for Secure Electronic


© M. H. Sherif
Commerce (2nd ed.) 35
Public Key Cryptography
• RSA (ISO/IEC 9796): patent expired on 9/20/2000
• DSA (FIPS 186)
• PKCS (a series of business specifications based on RSA)
• PGP (RFC 1991)
– Public key exchange with RSA and MD5 hashing
– Data compression with ZIP
– Message encryption with IDEA
– ASCII "armor" to protect binary messages through the
Internet

Protocols for Secure Electronic


© M. H. Sherif
Commerce (2nd ed.) 36
Characteristics of Public-Key
Algorithms
• Algorithms require a trap-door one-way function:
– a function whose inverse is extremely difficult to compute
unless certain “trap-door” information is known.
– Systems based on the discrete logarithm problem
¤ Diffie-Hellman
¤ El-Gamal
– Systems based on the factoring problem
¤ Rivest, Shamir and Adleman (RSA)
– Systems based on the elliptic logarithm problem
• Computational load much larger than for symmetric
algorithms

Protocols for Secure Electronic


© M. H. Sherif
Commerce (2nd ed.) 37
RSA Algorithm
Generate two large distinct random prime numbers
p and q
Compute N = p x q and φ (N) = (p - 1) (q - 1)
Select a random integer e, 1 < e < φ
such that gcd (e, φ ) =1
There is a unique integer d such that

ed ≡1 (mod φ )
Public key is (N, e), private key is d
Suggested values for e in practice are 3 or 216 +1

Protocols for Secure Electronic


© M. H. Sherif
Commerce (2nd ed.) 38
Notes on RSA

• A public key of 512 bits is no longer safe (was factored


by a team of scientists of the National Research
Institute of Mathematics and Computer Science in the
Netherlands in 1999)
• Adi Shamir designed a factoring device named TWINKLE
to break a 512-bit key within a few days
• For short term security, keys should be at least 768 bits
• For long term security (5 -10 years), 1024 bits should
be used
• It is believed that a key of 2048 bits, would last about
15 years
• There are many computational tricks to reduce the
decoding time if the keys are available.

Protocols for Secure Electronic


© M. H. Sherif
Commerce (2nd ed.) 39
Digital Envelope

• Public-key algorithms are slower than secret-key


algorithms because of their longer keys.
• A combination of secret and public-key encryption,
known as Digital Envelope, is used in real-world
applications:
– Public-key encryption is used to create and send a
symmetric key to the message recipient.
– The symmetric key is then used for symmetrical
encryption

Protocols for Secure Electronic


© M. H. Sherif
Commerce (2nd ed.) 40
Digital Envelope
Public key of
Recipient Private key of
Session Key
Recipient
Session Key Digital Envelope Decryption

Encryption

Session Key
Session Key

Message Cipher- Message


Text text Text
Encryption
Decryption

Sender Recipient

Protocols for Secure Electronic


© M. H. Sherif
Commerce (2nd ed.) 41
Hash Functions

• One-way function used to calculate the fingerprint or


hash or message digest h=H(M)
• It has the following characteristics
– Given M, h can be easily computed
– Given h, it is very difficult to find M (impossibility of
inversion)
– Absence of collisions (the probability of obtaining the same
value h using two different messages is very small)
– A small difference between the two messages gives a large
difference between the finger prints

Protocols for Secure Electronic


© M. H. Sherif
Commerce (2nd ed.) 42
Hash Functions in Electronic
Commerce
• AR/DFP (German Banks)
• DSMR (ISO/IEC 9796)
• MCCP (ISO/IEC 1116-2)
• MD4 (RFC 1320)
• MD5 (RFC 1321) a 128-bit hash message designed by
Rivest
• NVB7.1, NVBAK (Dutch Banking Standard)
• RIPEMD-128,-160 (ISO/IEC 10118-3)
• SHA, SHA-1 (FIPS 180-1, ISO/IEC 10118-3) (Secure
Hash Algorithm 1) produces a 160-bit hash for use with
the Digital Signature Standard (DSS). Designed by NIST

Protocols for Secure Electronic


© M. H. Sherif
Commerce (2nd ed.) 43
Data Integrity

• Verify that the message content has not been modified,


intentionally or accidentally during transmission
• A sequence of bits that depends on the content of the
message ("finger print") travels with the message to be
protected
• At the destination, the receiver recalculates the value
and compares it with what is received. Any difference
indicates tampering
• Blind-signature is a special type of signature of a
message without knowing the content (used for digital
money)

Protocols for Secure Electronic


© M. H. Sherif
Commerce (2nd ed.) 44
Verification of Integrity with
Symmetric Cryptography

Secret Key Message Secret Key


Authentication
Code (MAC)
E D
Comparison

h h

Data
Sender Receiver

Protocols for Secure Electronic


© M. H. Sherif
Commerce (2nd ed.) 45
Verification of Integrity with Public
Key
Sender (User A) Receiver (User B)

M User A’s S User B’s E User B’s S User A’s M


private key public key private key public key
Dk2A Ek1B DDk2B
A Ek1A

A’s Signed Message: S = Dk2A(M) Ek1B(Dk2A(M)) S = Dk2A(E)

A more common approach is to use the fingerprint (hash) of


the message because this reduces the computational load

Protocols for Secure Electronic


© M. H. Sherif
Commerce (2nd ed.) 46
Digital Signature with Public Key
Encryption and Hashing

Private key Public key

Signature
E D
Comparison

h h

Data
Sender Receiver
Protocols for Secure Electronic
© M. H. Sherif
Commerce (2nd ed.) 47
Integrity Verification with Symmetric
and Public Key Encryptions
• Symmetric cryptography and hash functions
– Hash function --> Message Authentication Code (MAC) or
Hashed Message Authentication Code (HMAC)
– Encrypt the MAC with a symmetric algorithm
– This is called a "signature"
• The legitimate recipient can verify the integrity; others
cannot
• With public key cryptography, if the MAC is encrypted
with the sender's private key; anyone having the public
key can verify the integrity

Protocols for Secure Electronic


© M. H. Sherif
Commerce (2nd ed.) 48
Combination of Integrity and
Confidentiality with Public Key and
Symmetric Key Encryptions
Sender Sender’s
Digest private key
Cleartext
Digital signature
Sender

Sender's signing Session secret key


certificate Receiver

Protocols for Secure Electronic


© M. H. Sherif
Commerce (2nd ed.) 49
Anonymity

• Anonymous plastic support


• Anonymous recharging transaction
• Anonymous payment transaction (cannot be tied to the
holder's bank account)
• Anonymity for face-to-face commerce
• Anonymity for remote transactions
• Use of "mix networks" to achieve anonymity and
untraceability of the sender (David Chaum)

Protocols for Secure Electronic


© M. H. Sherif
Commerce (2nd ed.) 50
Basic Idea of Mixes
If the sender wants to establish anonymity, it
chooses n mixes (M1,.., MN) with addresses
AM1, ..., AMN and encrypts the message using the
public keys of the successive mixes as well as the
end receiver after adding a random blinding
factor to prevent replay attacks as follows:
N1 = PKM1 (AM2, k1, N2)
N2 = PKM2 (AM3, k2, N3)
...
Nn+1 = PKR(N)
Protocols for Secure Electronic
© M. H. Sherif
Commerce (2nd ed.) 51
Extension to Bilateral Anonymous
Communications
• Receiver repeats the same steps
• For Web publishing with client and servers remain
anonymous
– use pseudonyms
– generate session keys for the pseudonym
– exchange the keys through another channel with
dynamically generated addresses to prevent replay attacks
• See: T. Demuth, Establishing bilateral anonymous
communication in open networks, IFIP TC11 17th
International Conference on Information Security (SEC
2002)

Protocols for Secure Electronic


© M. H. Sherif
Commerce (2nd ed.) 52
Elliptic Curve Discrete Logarithm

• Require shorter keys than RSA to achieve the same


level of security
• A 160-bit elliptic curve key is roughly equivalent to a
1024-bit RSA key
• Elliptic Curve Digital Signature Algorithm (ECDSA) is
standardized ANSI X9.62 and IEEE P1363

Protocols for Secure Electronic


© M. H. Sherif
Commerce (2nd ed.) 53
PKCS

• A set of business standards developed by RSA


Laboratories in collaboration with others
• Describe the mechanisms for data encryption, message
formats, key formats, etc.
• Described in IETF documents but not standardized
because they use proprietary algorithms

Protocols for Secure Electronic


© M. H. Sherif
Commerce (2nd ed.) 54
PGP (Pretty Good Privacy)

• Uses RSA with MD5 Hashing


• Data Compression with ZIP
• Message Encryption with IDEA
• Not suitable for large scale applications

Protocols for Secure Electronic


© M. H. Sherif
Commerce (2nd ed.) 55
Identification and Authentication

• In one step:
– with symmetric cryptography
– with biometric recognition
• In two steps with public key cryptography
• In public cryptography, requires a certification
infrastructure

Protocols for Secure Electronic


© M. H. Sherif
Commerce (2nd ed.) 56
Biometric Identification

• Identification systems
– centralized data base
– used with badge, password
• Verification system
– distributed architecture
– compare actual data with data stored on a card
– verify privileges

Protocols for Secure Electronic


© M. H. Sherif
Commerce (2nd ed.) 57
Classification of Biometric Systems

• Characteristics used (acquired vs. innate)


• Identification systems
– biometric data match an entry in a database
– supplement another identifier (password, badge, etc.)
• Verification systems
– biometric data match what is stored in user credentials
(e.g., a smart cart) to verify access privileges

Protocols for Secure Electronic


© M. H. Sherif
Commerce (2nd ed.) 58
Biometrics Framework for
Identification
Main Frame
Yes/No
Features Search
Sensor Image processing
extraction and
compare

Bio reader

Data Data
base base

Protocols for Secure Electronic


© M. H. Sherif
Commerce (2nd ed.) 59
Biometrics Framework for
Verification
PC
Yes/No
Features
Sensor Image processing
extraction Matching

Bio reader

Reference pattern
Smart card

Protocols for Secure Electronic


© M. H. Sherif
Commerce (2nd ed.) 60
Applications and Mode of Operations
• Applications:
– Face-to-face applications
¤ Secure access to physical areas
¤ Check cashing
¤ Identification of bodies
– Remote
¤ Secure access to networks
¤ Telework (telecommuting)
¤ Mobile telephony
¤ Electronic co
• Mode of operation (on-line, off-line, semi-online)
¤ commerce on the internet

Protocols for Secure Electronic


© M. H. Sherif
Commerce (2nd ed.) 61
Measures of Accuracy

• Identification systems
– rate of mix-up of identities
– percent rejects of authorized identities
• Verification systems
– rate of false rejects
– rate of false acceptances

Protocols for Secure Electronic


© M. H. Sherif
Commerce (2nd ed.) 62
Acquired Biometrics

• Handwritten signature
• Voice
• Keystroke dynamics
• Gait

Protocols for Secure Electronic


© M. H. Sherif
Commerce (2nd ed.) 63
Innate Biometrics

• Photo image
• Fingerprint
• Iris scan
• Retina
• Dental imprints
• Shape of the hand, the ear, etc.
• DNA

Protocols for Secure Electronic


© M. H. Sherif
Commerce (2nd ed.) 64
Voice Systems
• Speaker identification vs. speaker verification
• Size of voice prints 1 - 70 K octets depending on
algorithm and duration
• Performance depends on ambient noise, network
conditions, etc
– AT&T's text-to-speech algorithm sounds human
– Bacob and Keyware technologies for electronic commerce
(by phone) http://www.keywareusa.com)
– Motorola/Trintech for mobile commerce
– ITU SG16: distributed speech recognition and distributed
speaker verification systems

Protocols for Secure Electronic


© M. H. Sherif
Commerce (2nd ed.) 65
Manual Signature Recognition

• Static by comparing to a stored signature


• Dynamic (using a special stylus and pad) to analyze
movement dynamics (speed, acceleration, pressure,
etc.)
• http://www.wacom.com
• FSTC has a project for signature recognition on checks
• Relatively large rate of false rejects

Protocols for Secure Electronic


© M. H. Sherif
Commerce (2nd ed.) 66
Keyboard Recognition

• Characteristics of keyboard typing


• Net Nanny Software (http://www.biopassword.com)
• Reference contains at least 8 characters and training
requires 8 repetitions.
• Verification requires 15 trials.

Protocols for Secure Electronic


© M. H. Sherif
Commerce (2nd ed.) 67
Retinal Recognition

• Configuration of blood vessels in the eye


• Descriptor's size 35 octets
• Secure access (military, high security prisons, etc.)
• Enrollment in 60 s but requires an invasive exam
• Verification time is about 5 s for a library of 1500
persons
• Rate of false acceptance claimed to be 1 per million
• EyeDentify, Inc. (http://www.eye-dentify.com) since
1975

Protocols for Secure Electronic


© M. H. Sherif
Commerce (2nd ed.) 68
Iris Recognition

• Description of iris patterns in 256 octets (2048 bits)


• Less invasive and less complex than retinal scanning
• IriScan, Inc. (http://www.iriscan.com) now Iridian
• Duration of capture claimed to be less than 1 sec.
• Independent verification of performance may be
needed.

Protocols for Secure Electronic


© M. H. Sherif
Commerce (2nd ed.) 69
Face Recognition

• Template from 100 to 800 octets


• A person can be detected from a library of 5 000 to
50,000 images
• Verification lasts 3 to 20 s.
• Affected by other factors (wearing glasses,
moustaches, lighting, head inclination, etc.)
• TrueFace™ (from Miros)
• Visionics (www.viisage.com) has implemented FaceIt®
from Rockfeller University

Protocols for Secure Electronic


© M. H. Sherif
Commerce (2nd ed.) 70
Performance of Face Recognition
Systems
• US Army Research Laboratory results from 1996 to
1997: the rate of false rejects increase with the time
between the reference image and the execution image

Protocols for Secure Electronic


© M. H. Sherif
Commerce (2nd ed.) 71
Finger Prints or Finger Images

• Performance
– rate of false rejects in commercial systems (3%)
– false acceptance (1 in a million)
• Phenomenon used to record the s minutia
– Capacitance (Infineon, Secugen)
– Electric field (Authentec, Veridicom)
– Optical and optoelectronic (Identix, Who?Vision)
– Temperature (Thomson-CSF)

Protocols for Secure Electronic


© M. H. Sherif
Commerce (2nd ed.) 72
Hand Geometry

• Used for control access to U.S. entry


• Enrollment takes a few minutes
• Template has a size of 9 octets
• BiomMet Partners (http://www.biomet.ch) and
Recognition Systems (http://www.recogsys.com)

Protocols for Secure Electronic


© M. H. Sherif
Commerce (2nd ed.) 73
Summary of Biometric Identification
• Acquired characteristics
– Handwritten signature (500-1000 octets)
– Voice print (1000-2000 octets)
– Keystroke dynamics
• Innate characteristics
– Photo image (100-800 octets)
– Fingerprint (500-1000 octets)
– Iris scan(256 octets)
– Retina (35 octets)
– Shape of the hand (9 octets)
• BIOAPI

Protocols for Secure Electronic


© M. H. Sherif
Commerce (2nd ed.) 74
Major Problems for Large Scale
Operation of Biometric Systems
• Systems are not interoperable at any level (hardware,
software, architecture, application, etc.)
• Business demands are not focused or strong enough to
encourage standardization
• IPR and Patents
• No single place responsible for evaluation and
standardization
• What happens if an identifier is compromised?

Protocols for Secure Electronic


© M. H. Sherif
Commerce (2nd ed.) 75
Biometrics Points of Vulnerability

PC
Yes/No
Features
Sensor Image processing
extraction Matching

Bio reader

Reference pattern
Smart card

Protocols for Secure Electronic


© M. H. Sherif
Commerce (2nd ed.) 76
Biometrics in a Networked
Environment
Manager of the
relation
(ISP, Airport authority
etc..)
Biometrics Performance depends on
Individual to be
identified
Application
User
the exchange of
performance and fault
management information
Biometrics across administrative
Service Provider
domains

Network Provider 1 Network Provider 2

Infrastructure Provider (s)

Protocols for Secure Electronic


© M. H. Sherif
Commerce (2nd ed.) 77
Authentiction with Digital Certificate

• Certificate issued by a
Certification Authority
Name : “Richard”
• Verifies the identity of Public Key:
the holder of a public key Serial # : 29483756
Expires : 6/18/02
• Structure governed by Signed : CA’s Signature
ITU Recommendation
X.509

Protocols for Secure Electronic


© M. H. Sherif
Commerce (2nd ed.) 78
Access Control

• Identity-based access control: identity determines


access rights
• Role-base access control: identity and role determine
access privileges
• At the network layer, access control in IP networks is
based on:
– packet filtering
– application level gateways
– using dedicated servers such as RADIUS and TACACS

Protocols for Secure Electronic


© M. H. Sherif
Commerce (2nd ed.) 79
Remote Access Control with RADIUS

Protocols for Secure Electronic


© M. H. Sherif
Commerce (2nd ed.) 80
Denial of Service (DOS)

• Result for the failure of access control


• Inherently associated with IP networks because:
– control and user data share the same physical and logical
bandwidths
– IP is a connectionless protocol so call admission is
irrelevant
• In distributed denial of service attacks, many
compromised hosts may send useless packets back to
the targeted host

Protocols for Secure Electronic


© M. H. Sherif
Commerce (2nd ed.) 81
Non-Repudiation

• This is a legal concept that requires the intervention of


a third party
• Non-repudiation at the origin
• Non-repudiation at the destination
• Easier with public key cryptography than with
symmetric cryptography
• No backup of private signature key
• Time-stamping and sequence numbers

Protocols for Secure Electronic


© M. H. Sherif
Commerce (2nd ed.) 82
Technical Aspects of Nonrepudiation
(X.813)

• Generation of proofs
• Recording of proofs
• Verification of proofs
• Retrieval and re-verification of the proofs

Protocols for Secure Electronic


© M. H. Sherif
Commerce (2nd ed.) 83
Key Management
• Production
• Storage
• Distribution
• Utilization (Exchange)- Kerberos/Diffie-Hellman
– ISAKMP- Cisco
– SKIP- Sun
– KEA -NSA
• Withdrawal, Replacement
• Deletion
• Back-up and Archival - not of private signature keys

Protocols for Secure Electronic


© M. H. Sherif
Commerce (2nd ed.) 84
KERBEROS

• Produced by the MIT (ftp://athena-


dist.mit.edu/keberos)
• Version 5 currently in use
• Free version called Heidmal (Swedish Institute of
Computer Science)
• Public key version used in NetBill (RFC 1510)

Protocols for Secure Electronic


© M. H. Sherif
Commerce (2nd ed.) 85
Authentication in Kerberos
M
3 - Service
Service request Request
comprises the
session ticket
4 - Optional Response of the
and an
authentication
merchant's server
note encrypted
with the session 1 - Request of a session ticket
key C KS

2 - Ticket
acquisition

Message 2 contains a session encryption key encrypted with a common


symmetric key between the client and the Kerberos server and a session ticket
with information encrypted by the common symmetric key between the
merchant and the Kerberos server

Protocols for Secure Electronic


© M. H. Sherif
Commerce (2nd ed.) 86
Public Key Infrastructure

• Types of Certificates:
– Identity
– Privileges or attributes
• SDSI (Simple Distributed Security Infrastructure)
• SPKI (Simple Public Key Infrastructure): for privileges
• Online management of certification
– CMP (Certificate Management Protocol): key exchange and
cross-certification (Entrust and IBM, as part of PKIX): RFC
2510
– OCSP (Online Certification Status Protocol): RFC 2560

Protocols for Secure Electronic


© M. H. Sherif
Commerce (2nd ed.) 87
Certificate Management

• X.509/ISO/IEC 9594-1- Four versions


• Directory System is LDAP
• EDIFACT has a different approach- DEDICA
• Certification Path and Recursive Verification
• Cross-certification
• Authorities needed:
– Certification authorities
– Naming or Registering authorities
– Directory

Protocols for Secure Electronic


© M. H. Sherif
Commerce (2nd ed.) 88
Communication Protocols in the
X.500 Directory System
Directory
DSA
DSP
DSA Directory system protocol
(DSP) of X.518
Directory access protocol
(DAP) of X.519 DSP DSA

Directory information shadowing protocol


(DISP) of X.525

Work station with a Directory access protocol Duplicate DSP


directory user agent (DAP) of X.519 directory
(DUA) DSA
Directory system protocol
DSA
(DSP) of X.518

DSP
DSA

Protocols for Secure Electronic


© M. H. Sherif
Commerce (2nd ed.) 89
Simplification of X.509

• LDAP (RFC 2251) is carried directly over TCP/IP


• LDAP has simplified information models and object
classes
• LDAP is restricted to the client side
• LDAP does not react to what happens on the service
side, for example, duplication of entries.
• LDSPv3 does not mandate any strong authentication
mechanism
• PKIX (IETF) simplifies the X.509 infrastructure and
access policies

Protocols for Secure Electronic


© M. H. Sherif
Commerce (2nd ed.) 90
Certification Authority (CA)

• A trusted third party that issues digital certificates


• Individuals or companies apply for digital certificate by
sending their public key and identifying information to
CA.
• CA verifies the information and creates a certificate
containing the applicant’s name, public key, and the
key’s expiration date.
• Each certificate has a unique serial number for
identifying it.
• CA uses its private key to encrypt the certificate and
sends the signed certificate to the applicant.

Protocols for Secure Electronic


© M. H. Sherif
Commerce (2nd ed.) 91
Basic Content of the X.509
Certificate
• Version
• Certificate serial number
• Identifier of the algorithm used to sign the certificate
and the parameters used
• Name of the certification authority
• Expiration date of the certificate
• User's references
• Information concerning the public key algorithm of the
sender, its parameters and the public key itself

Protocols for Secure Electronic


© M. H. Sherif
Commerce (2nd ed.) 92
Authentication Steps

• Verify the signature of the certification authority


• Extraction of the requester's public key from the
certificate
• Verification of the validity of the certificate by
comparison of with the certificate revocation list (CRL)
• Establishment of a certification path between the
certification authority and the authority that the server
recognizes
• Determination of the privileges that the requester
enjoys (e.g., financial data)

Protocols for Secure Electronic


© M. H. Sherif
Commerce (2nd ed.) 93
Recursive Verification of Certificates
Root Authority (RA)

Authority
A
Subject = Authority A
Public key of A
Authority
Signature of RA
Subject = B
Authority B
Public key of B
Signature of A

User
Subject = Authority C
Subject = User
Public key of C
Public key of user
Signature of B
Authority
Signature of C C

Protocols for Secure Electronic


© M. H. Sherif
Commerce (2nd ed.) 94
Hierarchical Certification Path X.509

U«V»
V «U»

V«W» V
V«Y»
W«V»
Y«V»
Y
W
W«X»
X «W» Y«Z»
X«Z» Z «Y»
X Cross- Z Z «X»

certification
C A B
X «C» X «A» Z «B»

Z «B» = Z certifies B
Protocols for Secure Electronic
© M. H. Sherif
Commerce (2nd ed.) 95
Banking Applications

• Bank-Led Organizations:
– The Global Trust Authority (GTA) 800 banks
– IDENTRUS (infrastructure for the TrustAct services from
SWIFT)
• VeriSign (acquired Thawte Certification)
• Scotiabank (Entrust)
– North America's biggest bank certification authority
– 150,000 digital certificates
– >500,000 online banking transactions

Protocols for Secure Electronic


© M. H. Sherif
Commerce (2nd ed.) 96
IDENTRUS and TrustAct
International
Interbank
Settlement
(SWIFT)
IDENTRUS

Issuer Bank Acquirer Bank

Message
TrustAct
to the
acquirer Enterprise A Enterprise B
bank

Protocols for Secure Electronic


© M. H. Sherif
Commerce (2nd ed.) 97
Attribute Management

• Grant authority to the holder of the certificate (legal


age, sufficient funds availability, payment/shipping
guarantees etc.) by reference to an identity certificate
• Allows delegation of privileges
• X.509 v. 4 (2000) defines a framework for attribute
certificates
• Useful for banks
– Scotiabank of Toronto/Canada
– US Banks: Financial Agent Secure Transaction (FAST)

Protocols for Secure Electronic


© M. H. Sherif
Commerce (2nd ed.) 98
Access Management

• Rules may be complex (conditional statements)


• Role-Based Access Control (RBAC) restricts access to
objects associated with a role
• NIST/OMG are developing a Resource Access Decision
(RAD) interface
• (ftp://ftp.omg.org/pub/docs/corbamed/99-03-02.pdf)

Protocols for Secure Electronic


© M. H. Sherif
Commerce (2nd ed.) 99
Interoperability of Certificates

• MISPC (Minimum Interoperability Specification for PKI


Components)- NIST
• GOCPKI (Government of Canada Public Key
Infrastructure)
• Internet Council of NACHA (National Automated
Clearing House Association)
• Authentication practices must be equivalent
• Independent audits

Protocols for Secure Electronic


© M. H. Sherif
Commerce (2nd ed.) 100
Additional Organizations

• Auditing organizations: American Institute of Certified


Public Accountants and Canadian Institute of Chartered
Accountants
• http://bbbonline.org
• http://www.truste.org (Electronic Frontier Foundation
and CommerceNet)
• http://www.aece.org (Spain)

Protocols for Secure Electronic


© M. H. Sherif
Commerce (2nd ed.) 101

Vous aimerez peut-être aussi