Identity Authentication Technologies

advertisement
Identity Authentication Technologies
An Overview and Comparison
15 September 2014
Catherine Tilton
Global Identity Summit – September 2014
Agenda
•
•
•
•
•
•
•
•
•
Authentication & authentication technologies
Authentication paradigms
E-Authentication
Multi-factor authentication – combining technologies
Federated identity
Biometric authentication architectures
Security models & mechanisms
Issues & considerations (challenges)
Related standards – moved to Standards session
Global Identity Summit – September 2014
The information security puzzle
Non-repudiation
Integrity
Detection
Confidentiality
I&A
Availability
Authorization
Identification & Authentication: Verifying the identity of the user
Global Identity Summit – September 2014
Access control
Logical Access Control
• Related to information
security (INFOSEC)/
information assurance (IA)
space
• Involves user authentication
and authorization
• Controls access to:
– Computer systems
(workstations, etc.)
– Network resources
– Software applications
– Data
• Single sign-on
Global Identity Summit – September 2014
Physical Access Control
• Related to perimeter security
• Involves identification of
personnel entering/exiting
• Controls access to:
– Buildings
– Secure areas
– Checkpoints/portals
• Includes guards, keys,
badges, etc.
• Throughput time is a key
consideration
• Integration with existing
physical access control
systems
Identification & Authentication
Methods
• Something you know
– Passwords
– PINs
– Mother’s maiden name
• Something you have
– ATM card
– Smart card
– Token
• Something you are
– Biometrics
Addressing the weakest link
Global Identity Summit – September 2014
Authentication v. Authorization
• Authentication
– Verifying the identity of an individual
• Authorization
– Convey privileges to an authenticated identity
• Authentication is seldom an end in itself
• The objective is usually Authorization
• A biometric template (like a password) can be associated with an
account
• Successful authentication may authorize use of (or access to)
that account
Global Identity Summit – September 2014
Logical access uses
Control
employee
access to
sensitive
files and
applications
Biometric
Authentication
Internet
E-commerce or Internet
bank customer
Global Identity Summit – September 2014
Enterprise
Web Server
The password dilemma
Low Security AND User Inconvenience
Global Identity Summit – September 2014
The trouble with passwords
• Passwords are easily guessed, stolen, shared, hacked,
social engineered
• Weak passwords are the norm
– Published lists of “Top-10” passwords
• When strong passwords are used, they are difficult to
remember, so people write them down
• Huge administrative cost due to password resets
– Estimates range from $50-300/user/year
– #1 help desk call
• 80% of intrusions are based on password attacks
But … passwords are “free” and widely accepted
Global Identity Summit – September 2014
Top 25 Passwords for 2013
1. 123456 (Up 1)
2. password (Down 1)
3. 12345678 (Unchanged)
4. qwerty (Up 1)
5. abc123 (Down 1)
6. 123456789 (New)
7. 111111 ( Up 2)
8. 1234567 (Up 5)
9. iloveyou (Up 2)
10. adobe123 (New)
11. 123123 (Up 5)
12. admin (New)
13. 1234567890 (New)
14. letmein (Down 7)
15. photoshop (New)
16. 1234 (New)
17. monkey (Down 11)
18. shadow (Unchanged)
19. sunshine (Down 5)
20. 12345 (New)
21. password1 (up 4)
22. princess (New)
23. azerty (New)
24. trustno1 (Down12)
25. 000000 (New)
Source: CBS News: http://www.cbsnews.com/news/the-25-most-common-passwords-of-2013/
Global Identity Summit – September 2014
Well … OK
Global Identity Summit – September 2014
Password characteristics
• Based on shared secrets
• Password strength based on:
–
–
–
–
–
–
–
–
–
–
Composition
Length
Lifetime
Source
Ownership
Distribution
Storage
Entry
Transmission
Authentication Period
See FIPS 112*
Global Identity Summit – September 2014
Obligatory cartoon
Global Identity Summit – September 2014
Other knowledge based methods
• KBA (knowledge based authentication)
– tests personal knowledge of the individual against
information obtained from public databases
– Static or dynamic
• Pre-registered knowledge techniques
– challenge/security questions
• Image recognition methods (including faces)
– e.g., selecting pre-registered images from a set on
multiple pages
• Pattern swipes
– popular on some mobile devices
• Others?
Global Identity Summit – September 2014
Biometrics
Global Identity Summit – September 2014
Biometrics overview
• What are Biometrics?
– automated recognition of individuals based on their
biological and behavioural characteristics
ISO/IEC 2382-37
• Examples of Biometric Types:
- Fingerprint
- Facial features
- Voice
- Signature
- Iris
- Retina
Global Identity Summit – September 2014
- Hand geometry
- Facial thermography
- Keystroke dynamics
- Palm print
- Vein patterns
- DNA (?)
How do biometrics work?
Enrollment:
Present
biometric
Capture
Process
Store
No Match
Compare
Verification:
Match
Present
biometric
Capture
Global Identity Summit – September 2014
Process
Example biometric devices
Global Identity Summit – September 2014
Benefits of biometrics
•
Cannot be forgotten, lost, shared or stolen
•
Security – Replace vulnerable passwords
– Links an event to a real person
– Accurate - positive authentication
– Protects personal privacy
•
Convenient - nothing to carry or remember
•
Non-repudiation - provides positive audit trail of events
•
Cost Savings - reduces helpdesk support costs for password resets
•
Compliance - helps comply with legislation and regulations
Biometrics link the event to a particular individual,
not just to a password or token, which may be
used by someone other than the authorized user
Global Identity Summit – September 2014
Physical Tokens
Global Identity Summit – September 2014
Physical Tokens
SafeNet iKey
RSA SecureID
Privaris PlusID
Global Identity Summit – September 2014
Spyrus HSMs
iButton
Mobil
SpeedPass
Smartcards
(PIC/CAC)
Smartcards, RF, and proximity badges
• Allow users to authenticate without entering a claimed
identity
• Variety of effective ranges
• Can automatically logoff user
• Can bind cardholder to card
• Provides multi-factor authentication
– Higher level of security
Global Identity Summit – September 2014
Smartcards (aka chipcards)
• Smartcards v. Memory cards
• Contact & contactless
–
–
–
–
ISO 7816 / ISO 14443 A/B / ISO 15693
Contact mostly used for logical access
Contactless mostly used for physical access
Hybrid or Dual Interface
• Card architectures & operating systems
–
–
–
–
Javacard
Native OS
Multos
EMV
• May include embedded cryptographic functions
– FIPS 140-2, Level 2/3
• Typical card today: 8-32 bit, 64-128KB
Global Identity Summit – September 2014
Secure microprocessor chip
•
•
•
•
•
•
•
•
•
•
•
An 8 to 32-bit central processing unit (CPU);
Read Only Memory (ROM) or flash memory that contains the chip’s
operating system and, optionally, application software;
Random Access Memory (RAM) that serves as a temporary register for
data;
Other non-volatile memory that is used for storage of user data (e.g.,
Electrically Erasable Programmable Read Only Memory (EEPROM),
ferroelectric RAM, flash memory);
Features that integrate countermeasures against known and foreseen
security threats to achieve Common Criteria or FIPS 140-2 certification;
Environmental sensors (e.g., voltage, frequency, temperature);
At least one serial communication port;
A random number generator;
Timers;
Optional cryptography engine(s) (e.g., providing support for DES, 3DES,
AES, RSA, ECC);
Optional other dedicated peripherals (e.g., checksum accelerator, Serial
Peripheral Interface (SPI) communication port).
Source: Government Smart Card Handbook
Global Identity Summit – September 2014
Multi-technology smartcard
Contactless
ICC
125 khz
Prox Antenna
Magnetic Stripe
Organization Name
Or Logo
Digital
Photograph
Card
Front
Bar Code
Contact
ICC
Front
Source: Government Smart Card Handbook
Global Identity Summit – September 2014
Back
Card
Back
Contactless technology comparison
Contactless Technology Comparison
Features
14443
15693
125 kHz
Standards
ISO/IEC 14443
ISO/IEC 7810
ISO/IEC 15693
ISO/IEC 7810
None
(de facto)
Frequency
13.56 MHz
13.56 MHz
125 kHz
Read range
Up to10 centimeters
(~3-4 inches)
Up to 1 meter
(~3.3 feet)
Up to1 meter
(~3.3 feet)
Chip types supported
Memory
Wired logic
Secure microcontroller
Memory
Wired logic
Memory
Wired logic
Encryption and
authentication functions
MIFARE encryption,
DES/3DES, AES, RSA,
ECC
Supplier-specific,
DES/3DES
Supplier-specific
64 to 72K bytes
256 and 2K bytes
8 to 256 bytes
Read/write ability
Read/write
Read/write
Read only
Data transfer rate
(Kbytes/second)
Up to 106 (ISO)
Up to 848 (available)
Up to 26.6
Up to 4
Yes
Yes
Optional
Challenge/Response
Challenge/Response
Password
Hybrid card capability
Yes
Yes
Yes
Contact interface
support
Yes
No
No
Storage capacity range
Anti-collision
Card-to-reader
authentication
Global Identity Summit – September 2014
Source: Government Smart Card Handbook
Conceptual architecture
Public Key
Certificates
Public Key / Biometric Template
Certificates
Card
Certificate/Attribute
Authority Workstation
Card Personalization
System
Card Data
Cardholder
Database
Card Printer
Central Card Management System
Completed
Cards
Integrated
Card Data
Video Camera
Account
Set-up
Data
Physical Access Control System
Biometric Scanner
Biometric Scan
Digitized Signature Scanner
Digitized Photo
Integrator
Logical Privileges
Signature
Enrollment
Workstation
Government Employee
Source: Government Smart Card Handbook
Global Identity Summit – September 2014
Logical Access Control System
Personnel System
Card technology comparison
Feature with respect to security
Comparison of Dynamic versus Static Technology with Relation to
Memory and Security
9
On-card biometric
8
Crypto coprocessor
7
Dynamic session key
On-card Biometric
6
Data access security
Dynamic IC
1.
1D bar code
2.
Magnetic stripe
3.
2D bar code
4.
Optical stripe
5.
Memory chip
6.
ICC
7.
Java firewalled
8.
PKI on-card key
generation
9.
Biometric matchon-card
5
4
Encrypted data
Media authenticity
Unique identifier
2
3
Static Storage
1
30b
1k 1.5k
8k
16k
32k
64k
Memory Storage of the Medium
Source: Government Smart Card Handbook
Global Identity Summit – September 2014
2M
4M
Cryptography/PKI
Global Identity Summit – September 2014
Public key infrastructure (PKI)
SENDER
RECEIVER
Cleartext
Cleartext
Public
Key
Private
Key
Decrypt
Encrypt
Ciphertext
Key Confidentiality
Ciphertext
Asymmetric keys are used to protect symmetric keys.
Global Identity Summit – September 2014
PKI (cont’d)
SENDER
RECEIVER
Cleartext
Cleartext
Hash
Hash
Private
Key
Public
Key
Verify
Sign
Signature
Signature
Non-repudiation
Global Identity Summit – September 2014
?
Mutual authentication
Authentication Device
Host System
Generate Random Number
RN1
[RN1], RN2
Decrypt received RN1 &
compare to original
Encrypt RN1,
Generate RN2
If matches, device
authenticated
Encrypt RN2
[RN2]
Decrypt received RN2 &
compare to original
If matches, host
authenticated
Simple example based on symmetric keys, challenge-response protocol
Global Identity Summit – September 2014
TLS Authentication
Server
Client
ClientHello
ServerHello
Certificate*
ServerKeyExchange*
CertificateRequest*
ServerHelloDone
Certificate*
ClientKeyExchange
CertificateVerify*
[ChangeCipherSpec]
Finished
[ChangeCipherSpec]
Finished
Application Data
Application Data
Secure Channel
Source: RFC 5246
Global Identity Summit – September 2014
Kerberos (crypto based authentication)
Key Distribution Server
Client
ticket request
Generate ticket request
Client derives the user's
key from the password,
decrypts the response
packet and verifies the
timestamp and service
identity.
Global Identity Summit – September 2014
Obtains key for the client and
service, creates a temporary
session key, prepares a
response packet containing a
ticket encrypted under the
service's key, and encrypts the
response packet under the
client's key.
response packet
RESPONSE PACKET
(Encypted under client's key)
Temporary session key
Ticket
Server identity
Timestamp
Validity interval
TICKET
(Encypted under service's
secret key)
• Temporary session key
• Client identity
• Timestamp
• Client address
• Validity interval
Kerberos (cont’d)
Service
Client
service request
Generate service request
SERVICE REQUEST
Ticket
Authenticator
Decrypts the ticket contained
in the service request with
the services's secret key.
The request is considered
valid if the client's name and
address match in the ticket
and authenticator, and the
timestamps are accurate.
Authenticator (optional)
AUTHENTICATOR
(Encrypted under session key)
Client identity
Client address
Timestamp
Global Identity Summit – September 2014
Proof of Possession
• How do you prove possession of a physical token remotely?
• This is generally done by either:
– Proving the physical token contains a software token/object, such
as a cryptographic key
• Key possession proved by protocols such as those described
– Proving the physical token can generate or receive (at a unique
address) a time-bound piece of data
• One-time passwords (OTP)
• That is why keys, tickets, OTPs, etc. are considered “what you
have” factors
• NOTE: Higher levels require proof of possession AND control.
Global Identity Summit – September 2014
Authentication models
Traditional authentication model
Biometric authentication
Global Identity Summit – September 2014
Authentication models
• Two processes
– Registration & Authentication
• Features of traditional model
– Tokens are always secrets and it is the responsibility of
the subscriber to protect them.
– It is undesirable for verifiers to learn shared secrets
unless they are a part of the same entity as the CSP that
registered the tokens.
In SP800-63 parlance: Tokens are authentication data objects.
A CSP is a Credential Service Provider, the issuer of electronic credentials.
A credential is an object that binds an identity to a token & is presented to
the verifier during an authentication transaction.
Global Identity Summit – September 2014
Traditional model - registration
Subscriber
Identity
(Secret, opt)
Credential
• Applies
Est. Identity
(+ opt secret)
Credential
• Identity proofing
• Generate/Register Token
• Issues Credential
(bind identity to token)
• “An applicant applies to a Registration Authority (RA) to become
a subscriber of a Credential Service Provider (CSP) and, as a
subscriber, is issued or registers a secret, called a token, and a
credential that binds the token to a name and possibly other
attributes that the RA has verified. The token and credential may
be used in subsequent authentication events.” [SP800-63]
Global Identity Summit – September 2014
Traditional model - authentication
Claimant
Token PoP
(Authen. Protocol)
Assertion
Access
• Requests access
• Verifies identity
• Checks authorization
• Grants access
• During authentication, when the party to be authenticated (called a
claimant) successfully demonstrates possession and control of a token
to a verifier (the party verifying the identity) through an on-line
authentication protocol, the verifier can verify that the claimant is the
subscriber.
• The verifier passes on an assertion about the identity of the subscriber
to the relying party. The relying party can use the authenticated
information provided by the verifier/CSP to make access control or
authorization decisions.
Global Identity Summit – September 2014
Biometric model – registration/enrollment
Subscriber
Identity +
Biometric
Est. Identity
+ biometric
Credential
Credential
• Applies
• Identity proofing
• Enrolls biometric
• Register Biometric
• Build Credential (bind
identity to ref. biometric)
• The applicant/subscriber enrolls (provides) their biometric data to the
RA/CSP. The biometric reference data in this case is analogous to an
authentication token except that:
– It is not a secret known by the subscriber or a secret generated by
the CSP – it is an inherent characteristic of the subscriber (though
it *may* also incorporate knowledge-based content).
– The reference biometric is bound to the identity by the CSP. The
resulting credential (unless it is instantiated within a physical token)
does not need to be issued to the subscriber since he retains the
source of the biometric data (himself).
Global Identity Summit – September 2014
Biometric model - authentication
Biometric
Authentication
Server
Claimant
Claimed identity
+ Live biometric
Assertion
Access
• Requests access
•
• Verifies identity (through
biometric matching)
• Checks authorization
• Grants access
During authentication, the claimant presents a new biometric sample to the
verifier, to be compared with that originally registered and incorporated into
the credential.
– For server-based matching:
• This requires that the verifier have knowledge of the registered biometric
(credential) OR that a separate biometric authentication service be used. A
method to register the reference biometrics with the biometric server would be
required (i.e., a relationship with the CSP is implied).
– For local matching (e.g., on a physical token):
• The live sample is matched against the biometric credential stored locally,
releasing a separate token for use in the traditional authentication protocol.
Global Identity Summit – September 2014
Model differences
• The main difference
– Instead of proving possession of a CSP issued credential, the
claimant proves he can present a biometric sample from the
same source as that originally registered.
– The authentication protocol is therefore not engineered to
verify proof of possession (PoP), but to ensure the integrity
and authenticity of the live sample and to verify that it
matches the registered biometric credential.
• This is in some ways “backwards” from the traditional model
in that:
– The biometric “token” is provided by the subscriber to the
CSP rather than issued by the CSP to the subscriber.
– It is not the credential (issued token) that is provided for
verification, but the credential that the provided biometric is
verified against.
Global Identity Summit – September 2014
E-Authentication
Global Identity Summit – September 2014
The problem
• Electronic authentication (e-authentication):
– the process of establishing confidence in user identities
electronically presented to an information system
• Remote e-authentication
– Establishing identity over an open network that you do not
control from a node that is outside of your supervision
Global Identity Summit – September 2014
Open and closed networks
Internet
LAN / WAN
Global Identity Summit – September 2014
Local and remote authentication
• Local authentication
– Verifier has more control
• May be attended
• Verifier knows where claimant physically is
• Remote authentication
– Verifier control and supervision is harder
• Claimant often uses his own system
• Authentication process generally unattended
• Verifier doesn’t know where claimant is
– Protocols usually use secrets
• Many well-studied protocols
Source: B. Burr, NIST
Global Identity Summit – September 2014
OMB M-04-04
E-Authentication Guidance for Federal Agencies
• Scope is e-Government
• Does not mention biometrics (or any technology)
• Defines 4 levels of assurance:
Level
Confidence in Asserted Identity’s Validity
1
Little or none
2
Some
3
High
4
Very High
Global Identity Summit – September 2014
SP 800-63
Electronic Authentication Guideline
• Biometric methods are widely used to authenticate
individuals who are physically present at the authentication
point, for example for entry into buildings.
• Biometrics do not constitute secrets suitable for use in the
conventional remote authentication protocols addressed in
this document.
• In the local authentication case, where the claimant is
observed and uses a capture device controlled by the
verifier, authentication does not require that biometrics be
kept secret.
• The use of biometrics to “unlock” conventional
authentication tokens and to prevent repudiation of
registration is identified in this document.
Global Identity Summit – September 2014
800-63-1 Token Types
•
•
Levels 1&2 require 1 factor; Levels 3&4 require 2 factors.
Biometrics allowed at levels 3&4 to access token.
Global Identity Summit – September 2014
Multifactor Authentication
Global Identity Summit – September 2014
Authentication – method comparison
Possession
Biometric
• Subject to memory loss
• Subject to left behind
• Carry it with you
• Subject to guessing
• Subject to duplication
• Difficult to counterfeit
• Social engineering
• Social engineering
• Cannot give away
• Ubiquitous (logon)
• Common (phys. access)
• Niche markets
• Reliable
• Reliable
• Improved
• ‘Free’
• Costly
• Lower
• Easy to use
• More difficult to use
• Easy to use
• 4-8 characters
• 105 <-> 10290
• 109 <-> 1070
• Difficult to manage
• Difficult to manage
• Difficult to manage
Knowledge
• Enrollment process
Source: J. Stapleton, KPMG
Global Identity Summit – September 2014
Passwords
• Discrimination high
– Large password space –high entropy
• Technically strong
– Long string = High entropy, very long time to exhaust
– Cryptographically strong algorithms – can’t be reverse engineered
• Procedurally weak
–
–
–
–
–
Short passwords = Low entropy
Easy-to-guess passwords = Low/zero entropy
Written down = Zero entropy
Divulged to colleagues = Zero entropy
Vulnerable to social engineering attacks = Zero entropy
• Password security paradox
– Increased technical strength ►decreased procedural strength
Source: P. Statham
Global Identity Summit – September 2014
Tokens
• Discrimination very high – token store “password”
• Technically (quite) strong
– Difficult to copy – physical barriers
– Very difficult to modify – physical and cryptographic
barriers
– Attacks needs considerable expertise and specialized
equipment
• Procedurally weak
– Loss
– Theft
– But at least you know when it’s missing!
Source: P. Statham
Global Identity Summit – September 2014
Biometrics
• Discrimination medium-high (depending on modality)
– Entropy limited by FAR
• Not directly equivalent to password entropy because you
can’t mount a simple exhaustion attack
• Technical strength medium
– Spoofing
– Reverse engineering of stored templates
– Capture of stored images
• Procedurally strong
– Not so reliant on human discipline
– Human failures don’t weaken the binding in the same
way as for passwords and tokens
Source: P. Statham, CESG
Global Identity Summit – September 2014
Considerations
Capabilities
Biometrics
Positive ID of human user Enrollment logistics
Fixes identity in time
Secure environment
Technology performance
Portable/secure storage
Smart Cards Crypto device
Tokens
Crypto / PKI
Considerations
Document/record signing
Mutual authentication
Global Identity Summit – September 2014
Distribution/inventory control
Space usage
Processing power
Card issuance/mgmt
Complexity
Key management
Infrastructure
Security certification
Cross certification/trust models
INFOSEC requirements
Crypto / PKI
Biometrics
I&A
PW based
Unique
Authorization
Supports
Supports
Integrity
Dig Cert
No
Confidentiality
Encryption
No
Non-repudiation
Some doubt
Yes
Detection
No
No
Global Identity Summit – September 2014
Multifactor authentication
Source: Smart Card Alliance
Global Identity Summit – September 2014
Multifactor – 2 types
Chained
Authenticates to
Releases
Transmits to
Verifier
What you
Know or are
What you
have
Secret
Parallel
1234
Global Identity Summit – September 2014
>1
Verifier
Synergistic technologies
Biometrics
Smart Cards
PKI
Global Identity Summit – September 2014
Mutual benefits
USES
Biometrics
Crypto/PKI
Crypto/PKI
• SC portable/secure • Secure template
template storage
during xmt/store
• Claimed identity
• Dig sign template
nd
• 2 authen. Factor • Dig sign components
• SC becomes BSP
Biometrics
Smart Cards
Smart Cards
• Access ctrl to card
• Unlock secrets on
card
• Verify cardholder
as cardowner
• Secure data on card
• Secure reader I/F
• Mut auth. SC apps.
• Prove possession
• Protect access to
• SC becomes CSP
private key/dig cert • SC portable/secure
• Enhance nonkey/cert storage
repudiation
BSP=Biometric Service Provider
CSP=Crypto Service Provider
Global Identity Summit – September 2014
Example – document signing
Create document
Biometric
authentication
Release
Dig. Cert.
match
Initiate
signature
John
Hancock
Network
Signed
document
* Similar process for PKI enabled applications, including cert based network login.
Global Identity Summit – September 2014
Example – PIV system
PIV Card Issuance and Management
Access Control
Authorization
Data
PKI Directory &
Certificate Status
Responder
Physical Access Control
Key
Management
Identity
Proofing &
Registration
Card
Issuance &
Management
I&A
I&A
PIV Card
PIN Input
Device
Biometric
Reader
PIV Front-End
Source: FIPS 201
Global Identity Summit – September 2014
Physical
Resource
Logical Access Control
Card Reader
/Writer
Cardholder
Applicant
Authorization
Authorization
Logical
Resource
Authorization
Data
PIV authentication technologies
Mandatory
Optional
• a PIN
• a CHUID
• PIV authentication data
• 1 or 2 iris images
• 1 or 2 fingerprint templates for
on-card comparison (OCC)
• a symmetric Card
Authentication key for
supporting physical access
applications
• a symmetric PIV Card
Application Administration key
associated with the card
management system.
– one asymmetric private key and
corresponding certificate
• 2 fingerprint templates
• an electronic facial image
• card authentication data
– one asymmetric private key and
corresponding certificate
Conditionally
• Digital signature key/cert
• Key management key/cert
Global Identity Summit – September 2014
PIV graduated assurance levels
Physical Access
Logical Access
Source: FIPS 201-2
Global Identity Summit – September 2014
Comparison of biometric credentials
Program
Modes
Qty
Encry
Sign
Interface*
PIV
FP-temp
Face
2
1
N
Y
C
RT
FP-temp
Iris-polar
Face
2-4
0-2
1
N
Secty
Obj.
(C/L future)
TWIC
FP-temp
Face
2
1
Y
Y
C/CL
ePass
Face
FP (opt)
Iris (opt)
1
0-N
0-2
N
Secty
Obj.
CL
* C=contact, CL=contactless
Global Identity Summit – September 2014
C
Prot. Mech.
PIN
Mut. Auth.
BAC/TPK**
BAC/
Mut. Auth.
** BAC=Basic Access Control; TPK=TWIC Privacy Key
What about FIDO?
• FIDO also supports multiple authentication technologies
Global Identity Summit – September 2014
Federated Identity
Global Identity Summit – September 2014
Federated Identity
• Goal – an environment where subscribers and relying
parties may choose among a marketplace of identity
providers and where a credential issued by one
provider may be used at multiple relying parties.
– Reduce the number of credentials an individual must
manage
– Provide choice to RPs and subscribers
– Support multiple levels of assurance
Global Identity Summit – September 2014
SP800-63 Model
Global Identity Summit – September 2014
National Strategy for Trusted Identities in Cyberspace
• Report issued by the White House in April 2011.
– Outgrowth of the President’s Cyberspace Policy Review
• Vision:
– Individuals and organizations utilize secure, efficient, easy-to-use,
and interoperable identity solutions to access online services in a
manner that promotes confidence, privacy, choice, and innovation.
• The realization of this vision is the user-centric “Identity
Ecosystem” – an online environment where individuals and
organizations will be able to trust each other because they follow
agreed upon standards to obtain and authenticate their digital
identities—and the digital identities of devices.
• National Program Office (NPO) established within Dept of
Commerce (NIST). Privately led Steering Committee stood up.
Global Identity Summit – September 2014
NSTIC Model
Global Identity Summit – September 2014
Roles
• Identity Provider (IDP) – responsible for establishing,
maintaining, and securing the digital identity associated with a
subject; issues identity credentials
• Relying Party (RP) – the service provider (app provider) who
needs to authenticate subscribers. Makes transaction decisions
based upon its receipt, validation, and acceptance of a subject’s
authenticated credentials and attributes
• Subscriber – subject of a transaction, to be authenticated; entity
registered with an IDP
• Attribute Provider – responsible for establishing and
maintaining identity attributes (e.g., verifying a person is >17
years old, part of a group, etc.)
• Trust Framework – group f interoperable IDPs following the
same technical, policy, and business standards
Global Identity Summit – September 2014
Trust Frameworks
• Enables a party who accepts a
digital identity credential to trust
the identity, security, and
privacy policies of the party
who issues the credential and
vice versa.
• Comprises:
–
–
–
–
–
–
Global Identity Summit – September 2014
Policies
Standards
Legal agreements
Operating rules
Interoperability requirements
Accreditation & Certification
schemes
Mobile
Global Identity Summit – September 2014
The challenge
Dog
Fraudster
Hacker
Terrorist
Legitimate
User
Global Identity Summit – September 2014
Device/App
App Server
(Relying Party)
The environment
We are at the pivotal intersection of two
fundamental & global paradigm shifts
1. The move to digital interactions
• Has been occurring since the web went
mainstream
• Social networking leading to greater
online presence
• Identity fraud rates are high and growing
• Current authentication methods
(PIN/Passphrase based) are woefully
inadequate; alternatives are expensive
2. The emerging ubiquity of connected
mobile computing devices (e.g. smart
phones/tablets)
• Massive consumer adoption
• Always connected, managed computing
platform in your hands at all times
• Greater utility beyond handset
Global Identity Summit – September 2014
The App
• Apps (and functions/transactions within apps) vary in
risk/sensitivity and thus the levels of assurance
required
• Users need to authenticate into multiple apps (daily)
• Contexts change - different conditions may exist at
different times (e.g., location, threat levels, etc.)
Global Identity Summit – September 2014
The platform
• The mobile platform is versatile
• Can be used to host a variety of authentication
methods – traditional and biometric
• These can be used to authenticate into the mobile app,
but …
• This platform can serve as the authentication platform
into traditional applications and web apps as well!
Global Identity Summit – September 2014
In-band v. Out-of-band
• In-band: The authentication channel is the same as the
transaction channel.
• Out-of-band (OOB): The authentication channel is
separate from the transaction channel.
App Server / Authentication Server
Transaction
Authentication
In-band example
Global Identity Summit – September 2014
Example OOB
Relying Party Application
Request
Authentication
Authentication Server
(Identity Provider)
Authentication
Results
Request
Transaction
Access
Decision
Authentication
Package
Authentication
Response
Subscriber (User)
Global Identity Summit – September 2014
Authentication
Platform
Authentication
Challenge(s)
Biometric Authentication
Architectures
Global Identity Summit – September 2014
Biometric reference architecture
Source: ISO/IEC JTC1 SC37 SD11
Global Identity Summit – September 2014
Biometric architectures
• Storage Locations
– Central/distributed
– Local workstation
– Device/peripheral
– On-token
• Matching Locations
– Server
– Local/client
– Device/peripheral
– On-token
Store
Server
Client
Device
X
X
Match
Server
Client
X
X
Device
X
X
Token
X
X
* Processing may be performed at point of capture or point of matching
Global Identity Summit – September 2014
X
Token
X
Why does Where matter?
Component
Selection
Affects:
Design
Privacy
Speed
Vulnerability
Points
Global Identity Summit – September 2014
Connectivity
Requirements
Central storage
• Enrolled biometric templates stored in central or
distributed database or directory
• Enables simplified/central administration
• Supports roving users
• Server generally physically secure/behind firewall
• Requires protection of template during transmission
and storage
– Encrypt & sign template
– Secure communications channel
– Access controls on database
Global Identity Summit – September 2014
Workstation storage
• Enrolled templates stored locally on host workstation
hard disk or other media
• Frequently done for access to local or standalone (nonnetworked) workstation
• May also be used for network access; however,
requires that users be enrolled at each workstation
access point or that a secure method of template
distribution be provided
• Template protection is required
(client platforms generally
considered “untrusted”)
Global Identity Summit – September 2014
Device storage
• Some biometric devices provide on-board storage for
some number of biometric templates
• Generally provides hardware protection of data;
however, cryptographic protection also recommended
• Most suitable for local resource access
• Network access possible with suitable distribution
mechanism
Global Identity Summit – September 2014
Smart card storage
• Enrolled biometric may be stored on the smart card
• Provides “portable” biometric database
• Newly captured sample compared against template on
card
• May facilitate authentication of owner to card or
unlocking secrets on card, depending on where
matching occurs
• Storage space on card generally limited
– May limit types of technologies or number of samples
• Template sizes range from 9B to >5KB
Global Identity Summit – September 2014
Central matching
• Matching performed at central server or cluster of servers
• Server generally physically secure/behind firewall
• Capitalize on increased processing power available
– Preferred for 1:many search/matching
• Facilitates access control to networked resources
• Enables central administration/control of security policies
• Requires:
– Reliable network connectivity to access point
– Secure communications
– Reliable server configuration (redundancy/failover)
Global Identity Summit – September 2014
Local workstation matching
• Matching algorithm executes within local host platform
(workstation)
• Used when authentication is being performed for access to the
local resource only.
• In a networked environment, protections must be in place to
ensure that the results of the matching are securely translated
into access rights to network resources.
– An untrusted workstation cannot declare that a successful
biometric authentication has occurred when in fact it has not.
– This can be achieved through incorporation of a secure
environment which provides a trusted path through mutual
authentication of components.
Global Identity Summit – September 2014
Device matching
• “Self-contained devices”
– Processing/matching algorithms are instantiated in hardware (or
ROM) within the biometric capture device
– May or may not also include on-board storage of the biometric
template
• If not, the enrolled template is passed into the device
– The new biometric sample is captured, processed, and matched
against the enrolled template internally
– A "match/no-match" result is returned to the application, perhaps
with match scores through the device interface
• Advantage is generally speed
• Considerations
– Same considerations as for local matching
– Requires secure environment within the workstation when used for
network access.
Global Identity Summit – September 2014
On-card matching
• Some smart cards possess adequate processing power to
perform the biometric processing/matching on the card itself.
• Particularly useful if:
– The biometric template is also stored on the card and/or
– The biometric sensor is also located on the card or card reader
• Facilitates authentication of the card owner or unlocking of
secrets on the card (i.e., PIN replacement)
• Security implications:
– Once enrolled, template does not leave card
– Tamper resistance of card
Global Identity Summit – September 2014
Expanding card configurations
enrollment
System On Card
Data
Collection
processed
data
raw
data
template
Storage
Processing
Store On
Card
score
initiate
Application
Matching
yes/no
Decision
adaptation
Match On
Card
Source:
Adapted from X9.84
Global Identity Summit – September 2014
Security Models & Mechanisms
for Biometric Authentication
Global Identity Summit – September 2014
Attack types
• Input-Level Attacks
– Spoofing
– Bypassing/Overloading

Processing and TransmissionLevel Attacks
- Hacking
- Skimming/Sniffing - Hill-climbing
• Backend- and Storage-Level Attacks
– Implantation
– Infiltration
– Hacking
Source: IBG
Global Identity Summit – September 2014
Generic threat model
Storage
7
9
6
Data
Collection
2
1
4
3
Decision
Matching
Signal
Processing
8
10
5
Verifier
11
Source: “Study Report on Biometrics in E-Authentication”, M1/07-0185rev,
http://standards.incits.org/apps/group_public/download.php/24528/m1070185rev.pdf,
with credit to N. Ratha.
Global Identity Summit – September 2014
Threats and countermeasures (examples)
Location
1 – Data Collection
Threats
Countermeasures
Device substitution
Liveness detection
Challenge/response
Mutually authenticate device
Spoofing
2 – Raw Data Transmission
Replay attack
3 – Signal Processing
(Software) Component
replacement
Manipulation of match scores Debugger hostile environment
5 – Matching
Hill climbing
7 - Storage
9 – Decision
Database compromise
(reading/replacing template,
changing bindings)
Threshold manipulation
Excerpt. Entire table located in M1/07-0185rev
Global Identity Summit – September 2014
Sign data, timestamp, session
tokens/nonces, secure channel
Sign components
Coarse scoring, trusted sensor,
secure channel, limit attempts
DB access controls, sign/encrypt
templates, store on secure token
Protected function, data protection
Countermeasures
•
Liveness Detection. Techniques by which systems determine that a
submitted sample is from a living person.
•
Challenge/Response. A protocol in which the user is challenged to provide a
live response as part of the authentication process. For behavioral biometrics,
the response would be embedded in the biometric characteristic captured
(i.e., a spoken, written, or typed word). For physiological biometrics, it could
be a specific finger for facial expression.
•
Nonces. Standing for “Number ONCE”, an arbitrary number that is generated
for security purposes such as an initialization vector. A nonce is used only
one time in any security session. In this context, it would involve the matching
server generating and sending a nonce to the capture client/device which
would then embed the nonce into the (signed) biometric sample so that when
the matcher receives it, it can validate that the sample came from who it was
very recently sent to.
•
Signed Components. Software or firmware components are digitally codesigned and validated during installation and/or use to mitigate against their
modification or substitution. (An example would be a signed biometric
algorithm DLL.)
Global Identity Summit – September 2014
Countermeasures (cont’d)
•
1:1 Matching. Since a single attempt against a 1:N system allows an
attacker to simultaneously attack ALL biometric references, limiting each
attempt to a single biometric reference, for which the account ID (claimed
identity) must be known, increases the difficulty of an attack.
•
Multibiometric/Multifactor. The requirement to use more than one biometric
characteristic or more than one authentication technology/method, increasing
the sophistication and resources required of an attacker.
•
Debugger Hostile. Methods to detect or prevent data from being
manipulated while in RAM/memory (such as is done by code debuggers which
could be used to change a match decision, for example).
•
Coarse Scoring. The return of match scores of sufficiently large incremental
resolution such that small changes in input samples would result in a change
in matching score smaller than that increment. In this way, an attacker does
not receive the feedback required to successfully mount a hill-climbing attack.
Global Identity Summit – September 2014
Data transfers
• Biometric authentication
data vulnerable during
transmission & storage
• Architecture dictates
transmission path for both
live sample (S) & reference
template (T)
• Countermeasures
– Sign/encrypt data
– Secure channels
– Timestamp, session
tokens, nonces
– ACBio
T: Template
S: Sample
Global Identity Summit – September 2014
Store on server/match on server
• One of most used
architectures
• Lends itself to a
network environment
• Co-location of
storage/matching
• Example: Web services
implementation
• Potential
vulnerabilities:
– Transfer of live
sample to server
– Database
compromise
Global Identity Summit – September 2014
Storage
7
9
6
Data
Capture
2
1
4
3
Decision
Matching
Signal
Processing
8
5
10
Verifier
11
Client/Device
Server
This architecture stores biometric templates on a server
and requires that live samples be submitted back to the
server in order for the matching process to occur. Once
a match or no match result has been determined, the
result is then sent to the verifier and the appropriate
actions take place.
Store on client, match on client
•
•
•
•
Fast authentication
Standalone/
disconnected
operation
Example: Login to
laptop via embedded
sensor
Potential
vulnerabilities:
– Storage on
“untrusted” platform
– Transmission of
results
Storage
7
9
6
Data
Capture
2
1
Decision
Matching
Signal
Processing
4
8
3
5
10
Verifier
11
Device
Client
Server
This architecture stores biometric templates on a client
platform and requires that live samples be captured and
matched at the client. Once a match or no match result
has been determined, the client application
communicates the result to the verifier.
Global Identity Summit – September 2014
Store on device, match on device
•
•
•
•
Device: “selfcontained” biometric
sensor unit, PDA,
smart phone
Match can result in
the release of a
cryptographic token
Example: PACS
Potential
vulnerabilities:
– Integrity of device
(tamper resistance,
certification)
– Transmission of
results
Global Identity Summit – September 2014
Storage
7
9
6
Data
Capture
2
1
4
3
Decision
Matching
Signal
Processing
8
5
10
Verifier
11
Device
This architecture stores biometric templates on an
authentication device and requires that live samples be
matched on that device. Once a match or no match result
has been determined, the device sends the appropriate
signal to the mechanism it is securing.
Store on token, match on device
• Single token/
biometric reader
device
• Use cases:
Physical Token
– PDA
– Physical access
• Privacy friendly
• Potential
vulnerabilities
•
– Integrity/tamper
resistance of
physical token
– Transmission of
reference template
PIV (FIPS-201) model
– PACS
– For LACS, off-card
matching could
occur in device,
client, or server
Global Identity Summit – September 2014
Storage
7
9
6
Device
Data
Capture
2
1
4
3
Decision
Matching
Signal
Processing
8
5
10
Verifier
11
This architecture stores biometric templates on a physical
token such as an integrated circuit chip card or smart card.
The live sample is compared and matched on the local
device.
Store on token, match on token
•
•
•
•
•
•
“Match on Card”
Biometric PIN
replacement
Closest to SP80063 implementation
Match can ‘unlock’
other authentication
mechanisms
Privacy friendly
Potential
vulnerabilities:
– Integrity/tamper
resistance of
physical token
(certification)
– Sensor spoofing
Global Identity Summit – September 2014
Physical Token
Storage
7
9
6
Data
Capture
2
1
4
3
Decision
Matching
Signal
Processing
8
5
10
Client/Device
Verifier
11
This architecture stores biometric templates on a physical
token such as an integrated circuit chip card or smart card.
The live sample is compared and matched on the card
instead of an external server or device. Successful
verification could result in access to and release of an
authentication token stored on the card, such as a
certificate or key used in an authentication protocol.
Store on token, match on server
•
•
•
•
No central storage
(attack point)
Matching performed in
secure/controlled
location
Server can sign token
prior to deployment
(authentication,
revocation)
Potential vulnerabilities:
– Integrity/tamper
resistance of physical
token
– Transmission of
sample & template
Global Identity Summit – September 2014
Physical Token
Storage
7
9
6
Data
Capture
2
1
4
3
Client/Device
Decision
Matching
Signal
Processing
8
5
Server
10
Verifier
11
This architecture stores biometric templates on a
physical token such as an integrated circuit chip card
or smart card. In practice, the user inserts the smart
card and presents their biometric. Both the stored
template and live sample are transmitted to the server
for matching.
Enrollment threats
12
Identity
Proofing
13
7
Biometric
Enrollment
Storage
9
6
Data
Collection
2
1
4
3
Decision
Matching
Signal
Processing
8
10
5
Verifier
• System can be compromised
during enrollment as well
• Identity proofing
– Forged docs
– Collusion
– Records tampering
Global Identity Summit – September 2014
11
• Biometric enrollment
– Valid biometric/ false identity
– Valid identity/ false biometric
Challenges
Global Identity Summit – September 2014
Challenges
1.
2.
3.
4.
5.
6.
7.
Integrity -vs- Secrecy
Compromise
Revocation
Sensor Spoofing/Liveness Detection
Entropy/Strength-of-Function
Peer Review Methods
Privacy Considerations
Source: M1/07-0185rev
Global Identity Summit – September 2014
Secrecy v. Integrity
• Traditional authentication protocols are generally based on the
secrecy of the authentication “token”.
• However, most biometrics are not considered secrets and
therefore fall outside of the traditional paradigm.
• This begs the question of the role and relative importance of
secrecy and integrity of the biometric data in the overall
authentication protocol and system.
• When the biometric is not a secret, then why and how should it
be protected?
• If the authentication protocol cannot rely on the secrecy of the
data, what does it rely upon?
Global Identity Summit – September 2014
Integrity
• Given that secrecy is not the basis of a biometric
authentication protocol, then what becomes critical is
that:
– The biometric is captured from a living, present human
being, and
– The biometric data has not been modified in any way.
• That is, the integrity of the biometric data and process
is THE critical factor.
Source Authenticity
Anti-spoofing/Liveness detection
Digital Signatures
ACBio?
Global Identity Summit – September 2014
Compromise & revocation
• Issue – what does ‘compromise’ mean when the
authentication token is not a secret?
– “Disclosure” ≠ compromise for biometrics
– Biometric compromise – an individual has the ability to
provide the biometric data of another during an attack
• Electronically or physically
• Revocation equivalences
– Make an enrolled biometric unusable for authentication
– Potential approaches
• Template encryption and/or binding
• ‘Cancellable’ biometrics
Transformations
• Application specific templates
Global Identity Summit – September 2014
Sensor spoofing
• SPOOFING = presenting artifacts to sensors for
enrollment or recognition, or to circumvent enrollment
and recognition processes
Examples:
• Fingerprint Recognition
– Prostheses
– Props / Gag Items
– Photographs
– Residual Prints
– Latent Prints
• Iris Recognition
– Prostheses
– Playback
– Photographs
– Imprinted Contact Lenses
Global Identity Summit – September 2014



Face Recognition
– Photographs
– Disguises / Masks
Hand Geometry
– Prostheses
– Props / Gag Items
Voice Recognition
– Playback Recordings
– Composite Recordings
Liveness detection
Examples:
• Fingerprint Recognition
– Spectroscopy
– Temporal Variation in Perspiration
• Iris Recognition
–
–
–
–
Photonic and spectrographic countermeasures (e.g. – red eye)
Behavioral countermeasures (e.g. – blinking)
Analog physical attack countermeasures (e.g. – dye detection)
Digital replay attack countermeasures (e.g. – byte scrambling)
• Facial Recognition
– Reactivity to Cues
• Voice Recognition
– Recitation of Randomly Generated Passphrases
New standard in progress: ISO/IEC 30106, Presentation Attack Detection.
Global Identity Summit – September 2014
Entropy / Strength of Function
• How does the concept & measurement of entropy differ between
biometrics and secrets-based methods?
• What is the role of entropy in overall strength of function?
• Common assumption to equate entropy of a PIN to the False
Accept Rate (FAR) of a biometric system.
– Biometric FAR: 0.01% = 1 in 10,000 chance of “guessing” or False
Accept
– PIN: Four digit PIN = (10x10x10x10), 1 in 10,000 chance of
“guessing” the PIN
• Entropy of secrets proportional to keyspace.
• SOF roughly represents difficulty of mounting an attack.
– Many other factors besides entropy for biometrics.
Global Identity Summit – September 2014
Strength
• Fundamental Discrimination (Entropy) limits
– Discrimination, “raw” entropy –ability of mechanism to distinguish
between individuals
– The exploitation avenue for casual (low or zero-effort) attacks
• Human and procedural failures–reduces entropy, sometimes
to zero
–
–
–
–
Social engineering
“Easy” secrets
Failure to guard secrets
Corrupt users/administrators
• Technical attacks
– Exhaustion attacks against authentication mechanism
– Exploitation of vulnerabilities of the authentication mechanism
– Indirect attacks against supporting infrastructure
• Transmission paths
• Databases
Global Identity Summit – September 2014
Comparison
High
Medium
Low
Biometric
Password
Token
Source: Statham, 2005
Global Identity Summit – September 2014
Peer review
•
Cryptographic system
– Encryption algo’s
– Keys
Secrecy
– Cipher text
Peer Review
Determine difficulty of
discovering key
Global Identity Summit – September 2014
•
Biometric system
– Matching algo’s
– Biometric reference
– Biometric sample
Performance Testing
Determine probability
of false match
Integrity/
Authenticity
Privacy
• Biometrics declared to be ‘personally identifiable data’
and thus considered sensitive information and subject
to privacy rules
– Concerns related to disclosure & misuse of data
• Privacy rules established, e.g.,
–
–
–
–
Use is per original purpose
Due diligence in data protection/access
Retention/sharing policies
Informed consent
• ‘Anonymous’ biometrics v. identity binding
Global Identity Summit – September 2014
Findings of AHG on Biometrics in E-Auth
• There is a role for biometric authentication at each of
the four assurance levels defined in OMB M-04-04
• Some additional challenges and threats accompany
the use of biometric authentication, but
countermeasures exist to address them.
• Biometric authentication can provide significant
benefits in certain situations, not least of which is the
tight binding of the authentication event to the physical
presence of a human claimant.
• Biometrics present a different paradigm than traditional
authentication methods where authentication data is
always secret.
Global Identity Summit – September 2014
Findings (cont’d)
• In general, integrity and authenticity are more critical
than secrecy in a biometric authentication protocol/
implementation, although many mechanisms exist to
provide for the privacy of the biometric data.
• In addition, some biometrics may be used to convey
ancillary information, such as a secret (e.g., a password
or PIN) or shared knowledge, by leveraging the ability
of the user to control the manner in which the biometric
is presented to the system.
• Specific recommended edits to SP800-63 are provided
in Annex A.
Global Identity Summit – September 2014
Conclusion
• Identity authentication is a key element of information
system and online security
• Each authentication method has its own strengths &
weaknesses
• Biometrics provide strong user authentication but
protocols differ from traditional secrets-based methods
• There are many ways for using different authentication
methods in combination … and advantages to doing so
• The landscape is constantly changing
Global Identity Summit – September 2014
For your attention!
Catherine Tilton
VP, Standards & Technology, Daon
11325 Random Hills Rd, Suite 650
Fairfax, VA 22030
703-984-4080
cathy.tilton@daon.com
Global Identity Summit – September 2014
Download