SlideShare a Scribd company logo
1 of 14
Download to read offline
ITU KALEIDOSCOPE 2013
  RALEIGH ISSA CHAPTER MEETING
 THURSDAY, APRIL 4, 2013




 ITU Kaleidoscope 2013 Presentation
 Telebiometric Information Security and Safety Management


  Phillip H. Griffin

  Information Security Consulting

  October 18, 2012
                                                   GRIFFIN – APRIL 2013
ITU KALEIDOSCOPE 2013                                   What is the ITU ?

  ITU is the International Telecommunication Union


   —   United Nations specialized agency for information
        and communications technology (ICT)

   —   Membership includes 193 countries and over
        700 private-sector entities and academic institutions

   —   Allocates global radio spectrum and satellite orbits; develops
          technical standards to ensure seamless interconnection of
             networks and technologies (telephones, video, TV, etc.)

   —   Consensus efforts to support fundamental right to communicate

   —   Empowers people through technology education and training


                                                                GRIFFIN – APRIL 2013
                                      2
ITU KALEIDOSCOPE 2013             Building Sustainable Communities


                                 Assess standardization required so that
                                 cities can enhance their social, economic,
                                 and environmental sustainability by using
                                 Information & Communications Technology



  Sustainable communities will combine
     human-oriented technologies and human values

     Biometrics, Telecommunications
           Human-oriented technologies

     Security, Privacy, Safety
           Human values

     Rubric — Suggest Areas For New Standardization

                                                             GRIFFIN – APRIL 2013
                                       3
ITU KALEIDOSCOPE 2013                             New Standardization


 Telebiometric System Heartbeat

    Provides metrics to enable the continuous improvement of an information
    security and safety management program for telebiometric system devices

 Cryptographic Message Syntax (CMS)

    Need a version that complies with the ASN.1 standards
    Permits all binary encoding rules and XML Encoding Rules (XER)
    Supports ISO/IEC JTC 1/SC 27 algorithms, cryptographic techniques

 Signcryption Support in CMS

    Defines the schema and processing for a SigncryptedData type needed
    to support the techniques in the ISO/IEC 29150 Signcryption standard



                                                             GRIFFIN – APRIL 2013
                                     4
ITU KALEIDOSCOPE 2013   Telebiometric System Heartbeat

                               Periodic messages …

                               Should monitor and document the
                               safety, performance, and availability
                               of telebiometric system devices

                               Provide information to alert system
                               administrators of security and safety
                               events and system changes (e.g.,
                               FAR/FMR settings, device location,
                               aberrant behavior, etc.)

                               Source of derived metrics to inform
                               the continuous improvement of a
                               telebiometric system information
                               security and safety management
                               program

                                                    GRIFFIN – APRIL 2013
                           5
ITU KALEIDOSCOPE 2013               Cryptographic Message Syntax

 CMS is “a general syntax for data that may have cryptography applied to
 it, such as digital signatures and digital envelopes” - RSA Laboratories

  —   Defined by RSA Security in the early 1990s

  —   PKCS #7 (Public Key Cryptography Standard 7)

  —   Replaced the Privacy Enhanced Mail (PEM) standard

  —   Solved the X.509 certificate distribution problem

  —   Initial root was RSA until VeriSign spawned (RSA, IBM, etc.)

  —   Adopted by IETF to support secure email; SET; X9.73, others

  —   No valid international version of the CMS standard exists!

 CMS provides a standardized schema with a well defined “hole”.


                                                               GRIFFIN – APRIL 2013
                                       6
ITU KALEIDOSCOPE 2013                        CMS Message Example


   Schema is in ISO/IEC & ITU standard,
   Abstract Syntax Notation One (ASN.1)


   ASN.1 is used in billions of phones !
   6.8 B cell phone subscriptions, 2013


   Compact binary or XML markup

   Zero+ Certificates and CRLs


   Unsigned attribute content needs no
   protection (e.g., SAML assertion)



                                                      GRIFFIN – APRIL 2013
                                         7
ITU KALEIDOSCOPE 2013                 CMS In Biometric Standards


 CMS SignedData is used to provide data integrity and
 origin authenticity in each of the following standards:

   X9.84 Biometric Information Management and Security
   ISO 19092 Biometrics – Security Framework
   DoD & FBI Electronic Biometric Transmission Specification (EBTS)
   DHS Biometric Enabled Watch Lists (BEWL)
   ICAO Doc 9303 Machine Readable Passports
   ANSI / NIST-ITL 1-2011 Biometric Data Format & Interchange Standard
   OASIS XML Common Biometric Format (XCBF)
   ISO/IEC 24761 Authentication Context for Biometrics (ACBio)



                                                              GRIFFIN – APRIL 2013
                                      8
ITU KALEIDOSCOPE 2013                           Biometric System Vulnerabilities

 Support policy-based information
 security management using real-
                                                                                   CMS (6, 7), and
 time device FAR/FMR settings?
                                                                                   ACBio transfer?




  1 - Attack on a biometric sensor with dummies: reproduced biometric trait presented as input
  2 - Replay attack. Recorded, intercepted signal is replayed to bypass the biometric sensor
  3 - Attack on feature extractor: produces altered values to those read by the biometric sensor
  4 - Tampered feature representation (features are replaced with a fraudulent feature set)
  5 - Attack on the matcher, forcing it to produce high or low matching score to allow or deny access
  6 - Attack on biometric templates in a local, remote, or distributed database to add, modify, delete
  7 - Tampered biometric reference template. See 4.
  8 - Attack on the final matching decision end point : attacker disables the authentication system



                                                                                   GRIFFIN – APRIL 2013
                                                   9
ITU KALEIDOSCOPE 2013                        CMS Signcryption Support

 New CMS type proposed:

 ID360: Global Forum on Identity

 Schema similar to SignedData

 One mode supports field-level
 signcryption within signed object

 Attributes: Defined by any group
 with a need using any type or format

 Manifest defined for each content type,
 e.g., a list of XPath expressions in an
 XML document


                                                          GRIFFIN – APRIL 2013
                                        10
ITU KALEIDOSCOPE 2013                  Signcryption Primitive Support


   Signcryption combines encryption and digital signature
   functions into a single, efficient cryptographic operation.

  —   A cryptographic technique and a primitive

  —   ISO/IEC 29150:2011Signcryption standard

  —   Hybrid : Combines digital signature with encryption
       (hybrid like MAC + Encryption in SSL, SSH, ESP mode of IPsec)

  —   Confidentiality + Data Integrity + Origin Authenticity

  —   Asymmetric cryptography makes non-repudiation possible

  —   Faster, smaller result than signature-followed-by-encryption

  —   No standardized signcryption CMS type exists!
                                                                   GRIFFIN – APRIL 2013
                                         11
ITU KALEIDOSCOPE 2013                                             Summary


 New standards are needed:
 Telebiometric System Heartbeat

    Need a standardized, extensible, CMS protected message to enable
    development of vendor neutral telebiometric incident handling and
    information security and safety management solutions

 Cryptographic Message Syntax (CMS)

    Need an international standard that complies with the ASN.1 standards,
    that supports all encoding rules, and permits use of SC 27 cryptography

 CMS Signcryption Support

    Need a new CMS SigncryptedData message type that supports the
    use of efficient ISO/IEC 29150 Signcryption techniques in CMS

                                                               GRIFFIN – APRIL 2013
                                      12
ITU KALEIDOSCOPE 2013                                                  Deeper Dive

 Building Sustainable Communities – ITU Kaleidoscope conference, Kyoto, Japan, 22-25
 April, 2013. (http://itu.int/en/ITU-T/academia/kaleidoscope/2013/Pages/default.aspx)
 ITU-T Technology Watch Report 12: Biometrics and Standards. December, 2009.
   (http://www.itu.int/en/ITU-T/techwatch/Pages/reports.aspx)

 Griffin, P. (2012). Protecting Biometrics Using Signcryption
  (http://phillipgriffin.com/innovation.htm#ID360)

 Griffin, P. (2013). Telebiometric Information Security and Safety Management. ITU
  Kaleidoscope ’13 (http://phillipgriffin.com/innovation.htm#ITU)

 RSA Laboratories Public Key Cryptography Systems (PKCS) #7 – Cryptographic
  Message Syntax (CMS) (http://www.rsa.com/rsalabs/node.asp?id=2129)

 ISO/IEC 29150 (2011), Signcryption.
  (See http://phillipgriffin.com/innovation.htm#29150 for proposed schema corrections)

 X9.84-2011 Biometric Information Management and Security. U.S.A.: American National
    Standards Institute (ANSI).


                                                                        GRIFFIN – APRIL 2013
                                            13
ITU KALEIDOSCOPE 2013                                         Questions ?




         phil@phillipgriffin.com   +1 919 291 0019   Skype: phil.griffin



                                                               GRIFFIN – APRIL 2013
                  14

More Related Content

What's hot

Widyatama Lecture Applied Networking IV Week06 Mobile Security 2
Widyatama Lecture Applied Networking IV Week06 Mobile Security 2Widyatama Lecture Applied Networking IV Week06 Mobile Security 2
Widyatama Lecture Applied Networking IV Week06 Mobile Security 2Djadja Sardjana
 
Security Models in Cellular Wireless Networks
Security Models in Cellular Wireless NetworksSecurity Models in Cellular Wireless Networks
Security Models in Cellular Wireless NetworksWilliam Chipman
 
1 s2.0-s014036641000085 x-main
1 s2.0-s014036641000085 x-main1 s2.0-s014036641000085 x-main
1 s2.0-s014036641000085 x-maindsfsadfas
 
DEPLOYMENT OF INTRUSION PREVENTION SYSTEM ON MULTI-CORE PROCESSOR BASED SECUR...
DEPLOYMENT OF INTRUSION PREVENTION SYSTEM ON MULTI-CORE PROCESSOR BASED SECUR...DEPLOYMENT OF INTRUSION PREVENTION SYSTEM ON MULTI-CORE PROCESSOR BASED SECUR...
DEPLOYMENT OF INTRUSION PREVENTION SYSTEM ON MULTI-CORE PROCESSOR BASED SECUR...IJCNCJournal
 
Video Steganography using Discrete Wavelet Transform and Artificial Intelligence
Video Steganography using Discrete Wavelet Transform and Artificial IntelligenceVideo Steganography using Discrete Wavelet Transform and Artificial Intelligence
Video Steganography using Discrete Wavelet Transform and Artificial Intelligenceijtsrd
 
3g security analysis
3g security analysis3g security analysis
3g security analysisashrawi92
 
Ds nsa series_us_10_april10
Ds nsa series_us_10_april10Ds nsa series_us_10_april10
Ds nsa series_us_10_april10Yustinus Malawau
 
Internet of Things IoT Security Perspective
Internet of Things IoT Security PerspectiveInternet of Things IoT Security Perspective
Internet of Things IoT Security Perspectiveijtsrd
 
Certain Investigations on Security Issues in Smart Grid over Wireless Communi...
Certain Investigations on Security Issues in Smart Grid over Wireless Communi...Certain Investigations on Security Issues in Smart Grid over Wireless Communi...
Certain Investigations on Security Issues in Smart Grid over Wireless Communi...IJTET Journal
 
Acknowledge 09 Useraspecten En Evaluatie Ilse MariëN Ibbt Smit Vub
Acknowledge 09 Useraspecten En Evaluatie Ilse MariëN   Ibbt Smit VubAcknowledge 09 Useraspecten En Evaluatie Ilse MariëN   Ibbt Smit Vub
Acknowledge 09 Useraspecten En Evaluatie Ilse MariëN Ibbt Smit Vubimec.archive
 
Qo E E2 E6 Slotevent Programma
Qo E E2 E6 Slotevent ProgrammaQo E E2 E6 Slotevent Programma
Qo E E2 E6 Slotevent Programmaimec.archive
 
EWSN'15 Industry Session - Francesco Flammini (Ansaldo STS)
EWSN'15 Industry Session - Francesco Flammini (Ansaldo STS)EWSN'15 Industry Session - Francesco Flammini (Ansaldo STS)
EWSN'15 Industry Session - Francesco Flammini (Ansaldo STS)Francesco Flammini
 
Sip Intrusion Detection And Prevention Recommendations And Prototype Impleme...
Sip Intrusion Detection And Prevention  Recommendations And Prototype Impleme...Sip Intrusion Detection And Prevention  Recommendations And Prototype Impleme...
Sip Intrusion Detection And Prevention Recommendations And Prototype Impleme...guestbda3307
 
Development of web-based surveillance system for Internet of Things (IoT) app...
Development of web-based surveillance system for Internet of Things (IoT) app...Development of web-based surveillance system for Internet of Things (IoT) app...
Development of web-based surveillance system for Internet of Things (IoT) app...journalBEEI
 
Tech trendnotes
Tech trendnotesTech trendnotes
Tech trendnotesStudying
 
Context-Aware Intrusion Detection and Tolerance in MANETs
Context-Aware Intrusion Detection and Tolerance in MANETsContext-Aware Intrusion Detection and Tolerance in MANETs
Context-Aware Intrusion Detection and Tolerance in MANETsIDES Editor
 

What's hot (19)

169
169169
169
 
Download
DownloadDownload
Download
 
Widyatama Lecture Applied Networking IV Week06 Mobile Security 2
Widyatama Lecture Applied Networking IV Week06 Mobile Security 2Widyatama Lecture Applied Networking IV Week06 Mobile Security 2
Widyatama Lecture Applied Networking IV Week06 Mobile Security 2
 
Security Models in Cellular Wireless Networks
Security Models in Cellular Wireless NetworksSecurity Models in Cellular Wireless Networks
Security Models in Cellular Wireless Networks
 
1 s2.0-s014036641000085 x-main
1 s2.0-s014036641000085 x-main1 s2.0-s014036641000085 x-main
1 s2.0-s014036641000085 x-main
 
DEPLOYMENT OF INTRUSION PREVENTION SYSTEM ON MULTI-CORE PROCESSOR BASED SECUR...
DEPLOYMENT OF INTRUSION PREVENTION SYSTEM ON MULTI-CORE PROCESSOR BASED SECUR...DEPLOYMENT OF INTRUSION PREVENTION SYSTEM ON MULTI-CORE PROCESSOR BASED SECUR...
DEPLOYMENT OF INTRUSION PREVENTION SYSTEM ON MULTI-CORE PROCESSOR BASED SECUR...
 
Video Steganography using Discrete Wavelet Transform and Artificial Intelligence
Video Steganography using Discrete Wavelet Transform and Artificial IntelligenceVideo Steganography using Discrete Wavelet Transform and Artificial Intelligence
Video Steganography using Discrete Wavelet Transform and Artificial Intelligence
 
3g security analysis
3g security analysis3g security analysis
3g security analysis
 
Ds nsa series_us_10_april10
Ds nsa series_us_10_april10Ds nsa series_us_10_april10
Ds nsa series_us_10_april10
 
Internet of Things IoT Security Perspective
Internet of Things IoT Security PerspectiveInternet of Things IoT Security Perspective
Internet of Things IoT Security Perspective
 
Certain Investigations on Security Issues in Smart Grid over Wireless Communi...
Certain Investigations on Security Issues in Smart Grid over Wireless Communi...Certain Investigations on Security Issues in Smart Grid over Wireless Communi...
Certain Investigations on Security Issues in Smart Grid over Wireless Communi...
 
Acknowledge 09 Useraspecten En Evaluatie Ilse MariëN Ibbt Smit Vub
Acknowledge 09 Useraspecten En Evaluatie Ilse MariëN   Ibbt Smit VubAcknowledge 09 Useraspecten En Evaluatie Ilse MariëN   Ibbt Smit Vub
Acknowledge 09 Useraspecten En Evaluatie Ilse MariëN Ibbt Smit Vub
 
Qo E E2 E6 Slotevent Programma
Qo E E2 E6 Slotevent ProgrammaQo E E2 E6 Slotevent Programma
Qo E E2 E6 Slotevent Programma
 
EWSN'15 Industry Session - Francesco Flammini (Ansaldo STS)
EWSN'15 Industry Session - Francesco Flammini (Ansaldo STS)EWSN'15 Industry Session - Francesco Flammini (Ansaldo STS)
EWSN'15 Industry Session - Francesco Flammini (Ansaldo STS)
 
Sip Intrusion Detection And Prevention Recommendations And Prototype Impleme...
Sip Intrusion Detection And Prevention  Recommendations And Prototype Impleme...Sip Intrusion Detection And Prevention  Recommendations And Prototype Impleme...
Sip Intrusion Detection And Prevention Recommendations And Prototype Impleme...
 
Development of web-based surveillance system for Internet of Things (IoT) app...
Development of web-based surveillance system for Internet of Things (IoT) app...Development of web-based surveillance system for Internet of Things (IoT) app...
Development of web-based surveillance system for Internet of Things (IoT) app...
 
Tech trendnotes
Tech trendnotesTech trendnotes
Tech trendnotes
 
SS7: 2G/3G's weakest link
SS7: 2G/3G's weakest linkSS7: 2G/3G's weakest link
SS7: 2G/3G's weakest link
 
Context-Aware Intrusion Detection and Tolerance in MANETs
Context-Aware Intrusion Detection and Tolerance in MANETsContext-Aware Intrusion Detection and Tolerance in MANETs
Context-Aware Intrusion Detection and Tolerance in MANETs
 

Similar to ITU Kaleidoscope 2013 Presentation on Telebiometric Security Standards

Final_year_project_documentation
Final_year_project_documentationFinal_year_project_documentation
Final_year_project_documentationUshnish Chowdhury
 
Critical Infrastructure Assessment Techniques to Prevent Threats and Vulnerab...
Critical Infrastructure Assessment Techniques to Prevent Threats and Vulnerab...Critical Infrastructure Assessment Techniques to Prevent Threats and Vulnerab...
Critical Infrastructure Assessment Techniques to Prevent Threats and Vulnerab...Shakeel Ali
 
Encrypting an audio file based on integer wavelet transform and hand geometry
Encrypting an audio file based on integer wavelet transform and hand geometryEncrypting an audio file based on integer wavelet transform and hand geometry
Encrypting an audio file based on integer wavelet transform and hand geometryTELKOMNIKA JOURNAL
 
ITU-T Perspectives on the Standards-Based Security Landscape (SG 17 Main Focus)
ITU-T Perspectives on the Standards-Based Security Landscape  (SG 17 Main Focus)ITU-T Perspectives on the Standards-Based Security Landscape  (SG 17 Main Focus)
ITU-T Perspectives on the Standards-Based Security Landscape (SG 17 Main Focus)Abbie Barbir
 
Multilayer security mechanism in computer networks (2)
Multilayer security mechanism in computer networks (2)Multilayer security mechanism in computer networks (2)
Multilayer security mechanism in computer networks (2)Alexander Decker
 
SECURITY V/S QOS FOR LTE AUTHENTICATION AND KEY AGREEMENT PROTOCOL
SECURITY V/S QOS FOR LTE AUTHENTICATION AND KEY AGREEMENT PROTOCOLSECURITY V/S QOS FOR LTE AUTHENTICATION AND KEY AGREEMENT PROTOCOL
SECURITY V/S QOS FOR LTE AUTHENTICATION AND KEY AGREEMENT PROTOCOLIJNSA Journal
 
Multilayer security mechanism in computer networks
Multilayer security mechanism in computer networksMultilayer security mechanism in computer networks
Multilayer security mechanism in computer networksAlexander Decker
 
11.multilayer security mechanism in computer networks
11.multilayer security mechanism in computer networks11.multilayer security mechanism in computer networks
11.multilayer security mechanism in computer networksAlexander Decker
 
Achieving Data Dissemination with Security using FIWARE and Intel Software Gu...
Achieving Data Dissemination with Security using FIWARE and Intel Software Gu...Achieving Data Dissemination with Security using FIWARE and Intel Software Gu...
Achieving Data Dissemination with Security using FIWARE and Intel Software Gu...Dalton Valadares
 
Safe and secure autonomous systems
Safe and secure autonomous systemsSafe and secure autonomous systems
Safe and secure autonomous systemsAlan Tatourian
 
9726 dsi-protocol-stacks-ds new
9726 dsi-protocol-stacks-ds new9726 dsi-protocol-stacks-ds new
9726 dsi-protocol-stacks-ds newmm nn
 
Diameter Penetration Test Lab
Diameter Penetration Test LabDiameter Penetration Test Lab
Diameter Penetration Test Labfrcarlson
 
Lte security concepts and design considerations
Lte security concepts and design considerationsLte security concepts and design considerations
Lte security concepts and design considerationsMary McEvoy Carroll
 
Removing Security Roadblocks to IoT Deployment Success
Removing Security Roadblocks to IoT Deployment SuccessRemoving Security Roadblocks to IoT Deployment Success
Removing Security Roadblocks to IoT Deployment SuccessMicrosoft Tech Community
 
COMPREHENSIVE SURVEY OF POSSIBLE SECURITY ISSUES ON 4G NETWORKS
COMPREHENSIVE SURVEY OF POSSIBLE SECURITY ISSUES ON 4G NETWORKSCOMPREHENSIVE SURVEY OF POSSIBLE SECURITY ISSUES ON 4G NETWORKS
COMPREHENSIVE SURVEY OF POSSIBLE SECURITY ISSUES ON 4G NETWORKSIJNSA Journal
 
A Review Study on Secure Authentication in Mobile System
A Review Study on Secure Authentication in Mobile SystemA Review Study on Secure Authentication in Mobile System
A Review Study on Secure Authentication in Mobile SystemEditor IJCATR
 
NIST CSD Cybersecurity Publications 20160417
NIST CSD Cybersecurity Publications 20160417NIST CSD Cybersecurity Publications 20160417
NIST CSD Cybersecurity Publications 20160417James W. De Rienzo
 
A Robust finger Print Authentication Scheme viaBlockchain to retrieve Citizen...
A Robust finger Print Authentication Scheme viaBlockchain to retrieve Citizen...A Robust finger Print Authentication Scheme viaBlockchain to retrieve Citizen...
A Robust finger Print Authentication Scheme viaBlockchain to retrieve Citizen...IRJET Journal
 

Similar to ITU Kaleidoscope 2013 Presentation on Telebiometric Security Standards (20)

Final_year_project_documentation
Final_year_project_documentationFinal_year_project_documentation
Final_year_project_documentation
 
Critical Infrastructure Assessment Techniques to Prevent Threats and Vulnerab...
Critical Infrastructure Assessment Techniques to Prevent Threats and Vulnerab...Critical Infrastructure Assessment Techniques to Prevent Threats and Vulnerab...
Critical Infrastructure Assessment Techniques to Prevent Threats and Vulnerab...
 
Encrypting an audio file based on integer wavelet transform and hand geometry
Encrypting an audio file based on integer wavelet transform and hand geometryEncrypting an audio file based on integer wavelet transform and hand geometry
Encrypting an audio file based on integer wavelet transform and hand geometry
 
ITU-T Perspectives on the Standards-Based Security Landscape (SG 17 Main Focus)
ITU-T Perspectives on the Standards-Based Security Landscape  (SG 17 Main Focus)ITU-T Perspectives on the Standards-Based Security Landscape  (SG 17 Main Focus)
ITU-T Perspectives on the Standards-Based Security Landscape (SG 17 Main Focus)
 
Multilayer security mechanism in computer networks (2)
Multilayer security mechanism in computer networks (2)Multilayer security mechanism in computer networks (2)
Multilayer security mechanism in computer networks (2)
 
SECURITY V/S QOS FOR LTE AUTHENTICATION AND KEY AGREEMENT PROTOCOL
SECURITY V/S QOS FOR LTE AUTHENTICATION AND KEY AGREEMENT PROTOCOLSECURITY V/S QOS FOR LTE AUTHENTICATION AND KEY AGREEMENT PROTOCOL
SECURITY V/S QOS FOR LTE AUTHENTICATION AND KEY AGREEMENT PROTOCOL
 
Multilayer security mechanism in computer networks
Multilayer security mechanism in computer networksMultilayer security mechanism in computer networks
Multilayer security mechanism in computer networks
 
11.multilayer security mechanism in computer networks
11.multilayer security mechanism in computer networks11.multilayer security mechanism in computer networks
11.multilayer security mechanism in computer networks
 
V01 i010410
V01 i010410V01 i010410
V01 i010410
 
Achieving Data Dissemination with Security using FIWARE and Intel Software Gu...
Achieving Data Dissemination with Security using FIWARE and Intel Software Gu...Achieving Data Dissemination with Security using FIWARE and Intel Software Gu...
Achieving Data Dissemination with Security using FIWARE and Intel Software Gu...
 
Safe and secure autonomous systems
Safe and secure autonomous systemsSafe and secure autonomous systems
Safe and secure autonomous systems
 
9726 dsi-protocol-stacks-ds new
9726 dsi-protocol-stacks-ds new9726 dsi-protocol-stacks-ds new
9726 dsi-protocol-stacks-ds new
 
Diameter Penetration Test Lab
Diameter Penetration Test LabDiameter Penetration Test Lab
Diameter Penetration Test Lab
 
Lte security concepts and design considerations
Lte security concepts and design considerationsLte security concepts and design considerations
Lte security concepts and design considerations
 
Removing Security Roadblocks to IoT Deployment Success
Removing Security Roadblocks to IoT Deployment SuccessRemoving Security Roadblocks to IoT Deployment Success
Removing Security Roadblocks to IoT Deployment Success
 
COMPREHENSIVE SURVEY OF POSSIBLE SECURITY ISSUES ON 4G NETWORKS
COMPREHENSIVE SURVEY OF POSSIBLE SECURITY ISSUES ON 4G NETWORKSCOMPREHENSIVE SURVEY OF POSSIBLE SECURITY ISSUES ON 4G NETWORKS
COMPREHENSIVE SURVEY OF POSSIBLE SECURITY ISSUES ON 4G NETWORKS
 
A Review Study on Secure Authentication in Mobile System
A Review Study on Secure Authentication in Mobile SystemA Review Study on Secure Authentication in Mobile System
A Review Study on Secure Authentication in Mobile System
 
50120140502015
5012014050201550120140502015
50120140502015
 
NIST CSD Cybersecurity Publications 20160417
NIST CSD Cybersecurity Publications 20160417NIST CSD Cybersecurity Publications 20160417
NIST CSD Cybersecurity Publications 20160417
 
A Robust finger Print Authentication Scheme viaBlockchain to retrieve Citizen...
A Robust finger Print Authentication Scheme viaBlockchain to retrieve Citizen...A Robust finger Print Authentication Scheme viaBlockchain to retrieve Citizen...
A Robust finger Print Authentication Scheme viaBlockchain to retrieve Citizen...
 

More from Phil Griffin

ISSA Web Conference - Biometric Information Security Management
ISSA Web Conference - Biometric Information Security ManagementISSA Web Conference - Biometric Information Security Management
ISSA Web Conference - Biometric Information Security ManagementPhil Griffin
 
Proposed ISO/IEC 29150 ASN.1 Schema Corrections
Proposed ISO/IEC 29150 ASN.1 Schema CorrectionsProposed ISO/IEC 29150 ASN.1 Schema Corrections
Proposed ISO/IEC 29150 ASN.1 Schema CorrectionsPhil Griffin
 
Signcrypting information assets
Signcrypting information assetsSigncrypting information assets
Signcrypting information assetsPhil Griffin
 
Using signcryption to protect biometric information
Using signcryption to protect biometric information Using signcryption to protect biometric information
Using signcryption to protect biometric information Phil Griffin
 
Telebiometric information security and safety management
Telebiometric information security and safety managementTelebiometric information security and safety management
Telebiometric information security and safety managementPhil Griffin
 
Key Commitment Using CMS in ECMQV Key Agreement
Key Commitment Using CMS in ECMQV Key AgreementKey Commitment Using CMS in ECMQV Key Agreement
Key Commitment Using CMS in ECMQV Key AgreementPhil Griffin
 

More from Phil Griffin (6)

ISSA Web Conference - Biometric Information Security Management
ISSA Web Conference - Biometric Information Security ManagementISSA Web Conference - Biometric Information Security Management
ISSA Web Conference - Biometric Information Security Management
 
Proposed ISO/IEC 29150 ASN.1 Schema Corrections
Proposed ISO/IEC 29150 ASN.1 Schema CorrectionsProposed ISO/IEC 29150 ASN.1 Schema Corrections
Proposed ISO/IEC 29150 ASN.1 Schema Corrections
 
Signcrypting information assets
Signcrypting information assetsSigncrypting information assets
Signcrypting information assets
 
Using signcryption to protect biometric information
Using signcryption to protect biometric information Using signcryption to protect biometric information
Using signcryption to protect biometric information
 
Telebiometric information security and safety management
Telebiometric information security and safety managementTelebiometric information security and safety management
Telebiometric information security and safety management
 
Key Commitment Using CMS in ECMQV Key Agreement
Key Commitment Using CMS in ECMQV Key AgreementKey Commitment Using CMS in ECMQV Key Agreement
Key Commitment Using CMS in ECMQV Key Agreement
 

Recently uploaded

Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfRankYa
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
Training state-of-the-art general text embedding
Training state-of-the-art general text embeddingTraining state-of-the-art general text embedding
Training state-of-the-art general text embeddingZilliz
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
Vector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector DatabasesVector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector DatabasesZilliz
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 

Recently uploaded (20)

E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdf
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
Training state-of-the-art general text embedding
Training state-of-the-art general text embeddingTraining state-of-the-art general text embedding
Training state-of-the-art general text embedding
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
Vector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector DatabasesVector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector Databases
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 

ITU Kaleidoscope 2013 Presentation on Telebiometric Security Standards

  • 1. ITU KALEIDOSCOPE 2013 RALEIGH ISSA CHAPTER MEETING THURSDAY, APRIL 4, 2013 ITU Kaleidoscope 2013 Presentation Telebiometric Information Security and Safety Management Phillip H. Griffin Information Security Consulting October 18, 2012 GRIFFIN – APRIL 2013
  • 2. ITU KALEIDOSCOPE 2013 What is the ITU ? ITU is the International Telecommunication Union — United Nations specialized agency for information and communications technology (ICT) — Membership includes 193 countries and over 700 private-sector entities and academic institutions — Allocates global radio spectrum and satellite orbits; develops technical standards to ensure seamless interconnection of networks and technologies (telephones, video, TV, etc.) — Consensus efforts to support fundamental right to communicate — Empowers people through technology education and training GRIFFIN – APRIL 2013 2
  • 3. ITU KALEIDOSCOPE 2013 Building Sustainable Communities Assess standardization required so that cities can enhance their social, economic, and environmental sustainability by using Information & Communications Technology Sustainable communities will combine human-oriented technologies and human values Biometrics, Telecommunications Human-oriented technologies Security, Privacy, Safety Human values Rubric — Suggest Areas For New Standardization GRIFFIN – APRIL 2013 3
  • 4. ITU KALEIDOSCOPE 2013 New Standardization Telebiometric System Heartbeat Provides metrics to enable the continuous improvement of an information security and safety management program for telebiometric system devices Cryptographic Message Syntax (CMS)  Need a version that complies with the ASN.1 standards  Permits all binary encoding rules and XML Encoding Rules (XER)  Supports ISO/IEC JTC 1/SC 27 algorithms, cryptographic techniques Signcryption Support in CMS Defines the schema and processing for a SigncryptedData type needed to support the techniques in the ISO/IEC 29150 Signcryption standard GRIFFIN – APRIL 2013 4
  • 5. ITU KALEIDOSCOPE 2013 Telebiometric System Heartbeat Periodic messages … Should monitor and document the safety, performance, and availability of telebiometric system devices Provide information to alert system administrators of security and safety events and system changes (e.g., FAR/FMR settings, device location, aberrant behavior, etc.) Source of derived metrics to inform the continuous improvement of a telebiometric system information security and safety management program GRIFFIN – APRIL 2013 5
  • 6. ITU KALEIDOSCOPE 2013 Cryptographic Message Syntax CMS is “a general syntax for data that may have cryptography applied to it, such as digital signatures and digital envelopes” - RSA Laboratories — Defined by RSA Security in the early 1990s — PKCS #7 (Public Key Cryptography Standard 7) — Replaced the Privacy Enhanced Mail (PEM) standard — Solved the X.509 certificate distribution problem — Initial root was RSA until VeriSign spawned (RSA, IBM, etc.) — Adopted by IETF to support secure email; SET; X9.73, others — No valid international version of the CMS standard exists! CMS provides a standardized schema with a well defined “hole”. GRIFFIN – APRIL 2013 6
  • 7. ITU KALEIDOSCOPE 2013 CMS Message Example Schema is in ISO/IEC & ITU standard, Abstract Syntax Notation One (ASN.1) ASN.1 is used in billions of phones ! 6.8 B cell phone subscriptions, 2013 Compact binary or XML markup Zero+ Certificates and CRLs Unsigned attribute content needs no protection (e.g., SAML assertion) GRIFFIN – APRIL 2013 7
  • 8. ITU KALEIDOSCOPE 2013 CMS In Biometric Standards CMS SignedData is used to provide data integrity and origin authenticity in each of the following standards: X9.84 Biometric Information Management and Security ISO 19092 Biometrics – Security Framework DoD & FBI Electronic Biometric Transmission Specification (EBTS) DHS Biometric Enabled Watch Lists (BEWL) ICAO Doc 9303 Machine Readable Passports ANSI / NIST-ITL 1-2011 Biometric Data Format & Interchange Standard OASIS XML Common Biometric Format (XCBF) ISO/IEC 24761 Authentication Context for Biometrics (ACBio) GRIFFIN – APRIL 2013 8
  • 9. ITU KALEIDOSCOPE 2013 Biometric System Vulnerabilities Support policy-based information security management using real- CMS (6, 7), and time device FAR/FMR settings? ACBio transfer? 1 - Attack on a biometric sensor with dummies: reproduced biometric trait presented as input 2 - Replay attack. Recorded, intercepted signal is replayed to bypass the biometric sensor 3 - Attack on feature extractor: produces altered values to those read by the biometric sensor 4 - Tampered feature representation (features are replaced with a fraudulent feature set) 5 - Attack on the matcher, forcing it to produce high or low matching score to allow or deny access 6 - Attack on biometric templates in a local, remote, or distributed database to add, modify, delete 7 - Tampered biometric reference template. See 4. 8 - Attack on the final matching decision end point : attacker disables the authentication system GRIFFIN – APRIL 2013 9
  • 10. ITU KALEIDOSCOPE 2013 CMS Signcryption Support New CMS type proposed: ID360: Global Forum on Identity Schema similar to SignedData One mode supports field-level signcryption within signed object Attributes: Defined by any group with a need using any type or format Manifest defined for each content type, e.g., a list of XPath expressions in an XML document GRIFFIN – APRIL 2013 10
  • 11. ITU KALEIDOSCOPE 2013 Signcryption Primitive Support Signcryption combines encryption and digital signature functions into a single, efficient cryptographic operation. — A cryptographic technique and a primitive — ISO/IEC 29150:2011Signcryption standard — Hybrid : Combines digital signature with encryption (hybrid like MAC + Encryption in SSL, SSH, ESP mode of IPsec) — Confidentiality + Data Integrity + Origin Authenticity — Asymmetric cryptography makes non-repudiation possible — Faster, smaller result than signature-followed-by-encryption — No standardized signcryption CMS type exists! GRIFFIN – APRIL 2013 11
  • 12. ITU KALEIDOSCOPE 2013 Summary New standards are needed: Telebiometric System Heartbeat Need a standardized, extensible, CMS protected message to enable development of vendor neutral telebiometric incident handling and information security and safety management solutions Cryptographic Message Syntax (CMS) Need an international standard that complies with the ASN.1 standards, that supports all encoding rules, and permits use of SC 27 cryptography CMS Signcryption Support Need a new CMS SigncryptedData message type that supports the use of efficient ISO/IEC 29150 Signcryption techniques in CMS GRIFFIN – APRIL 2013 12
  • 13. ITU KALEIDOSCOPE 2013 Deeper Dive Building Sustainable Communities – ITU Kaleidoscope conference, Kyoto, Japan, 22-25 April, 2013. (http://itu.int/en/ITU-T/academia/kaleidoscope/2013/Pages/default.aspx) ITU-T Technology Watch Report 12: Biometrics and Standards. December, 2009. (http://www.itu.int/en/ITU-T/techwatch/Pages/reports.aspx) Griffin, P. (2012). Protecting Biometrics Using Signcryption (http://phillipgriffin.com/innovation.htm#ID360) Griffin, P. (2013). Telebiometric Information Security and Safety Management. ITU Kaleidoscope ’13 (http://phillipgriffin.com/innovation.htm#ITU) RSA Laboratories Public Key Cryptography Systems (PKCS) #7 – Cryptographic Message Syntax (CMS) (http://www.rsa.com/rsalabs/node.asp?id=2129) ISO/IEC 29150 (2011), Signcryption. (See http://phillipgriffin.com/innovation.htm#29150 for proposed schema corrections) X9.84-2011 Biometric Information Management and Security. U.S.A.: American National Standards Institute (ANSI). GRIFFIN – APRIL 2013 13
  • 14. ITU KALEIDOSCOPE 2013 Questions ? phil@phillipgriffin.com +1 919 291 0019 Skype: phil.griffin GRIFFIN – APRIL 2013 14