+ All Categories
Home > Documents > Trusted Optical Cards - NIST

Trusted Optical Cards - NIST

Date post: 08-Jan-2022
Category:
Upload: others
View: 4 times
Download: 0 times
Share this document with a friend
16
BSI2000, Inc. Trusted Optical Cards Workshop on Storage and Processor Card-Based Technologies National Institute of Standards and Technology (NIST) Gaithersburg, Maryland Wednesday, July 9, 2002 By Jack Harper, BSI2000, Inc. 12600 West Colfax Avenue, Suite B.410 Lakewood, Colorado 80215 USA 303.231.9095 303.231.9002 (fax) www.bsi2000.com [email protected]
Transcript
Page 1: Trusted Optical Cards - NIST

BSI2000, Inc.

Trusted Optical CardsWorkshop on Storage and Processor Card-Based Technologies

National Institute of Standards and Technology (NIST) Gaithersburg, MarylandWednesday, July 9, 2002

By Jack Harper, BSI2000, Inc.12600 West Colfax Avenue, Suite B.410 Lakewood, Colorado 80215 USA

303.231.9095 303.231.9002 (fax)www.bsi2000.com

[email protected]

Page 2: Trusted Optical Cards - NIST

What are Optical Cards?…

> Card that you carry in your

Wallet or Purse

> Same Size and Shape as Credit Card

> Holds Four Megabytes of Digital Data –that’s 1,500 Typewritten Pages

> ~20-Million in Use in N.A. by 2004.

2

Page 3: Trusted Optical Cards - NIST

Border Projects Today.

4 USA/INS – Green Card (PRC)

4 USA/INS – Border Crossing

4 Italian National ID Card

4 Canadian PRC – Maple Leaf

4 Saudi Arabian National ID

3

Page 4: Trusted Optical Cards - NIST

Why Optical Cards?

4 ~1000x the Memory of Smart Card

4 Permanent Memory – No Problems with Static

4 Highly Reliable – 10 Yr Life in Harsh Env.

4 Strong Identification – Multiple Biometrics

4 Off-Line Capability -- Works ANYWHERE

4 Complete Audit Trail on Card – 1000s of Transactions

4

Page 5: Trusted Optical Cards - NIST

Border Control System

4 Card Production Systems – Information Spectrum, Inc.

4 Integrated Card Terminals – BSI2000, Inc.

4 Hand Held Readers – LaserCard Systems Corp.

5

Page 6: Trusted Optical Cards - NIST

Data Security – Optical Cards

6

4 Where Do you Keep the Secret Key????

4 Past Solutions – Keep it in the Software…

4 Past Solutions -- …in the Microcode…

4 Past Solutions -- …Use a Home-Grown Keyless Crypto…

4 ..Obfuscate the Key…

All are BAD!

Page 7: Trusted Optical Cards - NIST

New Approach Needed!

7

4 Cryptographically Secure!

4 Credibly Secure!

4 Tough Nut (Keys!) Certified to FIPS 140-1 (1, 2, 3).

4 Enable Standard Public Key Crypto.

4 Resistant to Rubber Hose Cryptanalysis.

4 Prevent Cloned Cards, Records, Fraud, etc…..

4 Affordable!

Page 8: Trusted Optical Cards - NIST

Secure Optical Card Protocol -SOCP

8

4 Combination of…

4 …Standard Optical Card Terminal Device

4 …Special Crypto Hardware (Upgrade)

4 …Standard Crypto Software

4 …the SOCP Crypto Protocol.

Page 9: Trusted Optical Cards - NIST

Crypto 2000™

9

4 Secure Key Repository

4 Secure Key Management

4 Cryptographically Secure RNG

4 Simple Plug-In Module

Page 10: Trusted Optical Cards - NIST

Tamper Resistance

10

4 In-Box Tamper Sensor

4 On-Chip Tamper Sensor

4 Temperature Attack Sensor

4 …Attack Causes Zeroization of Battery Backed Up SRAM.

Page 11: Trusted Optical Cards - NIST

Secure Optical Cards

11

4 …any Number of Terminals

4 …any Number of Cards…

4 Record written to Card may only be Read by a Terminal in the Network.

Page 12: Trusted Optical Cards - NIST

Crypto Write Sequence

12

C2KSN, r, k ß Crypto 2000.

C2KSN, EC2K( r, r? ( DTS, CSN ), k ) à Optical Card.

EC2K( H( m )) à Optical Card.

Crypto 2000 à c0à Optical Card.

ci = Ek(mi? ci-1) (for i = 1, 2, …) à Optical Card.

Therefore, the complete secure record for the plaintext m is written to the optical card as:

C2KSN, EC2K( r, r? ( DTS, CSN ), k ), EC2K( H( m )), c0, Ek(mi? ci-1) (for i = 1, 2, …)

Page 13: Trusted Optical Cards - NIST

Crypto Read Sequence

13

The complete secure record read sequence to recover the plaintext m is:

C2KSN, EC2KSN( r, r? ( DTS, CSN ), k) ß Optical Card.

C2KSN, EC2KSN( r, r? ( DTS, CSN ), k) à Crypto 2000.

r, r? ( DTS, CSN ), k ß Crypto 2000.

DTS, CSN = r? ( r? ( DTS, CSN ))

EC2KSN( H( m )) ß Optical Card.

C2KSN, EC2KSN( H( m )) à Crypto 2000.

H( m ) ß Crypto 2000.

c0ß Optical Card.

ci = mi = ci-1? Dk( Ek( mi )) (for i = 1, 2, …) ß Optical Card.

H( m ) == H?( m )? (Signature OK?).

See “Cryptographically Secure Transactions with Optical Cards”

http://www.bsi2000.com/downloads.htm

Page 14: Trusted Optical Cards - NIST

Trust Model…

13

Crypto 2000 provides Data Security…

…which is NOT Trust.

Trust: “Firm reliance on the integrity, ability, or character of a person or thing.” – Random House College Dictionary.

Page 15: Trusted Optical Cards - NIST

Trust Model…

14

Top ofHierarchy

Level 2 Level 2 Level 2 Level 2

Level n

Cardholder

C2KSN1, EC2K(CSN1) -> Card2

Card2

C2KSN1, EC2K(CSN1) -> Cardn

……….

C2KSN2, EC2K(CSN2) -> Cardn

CARD

CARD is Trusted for this Specific Operation if the CSNk’s can be Recovered through the Entire Chain.

Each Component of the Trust Chain Record was Written on the Specific Machines (specific Crypto 2000s).

Cardn

Page 16: Trusted Optical Cards - NIST

15

www.bsi2000.com

[email protected]


Recommended