PKI/PKD Requirements, Challenges & Opportunities

Similar documents
Innovation in the identity domain: is ICAO s TRIP prepared for innovations?

Pan-Canadian Trust Framework Overview

The number theory behind cryptography

Legal Aspects of Identity Management and Trust Services

GENERAL DESCRIPTION OF THE CMC SERVICES

The Nagoya Protocol: Compliance. Implications of the E.U. law for Microbiologists

(Non-legislative acts) DECISIONS

ICAO. ICAO Council JTC1 ISO/IEC. Air Transport Committee SC17 TAG/MRTD WG3 ICBWG NTWG DOC ISO National Bodies.

Application for Assessment of a full quality assurance system regarding Measuring Instruments in accordance with MID

TEXTILE TESTING AND CERTIFICATION WORLDWIDE WITH SWISS RELIABILITY

How to Complete a PCR

Questions You Should Ask the Interviewer. Job Interview Tools, LLC, Non-distributable Content

Privacy Policy SOP-031

The circulation of judicial agency in Europe:

AGREEMENT on UnifiedPrinciples and Rules of Technical Regulation in the Republic of Belarus, Republic of Kazakhstan and the Russian Federation

[Investment Company Act Release No ; ] New Mountain Finance Corporation, et al.; Notice of Application

1 What is Standardization? 2 What is a standard? 3 The Spanish Association for Standardization, UNE

Type Approval JANUARY The electronic pdf version of this document found through is the officially binding version

Prof. Dr. Peter Wiedemann Karlsruhe Institute of Technology Germany

VITAL STATISTICS REGISTRATION ACT. Chapter 1 GENERAL PROVISIONS

IMPLEMENTING HSPD-12: A PROGRAM MANAGER S PERSPECTIVE

Vital Statistics Registration Act

Third Party Certification Agents

CAMD Transition Sub Group FAQ IVDR Transitional provisions

GSM R Notes on certification

Global Standards Symposium. Security, privacy and trust in standardisation. ICDPPC Chair John Edwards. 24 October 2016

Merkle s Puzzles. c Eli Biham - May 3, Merkle s Puzzles (8)

COMMISSION RECOMMENDATION. of on access to and preservation of scientific information. {SWD(2012) 221 final} {SWD(2012) 222 final}

Operational Research Consultants, Inc. (ORC) Access Certificates For Electronic Services (ACES) Certificate Practice Statement Summary. Version 3.

Technology: Lighting Units

Application pack Level 3 Certificate in Housing Practice blended learning open access

Enabling Trust in e-business: Research in Enterprise Privacy Technologies

DNVGL-CP-0338 Edition October 2015

By-Product Fish Fishery Assessment Interpretation Document

Decentralized Protocol for Self-Sovereign Identities with Embedded Compliance

Position Paper.

Open Science for the 21 st century. A declaration of ALL European Academies

The new GDPR legislative changes & solutions for online marketing

Software Testing. What is it?

Public Key Encryption

Secure identity and electronic signatures essential for digital trust

Do You Want To Be Your Own Boss?

A comprehensive guide to digital badges.

GIE response to public consultation Interoperability NC of ENTSOG

Our position. ICDPPC declaration on ethics and data protection in artificial intelligence

Missouri FY 10 Interoperable Grant Guideline Definition and Examples of Eligible Procurement

Royal Pavilion & Museums DRAFT Digital Preservation Policy 2018

Human Factors Points to Consider for IDE Devices

CHESS CLEARING HOUSE ELECTRONIC SUBREGISTER SYSTEM

Standards and Quality In Research Laboratories. By Geoff Visser SABS Research Fellow And Prof Roy Ramphal - UNISA

Moline Illinois CODE OF ORDINANCES. Art. IX. Miscellaneous DIVISION 3. IN-BUILDING EMERGENCY RADIO SYSTEM COVERAGE

PRODUCT INFORMATION FORM (PIF TM )

RECOMMENDATIONS. COMMISSION RECOMMENDATION (EU) 2018/790 of 25 April 2018 on access to and preservation of scientific information

Knights, Spies, Games and Social Networks

INTRODUCTION TO THE RESULTS OF THE IMO PUBLIC CONSULTATION ON ADMINISTRATIVE REQUIREMENTS IN MARITIME REGULATIONS

TERENA 2nd NREN-Grids Workshop

Assemblies according to the Pressure Equipment Directive - a consideration provided by the PED-AdCo Group 1 -

Quality Classification Scheme for esignature (elements)

Medical Devices cyber risks and threats

Digital Identity Innovation Canada s Opportunity to Lead the World. Digital ID and Authentication Council of Canada Pre-Budget Submission

ARTICLE 29 Data Protection Working Party

e-submission Quick Reference Guide for Economic Operators

COMMISSION OF THE EUROPEAN COMMUNITIES 98/0191 (COD) Proposal for a EUROPEAN PARLIAMENT AND COUNCIL DIRECTIVE

Overview of Information Barrier Concepts

End-to-End Privacy Accountability

GPG Keysigning. Matthew Walster, Fastly UKNOF34, 21 April 2016

FRESCO WHITEPAPER

The New Legislative Framework Revision of the NAWI-D and the MI-D

To extend a Tier 4 visa or make a PBS Dependants visa application in the UK you must begin the process online. This guide will show you how.

Standards and privacy engineering ISO, OASIS, PRIPARE and Other Important Developments

Project 25 Equipment Testing

Office of the Director of National Intelligence. Data Mining Report for Calendar Year 2013

Rapid Test Result: Negative HIV

Graph simple non-linear relations with and without the use of digital technologies and solve simple related equations.

As at: Draft Bill of the Federal Ministry for Economic Affairs and Energy. Fourth Law amending the Telecommunications Act

POSTDOC HUNTING FROM AN APPLICANT S PERSPECTIVE

Comments from CEN CENELEC on COM(2010) 245 of 19 May 2010 on "A Digital Agenda for Europe"

Purpose Week 2. Author: Chelsea Jacobs Project Supervisors Nick Diliberto and Rob Quinn Artwork: Kindred Canvas

Troublesome paper certificates and why the maritime industry must embrace e-certificates MARCH 2017

LIMITE EN COUNCIL OF THE EUROPEAN UNION. Brussels, 16 July /12 LIMITE SIRIS 64 COMIX 447

Evaluation of the Three-Year Grant Programme: Cross-Border European Market Surveillance Actions ( )

Permits and Certificates

SHARED TENANT SERVICE (STS) ARRANGEMENTS

Eidgenössisches Departement für Umwelt, Verkehr, Energie und Kommunikation UVEK. Bundesamt für Umwelt BAFU Abteilung Luftreinhaltung und Chemikalien

Public consultation for the evaluation of Directive 2006 /42/EC

Eastern Bank Challenges the Status Quo in Bank Lending by Implementing the DocuSign esignature API to Digitize Processes

ELEVATOR PITCH GUIDE. Office of Career Services North 103. Dr. M ary Rigali, PM P Director of Career Services

End User Awareness Towards GNSS Positioning Performance and Testing

Self-Scrambling Anonymizer. Overview

V I S O c o r e I n s p e c t

DNVGL-CG-0214 Edition September 2016

Mock Sides: Original Scripts for Workshop Actors HANDS IN PRAYER. Written by. David Dalton & Chad Schnackel

Math 319 Problem Set #7 Solution 18 April 2002

ITB TECHNICAL APPROVAL AT /2011

Latin-American non-state actor dialogue on Article 6 of the Paris Agreement

19 and 20 November 2018 RC-4/DG.4 15 November 2018 Original: ENGLISH NOTE BY THE DIRECTOR-GENERAL

Open Science in the Digital Single Market

The ALA and ARL Position on Access and Digital Preservation: A Response to the Section 108 Study Group

Sub: Guidelines to issue of BAI ID reg.

Economic and Social Council

Transcription:

Federal Department of Justice and Police Federal Office of Police, fedpol PKI/PKD Requirements, Challenges & Opportunities Arnaldo Cremisini Senior PKI Officer Federal Office of Police fedpol Switzerland ICAO PKD Workshop Montreal, 23 October 2017

Public Key Infrastructure destroying the myth As soon as we are confronted with PKI, we hear some possibly frightening words such as Cryptography, Key, Hash, Signature let us try to discover what they are and find a common jargon Cryptography is simply the art of hiding and un-hiding information ABC... hide $@#1... unhide ABC... This is achieved through some kind of mathematical process using objects called Keys Mathematicians tell us that there are couples of objects tied together (keys) which are able to hide and correctly uncover the information ABC... Key 1 $@#1... Key 2 ABC... If you keep Key 1 (PRIVATE) secret and well protected this means that all people knowing your Key 2 (PUBLIC) are able to uncover your protected information and at the same time, they know it comes from you and only from you! The PKI (Public Key Infrastructure) is the entity in charge of the definition, use and protection of the keys. 3

As soon as we talk about keys, secret publication etc. we understand that many things might be involved such as roles, people, organisation, policies, financial aspects, infrastructure etc. But PKI is all about mathematics and objects (keys), isn t it? well, not really The experience shows that keys and mathematics involves less then 5% of a PKI and more then 95% is about organisation, policies, roles, infrastructure etc. which in turn is about responsibility and management. Now the question that arises is: Are there any rules to identify the organisation in charge of and operating such a PKI? I m afraid I have to say NO. It depends on your country and organisation, who should be put in charge and how there is no recipe The Swiss case just as an example: The first organisation confronted with the issuance of emrtds was the Federal Office of Police and, at that time, the decision was taken for the sake of simplicity, that the same office should also be defined as responsible for the Swiss PKI. This was stated in the law so that also the legal conditions were met to allow the Federal Office of Police to create the Swiss edoc PKI. 4

The emrtd s issuer perspective After you have identified the organisation that will take care of your PKI, ICAO helps you with the Doc 9303 and allows you to identify the relevant aspects (technical and to some extent organisational). You then, have to consider to create and operate your PKI and further on, to issue your own emrtds and with the help of cryptography and your keys, you also make sure that the data stored onto them truly comes from your country. At an international level, ICAO defines such a PKI organisation as your national and unique CSCA (Country Signing Certification Authority) yes, it is a Certification Authority, because it certifies that the data stored in the documents - protected by its Private Key - are authentic. Now we have an organisation (PKI), a name for it (CSCA), the keys and we can issue authentic and secured emrtds But what about the verification of such an authentic emrtd? 5

The emrtd s world as seen by the verifier We have seen that the knowledge of a public key allows verifying the content of an emrtd document but we have to make sure that the public key is authentic and really, really comes from the document s issuer. Well, all this is about Trust Just exchanging hidden (encrypted) public objects is not really practical therefore the public keys are embedded into a further structure - that to some extent - declares which are the properties of your PKI and what - you allow - the keys to be used for. These objects are called Certificates and they must underlie the requirements specified in the ICAO document Doc 9303 and they are authentic, because you provide the proof through your secret and well protected private key. Now, assuming you are able to retrieve somewhere the Swiss certificate how can you be certain that this certificate really comes from Switzerland and if you can prove that this certificate comes from Switzerland but if it does not comply with the rules and requirements of ICAO what kind of trust can you apply to this object and finally to the emrtd it certifies? 6

The Public Key Directory The verifier has first to retrieve (find, acquire etc.) the issuer s CSCA certificate and then prove it is authentic The past experience has shown that finding an emrtd s CSCA certificate was (is) not an easy mission. Doc 9303 6 th edition required the CSCA certificates to be exchanged by diplomatic channels; this was to some extent a quite difficult task and not always successful. New in the 7 th edition of the same document, is the requirement to acquire by several and different channels - the certificate and verify it through out-of-band means. Now the time comes, to consider an important missing piece of our puzzle the PKD (Public Key Directory) In an ordinary PKI, the PKD is used to publish the certified public objects (e.g. certificates) belonging to the same PKI... in the emtrd s world the PKD has a much broader goal It is used to collect national as well as international certificates, verify their authenticity and finally provide them to the border control to allow this organisation to verify the digital content of the emrtds. 7

The Public Key Directory the mission As we previously said, everything at PKD level is about trust This is important when you have to prove the authenticity of the public object, such as certificates. The out-of-band verification plays an important role, but it also has to rely on a well established relationship between the issuer and the verifier what out-of-band might mean Assume, that (now) you know who I am; and you trust (for some well founded reasons), that I come from Switzerland and represent the Swiss PKI if I would give you the Swiss (public) certificate and confirm to you it s authenticity; could you believe me and recognise it as authentic? I suggest, you should not! A trivial interpretation of out-of-band may suggest that you verify the authenticity through, at least, another channel as an example you may contact another Swiss Federal Office (that you know you can rely upon) and ask them to confirm the certificate I gave you but first of all, you always have to get your hands on that certificate 8

no end to the concerns? You got the certificate and it is authentic proved by several independent means but what about the issuer s PKI? and what about the certificate compliance toward the requirements To enhance the trust the issuer should tell the verifier a bit more about its PKI The best way to increase confidence, is to anchor in a document how you handle your PKI; just write down the policy related to your organisation, your infrastructure so that everybody having access to your public objects (such as certificates, emrtds etc.), feels comfortable in using them but errare humanum est... (Latin: making mistakes is part of being human) and certificates (just to recall: they are used to publish your public keys), do not always conform to the specifications now, if the non-compliance is serious, it might provoke some major - issues at the verifier site e.g. it might cause some problems at the border, not allowing the verifier to rely on your emrtds but even minor certificate s issues might cause serious problems and what happens with our citizens traveling around the world? The last EU Interoperability tests, held in Italy in September 2017, showed that only 17 out of 40 certificates were compliant 9

in an ideal new world there is always a solution the issuer has to produce the keys the certificates and verify the compliance and publish them and the verifier must find and retrieve the certificate check their compliance with the specifications and verify the authenticity Assume that in this world all countries would be member of the ICAO PKD (great!) we could verify the compliance of our certificates and further public objects even before issuing and/or publishing them we could publish our own certificates through authentic lists (called Master Lists) we could even publish - in these lists - the certificates we acknowledged and proved to be authentic We would make the mission of the issuer and of the verifier much easier, more reliable and eventually enhance the overall confidence in the emrtds and border security 10

Any questions? 11

Thank you Contact details Name: Email: Arnaldo Cremisini arnaldo.cremisini@fedpol.admin.ch 12