day1 1030 introduction and concepts of identification systems · session objectives zconsider the...

41
Introduction and Concepts of Identification Systems 1 ISO/IEC Workshop December 1-3, 2009

Upload: others

Post on 30-Jul-2020

0 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Day1 1030 Introduction and Concepts of Identification Systems · Session Objectives zConsider the concept ... -Authorization zConsider how Trust derives from Identity ISO/IEC Workshop

Introduction and Conceptsof

Identification Systems

1ISO/IEC Workshop December 1-3, 2009

Page 2: Day1 1030 Introduction and Concepts of Identification Systems · Session Objectives zConsider the concept ... -Authorization zConsider how Trust derives from Identity ISO/IEC Workshop

Session Objectives

Consider the concept of InteractionConsider the concept of TrustDefine Identity and its major facets- Differential-identity- Experiential-identityConsider Credentials- Markers- CertificatesDefine the processes of Identification Systems- Enrolment- Authentication- AuthorizationConsider how Trust derives from Identity

2ISO/IEC Workshop December 1-3, 2009

Page 3: Day1 1030 Introduction and Concepts of Identification Systems · Session Objectives zConsider the concept ... -Authorization zConsider how Trust derives from Identity ISO/IEC Workshop

What is thePurpose of an Identification System?

To establish trust within an interaction

3ISO/IEC Workshop December 1-3, 2009

Page 4: Day1 1030 Introduction and Concepts of Identification Systems · Session Objectives zConsider the concept ... -Authorization zConsider how Trust derives from Identity ISO/IEC Workshop

What is an interaction?

The application of a force, i.e. an action,

between two or more entities,resulting in a consequence.

4ISO/IEC Workshop December 1-3, 2009

Page 5: Day1 1030 Introduction and Concepts of Identification Systems · Session Objectives zConsider the concept ... -Authorization zConsider how Trust derives from Identity ISO/IEC Workshop

Context

Interaction mechanics

Forces Consequence

Trust

An interaction isbounded by a context.

The context encompasses theinteracting entities,the forces throughwhich they interactand all of the parameterswhich influence the interaction.

Action

The action mayengage forces thatare physical or forcesthat are social; i.e.rules, laws, etc.

Trust is a measureof the probabilitythat a specific actionwill result in thedesired consequence.

When the assessment oftrust suggests an acceptable probabilityof the desire outcome,an action is evoked.

The resulting consequence concludes the interaction.Whether it is the desired consequence is the measure ofvalidity of the assessment of trust.

5ISO/IEC Workshop December 1-3, 2009

Page 6: Day1 1030 Introduction and Concepts of Identification Systems · Session Objectives zConsider the concept ... -Authorization zConsider how Trust derives from Identity ISO/IEC Workshop

Elements of an Interaction

Context – constraining association- Policy (forces, capabilities and social rules)- Interacting individuals- Initial conditions (trust) for action stimulus

Action – application of force within context- physical (natural forces)- organic (physiological capabilities)- social (social rules)

Consequence – result of action6ISO/IEC Workshop December 1-3, 2009

Page 7: Day1 1030 Introduction and Concepts of Identification Systems · Session Objectives zConsider the concept ... -Authorization zConsider how Trust derives from Identity ISO/IEC Workshop

Parties to an Interaction

Sentinel – the guardian of an interaction

Supplicant – one who seeks leave from the sentinel to engage in an interaction

Symmetric Interaction – an interaction in which all parties act both as sentinel as well as supplicant

7ISO/IEC Workshop December 1-3, 2009

Page 8: Day1 1030 Introduction and Concepts of Identification Systems · Session Objectives zConsider the concept ... -Authorization zConsider how Trust derives from Identity ISO/IEC Workshop

Overview of Interaction Mechanics

8ISO/IEC Workshop December 1-3, 2009

Page 9: Day1 1030 Introduction and Concepts of Identification Systems · Session Objectives zConsider the concept ... -Authorization zConsider how Trust derives from Identity ISO/IEC Workshop

How do we establish trust for personal interactions?

Privacy – participants control all aspects of the interaction

Secrecy – participants can exclude other parties from the interaction

Authentication - participants can establish each other’s identities

Authorization - capabilities can be limited based on identity

Information Integrity - information can be trusted; it doesn’t change

Non-Repudiation - participation & decisions can be documented

Trust derived from reputation

ISO/IEC Workshop December 1-3, 2009 9

Through mechanisms that we’ll find translate directly to the digital world!

Page 10: Day1 1030 Introduction and Concepts of Identification Systems · Session Objectives zConsider the concept ... -Authorization zConsider how Trust derives from Identity ISO/IEC Workshop

Secrecy

No one can hear usas we talk to each other.

I guess not,since we’re stuck

in this box!

10ISO/IEC Workshop December 1-3, 2009

Page 11: Day1 1030 Introduction and Concepts of Identification Systems · Session Objectives zConsider the concept ... -Authorization zConsider how Trust derives from Identity ISO/IEC Workshop

Authentication

My name is Alice. That’s nice. Can you show me

some identification?

11ISO/IEC Workshop December 1-3, 2009

Page 12: Day1 1030 Introduction and Concepts of Identification Systems · Session Objectives zConsider the concept ... -Authorization zConsider how Trust derives from Identity ISO/IEC Workshop

Authorization

Can I make a phonecall on your office phone?

Since I know you’reAlice, the boss’s wife,

you’re allowed touse my phone.

12ISO/IEC Workshop December 1-3, 2009

Page 13: Day1 1030 Introduction and Concepts of Identification Systems · Session Objectives zConsider the concept ... -Authorization zConsider how Trust derives from Identity ISO/IEC Workshop

Information Integrity

Here’s the box of aspirinI was supposed to bring

you.

Great! It still has thewrapper on it, so Iknow there’s just

aspirin inside!

13ISO/IEC Workshop December 1-3, 2009

Page 14: Day1 1030 Introduction and Concepts of Identification Systems · Session Objectives zConsider the concept ... -Authorization zConsider how Trust derives from Identity ISO/IEC Workshop

Non Repudiation

OK. Then I can provethat I paid you.

Here, I’ll sign thisreceipt for the moneyyou gave me for the

aspirin.

14ISO/IEC Workshop December 1-3, 2009

Page 15: Day1 1030 Introduction and Concepts of Identification Systems · Session Objectives zConsider the concept ... -Authorization zConsider how Trust derives from Identity ISO/IEC Workshop

Trust based on reputation

Your husband installedit. Surely we can

trust him...

I hope someone comesto take this box away

so we can leave.

15ISO/IEC Workshop December 1-3, 2009

Page 16: Day1 1030 Introduction and Concepts of Identification Systems · Session Objectives zConsider the concept ... -Authorization zConsider how Trust derives from Identity ISO/IEC Workshop

What is Trust?

Probability of a specificinteraction consequence

16ISO/IEC Workshop December 1-3, 2009

Page 17: Day1 1030 Introduction and Concepts of Identification Systems · Session Objectives zConsider the concept ... -Authorization zConsider how Trust derives from Identity ISO/IEC Workshop

How do we establish trust in individuals?

We identify them.

We engage in actions based on their capabilities.

We grant them access based on their characteristics, capabilities and/or authority.

We anticipate consequences based on their reputation.

17ISO/IEC Workshop December 1-3, 2009

Page 18: Day1 1030 Introduction and Concepts of Identification Systems · Session Objectives zConsider the concept ... -Authorization zConsider how Trust derives from Identity ISO/IEC Workshop

Identity

Who are you?18ISO/IEC Workshop December 1-3, 2009

Page 19: Day1 1030 Introduction and Concepts of Identification Systems · Session Objectives zConsider the concept ... -Authorization zConsider how Trust derives from Identity ISO/IEC Workshop

Two Major Facets of Identity

Differential Identity – distinguish the members of an identification system

Experiential Identity – the association of interaction consequences with differential identity

19ISO/IEC Workshop December 1-3, 2009

Page 20: Day1 1030 Introduction and Concepts of Identification Systems · Session Objectives zConsider the concept ... -Authorization zConsider how Trust derives from Identity ISO/IEC Workshop

Differential-identity

Differential-identity distinguishes entities only to the extent that they can be counted.

1

2

345

6

7

8

910

11

1213 14

15

1617

18

19

20ISO/IEC Workshop December 1-3, 2009

Page 21: Day1 1030 Introduction and Concepts of Identification Systems · Session Objectives zConsider the concept ... -Authorization zConsider how Trust derives from Identity ISO/IEC Workshop

Experiential-identityDate of Entry

Specialty

Discharge

Subordinate Information

Occupation

Employer

Stipend

21ISO/IEC Workshop December 1-3, 2009

Page 22: Day1 1030 Introduction and Concepts of Identification Systems · Session Objectives zConsider the concept ... -Authorization zConsider how Trust derives from Identity ISO/IEC Workshop

Credentials

The simple machines of identification systems

How do we establish differential-identity or experiential-identity?

22ISO/IEC Workshop December 1-3, 2009

Page 23: Day1 1030 Introduction and Concepts of Identification Systems · Session Objectives zConsider the concept ... -Authorization zConsider how Trust derives from Identity ISO/IEC Workshop

Two types of credentials

Markers – secrets or biometric characteristics used to establish differential-identity

Certificates – messaging mechanisms that rigorously convey information and hence can be used to establish and convey experiential-identity

23ISO/IEC Workshop December 1-3, 2009

Page 24: Day1 1030 Introduction and Concepts of Identification Systems · Session Objectives zConsider the concept ... -Authorization zConsider how Trust derives from Identity ISO/IEC Workshop

Characteristics of a good marker

Unique to a specific individualImmutable over the individual’s lifetimeNon-invasive to measureCost effective to measureCapable of trustworthy one-to-many testCapable of trustworthy one-to-one testCan ONLY be provided by the individualMinimal forensic value (Identity only!)

24ISO/IEC Workshop December 1-3, 2009

Page 25: Day1 1030 Introduction and Concepts of Identification Systems · Session Objectives zConsider the concept ... -Authorization zConsider how Trust derives from Identity ISO/IEC Workshop

Why a one-to-many test?

One successful comparison outof many attempts is called

IDENTIFICATION

IDENTIFICATION is the basis of ENROLMENT in an Identification System

25ISO/IEC Workshop December 1-3, 2009

Page 26: Day1 1030 Introduction and Concepts of Identification Systems · Session Objectives zConsider the concept ... -Authorization zConsider how Trust derives from Identity ISO/IEC Workshop

Why a one-to-one test?

An unsuccessful comparison means differential-identity is UNAUTHENTICATED

A successful comparison means differential-identity is AUTHENTICATED

26ISO/IEC Workshop December 1-3, 2009

Page 27: Day1 1030 Introduction and Concepts of Identification Systems · Session Objectives zConsider the concept ... -Authorization zConsider how Trust derives from Identity ISO/IEC Workshop

Some Common Markers

Fingerprint

DNA

Iris Pattern

Biometrics

Signature Key Signet

FacePicture

27ISO/IEC Workshop December 1-3, 2009

Page 28: Day1 1030 Introduction and Concepts of Identification Systems · Session Objectives zConsider the concept ... -Authorization zConsider how Trust derives from Identity ISO/IEC Workshop

Basic aspects of enrolmentJane Doe

(Biophysical Person0

Differential IdentityRegistry

Jim Smith(Biophysical Person0

Marker

Marker

Jim Smith(Biophysical Person0

Marker

Different People

Jane Doe Jim Smith

Jim Smith

EnrollmentProtocol

28ISO/IEC Workshop December 1-3, 2009

Page 29: Day1 1030 Introduction and Concepts of Identification Systems · Session Objectives zConsider the concept ... -Authorization zConsider how Trust derives from Identity ISO/IEC Workshop

Trust from Authentication

29ISO/IEC Workshop December 1-3, 2009

Page 30: Day1 1030 Introduction and Concepts of Identification Systems · Session Objectives zConsider the concept ... -Authorization zConsider how Trust derives from Identity ISO/IEC Workshop

Generic Overview of Authentication

30ISO/IEC Workshop December 1-3, 2009

Page 31: Day1 1030 Introduction and Concepts of Identification Systems · Session Objectives zConsider the concept ... -Authorization zConsider how Trust derives from Identity ISO/IEC Workshop

Authorization

Permission to engage in some specific action during an interactionAuthorization (permission) can be applied to actions directlyAuthorization can be applied to actions indirectly through other attributesAuthorization is typically conveyed with a digital certificate (credential)

31ISO/IEC Workshop December 1-3, 2009

Page 32: Day1 1030 Introduction and Concepts of Identification Systems · Session Objectives zConsider the concept ... -Authorization zConsider how Trust derives from Identity ISO/IEC Workshop

Generic overview of Authorization

Consequence

32ISO/IEC Workshop December 1-3, 2009

Page 33: Day1 1030 Introduction and Concepts of Identification Systems · Session Objectives zConsider the concept ... -Authorization zConsider how Trust derives from Identity ISO/IEC Workshop

And….. We make use of cryptography.

Cryptography – means of communication in the face of adversaries.

33ISO/IEC Workshop December 1-3, 2009

Page 34: Day1 1030 Introduction and Concepts of Identification Systems · Session Objectives zConsider the concept ... -Authorization zConsider how Trust derives from Identity ISO/IEC Workshop

Asymmetric Key Encryption

Encryption Process

Decryption Process

Plain Text

Ciphertext

Plain Text

Private Key

Public Key

34ISO/IEC Workshop December 1-3, 2009

Page 35: Day1 1030 Introduction and Concepts of Identification Systems · Session Objectives zConsider the concept ... -Authorization zConsider how Trust derives from Identity ISO/IEC Workshop

Digital Signature

Encryption Process

Hash Code

Private Key

DocumentOne WayHashingAlgorithm

Digital Signature

of Document

Sometimes referred to as a “digital digest”

35ISO/IEC Workshop December 1-3, 2009

Page 36: Day1 1030 Introduction and Concepts of Identification Systems · Session Objectives zConsider the concept ... -Authorization zConsider how Trust derives from Identity ISO/IEC Workshop

A Public Key Certificate

Key Expiration DateOwner’s Public KeyOwner’s Name Name of Issuer Serial Number Digital Signature

Hash Code

One WayHashingAlgorithm

Encryption Process

Issuer’s Private Key

Digital Signature

of Document

Digital Certificate

36ISO/IEC Workshop December 1-3, 2009

Page 37: Day1 1030 Introduction and Concepts of Identification Systems · Session Objectives zConsider the concept ... -Authorization zConsider how Trust derives from Identity ISO/IEC Workshop

How do we connect experience to identity?

A Trusted Party

AuthenticatesDifferential-identity

Authenticates anExperience

(e.g. Graduation)

Signs a certificate attestingTo both facts

37ISO/IEC Workshop December 1-3, 2009

Page 38: Day1 1030 Introduction and Concepts of Identification Systems · Session Objectives zConsider the concept ... -Authorization zConsider how Trust derives from Identity ISO/IEC Workshop

An “Experience” Certificate

Key Expiration Date

Experience Information e.g. Diploma

Digital Signature

Hash Code

One WayHashingAlgorithm

Encryption Process

Issuer’s Private Key

Digital Signature

of Document

Digital Certificate

Owner’s Public Key

Owner’s Name Name of Issuer Serial Number

38ISO/IEC Workshop December 1-3, 2009

Page 39: Day1 1030 Introduction and Concepts of Identification Systems · Session Objectives zConsider the concept ... -Authorization zConsider how Trust derives from Identity ISO/IEC Workshop

How do we establish trust for digital interactions?

Secrecy – interaction is shielded through encryption

Authentication – through differential-identity and protocols

Authorization – through experiential-identity and PKI

Information Integrity – through digital signatures and certificates

Non-Repudiation – through digital signatures and certificates

Trust derived from reputation based on experiential-identity and PKI

Through mechanisms that have their foundation in the personal world!

39ISO/IEC Workshop December 1-3, 2009

Page 40: Day1 1030 Introduction and Concepts of Identification Systems · Session Objectives zConsider the concept ... -Authorization zConsider how Trust derives from Identity ISO/IEC Workshop

THROUGH TOKEN BASED IAS SYSTEMS

How do we provide the various mechanisms we’ve just considered?

40ISO/IEC Workshop December 1-3, 2009

Page 41: Day1 1030 Introduction and Concepts of Identification Systems · Session Objectives zConsider the concept ... -Authorization zConsider how Trust derives from Identity ISO/IEC Workshop

QUESTIONS?

41ISO/IEC Workshop December 1-3, 2009