SlideShare uma empresa Scribd logo
1 de 41
Baixar para ler offline
Harmonizing Identity and
Privacy in Digital Identity and
Authentication technologies
Simon Blanchet
Information Security & Risk Team Leader - Application Security
{Undisclosed} Private Bank
Who Am I?
 Simon Blanchet, CISSP
 11+ years in Information System Security Security
      Security / Cryptographic Software Developer
      Information Security Professional (Application /
      Software Security) in Private Banking
 Hooked: Computers, BBSes, “hacking scene”
 Computer Science
 Passionate about Cryptology (Classical, Applied) &
 Software (In)Security
27.10.2011        Application Security Forum - Western Switzerland - 2011   2
Who Am I?
 Crypto / Security Software Developer
      Secure Email Solution (X.509, OpenSSL, MS CAPI, …)
      Meta-IDS built on OpenBSD (aggregation, correlation)
      Digital Credential initial PoC / SDK
 Information Security Professional (Swiss Banking)
      Application Security Architect (PKI, AAA, libs (authn, crypto), …)
      Smartcard Programming & Integration (PKCS11, APDUS)
      Application Security Team Lead – Private Bank
             Software Security, ARA, Threat Modeling, Security Testing
27.10.2011              Application Security Forum - Western Switzerland - 2011   3
Who Am I?
 Fun facts:
      Own (too) many books on Cryptology and Brewing
             Some of which are signed by the author with dedication




      Foodies, Beer aficionado
      Urban travelers, love languages


27.10.2011             Application Security Forum - Western Switzerland - 2011   4
Agenda
 What this talk IS about / What this talk is NOT about
 Authentication & Privacy
 Identity Meta System (IdP, RP, Subject / Principal, …)
 PKI, X.509, Case Study: SSL mutual authentication
 Introducing the Laws of Identity
 Some issues with current authentication schemes
 Introducing Elementary Cryptographic Primitives
 Introducing Digital Credential



27.10.2011        Application Security Forum - Western Switzerland - 2011   5
What this talk IS about
    Digital Identity
    Authentication
    Digital Privacy in the authentication world
    Identity Provider, Relying Parties, Subject
    Limitations of current implementations
    Elementary cryptographic primitives
             RSA, Digital Signature, Discrete Logarithms, ZKIP,
             Blind Signature, Selective Disclosure, …


27.10.2011             Application Security Forum - Western Switzerland - 2011   6
What this talk is NOT about
 Anonymous browsing
 MIX networks / Onion Routing
 Hiding identity at the network level
 Political statement / Privacy evangelism




 27.10.2011   Application Security Forum - Western Switzerland - 2011   7
Authentication & Privacy

             Definition, means, why, conflicting /
              diametrically opposed concepts?
                  Security vs Privacy debate

27.10.2011          Application Security Forum - Western Switzerland - 2011   8
Identification & Authentication

    Identification
             Act or process of identifying somebody or something or of being
             identified. So, it’s an act or process of showing who somebody is.
             Act of claiming an identity, where an identity is a set of one or
             more signs signifying a distinct entity.
    Authentication
             Act or process of proving something to be valid, genuine or true
             about someone’s identity.
             Act of verifying that identity, where a verification consists in
             establishing, to the satisfaction of the verifier, that the sign
             signifies the entity.


27.10.2011                 Application Security Forum - Western Switzerland - 2011   9
Identification vs Authentication

    Identification
             Ex: “Hi I’m Simon”, “Hi I’m the owner of this car”
    Authentication
             Ex: “Hi I’m Simon, here’s my passport”
                Something I own          Passport
             Ex: “Hi I’m Simon, here’s my passport and let me sign
             this piece of paper”
                Something I own Passport
                Something I am My signature


27.10.2011               Application Security Forum - Western Switzerland - 2011   10
Authentication (1/2)

    Authentication factors
             Knowledge         Something you know
               Ex: Password, Pin code, Passphrase, answer to a special ?
             Ownership         Something you own
               Ex: Security Token, Cell phone, Private Key associated to a cert
             Inherence       Something you do or are
               Ex: Fingerprint, voice, retina (think biometrics)
    Multi-factor Authentication
             Any combination of more than one of the above…


27.10.2011                Application Security Forum - Western Switzerland - 2011   11
Authentication (2/2)

    SSL Mutual Authentication
      Public Key Digital Signature (more on this later…)
    Hardware / Security Token
             Shared Secret Key Authentication
                OTP based on Shared Secret + Time
                OTP based on Shared Secret + Counter
                OTP based on Shared Secret + Challenge
             The minimum requirement of any token is at least an inherent
             unique identity…
    OpenID / SAML / …


27.10.2011                  Application Security Forum - Western Switzerland - 2011   12
Privacy

    Ability of a person to control the availability of
    information about and exposure of himself or
    herself. It is related to being able to function in
    society anonymously (including
    pseudonymous or blind credential
    identification)




27.10.2011      Application Security Forum - Western Switzerland - 2011   13
Anonymity / Pseudonymity

    Anonymity
             No information linking an identifier to its entity
             Identity that is not bound or linked to an entity
             Obscuring the identity of an entity
    Pseudonymity
             Pseudonym is a fictitious identifier which is not
             immediately associated to an entity
             Ex: Pen names, Nicknames, …
               Linking & Tracking possible, pseudo revealed: Game Over

27.10.2011               Application Security Forum - Western Switzerland - 2011   14
Security vs Privacy

    Is this a real dilemma?
    Conflicting / diametrically opposed concepts?
    We hear a lot about trading your Privacy to
    increase your Security in airport security
             Full-Body Scanners anyone?




27.10.2011            Application Security Forum - Western Switzerland - 2011   15
Security vs Privacy

    Post 9/11
             How much privacy are you willing to give up for security?
    Security or Privacy?
             Fundamental dichotomy? NOT really…
             Security affects Privacy when it's based on identity
             Real question: Liberty versus Control
    Quoting Benjamin Franklin:
             "Those who would give up essential liberty to purchase a little
             temporary safety, deserve neither liberty nor safety."


27.10.2011                  Application Security Forum - Western Switzerland - 2011   16
Identity Meta System
    IdP - Identity Provider
             Issues digital identity
                Ex: CA for X.509 Digital Certificate
    RP - Relying Parties
             Requires identity / Trust IdP
                Ex: Mutual SSL authn protected web server
    S / P – Subject / Principal
             Entities about whom claims are made
                Ex: Individual owning a cert & its associated private key
27.10.2011               Application Security Forum - Western Switzerland - 2011   17
PKI
     IdP is the Certification Authority (CA)
                               Authenticate
                               Validate CSR
                               Issue Cert                           Cryptographic
                                                      IdP           binding Identity
                                                                    + Public Key




         Subjec                             Access Request
                                                                                       RP
           t
                                     Certificate + Proof of
Keep Private Key                     possession private key
Sign(Attrib + Pub Key)   CSR



27.10.2011                 Application Security Forum - Western Switzerland - 2011          18
Case Study

             SSL Mutual Authentication




27.10.2011     Application Security Forum - Western Switzerland - 2011   19
SSL Mutual Authentication
    Common Trusted IdP (CA) between RP & S
    CA issues a digital certificate to Subject
             Client-side key pair generation
             PKCS10 Certificate Signing Request sent to CA
             CA authenticate Subject & verify proof of
             possession of associated Private Key
             CA issues X.509 certificate to Subject



27.10.2011             Application Security Forum - Western Switzerland - 2011   20
SSL Mutual Authentication
    RP is a Web Server configured to require a
    client certificate
             SSL “Server Hello” – “Client Certificate Request”
      $ openssl s_server -www -key myca_privkey.pem -cert
      myca.pem -state -msg -debug -Verify myca.pem




27.10.2011             Application Security Forum - Western Switzerland - 2011   21
SSL Mutual Authentication




               Copyright IBM Corporation 1999, 2011. All Rights Reserved.
               This topic's URL: http://publib.boulder.ibm.com/infocenter/wmqv7/v7r0/topic/com.ibm.mq.csqzas.doc/sy10660_.htm
27.10.2011     sy10660_       Application Security Forum - Western Switzerland - 2011                                           22
SSL Mutual Authentication
    So the client is only sending his certificate
    back to the server or is he?
    What else would be needed and why?
             Proof of possession of associated private key
             A certificate is public by definition …
    How to prove to a RP that we own such key?
             Someone said “Digital Signature”?
             What is really signed here? Why?

27.10.2011             Application Security Forum - Western Switzerland - 2011   23
SSL Mutual Authentication
    What can be signed?
    Who’s providing the material to sign?
             The server only?
             The client only?
             Both? Why?
               What can go wrong if not both?
    What’s the outcome of all of this?
             Server obtain a proof that the Client owns the
             private key associated with the cert shown
27.10.2011             Application Security Forum - Western Switzerland - 2011   24
Laws of Identity                                      ii.a




27.10.2011   Application Security Forum - Western Switzerland - 2011      25
Laws of Identity                                       ii.a




1.     User Control and Consent
2.     Minimal Disclosure for a Constrained Use
3.     Justifiable Parties
4.     Directed Identity
5.     Pluralism of Operators and Technologies
6.     Human Integration
7.     Consistent Experience Across Contexts

27.10.2011       Application Security Forum - Western Switzerland - 2011      26
Some issues with current
                     schemes




27.10.2011       Application Security Forum - Western Switzerland - 2011   27
Privacy Issues with current schemes
    IdP sees the certificates it issues
    RP can always track the entity authenticating
    RP can store all the certificates presented
             Different RPs can exchange & link those
             certificates
    ALL the attributes contained in the certificate
    are disclosed to the RP
    CRLs are distributed to all RP
27.10.2011             Application Security Forum - Western Switzerland - 2011   28
X.509 SSL Mutal Authn (1/2)
1. User Control and Consent ✗ / ?
             By Default: NO under most common OSes
             MS CAPI Private Key Security Level
2. Minimal Disclosure for a Constrained Use ✗
             ALL attributes embedded in the cert are
             disclosed




27.10.2011            Application Security Forum - Western Switzerland - 2011   29
Issues with X.509 authn (2/2)
    Cert contains direct unique identifiers such as:
             Subject Key Identifier ( 2.5.29.14 )
             IssuerDN + Serial Number
             Common Name*
    Cert contains indirect unique identifiers:
             Public Key
             CA’s Signature
             Computed Thumbprint




27.10.2011            Application Security Forum - Western Switzerland - 2011   30
Cryptographic Primitives




27.10.2011       Application Security Forum - Western Switzerland - 2011   31
Cryptographic Primitives

    RSA
    Discrete Logarithm Problem (DLP)
    Zero-Knowledge Proof (ZKP)
             Prover     Subject
             Verifier    RP
    Blind Signature
    Selective Disclosure



27.10.2011                Application Security Forum - Western Switzerland - 2011   32
RSA
    P & Q: Large random prime numbers
    n = P * Q Modulus common to privkey & pubkey
    Compute φ(n) = (p – 1)(q – 1)
    Choose an integer e such that 1 < e < φ(n) and
    gcd(e,φ(n)) = 1 public key
    d = e–1 mod φ(n) private key
    Encryption-Decryption / Signature-Validation
             ENC/DEC:          c = me (mod n), m = cd (mod n)
             SIG/VAL:          s = hd (mod n), h = se (mod n) h’=h?

27.10.2011              Application Security Forum - Western Switzerland - 2011   33
Discrete Logarithm Problem
    g and h are elements of a finite cyclic group G then a
    solution x of the equation gx = h is called a discrete
    logarithm to the base g of h in the group G.
    Given g ≠1 and a random h := gx, it is not possible to
    find x from computational complexity standpoint.




27.10.2011       Application Security Forum - Western Switzerland - 2011   34
Zero Knowledge Proof
For Children… (from Jean-Jacques Quisquater’s paper*)




Repeat until confidence level is reached…


•    http://en.wikipedia.org/wiki/Zero-knowledge_proof



    27.10.2011                             Application Security Forum - Western Switzerland - 2011   35
Introducing digital credential
• Issuing protocol                    Blind Signature
      – Subject can (blind) “randomize” its public key
      – IdP can still sign without “knowing” the public key
      – The resulting IdP signature is also “blinded” from
        the IdP perspective
• Showing protocol                         Selective Disclosure
      – Subject can blind, hence selectively disclose only
        the attributes he wishes to do to the RP (Verifier)


27.10.2011         Application Security Forum - Western Switzerland - 2011   36
Conclusion
 Pseudonymity != Anonymity
 Security XOR Privacy? NOT Really
 Liberty VS Control THE real question
 Most current authentication schemes were not built with
 “privacy” in mind and currently don’t comply with the “7
 Laws of Identity”
 Some cryptographic constructs exists to implement
 privacy and empower the Subject
 Implementations of those constructs already exist

 27.10.2011    Application Security Forum - Western Switzerland - 2011   37
© flickr.com/horiavarlan
              horiavarlan
                                     Questions



                                                   Questions ?




27.10.2011                  Application Security Forum - Western Switzerland - 2011   38
Thank You! / Merci!

         Simon Blanchet
         simon.blanchet@gmail.com
         http://ch.linkedin.com/in/sblanchet




                                                                   SLIDES A TELECHARGER
                                                                      PROCHAINEMENT:
                                                                    http://slideshare.net/ASF-WS


27.10.2011           Application Security Forum - Western Switzerland - 2011                       39
References (1/2)
i.          Microsoft’s Vision for an Identity Metasystem
       a.       http://www.identityblog.com/stories/2005/10/06/IdentityMetasystem.pdf
ii.         The Laws of Identity, Kim Cameron
       a.       http://www.identityblog.com/stories/2005/05/13/TheLawsOfIdentity.pdf
iii.        Rethinking Public Key Infrastructures and Digital Certificates, Stefan Brands
       a.       http://mitpress.mit.edu/catalog/item/default.asp?sid=DB63048D-0822-4233-8765-
                55C534600287&ttype=2&tid=3801
       b.       http://www.credentica.com/the_mit_pressbook.html
iv.         Work of David Chaum & Stefan Brands, School of Computer Science and
            Statistics at Trinity College Dublin (Michael Peirce’s homepage)
       a.       http://ntrg.cs.tcd.ie/mepeirce/Project/chaum.html
       b.       http://ntrg.cs.tcd.ie/mepeirce/Project/Mlists/brands.html
v.          The Id Element
       a.       http://channel9.msdn.com/Shows/Identity
       b.       http://channel9.msdn.com/shows/Identity/Deep-Dive-into-U-Prove-Cryptographic-protocols



27.10.2011                      Application Security Forum - Western Switzerland - 2011                  40
References (2/2)
v.           7 Laws of Identity, Ann Cavoukian
        a.      http://www.ipc.on.ca/images/Resources/up-7laws_whitepaper.pdf
vi.          The problem(s) with OpenID, The Identity Corner
        a.      http://www.untrusted.ca/cache/openid.html
vii.         An Overview of an SSL Handshake & How SSL provides authentication,
             confidentiality, and integrity
        a.      http://publib.boulder.ibm.com/infocenter/wmqv7/v7r0/advanced/print.jsp?topic=/com.ibm.mq.
                csqzas.doc/sy10670_.htm&isSelectedTopicPrint=true
        b.      http://publib.boulder.ibm.com/infocenter/wmqv7/v7r0/index.jsp?topic=%2Fcom.ibm.mq.csqzas
                .doc%2Fsy10660_.htm
viii.        Links Blog (Identity), Ben Laurie
        a.      http://www.links.org/?cat=8
ix.          U-Prove Crypto SDK V1.1 (Java Edition) - Apache 2.0 open-source
             license
        a.      http://archive.msdn.microsoft.com/uprovesdkjava
x.           Random Thoughts on Digital Identity, Digital Identity Glossary
        a.      http://blog.onghome.com/glossary.htm




27.10.2011                      Application Security Forum - Western Switzerland - 2011                41

Mais conteúdo relacionado

Mais procurados

Smart Cards & Devices Forum 2012 - Securing Cloud Computing
Smart Cards & Devices Forum 2012 - Securing Cloud ComputingSmart Cards & Devices Forum 2012 - Securing Cloud Computing
Smart Cards & Devices Forum 2012 - Securing Cloud ComputingOKsystem
 
Privacy of social network attributes for online services
Privacy of  social network attributes for online servicesPrivacy of  social network attributes for online services
Privacy of social network attributes for online servicesAtos_Worldline
 
Blockchain Self Sovereign Identity
Blockchain Self Sovereign IdentityBlockchain Self Sovereign Identity
Blockchain Self Sovereign IdentityPercival Lucena
 
SmartCard Forum 2008 - Securing digital identity
SmartCard Forum 2008 - Securing digital identitySmartCard Forum 2008 - Securing digital identity
SmartCard Forum 2008 - Securing digital identityOKsystem
 
2 15-12-jm torres mit presentation
2 15-12-jm torres mit presentation2 15-12-jm torres mit presentation
2 15-12-jm torres mit presentationeaquiroz
 
Can You Use an NDA to Protect an Idea or Concept?
Can You Use an NDA to Protect an Idea or Concept?Can You Use an NDA to Protect an Idea or Concept?
Can You Use an NDA to Protect an Idea or Concept?EveryNDA
 
Sxsw ppt voice-1
Sxsw ppt voice-1Sxsw ppt voice-1
Sxsw ppt voice-1Dan Miller
 
SmartCard Forum 2010 - Secured Access for enterprise
SmartCard Forum 2010 - Secured Access for enterpriseSmartCard Forum 2010 - Secured Access for enterprise
SmartCard Forum 2010 - Secured Access for enterpriseOKsystem
 
The Future of Authentication - Verifiable Credentials / Self-Sovereign Identity
The Future of Authentication - Verifiable Credentials / Self-Sovereign IdentityThe Future of Authentication - Verifiable Credentials / Self-Sovereign Identity
The Future of Authentication - Verifiable Credentials / Self-Sovereign IdentityEvernym
 
An Ultimate Guide to NFT Applications
An Ultimate Guide to NFT ApplicationsAn Ultimate Guide to NFT Applications
An Ultimate Guide to NFT Applications101 Blockchains
 
CIS14: Identifying Things (and Things Identifying Us)
CIS14: Identifying Things (and Things Identifying Us)CIS14: Identifying Things (and Things Identifying Us)
CIS14: Identifying Things (and Things Identifying Us)CloudIDSummit
 
Discretion and confidentiality
Discretion and confidentialityDiscretion and confidentiality
Discretion and confidentialityWebmaster
 
Digital Identity on Blockchain
Digital Identity on BlockchainDigital Identity on Blockchain
Digital Identity on Blockchainjakubkoci
 
SmartCard Forum 2008 - Gemalto
SmartCard Forum 2008 - GemaltoSmartCard Forum 2008 - Gemalto
SmartCard Forum 2008 - GemaltoOKsystem
 
Identity - Past Solutions & Current Blockchain Landscape
 Identity - Past Solutions & Current Blockchain Landscape Identity - Past Solutions & Current Blockchain Landscape
Identity - Past Solutions & Current Blockchain Landscapeaatkin1971
 
Hire blockchain developers from employcoder
Hire blockchain  developers from employcoderHire blockchain  developers from employcoder
Hire blockchain developers from employcoderEmploycoder
 
Ics Isac Overview V0.1pub
Ics Isac   Overview V0.1pubIcs Isac   Overview V0.1pub
Ics Isac Overview V0.1pubbradblask
 
Entrust Physical & Logical Access Solutions
Entrust Physical & Logical Access SolutionsEntrust Physical & Logical Access Solutions
Entrust Physical & Logical Access SolutionsEntrust Datacard
 

Mais procurados (20)

Smart Cards & Devices Forum 2012 - Securing Cloud Computing
Smart Cards & Devices Forum 2012 - Securing Cloud ComputingSmart Cards & Devices Forum 2012 - Securing Cloud Computing
Smart Cards & Devices Forum 2012 - Securing Cloud Computing
 
Privacy of social network attributes for online services
Privacy of  social network attributes for online servicesPrivacy of  social network attributes for online services
Privacy of social network attributes for online services
 
Blockchain Self Sovereign Identity
Blockchain Self Sovereign IdentityBlockchain Self Sovereign Identity
Blockchain Self Sovereign Identity
 
SmartCard Forum 2008 - Securing digital identity
SmartCard Forum 2008 - Securing digital identitySmartCard Forum 2008 - Securing digital identity
SmartCard Forum 2008 - Securing digital identity
 
2 15-12-jm torres mit presentation
2 15-12-jm torres mit presentation2 15-12-jm torres mit presentation
2 15-12-jm torres mit presentation
 
Can You Use an NDA to Protect an Idea or Concept?
Can You Use an NDA to Protect an Idea or Concept?Can You Use an NDA to Protect an Idea or Concept?
Can You Use an NDA to Protect an Idea or Concept?
 
Sxsw ppt voice-1
Sxsw ppt voice-1Sxsw ppt voice-1
Sxsw ppt voice-1
 
SmartCard Forum 2010 - Secured Access for enterprise
SmartCard Forum 2010 - Secured Access for enterpriseSmartCard Forum 2010 - Secured Access for enterprise
SmartCard Forum 2010 - Secured Access for enterprise
 
The Future of Authentication - Verifiable Credentials / Self-Sovereign Identity
The Future of Authentication - Verifiable Credentials / Self-Sovereign IdentityThe Future of Authentication - Verifiable Credentials / Self-Sovereign Identity
The Future of Authentication - Verifiable Credentials / Self-Sovereign Identity
 
An Ultimate Guide to NFT Applications
An Ultimate Guide to NFT ApplicationsAn Ultimate Guide to NFT Applications
An Ultimate Guide to NFT Applications
 
CIS14: Identifying Things (and Things Identifying Us)
CIS14: Identifying Things (and Things Identifying Us)CIS14: Identifying Things (and Things Identifying Us)
CIS14: Identifying Things (and Things Identifying Us)
 
Discretion and confidentiality
Discretion and confidentialityDiscretion and confidentiality
Discretion and confidentiality
 
NFT Explained
NFT ExplainedNFT Explained
NFT Explained
 
Sabett: ESRA Identity Management 11-09-10
Sabett:  ESRA Identity Management 11-09-10Sabett:  ESRA Identity Management 11-09-10
Sabett: ESRA Identity Management 11-09-10
 
Digital Identity on Blockchain
Digital Identity on BlockchainDigital Identity on Blockchain
Digital Identity on Blockchain
 
SmartCard Forum 2008 - Gemalto
SmartCard Forum 2008 - GemaltoSmartCard Forum 2008 - Gemalto
SmartCard Forum 2008 - Gemalto
 
Identity - Past Solutions & Current Blockchain Landscape
 Identity - Past Solutions & Current Blockchain Landscape Identity - Past Solutions & Current Blockchain Landscape
Identity - Past Solutions & Current Blockchain Landscape
 
Hire blockchain developers from employcoder
Hire blockchain  developers from employcoderHire blockchain  developers from employcoder
Hire blockchain developers from employcoder
 
Ics Isac Overview V0.1pub
Ics Isac   Overview V0.1pubIcs Isac   Overview V0.1pub
Ics Isac Overview V0.1pub
 
Entrust Physical & Logical Access Solutions
Entrust Physical & Logical Access SolutionsEntrust Physical & Logical Access Solutions
Entrust Physical & Logical Access Solutions
 

Semelhante a ASFWS 2011: Harmonizing Identity and Privacy in Digital Identity and Authentication technologies

electronic_payment_system_in_korea_eng
electronic_payment_system_in_korea_engelectronic_payment_system_in_korea_eng
electronic_payment_system_in_korea_engFrank Mercado
 
computer-security-and-cryptography-a-simple-presentation
computer-security-and-cryptography-a-simple-presentationcomputer-security-and-cryptography-a-simple-presentation
computer-security-and-cryptography-a-simple-presentationAlex Punnen
 
Overall cryptography and pki introduction
Overall cryptography and pki introductionOverall cryptography and pki introduction
Overall cryptography and pki introductionAvirot Mitamura
 
CIS14: Authentication Family Tree (1.1.1 annotated) - Steve Wilson
CIS14: Authentication Family Tree (1.1.1 annotated) - Steve WilsonCIS14: Authentication Family Tree (1.1.1 annotated) - Steve Wilson
CIS14: Authentication Family Tree (1.1.1 annotated) - Steve WilsonCloudIDSummit
 
Strong Authentication in Web Application #SCS III
Strong Authentication in Web Application #SCS IIIStrong Authentication in Web Application #SCS III
Strong Authentication in Web Application #SCS IIISylvain Maret
 
Cryptograpy Exam
Cryptograpy ExamCryptograpy Exam
Cryptograpy ExamLisa Olive
 
FIDO and the Broader Identity Landscape
FIDO and the Broader Identity LandscapeFIDO and the Broader Identity Landscape
FIDO and the Broader Identity LandscapeFIDO Alliance
 
CIS14: FIDO 101 (What, Why and Wherefore of FIDO)
CIS14: FIDO 101 (What, Why and Wherefore of FIDO)CIS14: FIDO 101 (What, Why and Wherefore of FIDO)
CIS14: FIDO 101 (What, Why and Wherefore of FIDO)CloudIDSummit
 
User Authentication for Government
User Authentication for GovernmentUser Authentication for Government
User Authentication for GovernmentCarahsoft
 
Strong Authentication State of the Art 2012 / Sarajevo CSO
Strong Authentication State of the Art 2012 / Sarajevo CSOStrong Authentication State of the Art 2012 / Sarajevo CSO
Strong Authentication State of the Art 2012 / Sarajevo CSOSylvain Maret
 
Implementing Public-Key-Infrastructures
Implementing Public-Key-InfrastructuresImplementing Public-Key-Infrastructures
Implementing Public-Key-InfrastructuresOliver Pfaff
 
FrontOne our new and different solutions
FrontOne our new and different solutionsFrontOne our new and different solutions
FrontOne our new and different solutionsfrontone
 
Managing IT security and Business Ethics
Managing IT security and Business EthicsManaging IT security and Business Ethics
Managing IT security and Business EthicsRahul Sharma
 
Tutorial 3 peter kustor
Tutorial 3 peter kustorTutorial 3 peter kustor
Tutorial 3 peter kustoregovernment
 
Authentication and strong authentication for Web Application
Authentication and strong authentication for Web ApplicationAuthentication and strong authentication for Web Application
Authentication and strong authentication for Web ApplicationSylvain Maret
 
Identity Federation on JBossAS
Identity Federation on JBossASIdentity Federation on JBossAS
Identity Federation on JBossASRoger CARHUATOCTO
 
Identity 2.0 and User-Centric Identity
Identity 2.0 and User-Centric IdentityIdentity 2.0 and User-Centric Identity
Identity 2.0 and User-Centric IdentityOliver Pfaff
 
Secure Gate / Reverse Proxy - WAF 1ere génération / Datelec
Secure Gate / Reverse Proxy - WAF 1ere génération / DatelecSecure Gate / Reverse Proxy - WAF 1ere génération / Datelec
Secure Gate / Reverse Proxy - WAF 1ere génération / DatelecSylvain Maret
 
State-of-the-Art in Web Services Federation
State-of-the-Art in Web Services FederationState-of-the-Art in Web Services Federation
State-of-the-Art in Web Services FederationOliver Pfaff
 

Semelhante a ASFWS 2011: Harmonizing Identity and Privacy in Digital Identity and Authentication technologies (20)

electronic_payment_system_in_korea_eng
electronic_payment_system_in_korea_engelectronic_payment_system_in_korea_eng
electronic_payment_system_in_korea_eng
 
computer-security-and-cryptography-a-simple-presentation
computer-security-and-cryptography-a-simple-presentationcomputer-security-and-cryptography-a-simple-presentation
computer-security-and-cryptography-a-simple-presentation
 
Overall cryptography and pki introduction
Overall cryptography and pki introductionOverall cryptography and pki introduction
Overall cryptography and pki introduction
 
CIS14: Authentication Family Tree (1.1.1 annotated) - Steve Wilson
CIS14: Authentication Family Tree (1.1.1 annotated) - Steve WilsonCIS14: Authentication Family Tree (1.1.1 annotated) - Steve Wilson
CIS14: Authentication Family Tree (1.1.1 annotated) - Steve Wilson
 
Strong Authentication in Web Application #SCS III
Strong Authentication in Web Application #SCS IIIStrong Authentication in Web Application #SCS III
Strong Authentication in Web Application #SCS III
 
Cryptograpy Exam
Cryptograpy ExamCryptograpy Exam
Cryptograpy Exam
 
FIDO and the Broader Identity Landscape
FIDO and the Broader Identity LandscapeFIDO and the Broader Identity Landscape
FIDO and the Broader Identity Landscape
 
CIS14: FIDO 101 (What, Why and Wherefore of FIDO)
CIS14: FIDO 101 (What, Why and Wherefore of FIDO)CIS14: FIDO 101 (What, Why and Wherefore of FIDO)
CIS14: FIDO 101 (What, Why and Wherefore of FIDO)
 
User Authentication for Government
User Authentication for GovernmentUser Authentication for Government
User Authentication for Government
 
Strong Authentication State of the Art 2012 / Sarajevo CSO
Strong Authentication State of the Art 2012 / Sarajevo CSOStrong Authentication State of the Art 2012 / Sarajevo CSO
Strong Authentication State of the Art 2012 / Sarajevo CSO
 
Implementing Public-Key-Infrastructures
Implementing Public-Key-InfrastructuresImplementing Public-Key-Infrastructures
Implementing Public-Key-Infrastructures
 
FrontOne our new and different solutions
FrontOne our new and different solutionsFrontOne our new and different solutions
FrontOne our new and different solutions
 
Wisekey italia presentation 2012
Wisekey italia presentation 2012Wisekey italia presentation 2012
Wisekey italia presentation 2012
 
Managing IT security and Business Ethics
Managing IT security and Business EthicsManaging IT security and Business Ethics
Managing IT security and Business Ethics
 
Tutorial 3 peter kustor
Tutorial 3 peter kustorTutorial 3 peter kustor
Tutorial 3 peter kustor
 
Authentication and strong authentication for Web Application
Authentication and strong authentication for Web ApplicationAuthentication and strong authentication for Web Application
Authentication and strong authentication for Web Application
 
Identity Federation on JBossAS
Identity Federation on JBossASIdentity Federation on JBossAS
Identity Federation on JBossAS
 
Identity 2.0 and User-Centric Identity
Identity 2.0 and User-Centric IdentityIdentity 2.0 and User-Centric Identity
Identity 2.0 and User-Centric Identity
 
Secure Gate / Reverse Proxy - WAF 1ere génération / Datelec
Secure Gate / Reverse Proxy - WAF 1ere génération / DatelecSecure Gate / Reverse Proxy - WAF 1ere génération / Datelec
Secure Gate / Reverse Proxy - WAF 1ere génération / Datelec
 
State-of-the-Art in Web Services Federation
State-of-the-Art in Web Services FederationState-of-the-Art in Web Services Federation
State-of-the-Art in Web Services Federation
 

Mais de Cyber Security Alliance

Robots are among us, but who takes responsibility?
Robots are among us, but who takes responsibility?Robots are among us, but who takes responsibility?
Robots are among us, but who takes responsibility?Cyber Security Alliance
 
iOS malware: what's the risk and how to reduce it
iOS malware: what's the risk and how to reduce itiOS malware: what's the risk and how to reduce it
iOS malware: what's the risk and how to reduce itCyber Security Alliance
 
Why huntung IoC fails at protecting against targeted attacks
Why huntung IoC fails at protecting against targeted attacksWhy huntung IoC fails at protecting against targeted attacks
Why huntung IoC fails at protecting against targeted attacksCyber Security Alliance
 
Corporations - the new victims of targeted ransomware
Corporations - the new victims of targeted ransomwareCorporations - the new victims of targeted ransomware
Corporations - the new victims of targeted ransomwareCyber Security Alliance
 
Introducing Man in the Contacts attack to trick encrypted messaging apps
Introducing Man in the Contacts attack to trick encrypted messaging appsIntroducing Man in the Contacts attack to trick encrypted messaging apps
Introducing Man in the Contacts attack to trick encrypted messaging appsCyber Security Alliance
 
Understanding the fundamentals of attacks
Understanding the fundamentals of attacksUnderstanding the fundamentals of attacks
Understanding the fundamentals of attacksCyber Security Alliance
 
Reverse engineering Swisscom's Centro Grande Modem
Reverse engineering Swisscom's Centro Grande ModemReverse engineering Swisscom's Centro Grande Modem
Reverse engineering Swisscom's Centro Grande ModemCyber Security Alliance
 
Easy public-private-keys-strong-authentication-using-u2 f
Easy public-private-keys-strong-authentication-using-u2 fEasy public-private-keys-strong-authentication-using-u2 f
Easy public-private-keys-strong-authentication-using-u2 fCyber Security Alliance
 
Create a-strong-two-factors-authentication-device-for-less-than-chf-100
Create a-strong-two-factors-authentication-device-for-less-than-chf-100Create a-strong-two-factors-authentication-device-for-less-than-chf-100
Create a-strong-two-factors-authentication-device-for-less-than-chf-100Cyber Security Alliance
 
Offline bruteforce attack on wi fi protected setup
Offline bruteforce attack on wi fi protected setupOffline bruteforce attack on wi fi protected setup
Offline bruteforce attack on wi fi protected setupCyber Security Alliance
 
App secforum2014 andrivet-cplusplus11-metaprogramming_applied_to_software_obf...
App secforum2014 andrivet-cplusplus11-metaprogramming_applied_to_software_obf...App secforum2014 andrivet-cplusplus11-metaprogramming_applied_to_software_obf...
App secforum2014 andrivet-cplusplus11-metaprogramming_applied_to_software_obf...Cyber Security Alliance
 
Warning Ahead: SecurityStorms are Brewing in Your JavaScript
Warning Ahead: SecurityStorms are Brewing in Your JavaScriptWarning Ahead: SecurityStorms are Brewing in Your JavaScript
Warning Ahead: SecurityStorms are Brewing in Your JavaScriptCyber Security Alliance
 
Killing any security product … using a Mimikatz undocumented feature
Killing any security product … using a Mimikatz undocumented featureKilling any security product … using a Mimikatz undocumented feature
Killing any security product … using a Mimikatz undocumented featureCyber Security Alliance
 

Mais de Cyber Security Alliance (20)

Bug Bounty @ Swisscom
Bug Bounty @ SwisscomBug Bounty @ Swisscom
Bug Bounty @ Swisscom
 
Robots are among us, but who takes responsibility?
Robots are among us, but who takes responsibility?Robots are among us, but who takes responsibility?
Robots are among us, but who takes responsibility?
 
iOS malware: what's the risk and how to reduce it
iOS malware: what's the risk and how to reduce itiOS malware: what's the risk and how to reduce it
iOS malware: what's the risk and how to reduce it
 
Why huntung IoC fails at protecting against targeted attacks
Why huntung IoC fails at protecting against targeted attacksWhy huntung IoC fails at protecting against targeted attacks
Why huntung IoC fails at protecting against targeted attacks
 
Corporations - the new victims of targeted ransomware
Corporations - the new victims of targeted ransomwareCorporations - the new victims of targeted ransomware
Corporations - the new victims of targeted ransomware
 
Blockchain for Beginners
Blockchain for Beginners Blockchain for Beginners
Blockchain for Beginners
 
Le pentest pour les nuls #cybsec16
Le pentest pour les nuls #cybsec16Le pentest pour les nuls #cybsec16
Le pentest pour les nuls #cybsec16
 
Introducing Man in the Contacts attack to trick encrypted messaging apps
Introducing Man in the Contacts attack to trick encrypted messaging appsIntroducing Man in the Contacts attack to trick encrypted messaging apps
Introducing Man in the Contacts attack to trick encrypted messaging apps
 
Understanding the fundamentals of attacks
Understanding the fundamentals of attacksUnderstanding the fundamentals of attacks
Understanding the fundamentals of attacks
 
Rump : iOS patch diffing
Rump : iOS patch diffingRump : iOS patch diffing
Rump : iOS patch diffing
 
An easy way into your sap systems v3.0
An easy way into your sap systems v3.0An easy way into your sap systems v3.0
An easy way into your sap systems v3.0
 
Reverse engineering Swisscom's Centro Grande Modem
Reverse engineering Swisscom's Centro Grande ModemReverse engineering Swisscom's Centro Grande Modem
Reverse engineering Swisscom's Centro Grande Modem
 
Easy public-private-keys-strong-authentication-using-u2 f
Easy public-private-keys-strong-authentication-using-u2 fEasy public-private-keys-strong-authentication-using-u2 f
Easy public-private-keys-strong-authentication-using-u2 f
 
Create a-strong-two-factors-authentication-device-for-less-than-chf-100
Create a-strong-two-factors-authentication-device-for-less-than-chf-100Create a-strong-two-factors-authentication-device-for-less-than-chf-100
Create a-strong-two-factors-authentication-device-for-less-than-chf-100
 
Offline bruteforce attack on wi fi protected setup
Offline bruteforce attack on wi fi protected setupOffline bruteforce attack on wi fi protected setup
Offline bruteforce attack on wi fi protected setup
 
App secforum2014 andrivet-cplusplus11-metaprogramming_applied_to_software_obf...
App secforum2014 andrivet-cplusplus11-metaprogramming_applied_to_software_obf...App secforum2014 andrivet-cplusplus11-metaprogramming_applied_to_software_obf...
App secforum2014 andrivet-cplusplus11-metaprogramming_applied_to_software_obf...
 
Warning Ahead: SecurityStorms are Brewing in Your JavaScript
Warning Ahead: SecurityStorms are Brewing in Your JavaScriptWarning Ahead: SecurityStorms are Brewing in Your JavaScript
Warning Ahead: SecurityStorms are Brewing in Your JavaScript
 
Killing any security product … using a Mimikatz undocumented feature
Killing any security product … using a Mimikatz undocumented featureKilling any security product … using a Mimikatz undocumented feature
Killing any security product … using a Mimikatz undocumented feature
 
Rump attaque usb_caralinda_fabrice
Rump attaque usb_caralinda_fabriceRump attaque usb_caralinda_fabrice
Rump attaque usb_caralinda_fabrice
 
Operation emmental appsec
Operation emmental appsecOperation emmental appsec
Operation emmental appsec
 

Último

Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoffsammart93
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProduct Anonymous
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdflior mazor
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century educationjfdjdjcjdnsjd
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024The Digital Insurer
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 

Último (20)

Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 

ASFWS 2011: Harmonizing Identity and Privacy in Digital Identity and Authentication technologies

  • 1. Harmonizing Identity and Privacy in Digital Identity and Authentication technologies Simon Blanchet Information Security & Risk Team Leader - Application Security {Undisclosed} Private Bank
  • 2. Who Am I? Simon Blanchet, CISSP 11+ years in Information System Security Security Security / Cryptographic Software Developer Information Security Professional (Application / Software Security) in Private Banking Hooked: Computers, BBSes, “hacking scene” Computer Science Passionate about Cryptology (Classical, Applied) & Software (In)Security 27.10.2011 Application Security Forum - Western Switzerland - 2011 2
  • 3. Who Am I? Crypto / Security Software Developer Secure Email Solution (X.509, OpenSSL, MS CAPI, …) Meta-IDS built on OpenBSD (aggregation, correlation) Digital Credential initial PoC / SDK Information Security Professional (Swiss Banking) Application Security Architect (PKI, AAA, libs (authn, crypto), …) Smartcard Programming & Integration (PKCS11, APDUS) Application Security Team Lead – Private Bank Software Security, ARA, Threat Modeling, Security Testing 27.10.2011 Application Security Forum - Western Switzerland - 2011 3
  • 4. Who Am I? Fun facts: Own (too) many books on Cryptology and Brewing Some of which are signed by the author with dedication Foodies, Beer aficionado Urban travelers, love languages 27.10.2011 Application Security Forum - Western Switzerland - 2011 4
  • 5. Agenda What this talk IS about / What this talk is NOT about Authentication & Privacy Identity Meta System (IdP, RP, Subject / Principal, …) PKI, X.509, Case Study: SSL mutual authentication Introducing the Laws of Identity Some issues with current authentication schemes Introducing Elementary Cryptographic Primitives Introducing Digital Credential 27.10.2011 Application Security Forum - Western Switzerland - 2011 5
  • 6. What this talk IS about Digital Identity Authentication Digital Privacy in the authentication world Identity Provider, Relying Parties, Subject Limitations of current implementations Elementary cryptographic primitives RSA, Digital Signature, Discrete Logarithms, ZKIP, Blind Signature, Selective Disclosure, … 27.10.2011 Application Security Forum - Western Switzerland - 2011 6
  • 7. What this talk is NOT about Anonymous browsing MIX networks / Onion Routing Hiding identity at the network level Political statement / Privacy evangelism 27.10.2011 Application Security Forum - Western Switzerland - 2011 7
  • 8. Authentication & Privacy Definition, means, why, conflicting / diametrically opposed concepts? Security vs Privacy debate 27.10.2011 Application Security Forum - Western Switzerland - 2011 8
  • 9. Identification & Authentication Identification Act or process of identifying somebody or something or of being identified. So, it’s an act or process of showing who somebody is. Act of claiming an identity, where an identity is a set of one or more signs signifying a distinct entity. Authentication Act or process of proving something to be valid, genuine or true about someone’s identity. Act of verifying that identity, where a verification consists in establishing, to the satisfaction of the verifier, that the sign signifies the entity. 27.10.2011 Application Security Forum - Western Switzerland - 2011 9
  • 10. Identification vs Authentication Identification Ex: “Hi I’m Simon”, “Hi I’m the owner of this car” Authentication Ex: “Hi I’m Simon, here’s my passport” Something I own Passport Ex: “Hi I’m Simon, here’s my passport and let me sign this piece of paper” Something I own Passport Something I am My signature 27.10.2011 Application Security Forum - Western Switzerland - 2011 10
  • 11. Authentication (1/2) Authentication factors Knowledge Something you know Ex: Password, Pin code, Passphrase, answer to a special ? Ownership Something you own Ex: Security Token, Cell phone, Private Key associated to a cert Inherence Something you do or are Ex: Fingerprint, voice, retina (think biometrics) Multi-factor Authentication Any combination of more than one of the above… 27.10.2011 Application Security Forum - Western Switzerland - 2011 11
  • 12. Authentication (2/2) SSL Mutual Authentication Public Key Digital Signature (more on this later…) Hardware / Security Token Shared Secret Key Authentication OTP based on Shared Secret + Time OTP based on Shared Secret + Counter OTP based on Shared Secret + Challenge The minimum requirement of any token is at least an inherent unique identity… OpenID / SAML / … 27.10.2011 Application Security Forum - Western Switzerland - 2011 12
  • 13. Privacy Ability of a person to control the availability of information about and exposure of himself or herself. It is related to being able to function in society anonymously (including pseudonymous or blind credential identification) 27.10.2011 Application Security Forum - Western Switzerland - 2011 13
  • 14. Anonymity / Pseudonymity Anonymity No information linking an identifier to its entity Identity that is not bound or linked to an entity Obscuring the identity of an entity Pseudonymity Pseudonym is a fictitious identifier which is not immediately associated to an entity Ex: Pen names, Nicknames, … Linking & Tracking possible, pseudo revealed: Game Over 27.10.2011 Application Security Forum - Western Switzerland - 2011 14
  • 15. Security vs Privacy Is this a real dilemma? Conflicting / diametrically opposed concepts? We hear a lot about trading your Privacy to increase your Security in airport security Full-Body Scanners anyone? 27.10.2011 Application Security Forum - Western Switzerland - 2011 15
  • 16. Security vs Privacy Post 9/11 How much privacy are you willing to give up for security? Security or Privacy? Fundamental dichotomy? NOT really… Security affects Privacy when it's based on identity Real question: Liberty versus Control Quoting Benjamin Franklin: "Those who would give up essential liberty to purchase a little temporary safety, deserve neither liberty nor safety." 27.10.2011 Application Security Forum - Western Switzerland - 2011 16
  • 17. Identity Meta System IdP - Identity Provider Issues digital identity Ex: CA for X.509 Digital Certificate RP - Relying Parties Requires identity / Trust IdP Ex: Mutual SSL authn protected web server S / P – Subject / Principal Entities about whom claims are made Ex: Individual owning a cert & its associated private key 27.10.2011 Application Security Forum - Western Switzerland - 2011 17
  • 18. PKI IdP is the Certification Authority (CA) Authenticate Validate CSR Issue Cert Cryptographic IdP binding Identity + Public Key Subjec Access Request RP t Certificate + Proof of Keep Private Key possession private key Sign(Attrib + Pub Key) CSR 27.10.2011 Application Security Forum - Western Switzerland - 2011 18
  • 19. Case Study SSL Mutual Authentication 27.10.2011 Application Security Forum - Western Switzerland - 2011 19
  • 20. SSL Mutual Authentication Common Trusted IdP (CA) between RP & S CA issues a digital certificate to Subject Client-side key pair generation PKCS10 Certificate Signing Request sent to CA CA authenticate Subject & verify proof of possession of associated Private Key CA issues X.509 certificate to Subject 27.10.2011 Application Security Forum - Western Switzerland - 2011 20
  • 21. SSL Mutual Authentication RP is a Web Server configured to require a client certificate SSL “Server Hello” – “Client Certificate Request” $ openssl s_server -www -key myca_privkey.pem -cert myca.pem -state -msg -debug -Verify myca.pem 27.10.2011 Application Security Forum - Western Switzerland - 2011 21
  • 22. SSL Mutual Authentication Copyright IBM Corporation 1999, 2011. All Rights Reserved. This topic's URL: http://publib.boulder.ibm.com/infocenter/wmqv7/v7r0/topic/com.ibm.mq.csqzas.doc/sy10660_.htm 27.10.2011 sy10660_ Application Security Forum - Western Switzerland - 2011 22
  • 23. SSL Mutual Authentication So the client is only sending his certificate back to the server or is he? What else would be needed and why? Proof of possession of associated private key A certificate is public by definition … How to prove to a RP that we own such key? Someone said “Digital Signature”? What is really signed here? Why? 27.10.2011 Application Security Forum - Western Switzerland - 2011 23
  • 24. SSL Mutual Authentication What can be signed? Who’s providing the material to sign? The server only? The client only? Both? Why? What can go wrong if not both? What’s the outcome of all of this? Server obtain a proof that the Client owns the private key associated with the cert shown 27.10.2011 Application Security Forum - Western Switzerland - 2011 24
  • 25. Laws of Identity ii.a 27.10.2011 Application Security Forum - Western Switzerland - 2011 25
  • 26. Laws of Identity ii.a 1. User Control and Consent 2. Minimal Disclosure for a Constrained Use 3. Justifiable Parties 4. Directed Identity 5. Pluralism of Operators and Technologies 6. Human Integration 7. Consistent Experience Across Contexts 27.10.2011 Application Security Forum - Western Switzerland - 2011 26
  • 27. Some issues with current schemes 27.10.2011 Application Security Forum - Western Switzerland - 2011 27
  • 28. Privacy Issues with current schemes IdP sees the certificates it issues RP can always track the entity authenticating RP can store all the certificates presented Different RPs can exchange & link those certificates ALL the attributes contained in the certificate are disclosed to the RP CRLs are distributed to all RP 27.10.2011 Application Security Forum - Western Switzerland - 2011 28
  • 29. X.509 SSL Mutal Authn (1/2) 1. User Control and Consent ✗ / ? By Default: NO under most common OSes MS CAPI Private Key Security Level 2. Minimal Disclosure for a Constrained Use ✗ ALL attributes embedded in the cert are disclosed 27.10.2011 Application Security Forum - Western Switzerland - 2011 29
  • 30. Issues with X.509 authn (2/2) Cert contains direct unique identifiers such as: Subject Key Identifier ( 2.5.29.14 ) IssuerDN + Serial Number Common Name* Cert contains indirect unique identifiers: Public Key CA’s Signature Computed Thumbprint 27.10.2011 Application Security Forum - Western Switzerland - 2011 30
  • 31. Cryptographic Primitives 27.10.2011 Application Security Forum - Western Switzerland - 2011 31
  • 32. Cryptographic Primitives RSA Discrete Logarithm Problem (DLP) Zero-Knowledge Proof (ZKP) Prover Subject Verifier RP Blind Signature Selective Disclosure 27.10.2011 Application Security Forum - Western Switzerland - 2011 32
  • 33. RSA P & Q: Large random prime numbers n = P * Q Modulus common to privkey & pubkey Compute φ(n) = (p – 1)(q – 1) Choose an integer e such that 1 < e < φ(n) and gcd(e,φ(n)) = 1 public key d = e–1 mod φ(n) private key Encryption-Decryption / Signature-Validation ENC/DEC: c = me (mod n), m = cd (mod n) SIG/VAL: s = hd (mod n), h = se (mod n) h’=h? 27.10.2011 Application Security Forum - Western Switzerland - 2011 33
  • 34. Discrete Logarithm Problem g and h are elements of a finite cyclic group G then a solution x of the equation gx = h is called a discrete logarithm to the base g of h in the group G. Given g ≠1 and a random h := gx, it is not possible to find x from computational complexity standpoint. 27.10.2011 Application Security Forum - Western Switzerland - 2011 34
  • 35. Zero Knowledge Proof For Children… (from Jean-Jacques Quisquater’s paper*) Repeat until confidence level is reached… • http://en.wikipedia.org/wiki/Zero-knowledge_proof 27.10.2011 Application Security Forum - Western Switzerland - 2011 35
  • 36. Introducing digital credential • Issuing protocol Blind Signature – Subject can (blind) “randomize” its public key – IdP can still sign without “knowing” the public key – The resulting IdP signature is also “blinded” from the IdP perspective • Showing protocol Selective Disclosure – Subject can blind, hence selectively disclose only the attributes he wishes to do to the RP (Verifier) 27.10.2011 Application Security Forum - Western Switzerland - 2011 36
  • 37. Conclusion Pseudonymity != Anonymity Security XOR Privacy? NOT Really Liberty VS Control THE real question Most current authentication schemes were not built with “privacy” in mind and currently don’t comply with the “7 Laws of Identity” Some cryptographic constructs exists to implement privacy and empower the Subject Implementations of those constructs already exist 27.10.2011 Application Security Forum - Western Switzerland - 2011 37
  • 38. © flickr.com/horiavarlan horiavarlan Questions Questions ? 27.10.2011 Application Security Forum - Western Switzerland - 2011 38
  • 39. Thank You! / Merci! Simon Blanchet simon.blanchet@gmail.com http://ch.linkedin.com/in/sblanchet SLIDES A TELECHARGER PROCHAINEMENT: http://slideshare.net/ASF-WS 27.10.2011 Application Security Forum - Western Switzerland - 2011 39
  • 40. References (1/2) i. Microsoft’s Vision for an Identity Metasystem a. http://www.identityblog.com/stories/2005/10/06/IdentityMetasystem.pdf ii. The Laws of Identity, Kim Cameron a. http://www.identityblog.com/stories/2005/05/13/TheLawsOfIdentity.pdf iii. Rethinking Public Key Infrastructures and Digital Certificates, Stefan Brands a. http://mitpress.mit.edu/catalog/item/default.asp?sid=DB63048D-0822-4233-8765- 55C534600287&ttype=2&tid=3801 b. http://www.credentica.com/the_mit_pressbook.html iv. Work of David Chaum & Stefan Brands, School of Computer Science and Statistics at Trinity College Dublin (Michael Peirce’s homepage) a. http://ntrg.cs.tcd.ie/mepeirce/Project/chaum.html b. http://ntrg.cs.tcd.ie/mepeirce/Project/Mlists/brands.html v. The Id Element a. http://channel9.msdn.com/Shows/Identity b. http://channel9.msdn.com/shows/Identity/Deep-Dive-into-U-Prove-Cryptographic-protocols 27.10.2011 Application Security Forum - Western Switzerland - 2011 40
  • 41. References (2/2) v. 7 Laws of Identity, Ann Cavoukian a. http://www.ipc.on.ca/images/Resources/up-7laws_whitepaper.pdf vi. The problem(s) with OpenID, The Identity Corner a. http://www.untrusted.ca/cache/openid.html vii. An Overview of an SSL Handshake & How SSL provides authentication, confidentiality, and integrity a. http://publib.boulder.ibm.com/infocenter/wmqv7/v7r0/advanced/print.jsp?topic=/com.ibm.mq. csqzas.doc/sy10670_.htm&isSelectedTopicPrint=true b. http://publib.boulder.ibm.com/infocenter/wmqv7/v7r0/index.jsp?topic=%2Fcom.ibm.mq.csqzas .doc%2Fsy10660_.htm viii. Links Blog (Identity), Ben Laurie a. http://www.links.org/?cat=8 ix. U-Prove Crypto SDK V1.1 (Java Edition) - Apache 2.0 open-source license a. http://archive.msdn.microsoft.com/uprovesdkjava x. Random Thoughts on Digital Identity, Digital Identity Glossary a. http://blog.onghome.com/glossary.htm 27.10.2011 Application Security Forum - Western Switzerland - 2011 41

Notas do Editor

  1. Being quite involved in designing and implementing cryptographic software &amp; software implementing security features. Applied cryptography (X.509, S/MIME, OpenSSL, Crypto API, Crypto++, …).Worked as an Application Security Architect for a Private Bank in Geneva integrating and implementing SSO and Strong Authentication solutions (smartcard programming at every level (CAPI, PKCS11, APDUS)) and PKI migration and integration.From implementing Security Product (Product Implementing Security Features) to Building Security In Software, hence building Secure Software. Because a Security Software is not necessarily a Secure Software…
  2. Authentication: DefinitionsMight want to skip those one and pass quickly over them if this is something too obvious for the crowd…
  3. Authentication: Real world examplesMight want to skip those one and pass quickly over them if this is something too obvious for the crowd…
  4. Authentication: IT worldMight want to skip those one and pass quickly over them if this is something too obvious for the crowd…
  5. Authentication: MechanismsMight want to skip those one and pass quickly over them if this is something too obvious for the crowd…
  6. This part can be interactive…
  7. This part can be interactive…
  8. 1)Technical identity systems must only reveal information identifying a user with the user’s consent. 2) The identity metasystem must disclose the least identifying information possible, as this is the most stable, long-term solution.3) Identity systems must be designed so the disclosure of identifying information is limited to parties having a necessary and justifiable place in a given identity relationship.4)A universal identity metasystem must support both “omnidirectional” identifiers for use by public entities and “unidirectional” identifiers for use by private entities, thus facilitating discovery while preventing unnecessary release of correlation handles. 5) A universal identity solution must utilize and enable the interoperation of multiple identity technologies run by multiple identity providers. 6) The identity metasystem must define the human user to be a component of the distributed system, integrated through unambiguous human-machine communication mechanisms offering protection against identity attacks. 7) The unifying identity metasystem must guarantee its users a simple, consistent experience while enabling separation of contexts through multiple operators and technologies.
  9. Use analogy of Cave with 2 paths and door, repeat the experience… Confidence level will go up.