What Identity Systems Can and Cannot Do - PowerPoint PPT Presentation

About This Presentation
Title:

What Identity Systems Can and Cannot Do

Description:

ID cards were very useful for splitting the Tory front bench in the run-up to the election ... Rather than universal identity run by the government, we should ... – PowerPoint PPT presentation

Number of Views:49
Avg rating:3.0/5.0
Slides: 32
Provided by: RossAn1
Category:
Tags: identity | systems

less

Transcript and Presenter's Notes

Title: What Identity Systems Can and Cannot Do


1
What Identity Systems Can and Cannot Do
  • Ross Anderson
  • Cambridge

2
Outline of talk
  • Do identity systems solve the right problem?
  • Will they affect behaviour in adverse ways?
  • What benefits can we get from better naming
    mechanisms for distributed systems?
  • How well do the component technologies work
    separately and together?
  • What are the research challenges?

3
Historical background
  • Drive over last 10-15 years to identify and track
    people (and things) using PKI, tamper-resistant
    hardware, biometrics, database checks
  • Yet Baltimore failed, and Verisign almost did!
  • I predicted failure for reasons set out later
  • Yet the efforts intensified since 9/11
  • No doubt some apps will work, others wont. What
    can we learn from previous failures?

4
Historical background (2)
  • UK government has tried repeatedly to reintroduce
    ID cards since Churchill abolished them (NHS,
    welfare, )
  • Peter Lilley, who tried in 1993, learned that
    police didnt want them (knew who the bad guys
    were but didnt have evidence), nor the spooks
    (ditto but didnt know intentions). Asylum
    seekers already have them
  • ID fraud well, thats actually libel

5
Cynical views
  • ID cards were very useful for splitting the Tory
    front bench in the run-up to the election
  • They grab a huge empire for the Home Office in
    terms of Whitehall systems
  • Theres a huge lobbying push from vendors
  • Dick Clarke on displacement activities
  • The security-industrial complex (Robert
    OHarrow, Washington Post)

6
Lessons from PKI
  • Idea people and things have many electronic
    identities. Build an infrastructure to join them
    up. Thanks to the browser wars, it was an
    oligopoly from the word go
  • Eventually youd pay Verisign 5 every two years
    to renew the cert in your toaster!
  • Governments raced to pass electronic signature
    laws and e-commerce directives
  • But the public didnt buy, and neither did anyone
    else outside a few niche markets

7
Lessons from PKI (2)
  • Would you sign the following?
  • I agree to be unreservedly liable for all
    signatures that are verified by the key that I
    now present to you and I will underwrite all the
    risks taken by anyone as a result of relying on
    it
  • (see Bohm, Brown and Gladman, at www.fipr.org)

8
Economics of Information Security
  • Liability-dumping undermined PKI
  • and ATM security in the UK banks blamed
    customers for fraud then got careless!
  • Medical record systems were designed for
    convenience of administrators, not privacy of
    patients leading to HIPAA
  • Its extremely hard to protect a system which one
    party defends, while another pays the cost of
    security failure

9
Economics of Infosec (2)
  • In the last five years, this subject has grown
    rapidly to include many topics
  • Economics of bugs and the patching cycle
  • DRM, accessory control and competition policy
  • Cooperation and conflict in networks
  • Why people say they want privacy but wont pay
    for it
  • What sort of mechanisms might stop spam
  • Many fascinating insights and the fifth annual
    workshop (WEIS 2006) will be held in Cambridge,
    June 26-28 2006

10
Distributed System Issues
  • Many things can scale badly consistency,
    synchronisation, fault tolerance, failure
    recovery and naming
  • Often a global naming system can cause as many
    problems as it solves
  • Why should a bank use an external PKI when
    account numbers already exist? Even linking up
    account numbers is hard enough!
  • What are names for, anyway?

11
Whats in a Name?
  • Recognition starts out relative
  • Evolutionary game theory social cooperation
    emerges when we recognize people who cooperated /
    cheated in the past
  • Property is the David E Bell who bought this
    house 14 years ago the D Elliott Bell who is now
    trying to sell it?
  • When is it worthwhile to make it universal?

12
Whats in a Name? (2)
  • Names may not be all in one place, so resolving
    them brings all the problems of a distributed
    system
  • Names imply commitments, and often a name at one
    level is an address at the next. Addresses
    change, and stuff breaks (The GCHQ Protocol)
  • Human names are rarely unique, and carry all
    sorts of cultural baggage (the Trosttádottir
    case)
  • Even surrogates are hard Icelanders have one
    SSN, Americans can have several, while German ID
    card numbers change when you renew them

13
Whats in a Name? (3)
  • Keep linkages short to minimise error and
    obsolescence
  • KA -gt Ross Anderson -gt sysadmin of rake
  • isnt as good as
  • KA -gt sysadmin of rake -gt Ross Anderson
  • In general you should not be naming and
    authenticating people but roles Officer of the
    watch, Manager of the Cambridge branch
  • And expect to end up needing more names than you
    thought (IP 13-gt16 digits for credit cards)

14
Whats in a Name? (4)
  • Remember the big push for multifunction
    smartcards 10 years ago?
  • My perspective (from an electricity meter
    project) we could do it technically but the
    client couldnt cope with liability issues, plus
    control of card upgrade, standards and so on
  • Cardis 94 discussion Philippe Maes said the
    initiative was being killed by arguments about
    whose logo went on the card

15
Revocation
  • The useful lifetime of a public-key certificate
    is inversely proportional to the number of things
    its good for
  • Kents
    law
  • Revocation is often the hard problem, and when it
    is, it can be very hard indeed

16
Component technologies (1)
  • Tamper resistant products are much less awful
    than 10 years ago
  • Size matters! Exploding complexity and a
    lengthening tool chain push up attack costs
  • The toughest target weve seen was the Magic Gate
    (accessory control) chip on the Playstation
  • One lesson randomize everything and dont give
    the attacker a single entry point! (See my SPW
    2004 paper on The Dancing Bear)

17
Component technologies (2)
  • The servers that track people or things have
    different problems
  • Databases tracking people aggregate and leak
    personal information a data protection crunch
    is coming sometime
  • Databases tracking things can get big tens of
    billions of cartons of a typical consumer good
    and can undermine trade and competition policy

18
Component technologies (3)
  • Were about to see how well biometric systems
    stand up to large-scale field use. This aint
    obvious!
  • Manuscript signatures awful in lab, but fine in
    practice
  • Fingerprint systems were trusted completely by
    the UK police force for 50 years until the
    McKie case here in Edinburgh
  • Iris scanning did fantastically well in lab
    tests, but recent UK Passport Office trials
    showed worrying levels of failure-to-enrol and
    failure-to-match

19
Biometrics cards crypto
  • How can we combine component technologies so that
    the system fails as gracefully as a component
    failure permits?
  • Example iris biometric can maybe be observed,
    password can maybe be guessed, smartcard can
    maybe be stolen and used or with lower
    probability reverse-engineered
  • How can you make a secret (such as a key) depend
    as robustly as possible on all three?

20
Biometrics cards crypto (2)
  • Iris codes can have say 10 of bits different
    between observations of same eye
  • So serious error correction is needed
  • Also some means of revocation
  • Various previous attempts didnt work
  • My student Hao Feng set out to build a system
    that did work with me and John Daugman
    (inventor of iris scanning)

21
Iris code statistics
22
How it works
  • Some random errors, and some burst errors (e.g.
    from eyelashes, specular reflections)
  • Design the coding carefully to suit, add in a
    password, do the computation in a smartcard
  • Security analysis neither simple nor conventional!

23
Protection goals
  • If biometric known, have full benefit of token
    password liveness test if any
  • If token stolen, need to get biometric and
    theres still a password retry counter
  • If token reversed, its still hard to get either
    key or biometric from the locked code
  • Full details H Feng, R Anderson, J Daugman,
    Combining Crypto and Biometrics Effectively

24
Laser Surface Authentication
  • Invented by Russell Cowburn at Imperial (formerly
    of Cambridge -)
  • Idea scan the surface of paper or other
    packaging and get a unique code which is much
    the same as an iris code (the error properties
    differ)
  • Identify already-seen objects by database lookup,
    or use objects to carry unique keys
  • Do what RFID does but cheaper (it works on
    existing packaging) and more securely (you need
    to swap the package, not just the chip, to spoof)

25
A microscopy image of paper
26
A microscopy image of a plastic card surface
Atomic Force Microscopy
100nm
27
A typical paper scan
28
Cross correlation between 2 scans
29
Results of a small scale trial
  • 500 different items
  • 125,000 different pairs
  • 100 identification

different objects paired
same object rescanned
30
Where next?
  • Rather than universal identity run by the
    government, we should expect multiple identities
    tailored to the application, which we link up
    only when needed
  • We will need different tools in different
    applications
  • Usability, maintainability and robustness will be
    of particular importance

31
Conclusions
  • Identifying principals from machines and roles
    to people and things is interesting, important,
    and complex. Simplistic solutions wont work
  • There are many issues with components, with
    system design, and with higher-level stuff like
    incentives and liability
  • I reckon the research frontier for the next five
    years will place more emphasis on usability,
    maintainability and robustness
Write a Comment
User Comments (0)
About PowerShow.com