FIPS 201 Framework: Special Pubs 800-73,76,78 Jim Dray HSPD-12 Workshop May 4/5, 2005.

Slides:



Advertisements
Similar presentations
Public Key Infrastructure and Applications
Advertisements

Doc.: IEEE /1012r0 Submission September 2009 Dan Harkins, Aruba NetworksSlide 1 Suite-B Compliance for a Mesh Network Date: Authors:
Confidential 1 Phoenix Security Architecture and DevID July 2005 Karen Zelenko Phoenix Technologies.
1 ABCs of PKI TAG Presentation 18 th May 2004 Paul Butler.
Technical Presentation AIAC Group 11. System Rationale System Architecture Secure Channel Establishment Username/Password Cartão Cidadão Digital.
Experiences with Massive PKI Deployment and Usage Daniel Kouřil, Michal Procházka Masaryk University & CESNET Security and Protection of Information 2009.
CardTech/SecureTech 2002 Government Smart Card Government Smart Card Smart Card Standards and the Government Smart Card Interoperability Specification.
Card and Reader Overview Gerald Smith Sr. Consultant ID Technology Partners.
Status of U.S. Smart Card Deployment Jim Dray Porvoo 7/ World eID Meeting May 2005.
Mobile Devices in the DoD
Trusted Symbol of the Digital Economy 1 Bill Holmes – VP Marketing ID Platform - Smart Cards.
Appropriate Access InCommon Identity Assurance Profiles David L. Wasley Campus Architecture and Middleware Planning workshop February 2008.
Overview of US Federal Identity Management Initiatives Peter Alterman, Ph.D. Chair, Federal PKI Policy Authority and Asst. CIO E-Authentication, NIH.
1 HSPD-12 Compliance: The Role of Federal PKI Judith Spencer Chair, Federal Identity Credentialing Office of Governmentwide Policy General Services Administration.
Identity and Access IDPrime MD 8840 and IDCore 8030 MicroSD cards
15June’061 NASA PKI and the Federal Environment 13th Fed-Ed PKI Meeting 15 June ‘06 Presenter: Tice DeYoung.
1 1 A Synopsis of Federal Information Processing Standard (FIPS) 201 for Personal Identity Verification (PIV) of Federal Employees and Contractors Presentation.
Personal Identity Verification Program
FIPS 201 Personal Identity Verification For Federal Employees and Contractors National Institute of Standards and Technology Information Technology Laboratory.
Cryptography and Network Security
“Personal Identity Verification (PIV) of Federal Employees and Contractors” October 27, 2005 Homeland Security Presidential Directive 12 (HSPD-12)
Cryptography Usage in TWIC (Draft v4 8Dec06)
NIST Special Publication Biometric Data Specification for Personal Identity Verification March 3, 2006 Update.
Windows Vista And Longhorn Server PKI Enhancements Avi Ben-Menahem Lead Program Manager Windows Security Microsoft Corporation.
Chapter 9: Using and Managing Keys Security+ Guide to Network Security Fundamentals Second Edition.
Federal Information Processing Standard (FIPS) 201, Personal Identity Verification for Federal Employees and Contractors Tim Polk May.
EDUCAUSE Fed/Higher ED PKI Coordination Meeting
PIV Data Model Testing Ketan Mehta March 3, 2006.
Java Security Model Lab#1 I. Omaima Al-Matrafi. Safety features built into the JVM Type-safe reference casting Structured memory access (no pointer arithmetic)
Lesson Title: Introduction to Cryptography Dale R. Thompson Computer Science and Computer Engineering Dept. University of Arkansas
Cryptography Basic (cont)
November 1, 2006Sarah Wahl / Graduate Student UCCS1 Public Key Infrastructure By Sarah Wahl.
Chapter 3 Encryption Algorithms & Systems (Part C)
Fall 2010/Lecture 311 CS 426 (Fall 2010) Public Key Encryption and Digital Signatures.
Network Security Essentials Fifth Edition by William Stallings Fifth Edition by William Stallings.
Chapter 8.  Cryptography is the science of keeping information secure in terms of confidentiality and integrity.  Cryptography is also referred to as.
Key Management Guidelines. 1. Introduction 2. Glossary of Terms and Acronyms 3. Cryptographic Algorithms, Keys and Other Keying Material 4. Key Management.
Digital Signature Xiaoyan Guo/ Xiaohang Luo/
NASA Personal Identity Verification (PIV) NASA Personal Identity Verification (PIV) High Level System Overview Tice F. DeYoung, PhD 14th Fed/Ed Workshop.
Russ Housley IETF Chair Founder, Vigil Security, LLC 8 June 2009 NIST Key Management Workshop Key Management in Internet Security Protocols.
Bob can sign a message using a digital signature generation algorithm
Digital Signatures Slides by Kent Seamons and Tim van der Horst Last Updated: Oct 7, 2013.
© Neeraj Suri EU-NSF ICT March 2006 DEWSNet Dependable Embedded Wired/Wireless Networks MUET Jamshoro Computer Security: Principles and Practice Slides.
1 Workshop on algorithms and parameters for Electronic Signatures November 25, Brussels.
Biometric Access Control in TWIC Read Hardware and Card Application Specification Roger Roehr.
.Net Security and Performance -has security slowed down the application By Krishnan Ganesh Madras.
Digital Signatures: Mathematics Zdeněk Říha. Data authentication Data integrity + data origin Digital signature Asymmetric cryptography public and private.
Introduction to Secure Messaging The Open Group Messaging Forum April 30, 2003.
Special Publication : Interfaces for Personal Identity Verification Jim Dray NIST NPIVP Workshop March 3, 2006.
CS 627 Elliptic Curves and Cryptography Paper by: Aleksandar Jurisic, Alfred J. Menezes Published: January 1998 Presented by: Sagar Chivate.
Java Security Pingping Ma Nov 2 nd, Overview Platform Security Cryptography Authentication and Access Control Public Key Infrastructure (PKI)
Key Management Workshop November 1-2, Cryptographic Algorithms, Keys, and other Keying Material  Approved cryptographic algorithms  Security.
Certificates and FIPS 201 Tim Polk March 3, 2006.
1 1 Update: ISO/IEC Identification Cards - Integrated circuit cards programming interfaces Teresa Schwarzhoff, U.S. Department of Commerce Porvoo-12:
Business and Systems Aligned. Business Empowered. TM Federal Identity Management Handbook May 5, 2005.
Chapter 21 Public-Key Cryptography and Message Authentication.
Computer Security: Principles and Practice First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown Chapter 2 – Cryptographic.
Some Perspectives on Smart Card Cryptography
Middleware for Secure Environments Presented by Kemal Altıntaş Hümeyra Topcu-Altıntaş Osman Şen.
European Electronic Identity Practices CEN TC224 WG15 European Citizen Card Standard Speaker: L. Gaston AXALTO Date: 26 May 05.
11 Authentication Algorithms Discussions CCSDS Security WG Winter 2007 Colorado Springs, Colorado USA Howard Weiss NASA/JPL/SPARTA
The Federal Information Processing Standards (FIPS) Encryption Suite Sean Smith COSC
1 NPIVP Workshop March 3, 2006 Red Auditorium, NIST, Gaithersburg PIV Test Guidelines Revisions Dr. R. Chandramouli (Mouli) (Director NPIVP)
Ketan Mehta March 3, 2006 PIV Data Model Testing Ketan Mehta March 3, 2006.
Dan Brown, Certicom Research November 10, 2004
Personal Identity Verification Program
EDUCAUSE Fed/Higher ED PKI Coordination Meeting
NASA Personal Identity Verification (PIV) High Level System Overview Tice F. DeYoung, PhD 14th Fed/Ed Workshop December 14, 2006.
Presentation transcript:

FIPS 201 Framework: Special Pubs ,76,78 Jim Dray HSPD-12 Workshop May 4/5, 2005

Special Publication PIV card application definition o NOT a general purpose card platform spec! Part 1: Common data model and migration Part 2: Transition card interfaces Part 3: End point specification

Part 1: Mandatory Data Objects PIV credential element objects o Card Capability Container: Discovery o Cardholder Unique Identifier: PACS 2.2 o PIV Authentication Key o Fingerprint Buffers (2) o Security Object

Part 1: Optional Data Objects Optional PIV credential element objects o Printed Information o Facial Image o Digital Signature Key o Key Management Key o Card Authentication Key

Part 1: Migration Issues Some agencies have smart card deployments Government Smart Card Interoperability Specification (NISTIR 6887) Migration path is based on continuity of the PIV data model Legacy agencies MAY use Part 2 transition specification

SP Part 2 Essentially a PIV profile of GSC-IS Maintains the GSC-IS dual card interfaces o File system o Virtual Machine Developed by the Government Smart Card Interagency Advisory Board Part 2 is informative

SP Part 3 Unified card command interface Compliant with existing international standards (ISO 7816) Technology neutrality: Implementable on any card platform Essential features for: o High degree of PIV card interoperability o Future-proofing PIV framework

Part 3: Data Model Data model is common to both Parts 2 and 3 Different identifiers (BER-TLV) used at the card edge in Part 3

Part 3: Standard Namespaces ASN.1 Object Identifiers in the PIV arc of the Computer Security Object Register at the Client Application Programming Interface PIV RID is the root of card Application Identifiers(AIDs) BER-TLV tags for data objects at the card interface

Part 3: PIV Card Application AID is A xx xx Full PIV RID to be published by NIST Access Control Rules applied to PIV credential objects Provides a set of 8 ISO compliant card interface commands Restricted functionality in contactless mode

Part 3: Client Application Programming Interface Equivalent to GSC-IS Basic Services Interface Provides 9 higher level commands Implemented by middleware PIV middleware is MUCH simpler than GSC-IS middleware because card command mapping is not required

Part 3: Reference Implementation Part 3 compliant implementation PIV card application running in a card simulator Middleware Publicly available Basis for conformance tests Estimated completion date June 25

SP Summary PIV II card application and client application programming interface spec Informative Part 2 transition specification for migrating legacy GSC-IS deployments Normative Part 3 end point specification All agencies are to reach full deployment of Part 3 PIV cards by the end of their PIV II Phase, regardless of the migration path chosen.

Special Publication Overview FIPS 201 relies on cryptography o To protect objects stored on the PIV card o To authenticate the PIV card or cardholder o To authenticate the source and integrity of status information

Cryptographic Strength Requirements SP mandates a transition from 80 bit strength to 112 bits of strength by 1/1/2011 o Cryptographic keys that provide long term data protection transition by 1/1/2009 to provide two years forward security Elliptic Curve Cryptography is specified with a minimum of 112 bits of strength (224 bit keys) o Avoid transition issues

Cryptographic Objects Stored on the PIV Card FIPS 201 specified o Cryptographic keys o Digitally signed objects CHUID Biometrics X.509 Certificates SP specified o Authentication/Integrity Object

Cryptographic keys Asymmetric private keys o PIV Authentication key (Mandatory) o Digital Signature key (Optional) o Key Management key (Optional) May support key transport or key agreement Card Management Key (Optional) o Symmetric key PIV Cardholder Authentication Key (Optional) o May be symmetric or asymmetric

Asymmetric Algorithms for Cryptographic Keys SP limits asymmetric keys to RSA and ECC o RSA must be 1024/2048/ bit keys phased out by 1/1/2011 Digital signature and key management keys transition by 1/1/2008 to provide for forward security Authentication keys transition by 1/1/2011 since forward security is not an issue o ECC must use a recommended curve from FIPS through 283 bit keys No phase out specified

Symmetric Algorithms for Cryptographic Keys SP limits symmetric keys to Triple DES (TDEA) and AES o TDEA must be two key or three key Two key TDEA phased out by 1/1/2011 o AES may be 128, 192, or 256 bit keys No phase out specified

Digitally Signed Objects Signatures may be generated using RSA or ECDSA o RSA may use PKCS #1 or PSS padding schemes o SHA-1, SHA-224, and SHA-256 hash algorithms SHA-1 phased out by 1/1/2011 Phase out depends on card expiration, not signature generation date

SP Security Object ICAO Authentication/Integrity Object Digitally signed hash table o The table includes a message digest for each of the objects (CHUID, keys, etc.) stored on the card o Message digests are generated using SHA-1, SHA-224, or SHA-256 SHA-1 phased out by 1/1/2011 o Signature requirements from previous slide

Status Information FIPS 201 relies upon digitally signed X.509 CRLs and OCSP responses to distribute status information Signatures may be generated using RSA or ECDSA o RSA may use PKCS #1 or PSS padding schemes o SHA-1, SHA-224, and SHA-256 hash algorithms SHA-1 phased out by 1/1/2011 Phase out depends on signature generation date

Special Publication Biometric Data Specification for Personal Identity Verification Major issue: Minutia vs. full image o File size o Interoperability o Privacy Still in draft form

Contact Information Curt Barker PIV Program Jim Dray ): Terry Schwarzhoff NIST Smart Card Program Manager, Standards NIST PIV Website: