Copyright 2000-12 1 COMP 3410 – I.T. in Electronic Commerce eSecurity Identity in Marketspaces Roger Clarke Xamax Consultancy, Canberra Visiting Professor,

Slides:



Advertisements
Similar presentations
Numbers Treasure Hunt Following each question, click on the answer. If correct, the next page will load with a graphic first – these can be used to check.
Advertisements

Variations of the Turing Machine
Copyright Roger Clarke Xamax Consultancy, Canberra Visiting Professor – Cyberspace Law & Policy UNSW and at the ANU and the Uni. of.
Chapter 10 Encryption: A Matter of Trust. Awad –Electronic Commerce 1/e © 2002 Prentice Hall 2 OBJECTIVES What is Encryption? Basic Cryptographic Algorithm.
1
Copyright Roger Clarke, Xamax Consultancy, Canberra Visiting Professor, Unis. of Hong Kong, U.N.S.W., ANU
Copyright Xamax Consultancy Pty Ltd, Canberra Visiting Professor, Uni. of Hong Kong, A.N.U. & U.N.S.W.
Copyright Roger Clarke, Xamax Consultancy, Canberra Visiting Professor, Unis. of Hong Kong, U.N.S.W., ANU
Distributed Systems Architectures
Copyright © 2003 Pearson Education, Inc. Slide 11-1.
Copyright © 2003 Pearson Education, Inc. Slide 1 Computer Systems Organization & Architecture Chapters 8-12 John D. Carpinelli.
Copyright © 2003 Pearson Education, Inc. Slide 7-1 Created by Cheryl M. Hughes The Web Wizards Guide to XML by Cheryl M. Hughes.
1 Copyright © 2013 Elsevier Inc. All rights reserved. Chapter 4 Computing Platforms.
Processes and Operating Systems
Slide 1 FastFacts Feature Presentation October 16 th, 2008 We are using audio during this session, so please dial in to our conference line… Phone number:
18 Copyright © 2005, Oracle. All rights reserved. Distributing Modular Applications: Introduction to Web Services.
1 ABCs of PKI TAG Presentation 18 th May 2004 Paul Butler.
Local Customization Chapter 2. Local Customization 2-2 Objectives Customization Considerations Types of Data Elements Location for Locally Defined Data.
Process a Customer Chapter 2. Process a Customer 2-2 Objectives Understand what defines a Customer Learn how to check for an existing Customer Learn how.
Computer Security CIS326 Dr Rachel Shipsey.
1 Pretty Good Privacy (PGP) Security for Electronic .
Plan My Care Brokerage Training Working in partnership with Improvement and Efficiency South East.
PUBLIC KEY CRYPTOSYSTEMS Symmetric Cryptosystems 6/05/2014 | pag. 2.
1 Advanced Tools for Account Searches and Portfolios Dawn Gamache Cindy Bylander.
1 Click here to End Presentation Software: Installation and Updates Internet Download CD release NACIS Updates.
1. Bryan Dreiling Main Contact for Three Year Plans
© Tally Solutions Pvt. Ltd. All Rights Reserved Shoper 9 License Management December 09.
Welcome. © 2008 ADP, Inc. 2 Overview A Look at the Web Site Question and Answer Session Agenda.
Break Time Remaining 10:00.
Turing Machines.
1. Documents types Visas (ID-2) ICAO standard passports (ID-3) ID cards and driving licences (ID-1) Travel and identity documents.
Table 12.1: Cash Flows to a Cash and Carry Trading Strategy.
ACT User Meeting June Your entitlements window Entitlements, roles and v1 security overview Problems with v1 security Tasks, jobs and v2 security.
Course Registration Overrides SLCM_WP_220 1SLCM_WP_220 Overrides.
PP Test Review Sections 6-1 to 6-6
EIS Bridge Tool and Staging Tables September 1, 2009 Instructor: Way Poteat Slide: 1.
Exarte Bezoek aan de Mediacampus Bachelor in de grafische en digitale media April 2014.
Sample Service Screenshots Enterprise Cloud Service 11.3.
Copyright © 2012, Elsevier Inc. All rights Reserved. 1 Chapter 7 Modeling Structure with Blocks.
1 © 2004, Cisco Systems, Inc. All rights reserved. CCNA 1 v3.1 Module 10 Routing Fundamentals and Subnets.
Adding Up In Chunks.
Services Course Windows Live SkyDrive Participant Guide.
SLP – Endless Possibilities What can SLP do for your school? Everything you need to know about SLP – past, present and future.
1 10 pt 15 pt 20 pt 25 pt 5 pt 10 pt 15 pt 20 pt 25 pt 5 pt 10 pt 15 pt 20 pt 25 pt 5 pt 10 pt 15 pt 20 pt 25 pt 5 pt 10 pt 15 pt 20 pt 25 pt 5 pt Synthetic.
Welcome to Instructions and tips for the online application process 1 June 2012.
GEtServices Services Training For Suppliers Requests/Proposals.
1 hi at no doifpi me be go we of at be do go hi if me no of pi we Inorder Traversal Inorder traversal. n Visit the left subtree. n Visit the node. n Visit.
Speak Up for Safety Dr. Susan Strauss Harassment & Bullying Consultant November 9, 2012.
Essential Cell Biology
Clock will move after 1 minute
PSSA Preparation.
Immunobiology: The Immune System in Health & Disease Sixth Edition
Chapter 13 Web Page Design Studio
Systems Analysis and Design in a Changing World, Fourth Edition
RefWorks: The Basics October 12, What is RefWorks? A personal bibliographic software manager –Manages citations –Creates bibliogaphies Accessible.
Introduction Peter Dolog dolog [at] cs [dot] aau [dot] dk Intelligent Web and Information Systems September 9, 2010.
1 DIGITAL INTERACTIVE MEDIA Wednesday, October 28, 2009.
User Security for e-Post Applications Dr Chandana Gamage University of Moratuwa.
1 Decidability continued…. 2 Theorem: For a recursively enumerable language it is undecidable to determine whether is finite Proof: We will reduce the.

SECURITY IN E-COMMERCE VARNA FREE UNIVERSITY Prof. Teodora Bakardjieva.
Digital Signature Xiaoyan Guo/ Xiaohang Luo/
Lecture 12 Electronic Business (MGT-485). Recap – Lecture 11 E-Commerce Security Environment Security Threats in E-commerce Technology Solutions.
1 Chapter 9 E- Security. Main security risks 2 (a) Transaction or credit card details stolen in transit. (b) Customer’s credit card details stolen from.
Security fundamentals Topic 5 Using a Public Key Infrastructure.
© Copyright 2009 SSLPost 01. © Copyright 2009 SSLPost 02 a recipient is sent an encrypted that contains data specific to that recipient the data.
LEARNING AREA 1 : INFORMATION AND COMMUNICATION TECHNOLOGY PRIVACY AUTHENTICATION VERIFICATION.
Information Systems Design and Development Security Precautions Computing Science.
Presentation transcript:

Copyright COMP 3410 – I.T. in Electronic Commerce eSecurity Identity in Marketspaces Roger Clarke Xamax Consultancy, Canberra Visiting Professor, A.N.U. and U.N.S.W. ETS3 {.html,.ppt} ANU RSCS, 16 October 2012

Copyright (Id)entification The process of associating data with a particular (id)entity (Id)entifier A particular attribute of an (id)entity that is sufficient to distinguish it from other instances of its class (cf. a candidate key)

Copyright

Copyright

Copyright Identities and Entities A User A Role (shift supervisor, delegate/rep, first-aider) Me-at-home, Me-at-work, Me-at-play A Guide-Dog, a Pet The Car the Pope's in A Physical Person (or an imposter) Different Physical People at various times A Physical Person in different contexts (or an imposter) A Dog, allowed / not allowed in an aeroplane Various physical cars

Copyright

Copyright

Copyright (Id)entified Transaction A Transaction in which the data can be associated with one or more (id)entities Examples Order paid with an identified credit card Order for delivery to a person at an address

Copyright Anonymous Transaction A Transaction in which the data cannot be associated with an entity (whether from the transaction alone, or by combining it with other data) Examples Calls from a public phone – ? Bus-rides – ? Cups of coffee – ? Drives along public roads ?

Copyright Pseudonymous Transaction The data may, however, be indirectly associated with the entity, if particular procedures are followed, e.g. the issuing of a search warrant authorising access to an otherwise closed index One in which the data cannot, in the normal course of events, be associated with a particular entity

Copyright Pseudonymous Transaction The data may, however, be indirectly associated with the entity, if particular procedures are followed, e.g. the issuing of a search warrant authorising access to an otherwise closed index Examples: HIV/AIDS research, share-trading, phone-calls with CLI, all Internet transactions One in which the data cannot, in the normal course of events, be associated with a particular entity

Copyright Authentication The process of confirming an assertion '(Id)entity Authentication' that data is associated with the correct (id)entity

Copyright Authentication The process of confirming an assertion 'Data Authentication' that data accurately reflects reality '(Id)entity Authentication' that data is associated with the correct (id)entity 'Attribute Authentication' that an entity has a particular attribute, especially: -eligibility for a subsidy, concession or tariff, or to purchase age-restricted goods or services -the power to perform acts on behalf of another entity 'Value Authentication' that liquid assets are of appropriate quality and quantity

Copyright Human (Id)entifiers AppearanceHow the person looks Social BehaviourHow the person interacts with others

Copyright Human (Id)entifiers AppearanceHow the person looks Social BehaviourHow the person interacts with others _________________________________________________________________________________________________________ ________ NameWhat the person is called by other people CodeWhat the person is called by an organisation

Copyright Human (Id)entifiers AppearanceHow the person looks Social BehaviourHow the person interacts with others _________________________________________________________________________________________________________ ________ NameWhat the person is called by other people CodeWhat the person is called by an organisation _________________________________________________________________________________________________________ ________ Bio-dynamicsWhat the person does Natural PhysiographyWhat the person is Imposed PhysicalWhat the person is now Characteristics

Copyright Human (Id)entity Authenticators What the Person Knows e.g. mothers maiden name, Password, PIN What the Person Has esp. a Token, e.g. a Ticket, Document, Card, or maybe a Digital Signature consistent with the Public Key attested to by a Digital Certificate What the Person Does (signing, keying) __________________________________________ ____ What the Person Is (biometrics) What the Person Is Now (imposed biometrics)

Copyright Human Identity Authentication Current Activities The Passports-originated 100-point Check, based on documents, continues to proliferate It is very weak, and it invites identity fraud by scattering insecure copies of key documents Organisations such as the new Online Banks are increasingly accessing 'public' records to cross-check data provided by the applicant e.g. Australia Post's register of names and addresses, the Electoral Roll, the White Pages,

Copyright Identity Authentication and Authorisation Its Application to Access Control

Copyright Identity Management aka Single Signon Across Organisations Industry Associations and Standards Initiatives Existing Associations Identrus Internet2 Shibboleth OASIS SAML The Open Group New Associations Liberty Alliance OpenID OpenSAML PingId SourceID Web Services Federation XNS

Copyright Biometrics Appearance height, weight, colour of skin, hair and eyes, visible physical markings, gender?, race??, facial hair??, wearing of glasses??, facial appearance?? Social Behaviour habituated body-signals, general voice characteristics, style of speech, visible handicaps Bio-Dynamics manner of writing one's signature, voice characteristics, keystroke dynamics, esp. of login-id, password Natural Physiography skull measurements??, teeth and skeletal injuries?, thumbprint, fingerprint sets, handprints, retinal scans, iris scans, capillary patterns (e.g. in earlobes), hand and digit geometry, DNA-patterns Imposed Features dog-tags, collars, bracelets and anklets, bar-codes and other kinds of brands, embedded micro-chips / RFID tags and transponders

Copyright The Biometric Process

Copyright Uses of Biometrics 1. For (Id)entification A process to find 1-among-many, in order to help answer the question 'Who is it?'

Copyright Uses of Biometrics 1. For (Id)entification A process to find 1-among-many, in order to help answer the question 'Who is it?' 2. For (Id)entity Authentication A process to test 1-to-1, in order to help answer the question'Is this the person who you think it is?'

Copyright Uses of Biometrics 1. For (Id)entification A process to find 1-among-many, in order to answer the question 'Who is it?' 2. For (Id)entity Authentication A process to test 1-to-1, in order to help answer the question'Is this the person who you think it is?' 3. For Attribute Authentication w/- (Id)entity A process to help answer the question 'Does this person (whoever they are) have the attribute they purport to have?'

Copyright The Huge Quality Problems with Biometric Applications Dimensions of Quality Reference-Measure Association Test-Measure Comparison Result-Computation Other Aspects of Quality Vulnerabilities Quality Measures Counter-Measures Spiralling Complexity

Copyright Consequences of the Quality Problems There is never 'a perfect match'; it's fuzzy A Tolerance Range has to be allowed 'False Positives' / 'False Acceptances' arise 'False Negatives' / 'False Rejections' arise Tighter Tolerances (to reduce False Negatives) increase the rate of False Positives; and vice versa The Scheme Sponsor sets (and re-sets) the Tolerances Frequent exceptions are mostly processed cursorily Occasional scares slow everything, annoy everyone

Copyright Threats to Biometric Applications Live Biometric capture, theft Live Biometric simulation Live Biometric substitution Reference Biometric substitution Reference Biometric forgery Message interception, modification, insertion Stored Biometric capture, theft, change, substitution Threshhold manipulation Device tampering Environmental tampering (e.g. lighting, jamming) Infrastructure manipulation (e.g. power-outage) Device or System override/backdoor/trojan utilisation Exception-Handling Procedures manipulation Fallback procedures for the Unenrollable subversion Insider collusion

Copyright Identity-Related Crimes Use of an identifier and/or authenticators... Identity Fraud... to financially advantage or disadvantage someone Identity Theft... to such an extent, or with such a negative impact, that further use by the person they were originally associated with is effectively precluded Identity-Facilitated Criminal Acts Proceeds of crime laundering, tax avoidance, trafficking... The identity that is compromised may be someone else's, 'fictional', or even the person's own

Copyright I.T. and Dataveillance Privacy-Invasive Technologies (the PITs) Data-Trail Intensification (id'd phones, SVCs, ITS) Data Warehousing and Data Mining Person-Location and Person-Tracking Stored Biometrics Imposed Biometrics

Copyright I.T. and Dataveillance Privacy-Invasive Technologies (the PITs) Data-Trail Intensification (id'd phones, SVCs, ITS) Data Warehousing and Data Mining Person-Location and Person-Tracking Stored Biometrics Imposed Biometrics Privacy-Enhancing Technologies (PETs) Countermeasures against the PITs Tools for Data Protection Tools for Client-Side Device Security Tools for Anonymity and Pseudonymity

Copyright PETS PIT Countermeasures Cookie-Cutters Cookie-Managers Personal Data Managers (e.g. P3P implementations) Personal Intermediaries / Proxies Data Protection Tools Client-Side Security Tools Channel, Server and Proxy/Firewall Security Tools

Copyright Savage PETs Deny identity Provide anonymity Genuinely anonymous ('Mixmaster') r ers, web-surfing tools, ePayment mechanisms, value authentication, attribute authentication

Copyright Gentle PETs Balance nymity and accountability through Protected Pseudonymity Intermediary Tools and Proxies, Client-Side Agents, Pseudonymous Connection, R ers, Web-Surfers

Copyright Digital Signatures and... A string of characters that the Sender adds to a message The Theory: Only the entity that has access to the relevant Private Key can have possibly sent the message... Public Key Infrastructure (PKI) A substantial set of equipment, software, procedures and organisations necessary to generate and protect key-pairs, generate signatures, publish public keys and revocations, pre-authenticate signors, authenticate signatures, assure quality, insure participants, prosecute the guilty

Copyright What a Digital Signature Actually Means A Digital Signature attests only that: the message was signed by a device that had access to the private key that matches the public key

Copyright Conventional, X.509-Based PKI Doesn't Work A DigSig does not confirm sender identity unless a long list of conditions is fulfilled Fulfilment of those conditions depends upon a substantial infrastructure, which is highly intrusive, and which has never been deployed Conventional, X.509-based PKI doesnt fulfil those conditions, and it never will

Copyright Alternative PKI Trust without Authenticated Identity Pretty Good Privacy (PGP) Intro: Simple Public Key Infrastructure (SPKI) Simple Distributed Security Infrastructure (SDSI) Stefan Brands / Credentica/MS UProve Bought by Microsoft, but now there's an open source SDK:

Copyright E-Trading Identity in Marketspaces Agenda 1.(Id)entification and Nymity 2.Authentication 3.Identity Management 4.Biometrics 5.Identity-Related Crimes 6.PITs and PETs 7.Digital Signatures and PKI

Copyright COMP 3410 – I.T. in Electronic Commerce eSecurity Identity in Marketspaces Roger Clarke Xamax Consultancy, Canberra Visiting Professor, A.N.U. and U.N.S.W. ETS3 {.html,.ppt} ANU RSCS, 16 October 2012

Copyright

Copyright

Copyright A string of characters that the Sender adds to a message The string is a concise representation of the whole message (called a Message Digest) In practice, a hashing algorithm is used The Digest is encrypted with the Senders Private Key The Receiver: decrypts the signature using the Senders Public Key regenerates the Message Digest from the message checks that the two are the same The Theory: Only the entity that has access to the relevant Private Key can have possibly sent the message A Digital Signature

Copyright Public Key Infrastructure (PKI) Signer-Side Means to generate a key-pair Security for the private key in use and storage Means to apply for a certificate Means to generate digital signatures Means to revoke a certificate Service-Provider Side Authentication of certificate applicants Issue of certificates Relier-Side Means to acquire certs Means to check: their value their currency Means to check dig sigs Means to sue service-providers

Copyright Conventional, X.509-Based PKI Doesn't Work A DigSig does not confirm sender identity unless a long list of conditions is fulfilled Fulfilment of those conditions depends upon a substantial infrastructure, which is highly intrusive, and which has never been deployed Conventional, X.509-based PKI doesnt fulfil those conditions, and it never will

Copyright What a Digital Signature Actually Means A Digital Signature attests only that: the message was signed by a device that had access to the private key that matches the public key

Copyright Public Key Infrastructure Security and Privacy Issues Generation of Key-Pairs In some schemes, someone else sees the Private Key Security of the Private Key It's vulnerable to malware when in use It's generally vulnerable in storage as well Onerous and Intrusive Authentication Processes Information Privacy Risks Directory of keyholder details, Trail of sites visited Consequential Privacy Implications e.g. increased expectation of identity disclosure

Copyright The SSL / https Process Sender Actions: Message-in-Clear-Text * Hash-Function => Hash-Value Hash-Value * Sender's-DigSig-Private-Key => Dig. Signature Message-in-Clear-Text || Signature => Signed-Text Signed-Text * Secret-Encryption-Key => Encrypted- Signed-Text Recipient Actions: Encrypted-Signed-Text / Secret-Encryption-Key => Message-in-Clear-Text || Signature Message-in-Clear-Text * Hash-Function => Hash-Value Signature / Sender's-DigSig-Public-Key => Hash-Value If the Hash-Values match, then Sender ID is Authenticated

Copyright SSL / TLS in Practice Channel-Encryption: Effective and Valuable Authentication: of Workstations / Browsers / Users Almost Nil of Hosts / Servers / Organisations Very Low-Grade Upgrades, e.g. 'Extended Validation' (EV), keep failing, because they're: expensive incomprehensible to consumers unable to handle key revocation, expiry not supported by warranties little-implemented

Copyright Alternative PKI Trust without Authenticated Identity Pretty Good Privacy (PGP) Intro: Simple Public Key Infrastructure (SPKI) Simple Distributed Security Infrastructure (SDSI) Stefan Brands / Credentica/MS UProve Bought by Microsoft, but now there's an open source SDK: