30
Dec 5-6, 2005 ITL-1-200X Security 1 Security Record Kevin Wilson BSI2000 Greg Cannon Crossmatch Jeff Stapleton Innove Anne Wang Cogent Systems Mike McCabe NIST

Security Record - NIST

  • Upload
    others

  • View
    5

  • Download
    0

Embed Size (px)

Citation preview

Page 1: Security Record - NIST

Dec 5-6, 2005 ITL-1-200X Security 1

Security Record

Kevin Wilson BSI2000Greg Cannon CrossmatchJeff Stapleton InnoveAnne Wang Cogent SystemsMike McCabe NIST

Page 2: Security Record - NIST

Dec 5-6, 2005 ITL-1-200X Security 2

Why Security?

Protect Document IntegrityConnect Personal Data to Biometric DataSecurity at the Document LevelPersonal Responsibility

Page 3: Security Record - NIST

Dec 5-6, 2005 ITL-1-200X Security 3

Words

Hash or DigestDigital Signature

Public/Private Key CryptographyCertificatesCertificate AuthoritiesTime Stamp Authorities

Page 4: Security Record - NIST

Dec 5-6, 2005 ITL-1-200X Security 4

What is a Hash or Digest?

Digested dataSmall but reproducibleFixed size for a given method

Small changes in input lead to large changes in outputHard to make the same digest from different dataOne way

Page 5: Security Record - NIST

Public/Private Key Cryptography

Public Key

Private Key

Page 6: Security Record - NIST

Digital Signature

Private Key

HASH

Page 7: Security Record - NIST

Digital Signature

Public Key

HASH

HASH ?=

Page 8: Security Record - NIST

Dec 5-6, 2005 ITL-1-200X Security 8

Digital Signature

Confidence that the signed data has not changedNon-repudiation

Page 9: Security Record - NIST

Public/Private Key Cryptography

Private KeyPublic Key

?

?? ?

Page 10: Security Record - NIST

CertificateAuthority

CertificateIdentity

Page 11: Security Record - NIST

Time Stamp Authority

HASH HASH

Page 12: Security Record - NIST

Dec 5-6, 2005 ITL-1-200X Security 12

The Security Record

New RecordCompatibility with earlier versions

OptionalAt the Document level

Zero to ManyAs document travels upstream

Page 13: Security Record - NIST

Dec 5-6, 2005 ITL-1-200X Security 13

Security RecordSet of Hashes

Linked to record by IDC and Type

Signature over the Set of HashesAlgorithms as per policy

NIST SP 800-57NIST SP 800-73

Page 14: Security Record - NIST

Dec 5-6, 2005 ITL-1-200X Security 14

The Security Record

Uses Cryptographic Message Syntax (CMS)

Also used inSecure email (S/MIME)SSL/TLS (https://)PIV Card

PKCS#7 since 1991 RSAASN.1 BER encoding

Page 15: Security Record - NIST

Hash of Each Record###### HASH ########### HASH ########### HASH ########### HASH ########### HASH ########### HASH ########### HASH ########### HASH ########### HASH ########### HASH ########### HASH #####

Signature

Page 16: Security Record - NIST

Dec 5-6, 2005 ITL-1-200X Security 16

Using Securitywith PKI

Booking/Enrollment OfficerState or Local or National PKIUpstream confidence

Upstream AgentsDownstream confidence

Page 17: Security Record - NIST

Dec 5-6, 2005 ITL-1-200X Security 17

Using Securitywithout PKI

Booking OfficerSelf-Signed certificate

Password or otherwise protected

Upstream AgentsSelf-signed certificates stamp as received/sent

Page 18: Security Record - NIST

Dec 5-6, 2005 ITL-1-200X Security 18

ImplementationCMS Signature

Microsoft CryptoApiOpenSSLJavaRSA, CerticomPIV Card

Certificate AuthorityMicrosoft Server CAOpenSSL CA

Page 19: Security Record - NIST

Dec 5-6, 2005 ITL-1-200X Security 19

PIV Enrollment and Infrastructure

Identity

Page 20: Security Record - NIST

Dec 5-6, 2005 ITL-1-200X Security 20

Summary

Strengthen Security by Embedding Security within the DocumentStraight forward to implement

Page 21: Security Record - NIST

Dec 5-6, 2005 ITL-1-200X Security 21

Security CommitteeGreg Cannon

Crossmatch TechnologiesMichael McCabe

NISTJeff Stapleton

InnoveAnne Wang

Cogent SystemsKevin Wilson

BSI2000

Page 22: Security Record - NIST

Dec 5-6, 2005 ITL-1-200X Security 22

Questions&

Discussion

Page 23: Security Record - NIST

Dec 5-6, 2005 ITL-1-200X Security 23

New Record17.001:4 character length<gs>17.002:IDC character<gs>Optional unsigned attributes17.050:Signing OID<gs>17.051:Signature or Timestamp<gs>17.052:Digest OID<gs>Optional signed attributes17.096:size of 17.050 through 17.096<gs>17.097:character count of IDC to follow<gs>17.098:IDC<us>hash<rs>IDC<us>hash<rs>…<gs>17.099:CMS<gs>

Page 24: Security Record - NIST
Page 25: Security Record - NIST

Summary of Tables 2 and 3 From SP 800-57

CryptographicStrength

SymmetricAlgorithm

HashAlgorithm

ECCAlgorithms

RSA/DSA/DHAlgorithms

56-bits DES - - -

80-bits 3DES-2K SHA-1 (160) 160-bits 1024-bits

112-bits 3DES-3K SHA-2 (224) 224-bits 2048-bits

128-bits AES-128 SHA-2 (256) 256-bits 3072-bits

192-bits AES-192 SHA-2 (384) 384-bits 7680-bits

256-bits AES-256 SHA-2 (512) 512-bits 15360-bits

Page 26: Security Record - NIST

ECC SignedDataExample

Field Value SizeOID1 OID cms-ct-signed-data { 1 . 2 . 840 . 113549 . 1 . 7 . 2

} 9 bytes

Version2 Version number (1) 1 byteOID3 OID fips-sha1 { 1 . 3 . 14 . 3 . 2 . 26 } 5 bytesOID4 OID cms-ct-data { 1 . 2 . 840 . 113549 . 1 . 7 . 1} 9 bytesDetached Data5 File content is not encapsulated in the SignedData

object0 bytes

Version6 Version number (1) 1 byteOID7 OID pkix-at-common-name { 2 . 5 . 4 . 3 } 3 bytesSubject Name8 Issuer common name “Subject” 7 bytesSerial Number9 Serial number hex “78 8C 29 19 99 25 FA 0B” 8 bytesOID10 OID fips-sha1 { 1 . 2 . 14 . 3 . 2 . 26 } 5 bytesOID11 OID ecdsa-with-sha1 { 1 . 2 . 840 . 10045 . 4 . 1 } 7 bytesSignature12 ECDSA 328-bit digital signature from 163-bit ECC

public key 41 bytes

Page 27: Security Record - NIST

ReferencesRFC3852 Cryptographic Message Syntax (July 2004, supersedes RFC3369, RFC2630, PKCS#7 1.5)NIST SP 800-57 Recommendation for KeyManagement (8/2005)ISO/IEC 8824:2001 (All parts) | ITU-T Recommendation X.680-series (2000), Information Technology - Abstract Syntax Notation One (ASN.1)[8825] ISO/IEC 8825-1:2001 | ITU-T Recommendation X.690 (2000), Information Technology - ASN.1 Encoding Rules: Specification of Basic Encoding Rules (BER), Canonical Encoding Rules (CER) and Distinguished Encoding Rules (DER)

Page 28: Security Record - NIST

Referencescontinued

ANSI X9.95-2005 Trusted Time Stamp Management and Security

Page 29: Security Record - NIST

CMS Structure

Page 30: Security Record - NIST