Development of Electronic Passport Scheme for Cryptographic Security and Face, Fingerprint Biometrics using ASP.Net
Автор: V.K. Narendira Kumar, B. Srinivasan
Журнал: International Journal of Modern Education and Computer Science (IJMECS) @ijmecs
Статья в выпуске: 1 vol.4, 2012 года.
Бесплатный доступ
Biometric passports is to prevent the illegal entry of traveler into a specific country and limit the use of counterfeit documents by more accurate identification of an individual. The e-passport, as it is sometimes called,represents a bold initiative in the deployment of two new technologies: Cryptography security and biometrics face and fingerprints. The privacy and security implications of this impending worldwide experiment in biometrics face and fingerprints authentication technology. An overall security process that involves people, technology and procedures can overcome limitations of the Cryptography security and face and fingerprint biometric passport using ASP.Net.
ASP.NET, Biometrics, e-Passport, Face, and Fingerprint
Короткий адрес: https://sciup.org/15010380
IDR: 15010380
Текст научной статьи Development of Electronic Passport Scheme for Cryptographic Security and Face, Fingerprint Biometrics using ASP.Net
A Passport is a document issued by a government to one of its citizens that provides a means of authenticating the identity and nationality of that citizen. A Passport is required for almost all international travel. An electronic passport is constructed by attaching an electronic chip to a passport document. In the electronic passport, this chip is a Radio Frequency Identification (RFID) device that contains the information within the standard passport and can be read by a machine at border crossings.
The International Civil Aviation Organization has adopted a global, harmonized blueprint for the integration of biometric identification information into machine readable passports. The purpose of the new biometric passports is to prevent the illegal entry of travelers into a specific country and to limit the use of fraudulent documents by more accurate authentication of individuals. This study aims to find out to what extent the integration of biometric identification information into passports will improve their robustness against identity theft.
The purpose of biometric passports is to prevent the illegal entry of travelers into a specific country and limit the use of fraudulent documents, including counterfeit and modified documents and the impostor’s use of legitimate documents [2].
The integration of face and finger print biometrics can provide better verification performance than the individual biometrics. Biometrics will also increase robustness of the biometric systems against the spoofing attacks and solve the problem of non-universality. Since the facial image is the mandatory biometric identifier to be included in the future passports, researcher study focus on the use of the facial image and finger prints for the identity verification of passport holders. In order of least secure and least convenient to most secure and most convenient, they are:
^ Something you have - card, token, key.
-
^ Something you know - PIN, password.
-
^ Something you are - biometric [1].
-
A. Purpose of the Study
The primary objective of the study is to produce new knowledge with respect to security of finger print and face biometric techniques in an e-passport. The results of the work should be useful for those making design decisions with respect to cryptographic security and finger print and face biometric technologies in an epassport setting.
-
B. Statement of the Problem
The purpose of biometric passports is to prevent the illegal entry of travelers into a specific country and to limit the use of fraudulent passport documents by more accurate identification of individuals. It is interesting to find out to what extent the integration of cryptographic security along with finger print and face biometric identification information into passports will improve their robustness against identity theft.
-
C. Biometric
Biometric technologies are automated methods of recognizing an individual based on their physiological or behavioral characteristics such as face and fingerprints. Biometric systems are applications of biometric technologies and can be used to verify a person’s claimed identity and to establish a person’s identity.
Two interesting properties of biometric identification are:
-
1. The person to be identified is required to physically be present at the point of identification.
-
2. Identification is based on the biometric technique that does not depend on the user to remember a password or to carry a token.
There are two distinct functions for biometric devices:
-
1. To prove you are who say you are
-
2. To prove you are not who you say you are not.
The purpose of the first function is to prevent the use of a single identify by multiple people. The second function is used to prevent the use of multiple identities by a single person. It would have to be ensured that the biometric system either automatically cross checks the enrolled characteristics for duplicates, or otherwise does not allow a person to register their biometric under two different names. A common feature of any system that uses biometric is a trade-off between high security and a more usable system.
-
D. Biometric System Modules
Enrollment Unit: The enrollment module registers individuals into the biometric system database. During this phase, a biometric reader scans the individual’s biometric characteristic to produce its digital representation (see figure 1) .
Feature Extraction Unit: This module processes the input sample to generate a compact representation called the template, which is then stored in a central database or a smartcard issued to the individual.
Matching Unit: This module compares the current input with the template. If the system performs identity verification, it compares the new characteristics to the user’s master template and produces a score or match value (one to one matching). A system performing identification matches the new characteristics against the master templates of many users resulting in multiple match values (one too many matching).
Decision Maker: This module accepts or rejects the user based on a security threshold and matching score [1]. E. Technology Evaluation
The technology test evaluates the technology itself: it measures the performance of the matching algorithms under controlled conditions in a laboratory. The purpose of a technology evaluation is to measure the state of the art and to determine the most promising approaches [4]. In a technology evaluation, the algorithms to be tested are given a database of biometric identifiers (facial and fingerprint). One part of the database is given to the participants so that they can be familiar with the biometric identifiers in the database and the other part is used for testing. The results from a technology test are repeatable since the technology tests are done under controlled conditions. The products of the technology evaluation are the verification, identification and watch list performance metrics [9].
-
II. BIOMETRICS IN E-PASSPORTS
Biometrics in e-passports complying with the ICAO standard consists of a mandatory facial image and fingerprints. While the former are used by a significant number of countries and thus information on them is widely available, the latter is currently used seldom. Therefore, this section only covers the vulnerabilities of facial images and fingerprints [3].
-
A. Face Image
Facial images are the most common biometric characteristic used by humans to make a personal recognition, hence the idea to use this biometric in technology. This is a nonintrusive method and is suitable for covert recognition applications. The applications of facial recognition range from static ("mug shots") to dynamic, uncontrolled face identification in a cluttered background (subway, airport). Face verification involves extracting a feature set from a two-dimensional image of the user's face and matching it with the template stored in a database.
The most popular approaches to face recognition are based on either: 1) The location and shape of facial attributes such as eyes, eyebrows, nose, lips and chin, and their spatial relationships, or 2) The overall (global) analysis of the face image that represents a face as a weighted combination of a number of canonical faces [2]. It is questionable if a face itself is a sufficient basis for recognizing a person from a large number of identities with an extremely high level of confidence [6]. Facial recognition system should be able to automatically detect a face in an image, extract its features and then recognize it from a general viewpoint (i.e., from any pose) which is a rather difficult task. Another problem is the fact that the face is a changeable social organ displaying a variety of expressions.
-
B. Fingerprint
A fingerprint is a pattern of ridges and furrows located on the tip of each finger. Fingerprints were used for personal identification for many centuries and the matching accuracy was very high [3]. Patterns have been extracted by creating an inked impression of the fingertip on paper. Today, compact sensors provide digital images of these patterns. Fingerprint recognition for identification acquires the initial image through live scan of the finger by direct contact with a reader device that can also check for validating attributes such as temperature and pulse. In real-time verification systems, images acquired by sensors are used by the feature extraction module to compute the feature values. The feature values typically correspond to the position and orientation of certain critical points known as minutiae points [4]. The matching process involves comparing the two-dimensional minutiae patterns extracted from the user's print with those in the template. One problem with the current fingerprint recognition systems is that they require a large amount of computational resources.

Figure 1: Block diagrams of Enrollment, Verification, and Identification tasks are shown using the modules of a biometric face and fingerprint for electronic passport.
-
IV. SECURITY GOALS
Researcher analyzes e-passport protocols by first identifying their security goals. Researcher assumes that a country implements the highest level of Cryptographic security and multiple biometrics for e-passports.
-
A. Data Confidentiality
Data confidentiality ensures the privacy of e-passport details and encryption is the common technique that provides confidentiality. In the case of e-passport, encryption is used to create a secure channel between the e-passport reader and the microchip. Note that the cryptographic keys used for encryption have to be guarded against unauthorized access.
-
B. Data Integrity
Data integrity prevents against illegal modifications of information exchanged between the e-passport reader and the microchip. Also the DF, SOD and LDS should be secure against any unauthorized modifications, i.e., any data tampering should be easily detectable by the border security centre.
-
C. Data Authentication
Data origin authentication ensure that the source of the transmission in a protocol is authentic, i.e., the data on the chip should be bound to information on MRZ and to the data that appears in the e-passport bio-data page currently being examined by a border security officer.
-
D. Non-Repudiation
Non repudiation provides the ability to prove an action or an event that has taken place, such that protocol participants cannot later deny having processed that data. Passport bearer will be physically present at the border security checkpoint. Nevertheless, it would be important to obtain an undeniable biometric data from the epassport for future processing.
-
E. Mutual Authentication
Mutual authentication is the process where both participants prove their identities to each other. As in the goal 3, where the e-passport reader authenticates an epassport, this goal protects the e-passport bearer, as it is crucial for an e-passport to authenticate the e-passport reader before divulging any personal information. This prevents an unauthorized e-passport reader from obtaining biometric and personal details from an epassport.
-
F. Certificate Manipulation
Certificates acts as an off-line assurance from a trusted authority that the certified public key really does belong to the principal who is in possession of corresponding secret key. However, it is the responsibility of the protocol to validate that the corresponding secret key is actually held by the principal claiming ownership of the public key. The e-passport reader should have a guarantee that certificates presented by the e-passport are valid and match the data on the epassport. ICAO has implemented a PKI which would store signature certificates from issuing state and organizations.
-
V. LOGICAL DATA STRUCTURE
The ICAO issued a standardized data structure called Logical Data Structure (LDS) for the storage of data elements. This was to ensure that global interoperability for e-Passport Tags and Readers could be maintained.
TABLE 1: PASSPORT LOGICAL DATA STRUCTURE
Data Group |
Data Element |
DG 1 |
Document Details |
DG 2 |
Encoded Headshot |
DG 3 |
Encoded Face biometrics |
DG 4 |
Encoded Fingerprint |
DG 5 |
Displayed Portrait |
DG 6 |
Reserved for Future Use |
DG 7 |
Signature |
DG 8-10 |
Data features |
DG 11-13 |
Additional Details |
DG 14 |
CA Public Key |
DG 15 |
AA Public Key |
DG 16 |
Persons to Notify |
SDE |
Security Data Element |
The specifications state that all the 16 data groups are write protected and can be written only at the time of issue of the e-Passport by the issuing state shown in table 1. A hash of data groups 1-15 are stored in the security data element (SDE), each of these hashes should be signed by the issuing state.
-
VI. IMPLEMENTATION OF ASP.NET
Forms Authentication: This is a cookie based authentication where username and password are stored on client machines as cookie files or they are sent through URL for every request. Form-based authentication presents the user with an HTML-based Web page that prompts the user for credentials.
Passport Authentication: Passport authentication is based on the passport website provided by the Microsoft .So when user logins with credentials it will be reached to the passport website where authentication will happen. If Authentication is successful it will return a token to your website.
Anonymous access: If you do not want any kind of authentication then you will go for Anonymous access.

User
Website
E-Passport
Load
Initialize
Open Connection
Open
Request Token
Check Authentication
Login
Policy
Get DataGroup
Proof
Open Passport
BAC-Challenge
Get Data Group

Data Group
Data Group
Security Token
Access Granted
Figure 2: Message sequence chart of authenticate with e- Passport scenario
Figure 2 shows the different entities involved in authenticate with e-Passport scenario and the traffic that is exchanged between them. A TCP connection from the e-Passport to the user is created as soon as the user loads the login page. In the current implementation this is accomplished by placing an ASP.NET owned by the identity provider on the web page (to be more precise, what is placed on the web page is an HTML tag linking to code on the web server). The website is signed by the identity provider and also loaded from the passport web server so that the Runtime Environment at the user’s client trusts this piece to allow it to set up a connection back to the passport server. The website was given permission to connect to the contactless reader in a passport policy file which was installed during enrollment. The TCP connection is used for subsequent communication between the identity provider and the user’s e-Passport.
Using the managed passport acquired during enrollment the user can attempt to login. One extra step is taken by the identity provider after receiving a token request from the client. In this extra step the identity provider checks if the user has a valid passport and it reads the user’s details from the passport. As soon as the client actually requests a token at the identity provider, the identity provider will look at the provided token and send the appropriate BAC data to the passport authenticating the identity provider at the passport. The identity provider will request the e-Passport’s AA public key and SOD. With the SOD it can check if the public key has been signed by the issuing country. It can then send a random challenge to the e-Passport which encrypts it using the AA private key. This proves that the passport is authentic and not a simple clone. The identity provider will request the minimal needed information from the e-Passport to confirm to the token request. The token is sent back to the client and from here on the normal Information scenario continues.
To summarize, the identity provider uses BAC, AA, and PA and then reads Data Group. Based on the results of the security protocols the identity provider knows that the information in Data Group correctly identifies a citizen of the issuing country (for as far as the identity provider trusts the country’s CSC, of course). Remember that Data Group contains basic textual card holder information (name, date of birth, date of expiry of document, document number, gender, nationality, and in the case even the citizen ID). The information in this data group is used in the token created by the identity provider and only the required fields (as requested by the relying party’s policy) are sent to the relying party (via the user’s client). No other information is sent to the relying party and the relying party needs to trust the identity provider that it has done its job in checking the validity of the user’s e-Passport.
-
A. Public Key Infrastructure
In normal situations, certificate-issuing organizations known as Certificates Authorities (CA’s) are grouped in a trusted hierarchy. All CA’s directly or indirectly trust the top-level Root CA. However, in ICAO, when a private key is compromised, the country cannot automatically invalidate all the passports issued with this key. The passport signed by any private key is expected to last for the issuing period. It is not feasible to ask hundreds or even thousands of passport holders to renew their passports every time a key is revoked. Instead, these passports should be used as normal, and a mechanism should notify the custom officials inspect the passport in greater detail. For each country such as the US, there is a Country Signing CA responsible for creating a public/private key pair, which is used to sign the Document Signer Certificates. This key pair should be generated and stored in a highly protected, offline CA infrastructure by the issuing country [5]. The lifetime of a Country Signing CA Key should be the longer of:
-
> The length of time the key will be used to issue passports
-
> The lifetime of the passport issued by the key.
To ensure security, the ICAO recommended the countries to replace the CA key every 3-5 years [5]. Under each country, there are numerous passport-issuing offices. Each of them is a Document Signer with a public/private key pair and has a Document Signer Certificate. Each passport is signed by the Document Signer Certificate to ensure data integrity. In order to avoid large amount of passports with invalid keys when a Document Signer Certificate Key is revoked, the suggested lifetime of the key should be about three months, less if the office issue a lot of passports per period of time. If a key or a certificate needs to be revoked, the Country CA must communicate bilaterally to all other countries and to the ICAO Public Key Directory within 48 hours [7]. In addition, a full revocation list should be exchanged every 90 days. All the private keys of Document Signer is stored in the passport-issuing office, where as the public key is stored in the ICAO Public Key Directory. The directory is a central source used to distribute the public key to the participating countries. Each participant country is responsible for downloading the latest version of the keys and making sure passports are indeed signed by the Document Signer.
-
B. Passive Authentication
Passive Authentication is the only mandatory cryptographic protocol in the ICAO. Its primary goal is to allow a Reader to verify that the biometric face data in the e-Passport is authentic. This scheme is known as passive authentication since the Tag performs no processing and is only passively involved in the protocol. One must note that Passive Authentication does not tie the Tag to a passport. The Inspection System retrieves the certificate of the issuing document verifier; using the public key from the certificate it verifies the digital signature and biometric used to sign the biometric face data. Once the validity of the signature is established, the Reader computes the hash of each of these data elements and compares them with the hashed values stored. If there is a match, it can be established that the data on the Tag was not manipulated [7].
-
C. Active Authentication
Active Authentication is an optional protocol in the ICAO specifications. Using a simple challenge-response mechanism, it aims to detect if a Tag has been substituted or cloned. If Active Authentication is supported, the Tag on the e-Passport stores a public key (KP uAA ) in Data and its hash representation. The corresponding private key (KP rAA ) is stored in the secure section of Tag memory. In order for the Tag to establish its authenticity, it must prove to the Reader that it possess this private key.
-
> The Reader sends a randomly generated 64 bit string
(R) to the Tag.
-
> The Tag signs this string using the key KPrAA and sends this signature to the Reader.
-
> The Reader obtains the public key KPuAA stored in biometric Data.
-
> The Reader verifies the correctness of the signed string using its knowledge of R and KP uAA .
-
D. Basic Access Control
The Basic Access Control (BAC) is an optional protocol that tries to ensure that only Readers with physical access to the passport can read Tag data. When a reader attempts to scan the BAC enabled e-Passport, it engages in a protocol which requires the Reader to prove knowledge of a pair of secret keys (called `access keys') that are derived from biometric data on the Machine Readable Zone (MRZ) of the passport. From these keys, a session key which is used for secure messaging is obtained [8].
-
E. Chip Authentication
The Chip Authentication protocol is aims to replace Active Authentication as a mechanism to detect cloned ePassports. If Chip Authentication is performed successfully it establishes a new pair of encryption and MAC keys to replace BAC derived session keys and enable secure messaging. It does this using the static Diffie-Hellman key agreement protocol. Note that the ePassport Tag already has a Chip Authentication public key and private key (in secure memory).
The e-Passport and an IS instantiate a non-concurrent protocol run (session) between them, whereas the session connections between an IS and a DV may run concurrently. An IS is always the initiator of a protocol run and an e-Passport is always the responder. The underlying security for Diffie-Hellman (DH) key exchange; the Decisional Diffie-Hellman (DDH) assumption holds. Cryptographic primitives such as symmetric and public key encryption, digital signatures, message authentication codes and hash functions are secure under the standard security notions in the cryptographic literature.
-
F. E-Passport Protocols
The ICAO e-passport is a complex protocol suite that consists of three sub protocols namely, BAC, PA and AA. Such a protocol suite is not only difficult to formalize, but also verification of such systems more often leads to an exponential state-space explosions. Researcher model the flow of e-passport protocol according to the following stages:
-
> When an e-passport is presented at a border security checkpoint, the chip and the e-passport reader execute the BAC protocol, in order to establish a secure (encrypted) communication channel between them.
-
> On successful completion of BAC, the e-passport reader performs PA.
-
> On successful completion of PA the chip and the epassport reader execute the AA protocol.
The e-passport authentication heavily relies on PKI. Researcher model only one level of certification hierarchy, up to the document signer and researcher assume that document signer public key is certified by its country signing authority and, is valid and secure. This does not weaken the verification process of the epassport protocol suite, but only indicates that the model assumes the “ideal” PKI implementation. Researcher also supposes that cryptographic primitives and multiple biometric used in the system like face, fingerprints and generation of keys are secure [8]. In the e-Passport protocol, this authentication protocol was used only when access to biometric data was required.
-
G. E-Passport Security Properties
By placing a secure sketch of a biometrics on the epassport, the proposed system has implemented a strong mapping between a passport and its owner. The act of using someone else’s passport as your own has now become quite a bit more difficult. Also, the system increases the reliability of a passport without putting any personal data at risk. The passport owner’s biometric data is not stored anywhere on the passport. Through the use of cryptography, a secure sketch of a biometric data is all that is needed to regenerate the key that is associated with a person’s face and fingerprint.
Very little overhead is placed upon the passport holder. Anyone who is having their passport examined must already present the passport to the person who is performing the check. After implementing the proposed system, the only additional burden will be that the passport holder will need to place his biometric data on biometric scanners for identity verification.
An advantage that using a face and fingerprint biometric has over another scheme is that the user is only presenting himself. This is something that the user always has with him and cannot forget at home. There is no need to remember an extra passphrase or physical key. In any case, using biometrics is preferred over either of those two methods because a key or passphrase only prove that you know something that the owner of the passport should know. It does not prove that the passport actually belongs to you.
Since the key is merely the passport holder’s face and finger there is no need to create a large infrastructure for the scheme that is proposed by this biometric passport system. An example of a large infrastructure would be setting up a secure, replicated database that holds the public and private key pairs of all of the citizens. Another example would involve creating an entirely new form of identification such as “passport” Implementing an entirely new system results in the need for new departments within the government, distribution and adjustment to the new card, and installation costs.
The e-passport system already involves installing passport readers at every passport check station. Implementing the notion of a secure sketch and associated public key requires only that biometric scanners be installed along with the new tag reading units. In addition to the cost of purchasing biometric scanners, there is also the cost of implementing software that will perform the scanning of face and finger prints and the transformations that are necessary for comparing two biometric data scans reliably.
-
VII. ON-LINE SECURE E-PASSPORT PROTOCOL
To resolve the security issues identified in both the firstand second-generation of e-Passports, in this section, we present an on-line secure e-Passport protocol (OSEP protocol). The proposed protocol leverages the infrastructure available for the standard non-electronic passports to provide mutual authentication between an ePassport and an IS. Currently, most security organizations are involved in passive monitoring of the border security checkpoints. When a passport bearer is validated at a border security checkpoint, the bearer’s details are collected and entered into a database. The security organization compares this database against the database of known offenders (for instance, terrorists and wanted criminals). The OSEP protocol changes this to an active monitoring system. The border security checkpoint or the DV can now crosscheck against the database of known offenders themselves, thus simplifying the process of the identification of criminals.
The on-line secure e-Passport protocol provides the following security features: An e-Passport discloses its information stored on the e-Passport chip only after a successful authentication of the IS (Inspection System). This prevents revealing the e-Passports identity to a third party that is not authorized or cannot be authenticated. This prevents the covert collection of e-Passport data from ‘skimming’ or ‘eavesdropping’ attacks that were very effective against both the first- and the second-generation e-Passports [9].
-
> The OSEP protocol provides proof-of-freshness and the authenticity for messages between the participating entities.
-
> The OSEP protocol uses the existing ICAO PKI implementation (as in first generation e-Passports) and eliminates the need for cross-certification among the participating countries, as required by the EAC (second-generation e-Passports).
-
> The OSEP protocol eliminates the need for certificate chain verification by an e-Passport. Only the top level certificate (CERT CVCA ( )) is required to be stored in an e-Passport, thus reducing the memory requirements and preventing a malicious reader from performing a DOS attack on an e-Passport.
-
> The OSEP protocol also requires an IS to provide proof-of-correctness for public key parameters to an e-Passport. This allows an e-Passport to verify that an IS is using the correct domain parameters and to prevent related attacks.
-
A. E-Passport Initial Setup
All entities involved in the protocol share the public quantities p, q, and g where:
-
> p is the modulus, a prime number of the order 1024 bits or more.
-
> q is a prime number in the range of 159 -160 bits.
-
> g is a generator of order q , where Ai < q, g + 1 mod p .
-
> Each entity has its own public key and private key pair (PK i ,SK i ) where PK i = g(SK i ) mod p
-
> Entity i’ s public key (PK i ) is certified by its root certification authority ( j ), and is represented as CERT j (PK i , i ).
-
> The public parameters p, q, g used by an e-Passport are also certified by its root certification authority.
-
B. Phase One - IS Authentication
Step 1 (IS) When an e-Passport is presented to an IS, the IS reads the MRZ information on the e-Passport using an MRZ reader and issues the command GET CHALLENGE to the e-Passport chip.
Step 2 (P) The e-Passport chip then generates a random eP £ R 1 ≤ eP ≤ q - 1 and computes KeP = geP mod p, playing its part in the key agreement process to establish a session key. The ePassport replies to the GET CHALLENGE command by sending KeP and its domain parameters p, q, g.
eP → IS: K eP , p, q, and g
Step 3 (IS) On receiving the response from the e-Passport, the IS generates a random IS £ R 1 ≤ IS ≤ q - 1 and computes its part of the session key as K IS = gIS mod p . The IS digitally signs the message containing MRZ value of the e-Passport and K eP .
S IS = SIGN SKIS (MRZ || K eP )
It then contacts the nearest DV of the ePassports issuing country and obtains its public key. The IS encrypts and sends its signature S IS along with the e-Passport’s MRZ information and KeP using the DV’s public key PKDV.
IS → DV: ENC PK DV (S IS , MRZ, K eP ), CERT CVCA (PK IS , IS)
Step 4 (DV) The DV decrypts the message received from the IS and verifies the CERT CVCA (PK IS , IS) and the signature S IS . If the verification holds, the DV knows that the IS is genuine, and creates a digitally-signed message S DV to prove the IS’s authenticity to the e-Passport.
SDV = SIGN SKDV (MRZ || K eP || PK IS ), CERT CVCA (PK DV , DV)
The DV encrypts and sends the signature SDV using the public key PKIS of IS.
DV → IS: ENC PKIS (S DV , [PK eP ])
The DV may choose to send the public key of the e-Passport if required. This has an obvious advantage, because the IS system now trusts the DV to be genuine. It can obtain a copy of ePassport’s PK to verify during e-Passport authentication.
Step 5 (IS) After decrypting the message received, the IS computes the session key K ePIS = (K IS ) eP and encrypts the signature received from the DV, the e-Passport MRZ information and KeP using KePIS. It also digitally signs its part of the session key K IS .
IS → eP: K IS , SIGN SKIS (K IS , p, q, g), ENCK ePIS (S DV , MRZ, KeP)
Step 6 C On receiving the message from the IS, the ePassport computes the session key K ePIS = (K IS ) eP. It decrypts the message received using the session key and verifies the signature SDV and VERIFY PKIS (SIGN SKIS (K IS , p, q, g)). On successful verification, the e-Passport is convinced that the IS system is genuine and can proceed further in releasing its details. All further communications between an e-Passport and IS are encrypted using the session key K ePIS.
-
C. Phase Two - e-Passport Authentication
Step 1 C The IS issues an INTERNAL AUTHENTICATE command to the e-Passport. The e-Passport on receiving the command, the e-Passport creates a signature S eP = SIGN SKeP (MRZ || K ePIS ) and sends its domain parameter certificate to the IS. The entire message is encrypted using the session key K ePIS .
eP → IS: ENCK ePIS (S eP , CERT DV (PK eP ), CERT DV (p, q, g))
Step 2 (IS) The IS decrypts the message and verifies CERT DV (p, q, g), CERT DV (PK eP ) and S eP . If all three verifications hold then the IS is convinced that the e-Passport is genuine and authentic.
During the IS authentication phase, and IS sends the ePassport’s MRZ information to the nearest e-Passport’s DV, which could be an e-Passport country’s embassy. Embassies are DV’s because they are allowed to issue ePassports to their citizens and because most embassies are located within an IS’s home country, any network connection issues will be minimal. Sending the MRZ information is also advantageous, because the embassy now has a list of all its citizens that have passed through a visiting country’s border security checkpoint. We do not see any privacy implications, because, in most cases, countries require their citizens to register at embassies when they are visiting a foreign country.
-
VIII. EXPERIMENTAL RESULTS
The key application of a biometrics solution is the identity verification problem of physically tying an MRTD holder to the MRTD they are carrying. There are several typical applications for biometrics during the enrolment process of applying for a passport:
The applicant’s biometric template(s) generated by the enrolment process can be searched against one or more biometric databases (identification) to determine whether the applicant is known to any of the corresponding systems (for example, holding a passport under a different identity, criminal record, holding a passport from another state).
When the applicant collects the passport (or presents them for any step in the issuance process after the initial application is made and the biometric data is captured) their biometric data can be taken again and verified against the initially captured template
The identities of the staff undertaking the enrolment can be verified to confirm they have the authority to perform their assigned tasks. This may include biometric authentication to initiate digital signature of audit logs of various steps in the issuance process, allowing biometrics to link the staff members to those actions for which they are responsible.
Each time traveler (i.e. MRTD holders) enters or exit a State, their identities can be verified against the images or templates created at the time their travel documents were issued. This will ensure that the holder of a document is the legitimate person to whom it was issued and will enhance the effectiveness of any Advance Passenger Information (API) system. Ideally, the biometric template or templates should be stored on the travel document along with the image, so that travelers’ identities can be verified in locations where access to the central database is unavailable or for jurisdictions where permanent centralized storage of biometric data is unacceptable.
Two-way check - The traveler’s current captured biometric image data, and the biometric template from their travel document (or from a central database), can be matched to confirm that the travel document has not been altered.
Three-way check - The traveler’s current biometric image data, the image from their travel document, and the image stored in a central database can be matched (via constructing biometric templates of each) to confirm that the travel document has not been altered. This technique matches the person, with their passport; with the database recording the data that was put in that passport at the time it was issued.
Four-way check - A fourth confirmatory check, albeit not an electronic one, is visually matching the results of the 3-way check with the digitized photograph on the Data Page of the traveler’s passport.
Besides the enrolment and border security applications of biometrics as manifested in one-to-one and one-to-many matching, States should also have regard to, and set their own criteria, in regard to:
Accuracy of the biometric matching functions of the system. Issuing States must encode one or more facial, fingerprint, palm print or iris biometrics on the MRTD as per LDS standards (or on a database accessible to the Receiving State). Given an ICAO-standardized biometric image and/or template, Receiving States must select their own biometric verification software, and determine their own biometric scoring thresholds for identity verification acceptance rates – and referral of imposters.
-
IX. CONCLUSIONS
The work represents an attempt to acknowledge and account for the presence on e-passport using face and fingerprint recognition towards their improved identification. The application of facial and fingerprint recognition in passports requires high accuracy rates; secure data storage, secure transfer of data and reliable generation of biometric data. The passport data is not required to be encrypted, identity thief and terrorists can easily obtain the biometric information. The discrepancy in privacy laws between different countries is a barrier for global implementation and acceptance of biometric passports. A possible solution to un-encrypted wireless access to passport data is to store a unique cryptographic key in printed form that is also obtained upon validation. The key is then used to decrypt passport data and forces thieves to physically obtain passports to steal personal information. More research into the technology, additional access and auditing policies, and further security enhancements are required before face and fingerprint recognition is considered as a viable solution to biometric security in passports. The adversaries might exploit the passports with the lowest level of security. The inclusion of multiple biometric identification information into machine readable passports will improve their robustness against identity theft if additional security measures are implemented in order to compensate for the limitations of the multiple biometric technologies. It enables countries to digitize their security at border control and provides faster and safer processing of an e-passport bearer. The main cryptographic features and multiple biometrics used with e-passports and considered the surrounding procedures. E-passports may provide valuable experience in how to build more secure and biometric identification platforms in the years to come.
Список литературы Development of Electronic Passport Scheme for Cryptographic Security and Face, Fingerprint Biometrics using ASP.Net
- A. K. Jain, R. Bolle, “Biometric personal identification in networked society” 1999, Norwell,MA: Kluwer.
- C.Hesher, A.Srivastava, G.Erlebacher, “A novel technique for face recognition using range images”in the Proceedings of Seventh International Symposium on Signal Processing and Its Application, 2003.
- HOME AFFAIRS JUSTICE, “EU standard specifications for security features and biometrics in passports and travel documents”, Technical report,European Union, 2006.
- ICAO, “Machine readable travel documents”,Technical report, ICAO 2006.
- KLUGLER, D., “Advance security mechanisms for machine readable travel documents, Technical report”, Federal Office for Information Security(BSI), Germany, 2005.
- ICAO, “Machine Readable Travel Documents”, Part 1 Machine Readable Passports. ICAO, Fifth Edition,2003
- Riscure Security Lab, “E-passport privacy attack”,at the Cards Asia Singapore, April 2006.
- D. Monar, A. Juels, and D. Wagner, “Security and privacy issues in e-passports”, Cryptology ePrint Archive, Report 2005/095, 2005.
- ICAO, “Biometrics Deployment of Machine Readable Travel Documents”, Version 2.0, May 2004.