Biometry to enhance smart card security (MOC using TOC protocol)

Slides:



Advertisements
Presentazioni simili
Trieste, 26 novembre © 2005 – Renato Lukač Using OSS in Slovenian High Schools doc. dr. Renato Lukač LinuxDay Trieste.
Advertisements

LEGAL INFORMATION ON THE WEB: THE ITALIAN SITUATION
Sfogliandomi… Viaggio tra me e me alla scoperta dellaltro… A travel between me and myself discovering the other…
Cache Memory Prof. G. Nicosia University of Catania
Prof. Stefano Bistarelli
Teoria e Tecniche del Riconoscimento
1 Teaching Cloud Computing and Windows Azure in Academia Domenico Talia UNIVERSITA DELLA CALABRIA & ICAR-CNR Italy Faculty Days 2010.
A. Oppio, S. Mattia, A. Pandolfi, M. Ghellere ERES Conference 2010 Università Commerciale Luigi Bocconi Milan, june 2010 A Multidimensional and Participatory.
Relaunching eLene Who are we now and which are our interests.
EBRCN General Meeting, Paris, 28-29/11/20021 WP4 Analysis of non-EBRCN databases and network services of interest to BRCs Current status Paolo Romano Questa.
DG Ricerca Ambientale e Sviluppo FIRMS' FUNDING SCHEMES AND ENVIRONMENTAL PURPOSES IN THE EU STRUCTURAL FUNDS (Monitoring of environmental firms funding.
Roberto Viola Vicepresidente, European Radio Spectrum Policy Group (RSPG) Roma 24 marzo Organizzazione Key4biz FORUM 2011.
Each student will be able to ask an adult or stranger: What do you like to do? and What dont you like to …?
1.E un algoritmo ricorsivo: Tutti le istanze di oggetti raggiungibili da un oggetto persistente diventano anchessi persistenti.
Cancer Pain Management Guidelines
Punto di partenza Reciprocal verbs are reflexives that express a shared or reciprocal action between two or more people or things. In English we often.
Il presente del congiuntivo (the present subjunctive)
Il presente del congiuntivo (the present subjunctive)
Dipartimento di Matematica Applicata Università di Firenze Multiband transport models for semiconductor devices Giornata di lavoro sulle Nanoscienze Firenze.
1 A neural approach to the analysis of CHIMERA experimental data CHIMERA Collaboration S.Aiello 1, M. Alderighi 2,3, A.Anzalone 4, M.Bartolucci 5, G.Cardella.
C Consiglio Nazionale delle Ricerche - Pisa Iit Istituto per lInformatica e la Telematica Reasoning about Secure Interoperation using Soft Constraints.
Corso di Laurea in Ingegneria Elettronica - U niversità di N apoli F EDERICO II Autori XXXXX XXXXXXX YYYYY YYYYYYY ZZZZZ ZZZZZZZ Titolo tesina Parte X:
Costruzione di Interfacce Lezione 10 Dal Java al C++ parte 1
TIPOLOGIA DELLE VARIABILI SPERIMENTALI: Variabili nominali Variabili quantali Variabili semi-quantitative Variabili quantitative.
Comunicazione on-line, reti e virtualità Matteo Cristani.
PLANCK LFI N. Mandolesi Consorzio PLANCK-LFI Incontro con Prof. P. Benvenuti IASF/CNR - Sez. di Bologna, Gennaio 2004.
Introduzione Grid1 Introduzione ai Sistemi Grid. Introduzione Grid2 Generalità Un sistema Grid permette allutente di richiedere lesecuzione di un servizio.
VARO SRL LOGISTIC, QUALITY, SERVICE
Applicazioni dell'Elettronica basata sul Diamante _________________________________________ Arnaldo Galbiati SOLARIS PHOTONICS Alkaline Solar Cells and.
ATE / 31 Lezione 3 i sistemi automatici di misurazione - gli ATE.
Le regole Giocatori: da 2 a 10, anche a coppie o a squadre Scopo del gioco: scartare tutte le carte per primi Si gioca con 108 carte: 18 carte.
LHCf Status Report Measurement of Photons and Neutral Pions in the Very Forward Region of LHC Oscar Adriani INFN Sezione di Firenze - Dipartimento di Fisica.
Concord A tool for the analysis and concordances of the terminological constituents P. Plini, N. Mastidoro* * - Èulogos, Rome Institute for Atmospheric.
Institute for Atmospheric Pollution – EKOLab Consiglio Nazionale delle Ricerche Environmental Terminology Workshop 2 nd Ecoterm Group Meeting UBA - Umweltbundesamt.
Francesca Pizzorni Ferrarese 05/05/2010
Ischia, giugno 2006Riunione Annuale GE 2006 Exploiting the Body Effect to Improve Analog CMOS Circuit Performances *P. Monsurrò, **S. Pennisi, *G.
Alcuni, qualche, un po’ di
Project Review byNight byNight December 6th, 2011.
UNIVERSITÀ DEGLI STUDI DI PAVIA FACOLTÀ DI ECONOMIA, GIURISPRUDENZA, INGEGNERIA, LETTERE E FILOSOFIA, SCIENZE POLITICHE. Corso di Laurea Interfacoltà in.
Guardate le seguenti due frasi:
Motor Sizing.
IMAGINE John Lennon.
Tutor: Elisa Turrini Mail:
Project Review Novembrer 17th, Project Review Agenda: Project goals User stories – use cases – scenarios Project plan summary Status as of November.
Project Review byNight byNight December 21th, 2011.
Project Review byNight byNight December 6th, 2011.
Project Review Novembrer 17th, Project Review Agenda: Project goals User stories – use cases – scenarios Project plan summary Status as of November.
Project Review byNight byNight December 5th, 2011.
Architettura software La scelta architetturale: MVA (Model – View – Adapter/Control) The view is completely decoupled from the model such that view and.
Federazione Nazionale Commercio Macchine Cantiermacchine Cogena Intemac Unicea Unimot ASSOCIAZIONE ITALIANA PER LA PROMOZIONE DELLA COGENERAZIONE.
BY: ERIC B. Italian Fashion Project. Italian And American clothing brands are different in many ways In this presentation, I am going to explore the similarities.
UG40 Energy Saving & Twin Cool units Functioning and Adjustment
Analysis and Development of Functions in REST Logic: Application to the «DataView» Web App UNIVERSITA’ DEGLI STUDI DI MODENA E REGGIO EMILIA DIPARTIMENTO.
LA WEB RADIO: UN NUOVO MODO DI ESSERE IN ONDA.
UITA Genève ottobre Comitè du Groupe Professionnel UITA Genève octobre 2003 Trade Union and Tour.
A PEACEFUL BRIDGE BETWEEN THE CULTURES TROUGH OLYMPICS OLYMPIC CREED: the most significant thing in the olympic games is not to win but to take part OLYMPIC.
Passato Prossimo. What is it?  Passato Prossimo is a past tense and it is equivalent to our:  “ed” as in she studied  Or “has” + “ed” as in she has.
Lezione n°27 Università degli Studi Roma Tre – Dipartimento di Ingegneria Corso di Teoria e Progetto di Ponti – A/A Dott. Ing. Fabrizio Paolacci.
Italian 1 -- Capitolo 2 -- Strutture
Ratifica dei trattati internazionali - Italia Art. 87 Costituzione “Il Presidente della Repubblica…ratifica i trattati internazionali, previa, quando occorra,
Scenario e Prospettive della Planetologia Italiana
Final Review Meeting Livorno, Italy January 30-31, 2012
Ontologia AA F. Orilia. Lez. 16 Discussione dell'approccio controfattualista di lewis condotta da Antonio De Grandis.
Each student will be able to ask an adult or stranger: What do you like to do? and What don’t you like to …?
SUMMARY Quadripoles and equivalent circuits RIEPILOGO Quadripoli e circuiti equivalenti RIEPILOGO Quadripoli e circuiti equivalenti.
Filtri del secondo ordine e diagrammi di Bode
SUMMARY Interconnection of quadripoles RIEPILOGO Interconnessione di quadripoli RIEPILOGO Interconnessione di quadripoli.
Dyslexia activity Group 2 (Debora Q.) Lesson Outline  This activity is targeted at beginners half way through their first year but it could also work.
X. Specifications (IV).
Transcript della presentazione:

Biometry to enhance smart card security (MOC using TOC protocol) Giampaolo Bella – Stefano Bistarelli – Fabio Martinelli Università degli Studi “G. d’Annunzio” Dipartimento di Scienze - Pescara

Overview Biometry and smart cards TOC, MOC, SOC Procotols between application/hardware A MOC protocol A MOC via TOC protocol Towards a formal specification/analysis Discussion…

Biometry Acquisition of bio-features that almost uniquely identify entities From bio to digital world Fingerprint: image acquisition from a scanner template acquisition from the imagine The template stores the useful information obtained from the image match algorithms receive as inputs two templates and returns true iff the two templates are compatible Bio-information is usually public in the sense that it can be ``easily’’ acquired.

Smart cards Smart devices with computational and storage resources Criptoki (PKCS#11) is the interface smart-cards/applications Access to smart card functions through a PIN We consider protocols that use also biometric authentication

Biometry and smart cards Applying biometric authentication to log on the smart card: Template On Card (TOC): Only the template is stored on board Requires very cheap cards Match On Card (MOC): The template is on the smart card, the match is performed on board, the live template acquisition is external Requires smart-cards with ``strong’’ computational power System On Card (SOC): Each phase is internally performed Requires currently expensive technology

Template on Card (TOC) Template on Card Biometric Template Biometric Input Smart Card Biometric Template Biometric Template User Grant

Match on Card (MOC) Match on Card Biometric Input CPU User Grant Smart Card Biometric Template CPU User Grant

System on Card System on Card Biometric Input Grant User CPU Smart Card CPU Biometric Template User Grant

A MOC protocol Goal: MOC + key establishment Correctness doesn’t depend on biometry but on cryptography The live template is a fresh scanner acquisition The live template is kept secret for privacy reasons

A MOC using TOC protocol CM is the criptoki match module CM signs a hash of the pair of templates only if they match

Verification challenges? Biometry adds no problems ``Incremental’’ protocols – the two are equivalent from the application viewpoint Functional Security

Formal specification Process algebra for functional and security aspects Basic sending/receiving operations Basic operators as sequencing (.); parallel composiiton (|) We have 4 different players Two specifications for the smart cards SMOC and SMT The criptoki C and the match module M MOC protocol: SMOC | C MOC using TOC : SMT | M | C The criptoki and the match module may be distinct processes (they share no knowledge)

Towards formal security analysis MOC is ``secure’’ Correspondence analysis: Control actions to express user’ beliefs Smart cards issues Start(S,C,Tstored) Criptoki issues End(C,S,Tlive) For every enemy X, SMOC | C | X when restricted to control actions is trace equivalent to Start(S,C,Tstored).End(C,S,Tlive) and Tstored and Tlive match MOC using TOC is ``as secure as’’ MOC SMT |C | M | X =control actions SMOC | C | X

Questions?