Smart Cards and Biometrics: Your Key to PKI

The cool way to make secure transactions.

For centuries, security was synonymous with secrecy. The shared secret—conducting business between two parties who each knew the code—was a worldwide approach. Even in this age of electronics and supercomputers, passwords and PINs are shared between you and the computer or ATM machine to which you want access. But secret passwords require a great deal of trust between parties sharing the secret. Can you always trust the administrator or other users of the machine you are accessing? Most computer break-ins today are due to compromise by system users or by a hacker who uses a legitimate account (possibly yours) to gain access to general security—sometimes even gaining superuser access. This traditional paradigm of shared-secret computer security could soon be a thing of the past with smart-card-based cryptographic credentials and biometric authentication for access control.

Some individuals and companies are replacing shared secret security (also called symmetric security) with the Public Key Infrastructure (PKI) approach. PKI uses a standardized set of transactions using asymmetric public key cryptography, a more secure and potentially much more functional mechanism for access to digital resources. The same system could also be used for securing physical access to controlled environments, such as your home or office.

In a PKI world, everyone would be issued at least one cryptographic key pair. Each key pair would consist of a secret (private) cryptographic key and a public cryptographic key. These keys are typically a 1024-bit or 2048-bit string of binary digits with a unique property: when one is used with an encoding algorithm to encrypt data, the other can be used with the same algorithm to decrypt the data. The encoding key cannot be used for decoding. Public keys are certified by a responsible party such as a notary public, passport office, government agency or trusted third party. The public key is widely distributed, often through a directory or database that can be searched by the public. But the private key remains a tightly guarded secret by the owner. Between sender and receiver, secure messaging (or other secure transaction) would work as described below.

Figure 1. Sender

For the sender (Figure 1), the following steps occur:

  1. Message data is hashed; that is, a variable-length input string is converted to a fixed-length output string. Hash functions are mainly used with public key algorithms to create digital signatures.

  2. A symmetric key is created and used to encrypt the entire message. DES and IDEA are examples of symmetric key cryptography.

  3. The symmetric key is encrypted with the receiver's asymmetric public key.

  4. The message hash is encrypted with the sender's asymmetric private key, creating a digital signature independent of the encrypted message.

  5. The encrypted message, encrypted symmetric key and signed message hash are sent to the receiver.

Figure 2. Receiver

For the receiver (Figure 2), these steps occur:

  1. The encrypted symmetric key is decrypted using the receiver's asymmetric private key.

  2. The symmetric key is then used to decrypt the message body.

  3. The encrypted hash is decrypted with the sender's asymmetric public key.

  4. The decrypted message is then rehashed with the original hashing algorithm.

  5. The two hashes are compared to verify the sender's identity and serves as proof that the message was not altered in transit.

Several technical issues must be solved before this scenario can be realized:

  • Secure key storage

  • Secure authentication to the key store

  • Directory services (central public key database)

  • Key escrow or other emergency recovery method for encrypted data

  • Cross-platform standards (Microsoft PC/SC, Netscape SMIME, Intel CDSA, IBM OSF, etc.)

  • International export and usage regulations for strong cryptography

If these issues seem daunting, remember how impossible a common network strategy once seemed. Today, the Internet is everywhere and connected to almost every type of computer. Let's consider the PKI issues one by one.

______________________

Comments

Comment viewing options

Select your preferred way to display the comments and click "Save settings" to activate your changes.

Smart cards and Biometrics based Public Distribution Systems

Anonymous's picture

Hey can anyone suggest what wil b d modules in a Smart cards and Biometrics based Public Distribution Systems(PDS).

dude how the hell do i get

Anonymous's picture

dude how the hell do i get the dam source code for this project...?

Heh, I always thought

Anonymous's picture

Heh, I always thought biometrics couldn't be used as keying material, I thought the devices using it would be like, "oh your fingerprint matches! here you go have this plaintext from my hdd!". Good to know that's not true.

Re: Smart Cards and Biometrics: Your Key to PKI

mahadevan_keyan's picture

Have you guys looked at key generation from Biometrics. That will solve the problem of key management. We can look at applications like e-voting which is currently a hot topic

White Paper
Linux Management with Red Hat Satellite: Measuring Business Impact and ROI

Linux has become a key foundation for supporting today's rapidly growing IT environments. Linux is being used to deploy business applications and databases, trading on its reputation as a low-cost operating environment. For many IT organizations, Linux is a mainstay for deploying Web servers and has evolved from handling basic file, print, and utility workloads to running mission-critical applications and databases, physically, virtually, and in the cloud. As Linux grows in importance in terms of value to the business, managing Linux environments to high standards of service quality — availability, security, and performance — becomes an essential requirement for business success.

Learn More

Sponsored by Red Hat

White Paper
Private PaaS for the Agile Enterprise

If you already use virtualized infrastructure, you are well on your way to leveraging the power of the cloud. Virtualization offers the promise of limitless resources, but how do you manage that scalability when your DevOps team doesn’t scale? In today’s hypercompetitive markets, fast results can make a difference between leading the pack vs. obsolescence. Organizations need more benefits from cloud computing than just raw resources. They need agility, flexibility, convenience, ROI, and control.

Stackato private Platform-as-a-Service technology from ActiveState extends your private cloud infrastructure by creating a private PaaS to provide on-demand availability, flexibility, control, and ultimately, faster time-to-market for your enterprise.

Learn More

Sponsored by ActiveState