IDENTITY & TRUST IN MONITORED SPACES
THE VIRTUES OF PRIVACY BY DESIGN
Eleanor McHugh
Romek Szczesniak
Cryptographer
Security Architect
Physicist
Transport Architecture
1998 PKI
elliptic curves
satellite PSN
1999 π-calculus VM
2000 control networks
2001 mobile identity
secure documents
2003 ENUM
2006 dotTel
hybrid encryption
2007 encrypted DNS
2010 concurrent VM
2011 national eID
2012 encrypted SQL
privacy by design
2014 uPass
2018 Redbush
Agora
PRIVACY AND SECURITY
➤ digital data is easily duplicated
➤ when data moves or is stored it generates
metadata which is itself digital data
➤ processing data or metadata can reveal
identity even if any personally identifying
data it contains is encrypted
➤ so a system which respects privacy needs to
know as little as practical about
➤ the data it processes
➤ the metadata it produces
fraud and even
household names
have fallen foul to
criminal hackers.
In response to the
public outcry
ambitious regulations have been introduced
such as the European Union’s GDPR and
Whenever your org
personal data you
consent from its su
guardian and you
by demand
UK LEGAL IDENTITY
➤ birth certificate and gender recognition
certificate are the primary identity
documents
➤ with either it's possible to get
➤ national insurance number
➤ NHS medical card
➤ passport
➤ name can be changed with a deed poll or a
statutory declaration
➤ none of these documents include
biometrics
ATTRIBUTES
➤ attributes are discrete facts
➤ dark hair
➤ wears black
➤ professional cryptographer
➤ fragments of an identity
➤ they may be entirely absent
➤ or some may be imprecise
➤ even a complete set may not be unique
➤ they're only as trustworthy as their origins
anonymity
pseudonymity
anonymity
pseudonymity
anonymity
pseudonymity
anonymity
pseudonymity
anonymity
pseudonymity
anonymity
pseudonymity
“What’s in a name?
That which we call a rose,
by any other name would
smell as sweet.”
William Shakespeare
SECURE TOKENS
➤ tokens alone are not proofs of the identity
of their bearer
➤ a biometric needs to be captured to
associate a token with an identifiable
human being
➤ and the biometric must be confirmed by a
person or an algorithmic process at the
time identity is being asserted to perform
an identification
➤ evidence that this has occurred should be
recorded if this needs to be confirmed at a
later date such as in a court of law
BIOMETRICS
➤ if it can be measured and tends towards
uniqueness…
➤ faces
➤ fingerprints
➤ iris patterns
➤ retina patterns
➤ genetic fingerprints
➤ electrocardiogram
➤ electroencephalogram
➤ it can also be duplicated and counterfeited!
ID CARD
➤ photo for visual comparison
➤ hologram to assert validity
➤ date of birth reveals age
➤ serial number allows this card to be
recorded and tracked
➤ physical security features increase the cost
of counterfeiting
➤ smart card features allow a card to be used
with digital scanners
➤ but how much scrutiny will be applied
when the card is used?
LIVENESS
➤ digital data is easily copied
➤ replay attacks repeat a previously captured
biometric
➤ spoofing creates a facsimile of a biometric
capable of fooling a digital system
➤ proofs
➤ is data being captured now
➤ is it from a genuine source
➤ has it been tampered with
➤ is it likely to be unique
TRUST ARBITRATION
➤ a contract is an agreement to do something
between two parties
➤ in Common Law this requires both intent
and an exchange of consideration
➤ a contract can be enforced by the courts
even if it has no written form
➤ trust relies on recognised authority and
transparency of process
➤ the internet has no courts and machines
lack intent so we must provide witnesses
that a human decision was made and rely
on off-line courts to resolve disputes
CHECKING IDENTITY
➤ each exchange of identity comes with proof
that the exchange occurred
➤ proof engenders trust
➤ we anchor trust in information based on its
provenance and its tamper-resistance
➤ we can also capture proof of why the
exchange occurred
➤ we can record these proofs for future
reference
➤ good bookkeeping is at the heart of all
identity schemes
THE CRYPTO TOOLBAG
➤ HMAC hashes are large numbers computed
from a set of data with cryptography
➤ any change to the set of data will result in a
different HMAC value being calculated
➤ symmetric encryption allows two parties
with the same key to communicate securely
➤ public key encryption keeps the decryption
key secret
➤ hybrid encryption allows a symmetric key
to be shared as data by encrypting it with a
public key
UNIQUENESS
➤ a one-time pad is a single use key for
encrypting a message
➤ it provides a unique mapping between the
encrypted content and the keys to generate
and recover that content
➤ it provides perfect secrecy as there are no
variant encrypted texts which can reveal
elements of the keys
➤ one-time pads require key management
which guarantees uniqueness and
randomness
IMMUTABILITY
➤ singly-linked lists are a popular abstraction
in computer science
➤ they allow several lists to share common
starting segments
➤ a hash chain extends this concept with
computed hashes for each element and an
optional signature to validate them
➤ alter one item in the chain and all
subsequent hashes must be recalculated for
the signature to remain valid
INTEGRITY
➤ trees are another popular data structure
related to lists but used to capture
hierarchical structures and optimise search
➤ Merkle trees are trees built from hash
chains
➤ adding to the tree creates a new root
element whose hash proves the integrity of
its links and leaf elements
➤ building many overlapping trees ensures
that changes to one tree will invalidate
other trees
BLOCKCHAIN
➤ Bitcoin uses a hash chain of Merkle trees
packaged as blocks of information to
provide nonrepudiation
➤ the hash chain can be forked deliberately or
as a result of network partitioning
➤ the Bitcoin consensus algorithm is based on
proof of work which limits the rate at
which transactions can be performed
➤ and if forks are later merged together then
the shorter fork is discarded
➤ forks can overcome this by using sidechains
for exchange
ROUTING
➤ the internet comprises a decentralised
physical infrastructure
➤ most applications are built with a
centralised client-server model which hides
this reality
➤ servers act as trust anchors
➤ blockchain mining & etherium dApps are
fully distributed
➤ lacking servers they require a consensus
algorithm to agree a trusted reality
CASE STUDY:
DESIGNING
UPASS
patented by Yoti Ltd, 130 Fenchurch Street, London
PRINCIPLES
➤ UK common law identity
➤ functional anonymity
➤ resistant to mass surveillance
➤ a reliable source of information even if the
information itself is unreliable
➤ transactions are fast with minimal need for
consensus or protocol handshakes
➤ can be scaled to a global system
➤ works on desktop, mobile & IoT platforms
OVERVIEW
➤ an anchor document underlies each identity
➤ mobile-centric design
➤ everything happens on the handset
➤ QR codes for easy token sharing
➤ validation service
➤ check tokens
➤ release information
➤ secure store is an encrypted datastore
➤ one-directional flows share trust between
all three actors
REGISTRATION
➤ digitise anchor document
➤ capture selfie
➤ create profiles
➤ anonymous
➤ date of birth
➤ name
➤ nationality
➤ generate encryption keys
➤ record phone address
➤ issue anonymous profile credential
TRANSACTIONS
➤ a customer presents a profile credential to a
merchant
➤ the merchant adds a credential of their own
➤ both credentials are sent to validation server
➤ the validation server confirms the credentials
are known to it
➤ it invalidates these and sends receipts directly
to both customer and merchant
➤ the receipts provide fresh credentials
➤ only the server
➤ knows the delivery addresses
➤ can make fresh credentials
PROFILES
➤ a set of keys and their associated values
➤ essentially a web form
➤ anchored to a document or assigned by
another profile
➤ has a confidence value based on its
provenance and usage
➤ is immutable and links to previous versions
of itself
➤ has an associated selfie chain with photos
of its owner
➤ anonymity is represented by a profile
containing no keys or values
CONFIDENCE
➤ courts reach a verdict by judging the
relative credibility of evidence & witnesses
➤ a distributed ledger which is very difficult
to tamper with provides a powerful witness
➤ and each anchor document is a witness of
the profile data depending on it
➤ a profile's associated selfie can be inspected
by its recipient at the time the transaction
takes place and compared with the
presenter's face
➤ combined with a confidence value this
provides a reasonable basis for making
informed choices
RECEIPTS
➤ receipts come in pairs
➤ each receipt has links to the relevant
information about the other party
➤ links are included to the profile presented
and to any profiles previously assigned by
the recipient
➤ receipts are encrypted with a symmetric key
specific to the profile used by the recipient
➤ and they contain a shared key which is
unique to this transaction
➤ each receipt contains a link to the previous
transaction performed by this profile
MASTER RECEIPTS
➤ receipt pairs are recorded opaquely as
master receipts in the secure store
➤ a master receipt is encrypted with the
shared transaction key
➤ the transaction key is never recorded in the
secure store
➤ master receipts form a chain
➤ the index for this chain is calculated from
the credentials used but these are only
stored in the receipt pair
FACE RECOGNITION
➤ the human brain is generally good at
looking for and identifying faces
➤ machines can be taught to match faces by
reducing them to a templated form
➤ this templated form can act as an index to
return one associated identity among many
➤ or it can be associated with a particular
profile and used to confirm identity
➤ each source image for the template and
their order are recorded in a blockchain
➤ this allows the template to be recalculated
for any point in a profile's history
BIOMETRIC LIVENESS
➤ to be practical a biometric should be simple
to capture & tamper resistant
➤ it should also have a differential property
which can be used to test it's live
➤ pupillary response to a succession of bright
flashes of light has calculable properties
➤ and eye movement may be guided using a
shared cryptographic secret which will be
unique to a particular device
➤ the server sets the parameters randomly for
each test making the results unique to this
particular interaction
FIG. 5D
time
Pupillary area
Constriction
δt
first pulse
applied
second pulse
applied
t1 t2
FIG. 4
D
SF_t
SF_(t_n)
W
FIG. 8
W
W
FIG. 9
W
FIG. 8
W
W
120c
y
x
Liveness
Eye
tracking
Enrolment
b
S1104b
S1112
S1110b
Cv Cv’
ET params
PD results
+ sig+URI
ET results
+ sig+URI
Access
control
214
104
120a
120b
120c
δt
time
Pupillary area
y
x
Pupil
dilation
Liveness
Eye
tracking
Enrolment
FIG. 11
S1102a
S1102b
S1104a
S1104b
S1106
S1108a
S1108b
S1112
S1110a
S1110b
130
Cv Cv’
PD params
ET params
Collect liveness
detection data
S1107
1102a
1102b
PD results PD+ET sig
ET results PD+ET sig
PD+ET params
+PD and ET server URIs
1101
PD results
+ sig+URI
ET results
+ sig+URI
Access
control
214
DEVICE LIVENESS
➤ live biometric responses with random
parameters give us unique values
➤ by controlling where and how these are
delivered we can prove uniqueness of our
current interaction
➤ as a result we can prove the device is live
➤ as with a transaction we use one-way
messaging which can reduce the ability of
an eavesdropper to apply flow analysis
WEB CONNECT+
➤ sometimes we need to perform transactions
via an untrusted intermediary
➤ These are potentially subject to Man-in-the-
Middle attacks
➤ by having a remote server use our device as
a validator we can perform a transaction
and give them access to a secure back
channel
➤ now we can monitor & control their
connection to our untrusted intermediary
➤ Essentially the remote site has to login to
our local system
ASSET TRACKING
➤ the building blocks of uPass can provide
identity to things as well as people
➤ we can use this fact to create private
identity spaces unique to a particular asset
class such as event tickets
➤ this can be used to control how the asset
changes hands
WWW.INIDSOL.UK
www.slideshare.net/feyeleanor

Identity & trust in Monitored Spaces

  • 1.
    IDENTITY & TRUSTIN MONITORED SPACES THE VIRTUES OF PRIVACY BY DESIGN Eleanor McHugh Romek Szczesniak
  • 2.
    Cryptographer Security Architect Physicist Transport Architecture 1998PKI elliptic curves satellite PSN 1999 π-calculus VM 2000 control networks 2001 mobile identity secure documents 2003 ENUM 2006 dotTel hybrid encryption 2007 encrypted DNS 2010 concurrent VM 2011 national eID 2012 encrypted SQL privacy by design 2014 uPass 2018 Redbush Agora
  • 3.
    PRIVACY AND SECURITY ➤digital data is easily duplicated ➤ when data moves or is stored it generates metadata which is itself digital data ➤ processing data or metadata can reveal identity even if any personally identifying data it contains is encrypted ➤ so a system which respects privacy needs to know as little as practical about ➤ the data it processes ➤ the metadata it produces fraud and even household names have fallen foul to criminal hackers. In response to the public outcry ambitious regulations have been introduced such as the European Union’s GDPR and Whenever your org personal data you consent from its su guardian and you by demand
  • 5.
    UK LEGAL IDENTITY ➤birth certificate and gender recognition certificate are the primary identity documents ➤ with either it's possible to get ➤ national insurance number ➤ NHS medical card ➤ passport ➤ name can be changed with a deed poll or a statutory declaration ➤ none of these documents include biometrics
  • 6.
    ATTRIBUTES ➤ attributes arediscrete facts ➤ dark hair ➤ wears black ➤ professional cryptographer ➤ fragments of an identity ➤ they may be entirely absent ➤ or some may be imprecise ➤ even a complete set may not be unique ➤ they're only as trustworthy as their origins
  • 7.
  • 8.
  • 9.
  • 10.
  • 11.
  • 12.
  • 13.
    “What’s in aname? That which we call a rose, by any other name would smell as sweet.” William Shakespeare
  • 14.
    SECURE TOKENS ➤ tokensalone are not proofs of the identity of their bearer ➤ a biometric needs to be captured to associate a token with an identifiable human being ➤ and the biometric must be confirmed by a person or an algorithmic process at the time identity is being asserted to perform an identification ➤ evidence that this has occurred should be recorded if this needs to be confirmed at a later date such as in a court of law
  • 15.
    BIOMETRICS ➤ if itcan be measured and tends towards uniqueness… ➤ faces ➤ fingerprints ➤ iris patterns ➤ retina patterns ➤ genetic fingerprints ➤ electrocardiogram ➤ electroencephalogram ➤ it can also be duplicated and counterfeited!
  • 16.
    ID CARD ➤ photofor visual comparison ➤ hologram to assert validity ➤ date of birth reveals age ➤ serial number allows this card to be recorded and tracked ➤ physical security features increase the cost of counterfeiting ➤ smart card features allow a card to be used with digital scanners ➤ but how much scrutiny will be applied when the card is used?
  • 17.
    LIVENESS ➤ digital datais easily copied ➤ replay attacks repeat a previously captured biometric ➤ spoofing creates a facsimile of a biometric capable of fooling a digital system ➤ proofs ➤ is data being captured now ➤ is it from a genuine source ➤ has it been tampered with ➤ is it likely to be unique
  • 18.
    TRUST ARBITRATION ➤ acontract is an agreement to do something between two parties ➤ in Common Law this requires both intent and an exchange of consideration ➤ a contract can be enforced by the courts even if it has no written form ➤ trust relies on recognised authority and transparency of process ➤ the internet has no courts and machines lack intent so we must provide witnesses that a human decision was made and rely on off-line courts to resolve disputes
  • 19.
    CHECKING IDENTITY ➤ eachexchange of identity comes with proof that the exchange occurred ➤ proof engenders trust ➤ we anchor trust in information based on its provenance and its tamper-resistance ➤ we can also capture proof of why the exchange occurred ➤ we can record these proofs for future reference ➤ good bookkeeping is at the heart of all identity schemes
  • 20.
    THE CRYPTO TOOLBAG ➤HMAC hashes are large numbers computed from a set of data with cryptography ➤ any change to the set of data will result in a different HMAC value being calculated ➤ symmetric encryption allows two parties with the same key to communicate securely ➤ public key encryption keeps the decryption key secret ➤ hybrid encryption allows a symmetric key to be shared as data by encrypting it with a public key
  • 21.
    UNIQUENESS ➤ a one-timepad is a single use key for encrypting a message ➤ it provides a unique mapping between the encrypted content and the keys to generate and recover that content ➤ it provides perfect secrecy as there are no variant encrypted texts which can reveal elements of the keys ➤ one-time pads require key management which guarantees uniqueness and randomness
  • 22.
    IMMUTABILITY ➤ singly-linked listsare a popular abstraction in computer science ➤ they allow several lists to share common starting segments ➤ a hash chain extends this concept with computed hashes for each element and an optional signature to validate them ➤ alter one item in the chain and all subsequent hashes must be recalculated for the signature to remain valid
  • 23.
    INTEGRITY ➤ trees areanother popular data structure related to lists but used to capture hierarchical structures and optimise search ➤ Merkle trees are trees built from hash chains ➤ adding to the tree creates a new root element whose hash proves the integrity of its links and leaf elements ➤ building many overlapping trees ensures that changes to one tree will invalidate other trees
  • 24.
    BLOCKCHAIN ➤ Bitcoin usesa hash chain of Merkle trees packaged as blocks of information to provide nonrepudiation ➤ the hash chain can be forked deliberately or as a result of network partitioning ➤ the Bitcoin consensus algorithm is based on proof of work which limits the rate at which transactions can be performed ➤ and if forks are later merged together then the shorter fork is discarded ➤ forks can overcome this by using sidechains for exchange
  • 25.
    ROUTING ➤ the internetcomprises a decentralised physical infrastructure ➤ most applications are built with a centralised client-server model which hides this reality ➤ servers act as trust anchors ➤ blockchain mining & etherium dApps are fully distributed ➤ lacking servers they require a consensus algorithm to agree a trusted reality
  • 26.
    CASE STUDY: DESIGNING UPASS patented byYoti Ltd, 130 Fenchurch Street, London
  • 27.
    PRINCIPLES ➤ UK commonlaw identity ➤ functional anonymity ➤ resistant to mass surveillance ➤ a reliable source of information even if the information itself is unreliable ➤ transactions are fast with minimal need for consensus or protocol handshakes ➤ can be scaled to a global system ➤ works on desktop, mobile & IoT platforms
  • 28.
    OVERVIEW ➤ an anchordocument underlies each identity ➤ mobile-centric design ➤ everything happens on the handset ➤ QR codes for easy token sharing ➤ validation service ➤ check tokens ➤ release information ➤ secure store is an encrypted datastore ➤ one-directional flows share trust between all three actors
  • 29.
    REGISTRATION ➤ digitise anchordocument ➤ capture selfie ➤ create profiles ➤ anonymous ➤ date of birth ➤ name ➤ nationality ➤ generate encryption keys ➤ record phone address ➤ issue anonymous profile credential
  • 30.
    TRANSACTIONS ➤ a customerpresents a profile credential to a merchant ➤ the merchant adds a credential of their own ➤ both credentials are sent to validation server ➤ the validation server confirms the credentials are known to it ➤ it invalidates these and sends receipts directly to both customer and merchant ➤ the receipts provide fresh credentials ➤ only the server ➤ knows the delivery addresses ➤ can make fresh credentials
  • 31.
    PROFILES ➤ a setof keys and their associated values ➤ essentially a web form ➤ anchored to a document or assigned by another profile ➤ has a confidence value based on its provenance and usage ➤ is immutable and links to previous versions of itself ➤ has an associated selfie chain with photos of its owner ➤ anonymity is represented by a profile containing no keys or values
  • 32.
    CONFIDENCE ➤ courts reacha verdict by judging the relative credibility of evidence & witnesses ➤ a distributed ledger which is very difficult to tamper with provides a powerful witness ➤ and each anchor document is a witness of the profile data depending on it ➤ a profile's associated selfie can be inspected by its recipient at the time the transaction takes place and compared with the presenter's face ➤ combined with a confidence value this provides a reasonable basis for making informed choices
  • 33.
    RECEIPTS ➤ receipts comein pairs ➤ each receipt has links to the relevant information about the other party ➤ links are included to the profile presented and to any profiles previously assigned by the recipient ➤ receipts are encrypted with a symmetric key specific to the profile used by the recipient ➤ and they contain a shared key which is unique to this transaction ➤ each receipt contains a link to the previous transaction performed by this profile
  • 34.
    MASTER RECEIPTS ➤ receiptpairs are recorded opaquely as master receipts in the secure store ➤ a master receipt is encrypted with the shared transaction key ➤ the transaction key is never recorded in the secure store ➤ master receipts form a chain ➤ the index for this chain is calculated from the credentials used but these are only stored in the receipt pair
  • 35.
    FACE RECOGNITION ➤ thehuman brain is generally good at looking for and identifying faces ➤ machines can be taught to match faces by reducing them to a templated form ➤ this templated form can act as an index to return one associated identity among many ➤ or it can be associated with a particular profile and used to confirm identity ➤ each source image for the template and their order are recorded in a blockchain ➤ this allows the template to be recalculated for any point in a profile's history
  • 36.
    BIOMETRIC LIVENESS ➤ tobe practical a biometric should be simple to capture & tamper resistant ➤ it should also have a differential property which can be used to test it's live ➤ pupillary response to a succession of bright flashes of light has calculable properties ➤ and eye movement may be guided using a shared cryptographic secret which will be unique to a particular device ➤ the server sets the parameters randomly for each test making the results unique to this particular interaction FIG. 5D time Pupillary area Constriction δt first pulse applied second pulse applied t1 t2 FIG. 4 D SF_t SF_(t_n) W FIG. 8 W W FIG. 9 W FIG. 8 W W 120c y x Liveness Eye tracking Enrolment b S1104b S1112 S1110b Cv Cv’ ET params PD results + sig+URI ET results + sig+URI Access control 214
  • 37.
    104 120a 120b 120c δt time Pupillary area y x Pupil dilation Liveness Eye tracking Enrolment FIG. 11 S1102a S1102b S1104a S1104b S1106 S1108a S1108b S1112 S1110a S1110b 130 CvCv’ PD params ET params Collect liveness detection data S1107 1102a 1102b PD results PD+ET sig ET results PD+ET sig PD+ET params +PD and ET server URIs 1101 PD results + sig+URI ET results + sig+URI Access control 214 DEVICE LIVENESS ➤ live biometric responses with random parameters give us unique values ➤ by controlling where and how these are delivered we can prove uniqueness of our current interaction ➤ as a result we can prove the device is live ➤ as with a transaction we use one-way messaging which can reduce the ability of an eavesdropper to apply flow analysis
  • 38.
    WEB CONNECT+ ➤ sometimeswe need to perform transactions via an untrusted intermediary ➤ These are potentially subject to Man-in-the- Middle attacks ➤ by having a remote server use our device as a validator we can perform a transaction and give them access to a secure back channel ➤ now we can monitor & control their connection to our untrusted intermediary ➤ Essentially the remote site has to login to our local system
  • 39.
    ASSET TRACKING ➤ thebuilding blocks of uPass can provide identity to things as well as people ➤ we can use this fact to create private identity spaces unique to a particular asset class such as event tickets ➤ this can be used to control how the asset changes hands
  • 40.