Abstract
The first generation of European e-passports will be issued in 2006. We discuss how borders are crossed regarding the security and privacy erosion of the proposed schemes, and show which borders need to be crossed to improve the security and the privacy protection of the next generation of e-passports. In particular we discuss attacks on Basic Access Control due to the low entropy of the data from which the access keys are derived, we sketch the European proposals for Extended Access Control and the weaknesses in that scheme, and show how fundamentally different design decisions can make e-passports more secure.
Id: passport.tex,v 1.44 2006/06/30 07:25:14 ronny Exp.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Kamerstuk II 2004/2005, 25 764, nr. 26 (Official communication of the Dutch parliament)
Kamerstuk II, 2004/2005, 29 754, nr. 5 (Official communication of the Dutch parliament)
Yearly report on algorithms and keysizes (2005). Technical report, IST-2002-507932 ECRYPT, D.SPA.10 Rev. 2005-0.2 (January 2006)
Bellovin, S.M., Merritt, M.: Encrypted key exchange: Password-based protocols secure against dictionary attacks. In: IEEE Security and Privacy, Oakland, CA, USA, pp. 72–84. IEEE, Los Alamitos (1992)
BSI. Advanced security mechanisms for machine readable travel documents – extended access control (eac). Technical Report TR-03110, Bundesamt für Sicherheit in der Informationstechnik (BSI), Bonn, Germany (2006)
Proposal for a council regulation amending regulation (ec) no 1683/95 laying down a uniform format for visas. OJ C 51, 219–220 (February 26, 2002)
Proposal for a council regulation on standards for security features and biometrics in eu citizens’ passports. OJ C 98(39) (April 23, 2004)
Hoepman, J.-H., Jacobs, B.: E-passports without the big picture. eGov Monitor (February 20, 2006), http://www.egovmonitor.com/node/4716
ICAO. Machine Readable Travel Documents. Technical report, ICAO, 5th edn (2003)
ICAO. Development of a logical data structure - LDS for optional capacity expansion technologies, revision 1.7. Technical report, ICAO (May 2004)
ICAO. PKI for machine readable travel documents offering ICC read-only access, version - 1.1. Technical report (Octrober 2004)
ISO 7816. ISO/IEC 7816 Identification cards – Integrated circuit(s) cards with contacts. Technical report, ISO JTC 1/SC 17
ISO 7816-12. ISO/IEC 7816 Identification cards – Integrated circuit(s) cards – Part 12: Cards with contacts – USB electrical interface and operating procedures. Technical report, ISO JTC 1/SC 17
Juels, A., Molnar, D., Wagner, D.: Security issues in e-passports. In: SecureComm 2005 (2005)
Gaurav, S.K., Karger, P.A.: Security and privacy issues in machine readable travel documents (MRTDs). IBM Technical Report (RC 23575), IBM T. J. Watson Research Labs (April 2005)
Kügler, D.: Security mechanisms of the biometrically enhanced (eu) passport. In: Security in Pervasive Computing conference, Boppard, Germany (April 2005), www.spc-conf.org/2005/slides/SPC_Passport.pdf
Massey, J.L.: Guessing and entropy. In: Proc. 1994 IEEE International Symposium on Information Theory, p. 204 (1994)
National Institute of Standards and Technology. Recommendation for key management. Technical Report Special Publication 800-57 Draft, NIST (August 2005)
Evaluation report biometrics trial 2B or not 2B (2005), www.europeanbiometrics.info/images/resources/88_630_file.pdf
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2006 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Hoepman, JH., Hubbers, E., Jacobs, B., Oostdijk, M., Schreur, R.W. (2006). Crossing Borders: Security and Privacy Issues of the European e-Passport. In: Yoshiura, H., Sakurai, K., Rannenberg, K., Murayama, Y., Kawamura, S. (eds) Advances in Information and Computer Security. IWSEC 2006. Lecture Notes in Computer Science, vol 4266. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11908739_11
Download citation
DOI: https://doi.org/10.1007/11908739_11
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-47699-3
Online ISBN: 978-3-540-47700-6
eBook Packages: Computer ScienceComputer Science (R0)