SlideShare a Scribd company logo
1 of 35
{
• Conventional travel documents  Low Technology
• Hard to copy/forge, printed paper with ID picture
• ICAO attempts to develop Biometric Passport
since 1968.

• Discrete Machine Readable Zone (MRZ)
containing little information.
• Aims at speeding information at borders.
Addition of machine readable
information on the cards since 1980

---Biometric main attraction

--ICAO Standard released in 2004
• Becoming the base for secure authentication of personal
identity
• Many countries started to issue E-passports with an embedded
chip containing biometric data
• MRZ (introduced in 1980) contains two machine readable lines
at the bottom of the identity page of passport.
• The latest biometric standardized contains biometric features
such as fingerprint, facial and iris recognition and enhances
the security mechanisms.
Minimal Requirements in ICAO Standard
Machine-Readable Travel Documents (MRTD) must
provide
• facial image
• a digital copy of the MRZ, and
• to have them digitally signed by the issuing
country.
The preferred platform is a contactless IC chip based
on RFID technology.
Logical Data Structure for MRTD
Logical Data Structure (LDS) ----> for global interoperability
• ICAO guideline on how data should be stored in a microchip
• Data Group (DG) -- for grouping & collecting logical data into
LDS
• ICAO guideline divides
• Data elements into 19 groups and
• LDS into three parts

 “Mandatory” Data Elements
 “Optional” Data Elements
:::Mandatory:::
• Data defined by the issuing state or organization.
• Includes the details recorded in the MRZ such as
• Passport Number,
• Passport Bearer’s Name,
• Nationality,
• Date of Birth,
• Date of Expiry of passport,
• Encoded facial biometric image &
• Checksum of individual data elements which are used
for deriving the session key.
:::Optional:::
• Data defined by the issuing state or organization.
• Includes
• Encoded identification features (face, finger and eye),
• Displayed identification features (digital signature), &
• Encoded security features (contact details, proof of
citizenship and endorsements).
• Details for automated border clearance,
• Electronic visas,
• Other travel records.
Overview of
Mandatory and
Optional Data
Elements defined
for LDS
Biometric passport = E-passport
Paper & electronic identity credential
Contains biometrics features for authentication of travellers
Contains chip & antenna enclosed in front/back/central page
Chip  storing the user’s information
Also contains biometric identifiers [depending on various
countries choice and technical evolution]
• Recommended file formats & communication protocols
followed
•
•
•
•
•
•
Biometric
Passport
Working Mechanism of Biometric Passport
Border/Immigration officer uses MRZ reader to scan the MRZ part of
e-passport to retrieve the embedded information.
||
Then, the stored information is obtained from the contact less chip by
putting the e-passport near to e-passport reader.
||
Finally, verification of data is performed using PA, BAC mechanism for
data encryption and integrity verification using either passive or
active authentication. PA is compulsory where as BAC and AA are
optional.
Special Properties of E-Passport
• Biographical information and biometric information are securely
stored which are identical to the information in the passport.
• Contactless chip technology that lets the stored information to
be retrieved by chip readers at a close distance.
• Digital signature technology for verification of authenticity of the
data stored on the chip.
RFID chips are being used everywhere such as tracking animals, inventory tracking devices, to start
cars,

ESPECIALLY IN E-PASSPORTS
Three Components of RFID System

Antenna
Transceiver
Transponder
RFID System
RFID Circuit
ICAO Definition: MRTD has a contactless IC imbedded in it that can be
used for biometric identification of the holder.
Hence, MRTDs shall carry the specified symbol
Russian Passport
with the
“Chip-Inside”
Symbol
• E-passport guarantees confidentiality, consistency and authenticity of
information based on some cryptographic tools.
• Wireless transmission of data in RFID makes it is vulnerable to an attack
from a distance.
• Attacks possible at communication network, chip or at backend system.
• Most common attacks:
• Eavesdropping,
• Reverse Engineering,
• Clandestine Scanning and Tracking,
• Cloning,
• Biometric Data-Leakage,
• Cryptographic Weaknesse &
• Skimming.
September 11, 2001
Global warning to handle & review
the security and border control
issues in practice
EAVESDROPPING
Attacker secretly listens to the communication link and
intercepts the information by using unauthorized device
during the communication between chip and legitimate
reader
-----Passive attack
-----Very hard to acknowledge because there is no emission of
powered signals
-----Attacker can eavesdrop up to at least of 2 meters
REVERSE ENGINEERING
The process of taking the technological principles of a
device, object or system apart to figure out how it works----Attacker can reverse engineer if he/she has the sound
technical knowledge & has access to equipment not
commonly found in commercial market
CLANDESTINE SCANNING AND TRACKING
Scanning: The secret way of reading the electronic data of
an identity card without the permission of the card holder
-----Tracking: Ability to locate an individual and it can easily
reveal the location privacy
-----Clandestine tracking more harmful than scanning
-----Faraday cage has been suggested to protect e-passports
CLONING
The way of acquiring the data from an authorized identity
card and making an unauthorized copy of the captured
sample in a new chip
-----Active authentication as the counter measure for cloning
threat.
-----Can be bypassed by amending the EF.COM file of the
passport chip.
BIOMETRIC DATA-LEAKAGE
If the biometric data are compromised, replacement is not
possible
-----One of the technics to increase data security is to use
data-hiding
-----Watermarking-based multimodal biometric approaches are
widely used
CRYPTOGRAPHIC WEAKNESSES
A new scheme for preserving authentication based on
fingerprints that uses ElGamal cryptosystem for biometric
comparison in encrypted domain
-----No facility for key sharing and only used for authentication
-----Authentication protocol based on elliptic curve
cryptography more theoretical without experimental
evaluation
-----Some weakness on cryptography relied by ICAO
SKIMMING
The act of obtaining encoded data without the consent of
users by using electronic storage device
-----Data retrieved by beaming power at the passport within a
few inches or at most a few feet
-----If the reader broadcasts the signal with high power the
range can be extended
The ways of attacks to the system must be understandable by
showing a generic biometric system model and its different
modules.
• ICAO standards specify cryptographic measures & control
techniques to be implemented in e-passport.
• One mandatory cryptographic feature & five optional advanced
security methods.

Stored data integrity in the LDS and SOD verified & authenticated by
PASSIVE AUTHENTICATION (PA).
ACTIVE AUTHENTICATION (AA) is an optional security feature
depending on public key cryptography to protect the chip against
modification or cloning.
Basic Access Control (BAC) as an optional feature against data
skimming and misuse.
Extended Access Control (EAC) adds functionality to terminal
authentication & chip authentication to prevent unauthorized
access to additional biometrics
Cryptography Threats: The recommended minimal key lengths
have been chosen so that breaking those keys requires a certain
effort, independent of the chosen signature algorithm.

Cryptographic Threats
• ICAO standard allows an additional security access mechanism to meet data
protection requirements & to enhance privacy of additional biometric data
(such as fingerprints and iris identifiers).
• Addition of metallic shield to cover e-Passport to prevent skimming and BAC
to prevent unauthorized readers from accessing the chip was implemented.
• These properties will make attacker more difficult to modify the stolen or
lost passports as the new name and information would differ from the
information on the RFID tag.
• All e-passports issued must follow ICAO standards.
• However, countries implement e-passport programs according to their
specific policies and are free to implement different options specified in the
standard.
• Because of this, there are some differences on implementation of epassports among several countries even though they all confirm to the ICAO.
• The US State Department specified that new US passports would increase
the available memory from 32 kilobytes to 64 kilobytes apparently to
reserve for some more biometric characteristics.
• The State Department also made compulsory rule for using the metallic
layer to cover the passport.
• The idea of using the metallic shield is a good concept but it does not
provide a complete solution.
• Since, passports are used for personal identification all over the world, one
need to open it which makes the exposition of RFID.
• Multimodal Biometric features are useful and widely used for
authentication process, but misuse of these features can make severe loss
of vital private information.
• Several technologies are implemented in order to prevent from security
threats, among them Biometrics is proved to be more secure than others.
Machine Readable Travel Documents (MRTD) - Biometric Passport

More Related Content

What's hot

Forensic Medicine
Forensic MedicineForensic Medicine
Forensic MedicineDon Caeiro
 
Smart card based electronic passport system
Smart card based electronic passport systemSmart card based electronic passport system
Smart card based electronic passport systemEdgefxkits & Solutions
 
Palmprint recognition presentation
Palmprint recognition presentationPalmprint recognition presentation
Palmprint recognition presentationAlexandru Dorobantu
 
Encase Forensic
Encase ForensicEncase Forensic
Encase ForensicMegha Sahu
 
Kali linux useful tools
Kali linux useful toolsKali linux useful tools
Kali linux useful toolsmilad mahdavi
 
Introduction to gsr analysis
Introduction to gsr analysisIntroduction to gsr analysis
Introduction to gsr analysisGopika Babu
 
Digital Forensic ppt
Digital Forensic pptDigital Forensic ppt
Digital Forensic pptSuchita Rawat
 
Internal Ballistics
Internal BallisticsInternal Ballistics
Internal BallisticsKetan Patil
 
Recording of Fingeprints
Recording of FingeprintsRecording of Fingeprints
Recording of FingeprintsDon Caeiro
 
Preserving and recovering digital evidence
Preserving and recovering digital evidencePreserving and recovering digital evidence
Preserving and recovering digital evidenceOnline
 
Firearm injuries
Firearm injuriesFirearm injuries
Firearm injuriesKetan Patil
 
Basic Fingerprints Classification And Analysis
Basic Fingerprints Classification And AnalysisBasic Fingerprints Classification And Analysis
Basic Fingerprints Classification And Analysisheremi
 
VSC ppt forensic science Shailesh Chaubey .pptx
VSC ppt  forensic science Shailesh Chaubey .pptxVSC ppt  forensic science Shailesh Chaubey .pptx
VSC ppt forensic science Shailesh Chaubey .pptxSHAILESH CHAUBEY
 
Forensic Analysis of Bare Footprint .pptx
Forensic Analysis of Bare Footprint .pptxForensic Analysis of Bare Footprint .pptx
Forensic Analysis of Bare Footprint .pptxPawanMandal8
 
History of firearm and mechanism
History of firearm and mechanismHistory of firearm and mechanism
History of firearm and mechanismNEELAM CHOUDHARY
 
Biometrics iris recognition
Biometrics iris recognitionBiometrics iris recognition
Biometrics iris recognitionsunjaysahu
 
Iris Biometric for Person Identification
Iris Biometric for Person IdentificationIris Biometric for Person Identification
Iris Biometric for Person IdentificationManish Kumar
 

What's hot (20)

Forensic Medicine
Forensic MedicineForensic Medicine
Forensic Medicine
 
Smart card based electronic passport system
Smart card based electronic passport systemSmart card based electronic passport system
Smart card based electronic passport system
 
Palmprint recognition presentation
Palmprint recognition presentationPalmprint recognition presentation
Palmprint recognition presentation
 
Encase Forensic
Encase ForensicEncase Forensic
Encase Forensic
 
Kali linux useful tools
Kali linux useful toolsKali linux useful tools
Kali linux useful tools
 
Introduction to gsr analysis
Introduction to gsr analysisIntroduction to gsr analysis
Introduction to gsr analysis
 
Digital Forensic ppt
Digital Forensic pptDigital Forensic ppt
Digital Forensic ppt
 
Mobile Forensics
Mobile ForensicsMobile Forensics
Mobile Forensics
 
Internal Ballistics
Internal BallisticsInternal Ballistics
Internal Ballistics
 
Recording of Fingeprints
Recording of FingeprintsRecording of Fingeprints
Recording of Fingeprints
 
Mobile Forensics
Mobile Forensics Mobile Forensics
Mobile Forensics
 
Preserving and recovering digital evidence
Preserving and recovering digital evidencePreserving and recovering digital evidence
Preserving and recovering digital evidence
 
Firearm injuries
Firearm injuriesFirearm injuries
Firearm injuries
 
Basic Fingerprints Classification And Analysis
Basic Fingerprints Classification And AnalysisBasic Fingerprints Classification And Analysis
Basic Fingerprints Classification And Analysis
 
VSC ppt forensic science Shailesh Chaubey .pptx
VSC ppt  forensic science Shailesh Chaubey .pptxVSC ppt  forensic science Shailesh Chaubey .pptx
VSC ppt forensic science Shailesh Chaubey .pptx
 
Iris recognition
Iris recognitionIris recognition
Iris recognition
 
Forensic Analysis of Bare Footprint .pptx
Forensic Analysis of Bare Footprint .pptxForensic Analysis of Bare Footprint .pptx
Forensic Analysis of Bare Footprint .pptx
 
History of firearm and mechanism
History of firearm and mechanismHistory of firearm and mechanism
History of firearm and mechanism
 
Biometrics iris recognition
Biometrics iris recognitionBiometrics iris recognition
Biometrics iris recognition
 
Iris Biometric for Person Identification
Iris Biometric for Person IdentificationIris Biometric for Person Identification
Iris Biometric for Person Identification
 

Viewers also liked

Czym rozni sie paszport biometryczny od tradycyjnego
Czym rozni sie paszport biometryczny od tradycyjnegoCzym rozni sie paszport biometryczny od tradycyjnego
Czym rozni sie paszport biometryczny od tradycyjnegorafaljurkowlaniec
 
Formal Security Analysis of Australian ePassport Implementation
Formal Security Analysis of Australian ePassport ImplementationFormal Security Analysis of Australian ePassport Implementation
Formal Security Analysis of Australian ePassport ImplementationVijay Pasupathinathan, PhD
 
Doc 9303 Part 1 Vol 2
Doc 9303 Part 1 Vol 2Doc 9303 Part 1 Vol 2
Doc 9303 Part 1 Vol 2guest455358
 
E-Passport: Deploying Hardware Security Modules to Ensure Data Authenticity a...
E-Passport: Deploying Hardware Security Modules to Ensure Data Authenticity a...E-Passport: Deploying Hardware Security Modules to Ensure Data Authenticity a...
E-Passport: Deploying Hardware Security Modules to Ensure Data Authenticity a...SafeNet
 
Key Management System Presentation: Jaguar
Key Management System Presentation: JaguarKey Management System Presentation: Jaguar
Key Management System Presentation: Jaguarm_phull
 
Customizing the API Store & Publisher in WSO2 API Manager
Customizing the API Store & Publisher in WSO2 API ManagerCustomizing the API Store & Publisher in WSO2 API Manager
Customizing the API Store & Publisher in WSO2 API ManagerWSO2
 
Ferroelectric nanostructures and their processing issues
Ferroelectric nanostructures and their processing issuesFerroelectric nanostructures and their processing issues
Ferroelectric nanostructures and their processing issues♪♫•*¨ *•.¸¸
 
Blake Silva resume
Blake Silva resume Blake Silva resume
Blake Silva resume Blake Silva
 
2011 12(112)
2011 12(112)2011 12(112)
2011 12(112)gsxr77
 
Como puede protegerte el programa espia para celular - Como rastrear un celul...
Como puede protegerte el programa espia para celular - Como rastrear un celul...Como puede protegerte el programa espia para celular - Como rastrear un celul...
Como puede protegerte el programa espia para celular - Como rastrear un celul...Gonzalo Viteri
 
Comunicación de crisis ebola (1ª semana)
Comunicación de crisis ebola (1ª semana)Comunicación de crisis ebola (1ª semana)
Comunicación de crisis ebola (1ª semana)Xtina García Carrera
 
Estimativos sobre la economía subterránea
Estimativos sobre la economía subterráneaEstimativos sobre la economía subterránea
Estimativos sobre la economía subterráneaKaren Zárate
 
Laberintos sombrios
Laberintos sombriosLaberintos sombrios
Laberintos sombriosDaniel Dagna
 
Thought Leadership on Social Platforms (Beth Kanter)
Thought Leadership on Social Platforms (Beth Kanter)Thought Leadership on Social Platforms (Beth Kanter)
Thought Leadership on Social Platforms (Beth Kanter)KDMC
 
NASA space apps guide for android
NASA space apps guide for androidNASA space apps guide for android
NASA space apps guide for androidRamy F. Radwan
 
Entorno de grupo
Entorno de grupoEntorno de grupo
Entorno de grupodrojos
 
Darshana chauhan sip report
Darshana chauhan sip reportDarshana chauhan sip report
Darshana chauhan sip reportDarshana Chauhan
 
Omtco it-costs-the-costs-growth-and-financial-risk-of-software-assets
Omtco it-costs-the-costs-growth-and-financial-risk-of-software-assetsOmtco it-costs-the-costs-growth-and-financial-risk-of-software-assets
Omtco it-costs-the-costs-growth-and-financial-risk-of-software-assetsKarthik Arumugham
 
Burson Marsteller 2010 global social media check-up
Burson Marsteller 2010 global social media check-upBurson Marsteller 2010 global social media check-up
Burson Marsteller 2010 global social media check-upAlex Kornfeind
 

Viewers also liked (20)

Czym rozni sie paszport biometryczny od tradycyjnego
Czym rozni sie paszport biometryczny od tradycyjnegoCzym rozni sie paszport biometryczny od tradycyjnego
Czym rozni sie paszport biometryczny od tradycyjnego
 
Formal Security Analysis of Australian ePassport Implementation
Formal Security Analysis of Australian ePassport ImplementationFormal Security Analysis of Australian ePassport Implementation
Formal Security Analysis of Australian ePassport Implementation
 
Doc 9303 Part 1 Vol 2
Doc 9303 Part 1 Vol 2Doc 9303 Part 1 Vol 2
Doc 9303 Part 1 Vol 2
 
E-Passport: Deploying Hardware Security Modules to Ensure Data Authenticity a...
E-Passport: Deploying Hardware Security Modules to Ensure Data Authenticity a...E-Passport: Deploying Hardware Security Modules to Ensure Data Authenticity a...
E-Passport: Deploying Hardware Security Modules to Ensure Data Authenticity a...
 
Key Management System Presentation: Jaguar
Key Management System Presentation: JaguarKey Management System Presentation: Jaguar
Key Management System Presentation: Jaguar
 
Customizing the API Store & Publisher in WSO2 API Manager
Customizing the API Store & Publisher in WSO2 API ManagerCustomizing the API Store & Publisher in WSO2 API Manager
Customizing the API Store & Publisher in WSO2 API Manager
 
Ferroelectric nanostructures and their processing issues
Ferroelectric nanostructures and their processing issuesFerroelectric nanostructures and their processing issues
Ferroelectric nanostructures and their processing issues
 
Blake Silva resume
Blake Silva resume Blake Silva resume
Blake Silva resume
 
2011 12(112)
2011 12(112)2011 12(112)
2011 12(112)
 
Como puede protegerte el programa espia para celular - Como rastrear un celul...
Como puede protegerte el programa espia para celular - Como rastrear un celul...Como puede protegerte el programa espia para celular - Como rastrear un celul...
Como puede protegerte el programa espia para celular - Como rastrear un celul...
 
Comunicación de crisis ebola (1ª semana)
Comunicación de crisis ebola (1ª semana)Comunicación de crisis ebola (1ª semana)
Comunicación de crisis ebola (1ª semana)
 
Estimativos sobre la economía subterránea
Estimativos sobre la economía subterráneaEstimativos sobre la economía subterránea
Estimativos sobre la economía subterránea
 
Laberintos sombrios
Laberintos sombriosLaberintos sombrios
Laberintos sombrios
 
Thought Leadership on Social Platforms (Beth Kanter)
Thought Leadership on Social Platforms (Beth Kanter)Thought Leadership on Social Platforms (Beth Kanter)
Thought Leadership on Social Platforms (Beth Kanter)
 
NASA space apps guide for android
NASA space apps guide for androidNASA space apps guide for android
NASA space apps guide for android
 
Entorno de grupo
Entorno de grupoEntorno de grupo
Entorno de grupo
 
Darshana chauhan sip report
Darshana chauhan sip reportDarshana chauhan sip report
Darshana chauhan sip report
 
Omtco it-costs-the-costs-growth-and-financial-risk-of-software-assets
Omtco it-costs-the-costs-growth-and-financial-risk-of-software-assetsOmtco it-costs-the-costs-growth-and-financial-risk-of-software-assets
Omtco it-costs-the-costs-growth-and-financial-risk-of-software-assets
 
Burson Marsteller 2010 global social media check-up
Burson Marsteller 2010 global social media check-upBurson Marsteller 2010 global social media check-up
Burson Marsteller 2010 global social media check-up
 
2016 R3 Corey York
2016 R3 Corey York2016 R3 Corey York
2016 R3 Corey York
 

Similar to Machine Readable Travel Documents (MRTD) - Biometric Passport

How to secure electronic passports
How to secure electronic passportsHow to secure electronic passports
How to secure electronic passportsRiscure
 
Document Verification through C-One E-Id - Copy
Document Verification through C-One E-Id - CopyDocument Verification through C-One E-Id - Copy
Document Verification through C-One E-Id - CopyRima Hajou
 
Vanderhoof smartcard-roadmap
Vanderhoof smartcard-roadmapVanderhoof smartcard-roadmap
Vanderhoof smartcard-roadmapHai Nguyen
 
International Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentInternational Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentIJERD Editor
 
E-Passport Using RFID Tag and Finger Print Sensor
E-Passport Using RFID Tag and Finger Print SensorE-Passport Using RFID Tag and Finger Print Sensor
E-Passport Using RFID Tag and Finger Print SensorIJSRED
 
Embedded system in Smart Cards
Embedded system in Smart CardsEmbedded system in Smart Cards
Embedded system in Smart CardsRebecca D'souza
 
Embedded System Security: Learning from Banking and Payment Industry
Embedded System Security: Learning from Banking and Payment IndustryEmbedded System Security: Learning from Banking and Payment Industry
Embedded System Security: Learning from Banking and Payment IndustryNarudom Roongsiriwong, CISSP
 
Design of Banking Security System Using Mems And Rfid Technology
Design of Banking Security System Using Mems And Rfid TechnologyDesign of Banking Security System Using Mems And Rfid Technology
Design of Banking Security System Using Mems And Rfid Technologytheijes
 
Access control basics-3
Access control basics-3Access control basics-3
Access control basics-3grantlerc
 
Smartcards and Authentication Tokens
Smartcards and Authentication TokensSmartcards and Authentication Tokens
Smartcards and Authentication Tokenssaniacorreya
 
project ppt.pptx
project ppt.pptxproject ppt.pptx
project ppt.pptxBhavanaKs10
 
Iot forensics
Iot forensicsIot forensics
Iot forensicsAbeis Ab
 
Mobile_Forensics- General Introduction & Software.pptx
Mobile_Forensics- General Introduction & Software.pptxMobile_Forensics- General Introduction & Software.pptx
Mobile_Forensics- General Introduction & Software.pptxgouriuplenchwar63
 
Introduction to Internet of Things.pdf
Introduction to Internet of Things.pdfIntroduction to Internet of Things.pdf
Introduction to Internet of Things.pdfGVNSK Sravya
 
פתרונות ביומטריים - רשיונות נהיגה ביומטריים | קומדע
פתרונות ביומטריים - רשיונות נהיגה ביומטריים | קומדעפתרונות ביומטריים - רשיונות נהיגה ביומטריים | קומדע
פתרונות ביומטריים - רשיונות נהיגה ביומטריים | קומדעZeev Shetach
 

Similar to Machine Readable Travel Documents (MRTD) - Biometric Passport (20)

How to secure electronic passports
How to secure electronic passportsHow to secure electronic passports
How to secure electronic passports
 
karsof systems e-visa
karsof systems e-visakarsof systems e-visa
karsof systems e-visa
 
Document Verification through C-One E-Id - Copy
Document Verification through C-One E-Id - CopyDocument Verification through C-One E-Id - Copy
Document Verification through C-One E-Id - Copy
 
Fiduciary Documents
Fiduciary DocumentsFiduciary Documents
Fiduciary Documents
 
Access controls
Access controlsAccess controls
Access controls
 
Vanderhoof smartcard-roadmap
Vanderhoof smartcard-roadmapVanderhoof smartcard-roadmap
Vanderhoof smartcard-roadmap
 
International Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentInternational Journal of Engineering Research and Development
International Journal of Engineering Research and Development
 
Automatic Data Capture.pptx
Automatic Data Capture.pptxAutomatic Data Capture.pptx
Automatic Data Capture.pptx
 
E-Passport Using RFID Tag and Finger Print Sensor
E-Passport Using RFID Tag and Finger Print SensorE-Passport Using RFID Tag and Finger Print Sensor
E-Passport Using RFID Tag and Finger Print Sensor
 
Card reader
Card readerCard reader
Card reader
 
Embedded system in Smart Cards
Embedded system in Smart CardsEmbedded system in Smart Cards
Embedded system in Smart Cards
 
Embedded System Security: Learning from Banking and Payment Industry
Embedded System Security: Learning from Banking and Payment IndustryEmbedded System Security: Learning from Banking and Payment Industry
Embedded System Security: Learning from Banking and Payment Industry
 
Design of Banking Security System Using Mems And Rfid Technology
Design of Banking Security System Using Mems And Rfid TechnologyDesign of Banking Security System Using Mems And Rfid Technology
Design of Banking Security System Using Mems And Rfid Technology
 
Access control basics-3
Access control basics-3Access control basics-3
Access control basics-3
 
Smartcards and Authentication Tokens
Smartcards and Authentication TokensSmartcards and Authentication Tokens
Smartcards and Authentication Tokens
 
project ppt.pptx
project ppt.pptxproject ppt.pptx
project ppt.pptx
 
Iot forensics
Iot forensicsIot forensics
Iot forensics
 
Mobile_Forensics- General Introduction & Software.pptx
Mobile_Forensics- General Introduction & Software.pptxMobile_Forensics- General Introduction & Software.pptx
Mobile_Forensics- General Introduction & Software.pptx
 
Introduction to Internet of Things.pdf
Introduction to Internet of Things.pdfIntroduction to Internet of Things.pdf
Introduction to Internet of Things.pdf
 
פתרונות ביומטריים - רשיונות נהיגה ביומטריים | קומדע
פתרונות ביומטריים - רשיונות נהיגה ביומטריים | קומדעפתרונות ביומטריים - רשיונות נהיגה ביומטריים | קומדע
פתרונות ביומטריים - רשיונות נהיגה ביומטריים | קומדע
 

More from Tariq Tauheed

MRAM & Its Applications
MRAM & Its ApplicationsMRAM & Its Applications
MRAM & Its ApplicationsTariq Tauheed
 
Error Resilient Video Communication
Error Resilient Video CommunicationError Resilient Video Communication
Error Resilient Video CommunicationTariq Tauheed
 
Piezoelectricity & Its Applications
Piezoelectricity & Its ApplicationsPiezoelectricity & Its Applications
Piezoelectricity & Its ApplicationsTariq Tauheed
 
Green chemistry – The Chemical Industries' Way To Go Green
Green chemistry – The Chemical Industries' Way To Go GreenGreen chemistry – The Chemical Industries' Way To Go Green
Green chemistry – The Chemical Industries' Way To Go GreenTariq Tauheed
 

More from Tariq Tauheed (6)

VSAT Technology
VSAT TechnologyVSAT Technology
VSAT Technology
 
MRAM & Its Applications
MRAM & Its ApplicationsMRAM & Its Applications
MRAM & Its Applications
 
Error Resilient Video Communication
Error Resilient Video CommunicationError Resilient Video Communication
Error Resilient Video Communication
 
Ultracapacitors
UltracapacitorsUltracapacitors
Ultracapacitors
 
Piezoelectricity & Its Applications
Piezoelectricity & Its ApplicationsPiezoelectricity & Its Applications
Piezoelectricity & Its Applications
 
Green chemistry – The Chemical Industries' Way To Go Green
Green chemistry – The Chemical Industries' Way To Go GreenGreen chemistry – The Chemical Industries' Way To Go Green
Green chemistry – The Chemical Industries' Way To Go Green
 

Recently uploaded

"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersRaghuram Pandurangan
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
Sample pptx for embedding into website for demo
Sample pptx for embedding into website for demoSample pptx for embedding into website for demo
Sample pptx for embedding into website for demoHarshalMandlekar2
 
What is Artificial Intelligence?????????
What is Artificial Intelligence?????????What is Artificial Intelligence?????????
What is Artificial Intelligence?????????blackmambaettijean
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfMounikaPolabathina
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxLoriGlavin3
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxBkGupta21
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
Training state-of-the-art general text embedding
Training state-of-the-art general text embeddingTraining state-of-the-art general text embedding
Training state-of-the-art general text embeddingZilliz
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxhariprasad279825
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 

Recently uploaded (20)

"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information Developers
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
Sample pptx for embedding into website for demo
Sample pptx for embedding into website for demoSample pptx for embedding into website for demo
Sample pptx for embedding into website for demo
 
What is Artificial Intelligence?????????
What is Artificial Intelligence?????????What is Artificial Intelligence?????????
What is Artificial Intelligence?????????
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdf
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptx
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
Training state-of-the-art general text embedding
Training state-of-the-art general text embeddingTraining state-of-the-art general text embedding
Training state-of-the-art general text embedding
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptx
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 

Machine Readable Travel Documents (MRTD) - Biometric Passport

  • 1. {
  • 2. • Conventional travel documents  Low Technology • Hard to copy/forge, printed paper with ID picture
  • 3. • ICAO attempts to develop Biometric Passport since 1968. • Discrete Machine Readable Zone (MRZ) containing little information. • Aims at speeding information at borders.
  • 4. Addition of machine readable information on the cards since 1980 ---Biometric main attraction --ICAO Standard released in 2004
  • 5. • Becoming the base for secure authentication of personal identity • Many countries started to issue E-passports with an embedded chip containing biometric data • MRZ (introduced in 1980) contains two machine readable lines at the bottom of the identity page of passport. • The latest biometric standardized contains biometric features such as fingerprint, facial and iris recognition and enhances the security mechanisms.
  • 6. Minimal Requirements in ICAO Standard Machine-Readable Travel Documents (MRTD) must provide • facial image • a digital copy of the MRZ, and • to have them digitally signed by the issuing country. The preferred platform is a contactless IC chip based on RFID technology.
  • 7. Logical Data Structure for MRTD Logical Data Structure (LDS) ----> for global interoperability • ICAO guideline on how data should be stored in a microchip • Data Group (DG) -- for grouping & collecting logical data into LDS • ICAO guideline divides • Data elements into 19 groups and • LDS into three parts  “Mandatory” Data Elements  “Optional” Data Elements
  • 8. :::Mandatory::: • Data defined by the issuing state or organization. • Includes the details recorded in the MRZ such as • Passport Number, • Passport Bearer’s Name, • Nationality, • Date of Birth, • Date of Expiry of passport, • Encoded facial biometric image & • Checksum of individual data elements which are used for deriving the session key.
  • 9. :::Optional::: • Data defined by the issuing state or organization. • Includes • Encoded identification features (face, finger and eye), • Displayed identification features (digital signature), & • Encoded security features (contact details, proof of citizenship and endorsements). • Details for automated border clearance, • Electronic visas, • Other travel records.
  • 10. Overview of Mandatory and Optional Data Elements defined for LDS
  • 11. Biometric passport = E-passport Paper & electronic identity credential Contains biometrics features for authentication of travellers Contains chip & antenna enclosed in front/back/central page Chip  storing the user’s information Also contains biometric identifiers [depending on various countries choice and technical evolution] • Recommended file formats & communication protocols followed • • • • • •
  • 13. Working Mechanism of Biometric Passport Border/Immigration officer uses MRZ reader to scan the MRZ part of e-passport to retrieve the embedded information. || Then, the stored information is obtained from the contact less chip by putting the e-passport near to e-passport reader. || Finally, verification of data is performed using PA, BAC mechanism for data encryption and integrity verification using either passive or active authentication. PA is compulsory where as BAC and AA are optional.
  • 14. Special Properties of E-Passport • Biographical information and biometric information are securely stored which are identical to the information in the passport. • Contactless chip technology that lets the stored information to be retrieved by chip readers at a close distance. • Digital signature technology for verification of authenticity of the data stored on the chip.
  • 15. RFID chips are being used everywhere such as tracking animals, inventory tracking devices, to start cars, ESPECIALLY IN E-PASSPORTS
  • 16. Three Components of RFID System Antenna Transceiver Transponder
  • 19. ICAO Definition: MRTD has a contactless IC imbedded in it that can be used for biometric identification of the holder. Hence, MRTDs shall carry the specified symbol
  • 21. • E-passport guarantees confidentiality, consistency and authenticity of information based on some cryptographic tools. • Wireless transmission of data in RFID makes it is vulnerable to an attack from a distance. • Attacks possible at communication network, chip or at backend system. • Most common attacks: • Eavesdropping, • Reverse Engineering, • Clandestine Scanning and Tracking, • Cloning, • Biometric Data-Leakage, • Cryptographic Weaknesse & • Skimming.
  • 22. September 11, 2001 Global warning to handle & review the security and border control issues in practice
  • 23. EAVESDROPPING Attacker secretly listens to the communication link and intercepts the information by using unauthorized device during the communication between chip and legitimate reader -----Passive attack -----Very hard to acknowledge because there is no emission of powered signals -----Attacker can eavesdrop up to at least of 2 meters
  • 24. REVERSE ENGINEERING The process of taking the technological principles of a device, object or system apart to figure out how it works----Attacker can reverse engineer if he/she has the sound technical knowledge & has access to equipment not commonly found in commercial market
  • 25. CLANDESTINE SCANNING AND TRACKING Scanning: The secret way of reading the electronic data of an identity card without the permission of the card holder -----Tracking: Ability to locate an individual and it can easily reveal the location privacy -----Clandestine tracking more harmful than scanning -----Faraday cage has been suggested to protect e-passports
  • 26. CLONING The way of acquiring the data from an authorized identity card and making an unauthorized copy of the captured sample in a new chip -----Active authentication as the counter measure for cloning threat. -----Can be bypassed by amending the EF.COM file of the passport chip.
  • 27. BIOMETRIC DATA-LEAKAGE If the biometric data are compromised, replacement is not possible -----One of the technics to increase data security is to use data-hiding -----Watermarking-based multimodal biometric approaches are widely used
  • 28. CRYPTOGRAPHIC WEAKNESSES A new scheme for preserving authentication based on fingerprints that uses ElGamal cryptosystem for biometric comparison in encrypted domain -----No facility for key sharing and only used for authentication -----Authentication protocol based on elliptic curve cryptography more theoretical without experimental evaluation -----Some weakness on cryptography relied by ICAO
  • 29. SKIMMING The act of obtaining encoded data without the consent of users by using electronic storage device -----Data retrieved by beaming power at the passport within a few inches or at most a few feet -----If the reader broadcasts the signal with high power the range can be extended
  • 30. The ways of attacks to the system must be understandable by showing a generic biometric system model and its different modules.
  • 31. • ICAO standards specify cryptographic measures & control techniques to be implemented in e-passport. • One mandatory cryptographic feature & five optional advanced security methods. Stored data integrity in the LDS and SOD verified & authenticated by PASSIVE AUTHENTICATION (PA). ACTIVE AUTHENTICATION (AA) is an optional security feature depending on public key cryptography to protect the chip against modification or cloning.
  • 32. Basic Access Control (BAC) as an optional feature against data skimming and misuse. Extended Access Control (EAC) adds functionality to terminal authentication & chip authentication to prevent unauthorized access to additional biometrics Cryptography Threats: The recommended minimal key lengths have been chosen so that breaking those keys requires a certain effort, independent of the chosen signature algorithm. Cryptographic Threats
  • 33. • ICAO standard allows an additional security access mechanism to meet data protection requirements & to enhance privacy of additional biometric data (such as fingerprints and iris identifiers). • Addition of metallic shield to cover e-Passport to prevent skimming and BAC to prevent unauthorized readers from accessing the chip was implemented. • These properties will make attacker more difficult to modify the stolen or lost passports as the new name and information would differ from the information on the RFID tag. • All e-passports issued must follow ICAO standards. • However, countries implement e-passport programs according to their specific policies and are free to implement different options specified in the standard. • Because of this, there are some differences on implementation of epassports among several countries even though they all confirm to the ICAO.
  • 34. • The US State Department specified that new US passports would increase the available memory from 32 kilobytes to 64 kilobytes apparently to reserve for some more biometric characteristics. • The State Department also made compulsory rule for using the metallic layer to cover the passport. • The idea of using the metallic shield is a good concept but it does not provide a complete solution. • Since, passports are used for personal identification all over the world, one need to open it which makes the exposition of RFID. • Multimodal Biometric features are useful and widely used for authentication process, but misuse of these features can make severe loss of vital private information. • Several technologies are implemented in order to prevent from security threats, among them Biometrics is proved to be more secure than others.