Dagdelen, Özgür (2013)
The Cryptographic Security of the German Electronic Identity Card.
Technische Universität Darmstadt
Ph.D. Thesis, Primary publication
|
Text
ÖzgürDagdelen-Thesis.pdf - Submitted Version Copyright Information: CC BY-NC-ND 2.5 Generic - Creative Commons, Attribution, NonCommercial, NoDerivs . Download (1MB) | Preview |
Item Type: | Ph.D. Thesis | ||||
---|---|---|---|---|---|
Type of entry: | Primary publication | ||||
Title: | The Cryptographic Security of the German Electronic Identity Card | ||||
Language: | English | ||||
Referees: | Fischlin, Prof. Dr. Marc ; Kutylowski, Prof. Dr. Miroslaw | ||||
Date: | 2013 | ||||
Place of Publication: | Darmstadt | ||||
Publisher: | tuprints | ||||
Date of oral examination: | 13 June 2013 | ||||
Abstract: | In November 2010, the German government started to issue the new electronic identity card (eID) to its citizens. Besides its original utilization as a ’visual’ identification document, the eID card can be used by the cardholder to prove one’s identity at border control and to enhance security of authentication processes over the Internet, with the eID card serving as a token to reliably transmit personal data to service providers or terminals, respectively. To this end, the German Federal Office for Information Security (BSI) proposed several cryptographic protocols now deployed on the eID card. The Password Authenticated Connection Establishment (PACE) protocol secures the wireless communication between the eID card and the user’s local card reader, based on a cryptographically weak password like the PIN chosen by the card owner. Subsequently, the Extended Access Control (EAC) protocol is executed by the chip and the service provider to mutually authenticate and agree on a shared secret session key. This key is then used in the secure channel protocol, called Secure Messaging (SM). Finally, an optional protocol, called Restricted Identification (RI), provides a method to use pseudonyms such that they can be linked by individual service providers, but not across different service providers (even not by malicious ones). This thesis consists of two parts. First, we present the above protocols and provide a rigorous analysis on their security from a cryptographic point of view. We show that the Germen eID card provides reasonable security for authentication and exchange of sensitive information allaying concerns regarding its usage. In the second part of this thesis, we introduce two possible modifications to enhance the security of these protocols even further. Namely, we show how to (a) add to PACE an additional efficient chip authentication step, and (b) augment RI to allow also for signatures under pseudonyms. |
||||
Alternative Abstract: |
|
||||
Uncontrolled Keywords: | German electronic identity card, key exchange, secure channel | ||||
URN: | urn:nbn:de:tuda-tuprints-35385 | ||||
Classification DDC: | 000 Generalities, computers, information > 004 Computer science | ||||
Divisions: | 20 Department of Computer Science > Cryptography and Complexity Theory | ||||
Date Deposited: | 22 Jul 2013 06:04 | ||||
Last Modified: | 09 Jul 2020 00:30 | ||||
URI: | https://tuprints.ulb.tu-darmstadt.de/id/eprint/3538 | ||||
PPN: | 325465053 | ||||
Export: |
View Item |