Page 178 - ITU KALEIDOSCOPE, ATLANTA 2019
P. 178

2019 ITU Kaleidoscope Academic Conference




           Knowledge-based cryptographic techniques such as PAKE   At  present,  information  exchange  in  the  ITU-T  X.1035
           combined  with  signals  capable  of  "noninvasive  brain-  protocol  is  defined  only  in  prose.  An  ITU-T  X.1035
           actuated  control  of  computerized  screen  displays  or   revision should augment this prose with an ASN.1 schema
           locomotive  devices"  could  allow  even  "motor-limited  and   defined  in  terms  of  ITU-T  X.894  CMS  type
           locked-in subjects" to securely authenticate their identities   NamedKeyEncryptedData. This schema should associate a
           to an information system and to establish a secure channel   PAKE  OID  with  this  CMS  type  in  a  message.  The
           for subsequent communications [12].                NamedKeyEncryptedData  type  provides  a  standardized
                                                              way  for  applications  to  encrypt  content  of  any  type  or
           The key to making this approach to identity authentication   format  with  a  cryptographic key  that  uses  any  encryption
           and  secure  communication viable  relies  on  the  realization   algorithm specified by a message sender.
           that human intentions manifested as electrical signals that
           emanate from the human brain can be used as something-  This key can be identified using the keyName field of type
           you-know  authentication  factors.  If  a  user's  intentions  can   NamedKeyEncryptedData.  This  field  can  be  transferred
           be treated as weak secrets that are represented in the form   unencrypted by a sender to indicate the name of their user
           of character strings, they are in a format suitable for input   account on a target server. The indicated account name can
           to a PAKE protocol.  At present there are no standardized   then be used by the server to identify that user's password.
           techniques  for  mapping  the  results  produced  by  a  neural   Type NamedKeyEncryptedData can be associated with an
           network  model  to  the  weak  secrets  needed  to  operate  a   OID that identifies any PAKE protocol version as follows:
           PAKE protocol.
                                                              PAKExchange ::= SEQUENCE {
                   5.  FUTURE STANDARDIZATION                   type  OBJECT IDENTIFIER,
                                                                pake  NamedKeyEncryptedData
           5.1    Focus areas                                         -- The keyName field is a UserID
                                                              }
           ITU-T Study Group 17 (SG17) has developed a wide range
           of  ICT  standards.  Their  expertise  spans  many  different   The account name indirectly identifies the user password on
           areas of technology, including telebiometrics, cryptography,   the server. The server uses this password to derive the key
           identity  management,  security  architecture,  modeling  and   needed to decrypt the user message. If decryption succeeds,
           formal definition languages for information exchange. This   identity authentication of the user has also succeeded and
           breadth of expertise makes it possible for SG17 to "bridge   the user challenge recovered.
           multiple domains, bringing them together in standards with
           a  cross  industry  focus  that  benefit  multiple  communities"   The server can encrypt its response to the user's challenge
           [15] and makes SG17 well suited to developing the cross-  with their shared symmetric key, and send the response to
           domain standards required to address the needs of elderly  the  user  in  another  NamedKeyEncryptedData  message.
           and disabled populations.                          When the user receives a correct response from the server,
                                                              mutual authentication is achieved, and a secure channel for
           These  populations  often  include  underserved  people  that   subsequent communications is established.
           could  benefit  from  remote  services  provided  to  AAL  and
           other  healthcare  environments.  To  enhance  the  ability  of   An ASN.1 schema for the content encrypted for exchange
           these  users  to  securely  access  remote  resources,  SG17   between  the  user  and  server  should  be  defined  and
           should revise its 2007 version of the ITU-T X.1035 PAKE   standardized.  At  a  minimum,  the  encrypted  payload  of
           protocol.  Following  revision,  standardization  efforts  that   NamedKeyEncryptedData  must  contain  components  for  a
           leverage  ITU-T  X.1035  to  create  new  PAKE-based   user  challenge  and  a  server  response.  These  components
           mechanisms  for  identity  authentication  and  access  control   should  be  optional  but  constrained  so  that  at  least  one
           should be undertaken. A core focus of this standardization   component is present in an exchange. This would allow the
           effort should be on achieving the goals of universal access   client and the server to exchange the same schema payload
           to enable more inclusive authentication solutions.   during PAKE operation.

           A  first  step  in  an  ITU-T  X.1035  revision  should  enable   The encrypted payload schema should contain an  optional
           PAKE use with the secure information exchange messages   component  to  support  a  BAKE  extension  to  the  PAKE
           approved   recently   in   the   ITU-T   X.894   CMS   protocol.  This  allows  two-factor  user  authentication  to  be
           Recommendation. This effort should define an information   supported but not required. The payload schema should also
           object   identifier   (OID)   in   ITU-T   X.1035   that   include an optional extensibility mechanism for use by any
           unambiguously identifies its processing requirements in an   implementation for any purpose. This mechanism should be
           instance  of  communication.  An  ITU-T  X.1035  OID  will   defined as a series of one or more authenticated attributes,
           allow the ITU-T version of PAKE to be distinguished from   each  uniquely  identified  by  an  OID.  These  attributes  are
           the  other  standardized  versions  of  PAKE  defined  in   protected  in  the  encrypted  payload  and  authenticated  by
           ISO/IEC  11770-4,  which  already  assigns  a  unique  OID   PAKE processing.
           value to each of its PAKE versions.







                                                          – 158 –
   173   174   175   176   177   178   179   180   181   182   183