Authentication Workshop
Authentication Workshop
1
Agenda
• Introductions and Welcome
• Authentication Background
– Authentication for Individuals
• Granular Authentication
2
Introduction
Focus for today’s dialogue:
3
Introduction
Desired Outcomes:
5
Authentication Background
6
GPO Authentication Goals
GGPO as the source for GPO disseminated documents vide assurance to document recipients or readers of:
8
Authentication Background
• Factors that seem important to future direction:
– Authentication technique that is clear and simple
about the publisher of the document
– Authentication technique that is easily extensible,
using open international standards, to clearly and
simply displaying for the consumer the chain of
custody (provenance of the document)
9
Authentication Techniques Beyond PDF
• Since Cryptographic Digital Signatures used and effective for PDF
Cryptographic Digital Signatures seem natural for other data types
COMPARATIVE FACTORS
Trusted Could Trusted Does it use Does the Does the Free Is the method Is offline
Third Party Third Party be Open method show method Client included in the NIST validation
Involved? GPO? Standards? the publisher facilitate software guidance for possible?
of the “Chain of available Electronic
document? Custody”? for users Authentication? (NIST
to Special Publication
validate? 800-63)
Method
Hash Based Yes Yes Yes (for Hash) No No* Yes No No
Method
Cryptographic Yes (Root Yes Yes Yes Yes Yes Yes Yes
digital CA) (IETF RFC
signature 5652 for
binary data;
W3C
standards for
XML data)
11
Authentication Techniques Beyond PDF
• Enveloping Signature
– Signature contains the signed content itself, all within the
document
• Detached Signature
– Signature is separate from the content
Consequences:
- The signature is a Child of the content
- Document needs a placeholder to hold the signature
Advantages:
- Signature and content are coupled together
- Easy to validate
- Offline validation possible
Consequences:
- The signature is the Parent of the content being signed
- Processing the document requires processing the signature syntax
Advantages:
- Signature and content are coupled together
- Easy to validate
- Offline validation possible
Disadvantages:
- Signed and unsigned content have different formats More
complicated software for viewing
16
Native XML Authentication
Detached Signature
– Signature is completely separate from the content
Consequences:
- Processing of the signature and the document are separated
- The no difference at all between signed and unsigned content
Advantages:
- If the content is a “mash up” of many disparate, separate documents,
then this might be somewhat less complicated to manage
Disadvantages:
- Somehow the signature and the content must be linked together and
tracked No standards for this Higher costs and more complex
user experience
- Same disadvantage as the embedded files in PDF (discussed earlier)
- Since signed content and unsigned (non-authenticated) content are
exactly the same, this could cause user confusion 17
Native XML Authentication
Preliminary GPO Conclusions, to date:
• Current signed PDF approach uses Enveloped signatures
– This seems to bode well for the Enveloped Signature approach
• For the case in which there is no content originator signature, this is the
simplest, most effective model
– Since there is less to go wrong and positive experience with PDF
• For cases in which a content originator signature along with disseminator
signature is desired (chain of custody use cases), the Enveloped Signature
approach does require a common “template” or specification between
content originators and publishers
– XML requires coordination between GPO and content originator as it is, and
we already coordinate closely together on many things
• For the Chain of Custody case, it seems more complex to use either the
Enveloping Signature method or the Detached Signature method
– More complex in terms of building and maintaining software
– Thus, to preserve potential for efficient and effective capability for the “Chain
of Custody” use cases, start with Enveloped Signature method
• ENVELOPED APPROACH may be good way to start
20
Re-Authentication over time
• The Challenges:
#1: Standard algorithms and techniques change over long time horizons.
Examples:
21
Re-Authentication over time
Current GPO Planning:
– Maintain awareness of requirements and changes in
authentication standards (continuous)
– Periodically assess requirement to re-authenticate any content
(annually; more frequent as awareness of changes and
requirements dictate)
– Start any re-authentication required well in advance of known
requirements changes
• Use automated, high volume authentication engines to re-
authenticate
– Canvas industry and suppliers for technical systems that can
make such a re-authentication process as efficient and hands-off
as possible (plan to do this near term)
22
Granular Authentication
• The problem statement:
1) Ability to authenticate an arbitrary portion of a document
• Example: 1 page out of 500 page document
2) Ability to locate text and relate it to a GPO authentic
publication (published document)
• Goal:
– An authenticated answer in a reasonable time period
Step 1:
User wants to obtain granular
1 authentication from GPO
Step 2:
FDsys supplies an input window 2
Input elements/options for user:
1) Input Box for text
2) Document name (optional)
Step 3:
User enters input data
3 and requests search
Step 4:
FDsys searches GPO Authenticated documents
for an exact match on the text (filename used to
start search on)
4
FDsys returns a list of documents with this
matching text to user
Step 5:
a) User decides if one of the documents returned in
Step 4 meets their desire for granular authentication
b) If a) YES, then User selects the one (and only 1) of
Step 6:
FDsys returns a document, which is digitally
signed by GPO in real-time, that contains:
6
- The Text and the GPO published document
that GPO can authenticate
- URL of the document the text was found in
24
Wrap Up
Thank you for your time and participation!
http://www.gpoaccess.gov/authentication/
Information to be posted:
- today’s slides (handout) (soon)
- transcript of the today’s proceedings (5-10 days)
- summary report from GPO (4-6 weeks)
25
Wrap Up
Email comments to GPO concerning this
workshop to: