<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>ePassport Protocol on the Spi Calculus</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Safa Saoudi</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Souheib Yous</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Riadh Robbana</string-name>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          ,
          <addr-line>LIP2, INSAT</addr-line>
          ,
          <country country="TN">Tunisia</country>
        </aff>
        <aff id="aff1">
          <label>1</label>
          <institution>LIP2, Tunisian Polytechnic School</institution>
          ,
          <country country="TN">Tunisia</country>
        </aff>
      </contrib-group>
      <abstract>
        <p>Electronic passport promises the possibility of a secure, simple and quick travel formalities. Many countries have started delivering electronic documents to their citizens. This is a proof of the importance of ePassport protocols which aim to improve the document security and the traveller authentication. Three generations of security solutions in ePassports were specied. We model via this work a new protocol of ePassport to provide better authentication and to protect sensitive data. Elliptic curve cryptography and secret sharing scheme present the main topics referred to in the proposed protocol. This coupling strengthens the eMRTD security, data storage and the authentication of both ePassport and its bearer. The Spi calculus is an adequate formalism to model cryptographic aspect of such electronic protocol and allows us to verify its properties.</p>
      </abstract>
      <kwd-group>
        <kwd>ePassport</kwd>
        <kwd>Border Security</kwd>
        <kwd>Authentication</kwd>
        <kwd>Secrecy</kwd>
        <kwd>Elliptic Curve Cryptography</kwd>
        <kwd>Secret Sharing</kwd>
        <kwd>Spi Calculus</kwd>
      </kwd-group>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>-</title>
      <p>
        Developing technologies and security standards has encourage governments to
pursue the issuance of more sophisticated Machine Readable Travel Documents
(MRTDs) to their citizens. The electronic MRTDs, also called ePassports or
biometric passports dier from the ordinary travel booklets, they contain biometric
traits and embedded Radio Frequency chip to store information about the
document owner. A successful implementation of biometric and radio frequency
identication (RFID) technologies [
        <xref ref-type="bibr" rid="ref11">11</xref>
        ] aims to enhance the security level. Malaysia
is the rst nation to issue electronic passports to its citizens. The rst major
step towards the global implementation of electronic passports was taken by the
United States in 2006. US mandates the adoption of electronic passports by the
27 nations in its Visa Waiver Program (VWP) to increase the security of
borders [
        <xref ref-type="bibr" rid="ref22">22</xref>
        ]. Border control authorities should benet from secure ePassports. In
fact, this electronic document provides automated verication of identity, faster
immigration inspection and greater border protection and security. The most
important processes, that aim to provide border security, are the authentication
of the ePassport chip and the identication of its bearer. Since the data stored in
the ePassport is digital, it is easily altered or used by attackers. First generation
specications of electronic documents is based on standards set by the
International Civil Aviation Organization (ICAO). However, many security threats are
detected in the rst generation. Therefore, a new specication, based on a set of
protocols, is proposed to cover certain aws of the rst generation [
        <xref ref-type="bibr" rid="ref6">6</xref>
        ]. But, some
concerns still needed to be addressed in this second generation [
        <xref ref-type="bibr" rid="ref12">12</xref>
        ]. To improve
ePassport security, several protocols are proposed in order to move to a third
generation [
        <xref ref-type="bibr" rid="ref22">22</xref>
        ].
1.1
      </p>
      <p>
        Related Work
Because of the sensitive data that can be stored in ePassport and the
importance of this document, several studies are conducted in order to enhance security
and privacy issues of ePassport. The International Civil Aviation Organization
(ICAO) is the rst responsible organization for cross border policies and air
travelling standards. It sets a standard specication for ePassports. It denes
a security mechanism based on several protocols with the use of RFID
(Radio Frequency Identication) and biometric technologies [
        <xref ref-type="bibr" rid="ref7">7</xref>
        ]. However, after the
adaptation of this standard, Juels et al. describe in their analysis of United
States ePassport [
        <xref ref-type="bibr" rid="ref11">11</xref>
        ] the privacy and security issues. They highlight important
vulnerabilities about authentication: the use of unauthenticated access to read
chip information may increase the risk of attacks and the cryptographic system
based on Basic Access Control (BAC) suer from the low entropy of key
generation mechanism. They try to provide solutions for some ICAO specications
weaknesses. To strengthen ePassport security, the European Union has released
a new specication called Extended Access Control (EAC) [
        <xref ref-type="bibr" rid="ref12">12</xref>
        ]. The primary
goal of EAC is to provide more comprehensive authentication protocols between
terminals (Inspection System and chip) and to promote the implementation of
secondary biometrics for additional security. Its specication denies access to
biometric data before being authenticated as a legitimate reader to prevent
unauthorized access. Pasupathinathan et al.’s analysis in [
        <xref ref-type="bibr" rid="ref24">24</xref>
        ] shows that the
EU proposal does not provide sucient security because it still considers the
BAC protocol for access control and uses, in an extensive way, a Public Key
Infrastructure (PKI). This puts the security mechanism in doubt. Then, they
introduced a new protocol, called on-line secure ePassport protocol (OSEP).
OSEP provides an active monitoring system regarding the inspection system
(IS), that attempts to detect criminal behaviour. It includes a mutual
authentication protocol between ePassports and IS. However, OSEP depends on online
and it risks the connection failure. Researches are still in progress until today.
The last ocial document of the ICAO published in 2015 mentions the newest
protocols and standards used on electronic travel documents [
        <xref ref-type="bibr" rid="ref8">8</xref>
        ]. It considers a
new access control protocol: Password Authentication Connection Establishment
as replacement of BAC. The PACE is specied by the German Federal Oce for
Information Security (BSI) to establish a secure communication between
ePassport and reader [
        <xref ref-type="bibr" rid="ref3">3</xref>
        ]. Many recent surveys: [
        <xref ref-type="bibr" rid="ref22">22</xref>
        ], [
        <xref ref-type="bibr" rid="ref26">26</xref>
        ] and [
        <xref ref-type="bibr" rid="ref2">2</xref>
        ] determine that current
specications and protocols are still insecure and allow attackers to eavesdrop,
identify and track electronic passports. In this paper, we propose a new
alternative in order to cover more existing aws and to ensure better security level.
We sketch the idea of building a shared secret between more than two entities
in order to protect sensitive data. The importance of formal verication
cryptographic protocols during the development process cannot be unheeded. Thus,
we use Pi calculus to formalize the description of our authentication protocol.
1.2
      </p>
      <p>Paper Organization
We rst describe the related structure of an electronic passport and existing
protocols. Then, we introduce our scheme providing authentication in ePassport.
The proposed solution employs distributed authority mechanism. We exploit the
Elliptic Curve Cryptography features. This approach aims to enhance security
properties and struggles against data leakage. This paper is organized as follows:
the next section describes the ePassport structure and the used technologies. In
section 3, we describe the existing schemes and mention some of their
vulnerabilities. In section 4, we introduce a detailed description of our contribution.
Section 5 contains a formal verication of the ePassport protocol and an
automated verication using Proverif reasoning tool. Finally, we conclude this work.
The aim of this contribution is to avoid falsication, identity theft and to
prevent authentication aws by protecting the stored data in the ePassport and to
ensure that the bearer is genuine.
2</p>
    </sec>
    <sec id="sec-2">
      <title>Epassport Structure</title>
      <p>This section sheds the light on the technical structure of the existing ePassport.
Two main specications distinguish an electronic Machine Readable Travel
Document (eMRTD) from a classic one: the Radio Frequency Identication (RFID)
technology and the Integrated Circuit Card (ICC) adapted to communicate with
RFID tags or readers.
2.1</p>
      <p>
        RFID
Radio Frequency Identication is a term for a family of technologies that
transmit data via a wireless network based on Radio frequency radiations. The
advantage of RFID is the absence of direct contact or line-of-sight scanning [
        <xref ref-type="bibr" rid="ref14">14</xref>
        ].
An RFID system consists of three components: an antenna, a reader and a tag
(a small embedded chip). The antenna uses radio frequency waves to transmit
a signal that activates the reader. When activated, the tag transmits data back
to the antenna. This data is used to notify a programmable logic controller
that an action should occur. The action could be as simple as raising an access
gate or as complicated as interfacing with a database to carry out a monetary
transaction [
        <xref ref-type="bibr" rid="ref11">11</xref>
        ]. Integration of RFID technology for ePassport began in 2004.
The ICAO specication for ePassports relies on the International Organization
for Standardization (ISO) 14443 standard, which species a radio frequency of
13.56MHz. This frequency have short transmission ranges. It’s between 10
centimetres and 1 meter [
        <xref ref-type="bibr" rid="ref1">1</xref>
        ]. This short range of interrogation zone allow powering
the tag of ePassport chip in order to communicate with the reader.
2.2
      </p>
      <p>
        Integrated Circuit Card
To ensure a global interoperability, the ICAO issues a standardized data
structure called Logical Data Structure (LDS) for the storage of data elements. The
LDS initially consists of 16 data groups. The specications state that all the 16
data groups are write protected and can be written only at the time of issue
of the ePassport. A hash of data groups 1-16 are stored in a ( SOD) , each of
these hashes should be signed by the issuing state. So, an Integrated Circuit
Card (ICC) of ePassport is composed of a LDS and SOD . ICAO species that
only DG1 and DG2 are mandatory and the rest of DGs depends on the issuing
country schemes and implementation. The Figure 1 from ICAO ocial
document [
        <xref ref-type="bibr" rid="ref9">9</xref>
        ] presents the data embedded in the contactless chip conforming to the
ICAO guidelines.
2.3
      </p>
      <p>
        ISO/IEC Biometrics
Biometrics are considered as sensitive data. They are used as supplemental
verication item to enhance security. To protect biometrics while storage and transfer,
ISO/IEC 24745 provides a standard under various requirements. The
architecture according to ISO/IEC is valid for all biometric modalities. When enrolment
of a biometric modality takes place, a feature extraction from the captured
sample results a Pseudonymous Identier (P I ) and Auxiliary Data (AD ). During a
verication, a new feature extraction from fresh biometric sample results a new
pseudonymous identier (P I ) which equals P I if and only if the same person
provided the biometric sample [
        <xref ref-type="bibr" rid="ref5">5</xref>
        ].
3
3.1
      </p>
    </sec>
    <sec id="sec-3">
      <title>Security Issues of ePassport</title>
      <sec id="sec-3-1">
        <title>Cryptographic Protocols</title>
        <p>
          In order to provide full protection of electronic passport, a set o security
features is implemented. Cryptographic protocols are specied to prevent skimming
of data from the Integrated Chip (IC), prevent eavesdropping on legitimate
communication between IC and reader. Thus, ICAO [
          <xref ref-type="bibr" rid="ref8">8</xref>
          ] denes a batch of protocols
to achieve the following goals
        </p>
        <p>Gain a secure access to IC,
Data authentication,
Chip authentication,
Additional access mechanism to biometrics,
Reading data securely.</p>
        <p>Fig. 1: Logical Data Structure.</p>
        <p>
          In literature, two protocols are dedicated to provide access control: Basic
Access Control (BAC) [
          <xref ref-type="bibr" rid="ref8">8</xref>
          ] and Password Authentication Connection Establishment
(PACE) [
          <xref ref-type="bibr" rid="ref18">18</xref>
          ].
        </p>
        <p>BAC: Is a session key establishment mechanism based on symmetric
cryptography. Keys are derived from Machine Readable Zone (MRZ) of the ePassport,
Document Number(DN), Date Of Birth (DOB) and Date Of Expiry (DOE)
followed respectively by their checksums are the extracted data and concatenated
under SHA 1 to result a key Kseed. The 16 more signicant bytes of Kseed are
concatenated to 00000001. The result is hashed under SHA 1 to compute the
key encryption KENC . The same process is performed to compute KMAC by
concatenation of Kseed to 00000002.</p>
        <p>Kseed = SHA_1(DN jDOBjDOE)
KENC = SHA_1(Kseedj00000001)</p>
        <p>KMAC = SHA_1(Kseedj00000002)
Then, a set of messages is exchanged between IC and reader to verify keys and
to establish a session and secure messaging mechanism.</p>
        <p>
          PACE: Is a supplemental access control launched in 2014. It is a
countermeasure to weaknesses of BAC. PACE is a Die-Hellman [
          <xref ref-type="bibr" rid="ref4">4</xref>
          ] key agreement protocol
that provides secure communication and password-based authentication of the
IC and the inspection system (IS). IC and IS share the same password and
the same key K = SHA_1( j3). PACE establishes secure messaging based
on weak (short) passwords.
        </p>
        <p>
          Passive Authentication PA: To ensure data authentication, the Document of
Security Objects SOD contains hashes of existing data groups and is signed by
the issuing country. Inspection systems contain Document Signer public keys of
each State or have read related certicates. It is a passive authentication
mechanism that read hashes and verify signature of SOD to validate data authenticity
and integrity. PA is the only mandatory protocol [
          <xref ref-type="bibr" rid="ref8">8</xref>
          ].
        </p>
        <p>Active Authentication AA: Implementing this protocol makes the chip
authenticate itself to the reader. AA public key is stored in the data group DG15
and its corresponding private key in stored in a secure memory of the integrated
chip. AA aims to verify is not cloned.</p>
        <p>
          EAC: To protect supplemental sensitive information, an Extended Access
Control (EAC) mechanism takes place. EAC is a set of Extended Access Keys used
instead of BAC [
          <xref ref-type="bibr" rid="ref3">3</xref>
          ]. EAC still not standardized by the ICAO. Each issuing
country dene its own security measures. For European Union, the BSI denes two
protocols: Chip and Terminal authentication (CA and TA).
        </p>
        <p>CA: Keys are computed using Die-Hellman key agreement protocol. CA
provides implicit authentication of both IC itself and the stored data by performing
secure messaging after establishment of session keys.</p>
        <p>
          TA: A successful execution of terminal authentication is a proof to the chip that
interrogating reader is not an intruder. This protocol requires a specic
certication architecture. Regarding to the BSI, each country issuing EAC ePassport
needs a trusted point: Country Verifying Certicate Authority (CVCA) issues
Document Verier DV certicates. CVCA public key must be stored in
ePassport chip and DV issues certicates for Inspection Systems. More details are set
in [
          <xref ref-type="bibr" rid="ref3">3</xref>
          ].
3.2
        </p>
        <p>
          Vulnerabilities
Many vulnerabilities have been identied in the literature. Attacks can be
classied according to their objectives [
          <xref ref-type="bibr" rid="ref2">2</xref>
          ].
        </p>
        <p>Obtaining data contained in ePassport’s chip,
Recognition of a set of passports,
Recognition of individual passport,</p>
        <p>Obtaining a proof of presence.</p>
        <p>Attackers can easily identify and track an ePassport. The main aw is the
absence of a standard normalization. It is a lack of interoperability. According to
ICAO specication, only two GDs are required and the rest is optional.
Security measures depends on issuing country. This diversity is a benecial factor
for attackers to identify batch of ePassport depending on error messages,
response time and other aspects related to manufacturing and country policies.
The security of the BAC protocol is based on a low entropy of two access keys
derived from data items on the MRZ of ePassport. Keys are easily guessable
because their entropy is, at maximum 46 bits. In some cases, when the MRZ
generation pattern is known, the entropy is lower. This allows identifying an
ePassport, tracking and obtaining its data applying brute-force attacks. PACE
provides better entropy compared to BAC but still depends on passwords
derived from MRZ. PA and EAC require sophisticated cetication structure and
roots verications. ePassports suer from lack of international standards and
implementations.
4</p>
      </sec>
    </sec>
    <sec id="sec-4">
      <title>Proposed Scheme</title>
      <p>Our proposal is based on the Elliptic Curve Cryptography and its advantages
specially for ICC.
4.1</p>
      <p>
        Elliptic Curve Cryptography
Elliptic curves have been studied in mathematics for 150 years. Their use within
cryptography was rst proposed in 1985, by Koblitz [
        <xref ref-type="bibr" rid="ref13">13</xref>
        ] and Miller [
        <xref ref-type="bibr" rid="ref19">19</xref>
        ]. Elliptic
Curve Cryptography (ECC) is based on properties of a particular type of
equation created from the mathematical group derived from points where the line
intersects the axes. Multiplying a point on the curve by a number will produce
another point on the curve, but it is very dicult to nd what number was used,
even if you know the original point and the result [
        <xref ref-type="bibr" rid="ref25">25</xref>
        ]. Kobliz and Miller believe
that the Discrete Logarithm Problem (DLP) is harder to solve for elliptic curve
than for a nite eld. The Elliptic Curve Discrete Logarithm Problem (ECDLP)
is described as follows: P is a point on the curve, if Q = xP , where x is a
digit, try to nd x. It is hard for an attacker to retrieve x. ECC oers a same or
stronger level of security using much smaller keys. It is an attractive option for
electronic documents such as ePassports that contain smart cards which have
less memory because of the decreased key size and computational complexity. For
example, to use Rivest Shamir Adleman (RSA) [
        <xref ref-type="bibr" rid="ref16">16</xref>
        ] or Die-Hellman (DH) [
        <xref ref-type="bibr" rid="ref4">4</xref>
        ]
cryptographic protocol for a 128-bit symmetric key security level, RSA and DH
should use 3072-bit parameters and equivalent key size for elliptic curves is only
256 bits [
        <xref ref-type="bibr" rid="ref21">21</xref>
        ]. So, ECC provides smaller key sizes resulting in faster computations
with lower power consumption and memory. The most standard form used in
ECC is the Weierstrass-form dened as bellow :
Let Fq be a nite eld, q = pm where p is a prime number and m is
integer (m &gt;&gt;&gt; 1), E is an elliptic curve dened over Fq for a; b 2 Fq such that
4a3 + 27b2 6= 0
      </p>
      <p>E : y2 = x3 + ax + b
(1)
for a; b 2 Fq such that 4a3 + 27b2 6= 0.</p>
      <p>
        Montgomery [
        <xref ref-type="bibr" rid="ref20">20</xref>
        ] introduced the non-standard form of elliptic curves
EM : by2 = x3 + ax2 + x; (a; b) 2 Fq
(2)
The Montgomery form of elliptic curves is faster than the Weierstrass form
elliptic curves by about 10 percent [
        <xref ref-type="bibr" rid="ref23">23</xref>
        ].
      </p>
      <p>Although ECC is not a dominant implementation for cryptography, it promises
a high security with harder discrete logarithm problems. It will be used in
practice progressively to instantiate cryptographic protocols. In this paper, we
consider elliptic curves over a nite eld Fq. We describe in the following the
proposed scheme.
4.2</p>
      <p>The Protocol in Detail
The protocol begins in a setup phase. In this stage, a set of authorities in
cooperation generate the key materials and publish the corresponding public
parameters. Then, the registration phase takes place. In order to authenticate himself,
an ePassport bearer needs to prove his identity using his ngerprint template.</p>
      <p>Our system consists four entities:
The user is the person who requests to have an ePassport noted US;
The reception authority that delivers ePassport at the citizen request
noted RA;
The document verier is the entity who conrms the ePassport creation
(It can be the interior ministry), noted DV;
The inspection system veries the eMRTD and its bearer while crossing
border, noted IS.</p>
      <sec id="sec-4-1">
        <title>Personalization phase</title>
        <p>
          First, the user is enrolled during the personalization phase. His biometric
enrolment is realized according to the ISO/IEC 24745 and resulting (PI/AD) [
          <xref ref-type="bibr" rid="ref10">10</xref>
          ].
Secondly, the RA sends this information to DV in order to check if this
applicant has the right to own an eMRTD (not criminal, don’t have another travel
document...). When receiving the validation from the DV, the RA of issuing
country personalizes the ePassport and adds the appropriate data on the LDS
of the ePassport 1 then delivers the electronic document to the applicant with a
unique ID and a date of expiration. At this stage, the ePassport is ready to be
used.
        </p>
      </sec>
      <sec id="sec-4-2">
        <title>Security features</title>
        <p>
          As prerequisite, we consider the equation 2 of the Montgomery form [
          <xref ref-type="bibr" rid="ref20">20</xref>
          ] over a
nite eld Fq, P a generator of EM , P 2 EM and a hash function
H1 : f0; 1g ! EM
While personalization of ePassport, the applicant, the reception authority and
the document verier are authorities of the system. Secret Sharing scheme
consists of creating a secret between more than two participants. To guarantee
the approach success, it is mandatory that one of the authorities must be honest.
In ePassport case, the issuing country is considered the most honest entity
(represented via the DV). Each authority participate to the scheme by generating a
part of the secret. The entire performs as a distributed key generator. Otherwise,
each entity knows a master key fragment. Computation can be performed only
when the three authorities collaborate. To establish a secure authentication
process, the applicant oers the rst fragment of the secret. It’s extracted from his
biometric template noted S1: Since secret is derived from the user identity (his
ngerprint template), it presents a strong mapping between an ePassport and
its owner. The process of biometric enrolment is standardized and protected
according to the ISO/IEC 24745 [
          <xref ref-type="bibr" rid="ref10">10</xref>
          ]. The RA provides the second part S2 and the
secret is completed by the DV fragment S3. So, SA is the shared secret needed.
The key SA is the sum of the fragments Si 2 Zq of each authority.
In order to build the secret, parties engage in an interactive protocol to map
secret with the elliptic curve. The mapping of the 3 segments of the secret is
described as follow:
        </p>
        <p>SA = S1 + S2 + S3</p>
        <p>S1 = H1(P I)
S2 = H1(Xa)</p>
        <p>S3 = H1(Xdv)
while P I is generated from the biometric enrolment (Personal Identier), Xa
and Xdv are random numbers chosen respectively by the reception authority
and the document verier. Then, an ePassport Identier (ID), Expiration Date
(ED) and the built secret SAP are written on the LDS (Figure 1): Data is stored
in the related DGs and SAP is hashed in the Document Security Object ( SOD).
The DV is the most honest authority as mentioned above. It supplies a segment
of the secret to the IS to avoid connexion establishment risks. In fact, it sends an
entity X = S2P + S3P and the inspection system saves it in its local database.
Then, the electronic document is delivered to its owner. Now, the ePassport is
ready to be used.</p>
      </sec>
      <sec id="sec-4-3">
        <title>Operational use</title>
        <p>To verify the traveller’s identity and if the ePassport is original, the Inspection
System (IS) needs to collect data and verify the secret. As prerequisite, this
approach is run under the assumption that a Password Authentication Connection
Establishment (PACE) is executed in order to establish a secure communication
between IS and the ePassport chip. Reading the MRZ allows inspection system
to load the corresponding certicates and parameters of electronic document and
(3)
(4)
(5)
(6)
its issuing country. Consequently, IS queries its local data base to get the secret
fragment given by the DV after the registration phase ( X = S2P + S3P ).</p>
        <p>A connection is established between the chip and the IS in order to read the
stored secret SAP . The ePassport bearer needs to regenerate his segment of the
shared secret. Thus, a biometric probe is measured and (PI*, AD) are extracted,
the secret (S 10P ) is generated and sent to the IS when P is a generator of the
elliptic curve.</p>
        <p>As mentioned above, the DV sends beforehand the partially generated secret
X = S2P + S3P . IS retrieves the secret SA0P = S10P + X after receiving S10P and
compares it to SAP stored in the chip of correspondent ePassport. The proposal
aims to optimize the use of resources by using only one elliptic curve and to avoid
storage of all the user entire related data in the DV database. The short keys
length is an interest for the RFID technology which uses less memory. From a
secure point of view, our contribution provides an authentication protocol based
on the uniqueness of ngerprint template, ECC and secret sharing advantages.
On the proposed scheme, there is no need to verify independently the chip and
its holder.</p>
        <p>The next session describes an analysis and a formal verication of the protocol
authentication process with the Spi calculus.
5</p>
      </sec>
    </sec>
    <sec id="sec-5">
      <title>Formal Verication of Proposed Scheme</title>
      <p>
        The need for applying formal methods has been recognized and widely used. It
helps specifying and reasoning about security properties. The Spi calculus [
        <xref ref-type="bibr" rid="ref15">15</xref>
        ],
which is a variant of the Pi calculus extended with shared-key cryptographic
primitives seems to be well-suited for modelling our security protocol. We dene
the Spi calculus language and an initial model of our ePassport process using
this formal grammar.
5.1
      </p>
      <p>The Spi Calculus
The Spi calculus is a language for describing systems of processes that
communicate on named channels. It is a mathematical model that describes concurrent
processes and their interactions. It has been used to study a variety of security
protocols, such as those for private authentication.</p>
      <sec id="sec-5-1">
        <title>Grammar</title>
        <p>To describe protocols with the Spi calculus, one needs to dene a set of names,
a set of variables which will be used in order to dene terms. Processes are
considered to describe behaviour and terms are representing data (messages,
keys, channels). We start with a sort of variables (such as x and y) and a sort
of names (such as n). The set of terms is dened by the grammar:
U; V ::= terms
c; n; s; K names
(M; N ) pair
x; y variables
0 zero
suc(M ) successor
fM1; ::; MkgN shared-key encryption</p>
        <p>The set of processes is dened by the grammar The nill process 0 does
nothing, P j Q is the parallel composition of P and Q, the replication !P behaves as
an innite number of copies of P running in parallel. The process n:P makes
a new name n then behaves as P . We often use as a generator of unguessable
seeds. In some cases, those values may serve as nonces or as keys. In others, they
may serve as seeds, and various transformations may be applied for deriving keys
from seeds. The match [M is N ]P construct if M = N then P else the process is</p>
        <p>P; Q ::= plain processes
0 nil process
P j Q parallel composition
!P replication
( n):P name restriction
[M is N ]P match
u(x):P message input
uhN i:P message output
case L of fxgN in P sharedkey decryption
stuck. The input process u(x):P is ready to input from channel u, then to run P
with the actual message replaced for the formal parameter x, while the output
process uhN i:P is ready to output message N on channel u, then to run P . In
both of these, we may omit P when it is 0. Processes are intended to represent
the components of a protocol, but they may also represent attackers, users, or
other entities that interact with the protocol. As an abbreviation, we may write:
let x = U in P . It can be dened as ( c)(chU ijc(x):P ), where c is a name that
does not occur in U or in P . Shared-key decryption process runs when a shared
key N is only known by the sharing principals. It attempts to decrypt a term L
with the key N .
5.2</p>
        <p>Protocol modelling
The Spi calculus representations of protocols often model secure channels as
primitive, without showing their possible cryptographic implementations. As
preliminaries, we assume that c is a secure channel on which all principals may
communicate. Therefore, we do not restrict the scope of c with the operator.
In our formulation, it is possible for a principal to receive a message intended for
other principal, and for the processing to get stuck. Master keys are related to
trusted authorities witch are : Inspection system, document verier and reception
authority. On the verication phase, only IS master key is needed KI . We model
the messages in the protocol rather directly. We describe each principal of the
ePassport protocol via a process: C for the chip, I for the inspection system and
U for the User. The variable msg is used as and msg = "Get_id" and the id
refers to the ePassport identier which is known by the inspection system after
reading the MRZ. KIC is a shared keys between Inspection System and Chip.
KIU is a shared keys between Inspection System and User.</p>
        <p>The process F represents the behaviour of Inspection System while comparing
collected data. We assemble the pieces so as to represent a system with the
process P .
I(id; msg)
U (S10P )
F (x; y)
P</p>
        <p>(SP ):(chfid; SP gKIC i):
, chfmsggKIC iin
c(y):case y of fx1; x2gKIC in
[x1 is id]
c(z):case z of fz2gKIU in
F (z2; x2):</p>
        <p>(S10P ) chfS10P gKIU i:
,
,
, [x is y]:0</p>
        <p>(KIC ; KIU )( !C j !I j !U j !F )</p>
      </sec>
      <sec id="sec-5-2">
        <title>Discussion</title>
        <p>Discrete logarithm problem Let A be the process of an active intruder. As
mentioned above, if a process receives a message from an intended principal, the
processing gets stuck. We suppose that the intruder breaks a key and tries to
behave as one of the principals.</p>
        <p>A , chfmsggKIC iin</p>
        <p>c(x):case x of fygKIC :
This scenario is the hardest that an intruder can get. Even if a shared key
is guessed or broken, the secret SAP is not broken because it still protected by
the DLP (Discrete logarithm problem) and is applicable to all communicated
messages via the ePassport protocol. This way, we guarantee the authentication
property.</p>
        <p>
          Observational Equivalences In the analysis of protocol security, we usually
verify that two given processes cannot be distinguished by any attacker. The
processes are observationally equivalent. In Spi calculus, static equivalence is
written s it relates processes that cannot be distinguished by any term of
comparison [
          <xref ref-type="bibr" rid="ref15">15</xref>
          ]. Firstly, the attacker cannot distinguish two messages sent to
the same principal from two dierent instances (two ePassports proceeding the
authentication) : For example
        </p>
        <p>(M1):chfid1; M1gKIC i s (M2):chfid2; M2gKIC i
M1 and M2 are not distinguished by A. An attacker who observes the
communicated messages cannot distinguish the two substitutions and the secret SAP still
protected. The proposed protocol may detect many threats and cover ePassport
security aws: Cloned document, unauthorized ePassport, unauthorized
ePassport holder can be detected if the comparison of shared secrets results a failure.</p>
      </sec>
    </sec>
    <sec id="sec-6">
      <title>Conclusion</title>
      <p>This paper presents the ePassport specications and reveals the evolution of
cryptographic protocols used to improve MRTDs security features. It points out
weaknesses of previous generations specied by ICAO, EU and BSI. In a
second part, the paper illustrates a new scheme of ePassport authentication. The
protocol is based on Elliptic Curve Cryptography, uniqueness of biometric
features and the secret sharing between entities. The proposed scheme is modelled
and veried (manual reasoning) using the Spi calculus. An automated analyse
of the property of secrecy succeeds using Proverif verication tool. Nevertheless,
countries follow dierent and dissimilar policies. Security weaknesses are based
on inconsistent implementations and measurements. This work aim to reduce
vulnerabilities and help to build a more robust solution for the future.</p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          1.
          <string-name>
            <given-names>Smart</given-names>
            <surname>Border</surname>
          </string-name>
          <article-title>Alliance</article-title>
          .
          <source>Rd feasibility study nal report</source>
          .
          <year>2004</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          2.
          <string-name>
            <given-names>G.</given-names>
            <surname>Avoine</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Beaujeant</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            <surname>Hernandez-Castro</surname>
          </string-name>
          ,
          <string-name>
            <given-names>L.</given-names>
            <surname>Demay</surname>
          </string-name>
          , and
          <string-name>
            <given-names>P.</given-names>
            <surname>Teuwen</surname>
          </string-name>
          .
          <article-title>A survey of security and privacy issues in epassport protocols</article-title>
          . volume
          <volume>48</volume>
          , pages
          <fpage>137</fpage>
          ,
          <year>2016</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          3. BSI.
          <article-title>Advanced security mechanisms for machine readable travel documents and eidas tokens</article-title>
          .
          <source>In Part</source>
          <volume>1</volume>
          :
          <article-title>eMRTDs with BAC/PACEv2 and EACv1</article-title>
          .
          <source>German Federal Oce for Information Security</source>
          ,
          <year>2015</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          4. Die and Hellman.
          <article-title>New directions in cryptography</article-title>
          .
          <source>In IEEE Transactions on Information Theory 22</source>
          , pages
          <fpage>644654</fpage>
          ,
          <year>1976</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          5.
          <string-name>
            <surname>C.Mueller G.Duy B.Deufel</surname>
            and
            <given-names>T.</given-names>
          </string-name>
          <string-name>
            <surname>Kevenaar</surname>
          </string-name>
          .
          <article-title>Biometric passwords for next generation authentication protocols for machine-readable travel documents</article-title>
          .
          <source>In In DuD:Datenschutz und Datensicherheit</source>
          ,
          <year>2013</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          6.
          <string-name>
            <given-names>Feng</given-names>
            <surname>Hao</surname>
          </string-name>
          ,
          <string-name>
            <surname>Ross Anderson</surname>
            ,
            <given-names>and John Daugman.</given-names>
          </string-name>
          <article-title>Combining crypto with biometrics eectively</article-title>
          .
          <source>IEEE Transactions on Computers</source>
          ,
          <volume>55</volume>
          (
          <issue>9</issue>
          ):
          <fpage>10811088</fpage>
          ,
          <year>2006</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          7.
          <string-name>
            <surname>ICAO</surname>
          </string-name>
          .
          <article-title>Machine readable travel documents</article-title>
          .
          <source>In Part 1: Machine Readable Passport</source>
          ,
          <article-title>Specications for electronically enabled Passports with Biometric Identication Capabilities</article-title>
          , Canada,
          <year>2006</year>
          . INTERNATIONAL CIVIL AVIATION ORGANIZATION.
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          8.
          <string-name>
            <surname>ICAO</surname>
          </string-name>
          .
          <article-title>Machine readable travel documents</article-title>
          .
          <source>In Part 11: Security Mechanisms for eMRTDs, Canada</source>
          ,
          <year>2015</year>
          . INTERNATIONAL CIVIL AVIATION ORGANIZATION.
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          9.
          <string-name>
            <surname>ICAO</surname>
          </string-name>
          .
          <article-title>Machine readable travel documents</article-title>
          .
          <source>In Part</source>
          <volume>10</volume>
          :
          <article-title>Logical Data Structure (LDS) for Storage of Biometrics and Other Data in the Contactless Integrated Circuit (IC)</article-title>
          , Canada,
          <year>2015</year>
          . INTERNATIONAL CIVIL AVIATION ORGANIZATION.
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          10. JTC1, SC27, and IS. Iso/iec 24745, biometric information protection.
          <year>2011</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          11.
          <string-name>
            <given-names>A.</given-names>
            <surname>Juels</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D.</given-names>
            <surname>Molnar</surname>
          </string-name>
          , and
          <string-name>
            <given-names>D.</given-names>
            <surname>Wagner</surname>
          </string-name>
          .
          <article-title>Security and privacy issues in epassports</article-title>
          . pages
          <fpage>7488</fpage>
          ,
          <year>2005</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          12. Justice and
          <string-name>
            <given-names>Home</given-names>
            <surname>Aairs</surname>
          </string-name>
          .
          <article-title>Eu standard specications for security features and biometrics in passports and travel documents</article-title>
          .
          <source>In Technical report</source>
          , pages
          <fpage>4863</fpage>
          ,
          <year>2006</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          13.
          <string-name>
            <given-names>N.</given-names>
            <surname>Koblitz</surname>
          </string-name>
          .
          <article-title>Elliptic curve cryptosystems</article-title>
          . volume
          <volume>48</volume>
          , pages
          <fpage>203209</fpage>
          ,
          <year>1987</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref14">
        <mixed-citation>
          14.
          <string-name>
            <given-names>B.</given-names>
            <surname>LIANG</surname>
          </string-name>
          .
          <article-title>Security and performance analysis for rd protocols</article-title>
          .
          <source>In ProQuest LLC</source>
          ,
          <year>2011</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref15">
        <mixed-citation>
          15.
          <string-name>
            <given-names>M.</given-names>
            <surname>Abadi</surname>
          </string-name>
          and
          <string-name>
            <given-names>A.D.</given-names>
            <surname>Gordon</surname>
          </string-name>
          .
          <article-title>A calculus for cryptographic protocols: The spi calculus</article-title>
          .
          <source>Information and Computation</source>
          ,
          <volume>148</volume>
          (
          <issue>1</issue>
          ):
          <fpage>10811088</fpage>
          ,
          <year>1999</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref16">
        <mixed-citation>
          16.
          <string-name>
            <surname>Marjono</surname>
            and
            <given-names>M.</given-names>
          </string-name>
          <string-name>
            <surname>Phil</surname>
          </string-name>
          .
          <article-title>The rivest, shamir, adleman (rsa) public key cryptosystem and cyclic codes</article-title>
          .
          <source>In INTEGRAL</source>
          , volume
          <volume>7</volume>
          no.
          <issue>1</issue>
          ,
          <year>2002</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref17">
        <mixed-citation>
          17.
          <string-name>
            <surname>M.Fischlin</surname>
            ,
            <given-names>J.</given-names>
          </string-name>
          <string-name>
            <surname>Bender</surname>
            , and
            <given-names>D.</given-names>
          </string-name>
          <string-name>
            <surname>Kugler</surname>
          </string-name>
          .
          <article-title>Security analysis of the pace keyagreement protocol</article-title>
          .
          <source>In In Information Security Conference ISC</source>
          ,
          <year>2009</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref18">
        <mixed-citation>
          18.
          <string-name>
            <surname>M.Fischlin</surname>
            ,
            <given-names>J.</given-names>
          </string-name>
          <string-name>
            <surname>Bender</surname>
            ,
            <given-names>O.</given-names>
          </string-name>
          <string-name>
            <surname>Dagdelen</surname>
            , and
            <given-names>D.</given-names>
          </string-name>
          <string-name>
            <surname>Kugler</surname>
          </string-name>
          .
          <article-title>The pace|aa protocol for machine readable travel documents and its security</article-title>
          .
          <source>In In Financial Cryptography and Data Security - 16th International Conference</source>
          ,
          <year>2013</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref19">
        <mixed-citation>
          19.
          <string-name>
            <given-names>V.</given-names>
            <surname>Miller</surname>
          </string-name>
          .
          <article-title>Use of elliptic curves in cryptography</article-title>
          .
          <source>In Lecture Notes in Computer Science,CRYPTO'85</source>
          , volume
          <volume>218</volume>
          , pages
          <fpage>203209</fpage>
          ,
          <year>1985</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref20">
        <mixed-citation>
          20.
          <string-name>
            <given-names>L.</given-names>
            <surname>Montgomery</surname>
          </string-name>
          .
          <article-title>Speeding the pollard and elliptic curve methods of factorization</article-title>
          . volume
          <volume>48</volume>
          , pages
          <fpage>243264</fpage>
          ,
          <year>1987</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref21">
        <mixed-citation>
          21. Security Agency National.
          <article-title>The case for elliptic curve cryptography</article-title>
          .
          <year>2009</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref22">
        <mixed-citation>
          22.
          <string-name>
            <given-names>R.</given-names>
            <surname>Nithyanand</surname>
          </string-name>
          .
          <article-title>A survey on the evolution of cryptographic protocols in epassports</article-title>
          .
          <source>In IACR Cryptology ePrint Archive</source>
          , pages
          <fpage>115</fpage>
          ,
          <year>2009</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref23">
        <mixed-citation>
          23.
          <string-name>
            <given-names>K.</given-names>
            <surname>Okeya</surname>
          </string-name>
          ,
          <string-name>
            <given-names>H.</given-names>
            <surname>Kurumatani</surname>
          </string-name>
          , and
          <string-name>
            <given-names>K.</given-names>
            <surname>Sakurai</surname>
          </string-name>
          .
          <article-title>Elliptic curves with the montgomeryform and their cryptographic applications</article-title>
          . volume
          <volume>1751</volume>
          , page 238257,
          <year>2000</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref24">
        <mixed-citation>
          24.
          <string-name>
            <given-names>V.</given-names>
            <surname>Pasupathinathan</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            <surname>Pieprzyk</surname>
          </string-name>
          , and
          <string-name>
            <surname>H. Wang.</surname>
          </string-name>
          <article-title>An on-line secure e-passport protocol</article-title>
          . volume
          <volume>4991</volume>
          , pages
          <fpage>1428</fpage>
          ,
          <year>2008</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref25">
        <mixed-citation>
          25.
          <string-name>
            <given-names>W.</given-names>
            <surname>Qingxian</surname>
          </string-name>
          .
          <article-title>The application of elliptic curves cryptography in embedded systems</article-title>
          .
          <source>In ICESS Proceedings of the Second International Conference on Embedded Software and Systems (ICESS'05)</source>
          , pages
          <fpage>527530</fpage>
          ,
          <year>2005</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref26">
        <mixed-citation>
          26.
          <string-name>
            <given-names>A.</given-names>
            <surname>Sinha</surname>
          </string-name>
          .
          <article-title>A survey of system security in contactless electronic passports</article-title>
          . volume
          <volume>4</volume>
          , pages
          <fpage>154164</fpage>
          ,
          <year>2010</year>
          .
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>