Abstract
There is a wide range of cryptographic techniques that may serve to prevent attacks on electronic identity documents (e-IDs). Many e-ID systems – including the ICAO ePass and virtually all national electronic identity cards – make intensive use of these methods. The first purpose of this work is to identify all cryptographic techniques that make an electronic identity document secure. As a second step, these techniques are grouped into several distinct classes. And third, they are evaluated according to their application areas and according to their advantages and disadvantages. In the fourth part of the paper, the ICAO ePass and the German electronic identity card (ePA) are examined with a view on the cryptographic techniques they use.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Part 1 – Machine Readable Passport – Volume 2. Specifications for Electronically Enabled Passports with Biometrie Identification Capabilities. Sixth Edition 2006
Einführung des elektronischen Personalausweises in Deutschland. Grobkonzept – Version 2.0. Bundesministerium des Innern, Berlin 2008
Schmeh, Klaus: Kryptografie; Verfahren, Protokolle, Infrastrukturen. Dpunkt Verlag, Heidelberg 2009
Schmeh, Klaus: Kryptografie; Verfahren, Protokolle, Infrastrukturen. Dpunkt Verlag, Heidelberg 2009
Editor information
Rights and permissions
Copyright information
© 2010 Vieweg+Teubner | GWV Fachverlage GmbH
About this chapter
Cite this chapter
Schmeh, K. (2010). A Taxonomy of Cryptographic Techniques for Securing Electronic Identity Documents. In: Pohlmann, N., Reimer, H., Schneider, W. (eds) ISSE 2009 Securing Electronic Business Processes. Vieweg+Teubner. https://doi.org/10.1007/978-3-8348-9363-5_35
Download citation
DOI: https://doi.org/10.1007/978-3-8348-9363-5_35
Publisher Name: Vieweg+Teubner
Print ISBN: 978-3-8348-0958-2
Online ISBN: 978-3-8348-9363-5
eBook Packages: Computer ScienceComputer Science (R0)