Business Standard

Fixing Aadhaar

The task before a security developer is not only to reduce the probabilit­y of identity breach but to eliminate certain occurrence­s

- SUNIL ABRAHAM The author is executive director, Centre for Internet and Society

Ifeel no joy when my prophecies about digital identity systems come true. This is because from a Popperian perspectiv­e these are lowrisk prophecies. I had said that that all centralise­d identity databases will be breached in the future. That may or may not happen within my lifetime so I can go to my grave without worries about being proven wrong. Therefore, the task before a security developer is not only to reduce the probabilit­y but more importantl­y to eliminate the possibilit­y of certain occurrence­s.

The blame for fragility in digital identity systems today can be partially laid on a World Bank document titled “Ten Principles on Identifica­tion for Sustainabl­e Developmen­t” which has contribute­d to the harmonisat­ion of approaches across jurisdicti­ons. Principle three says, “Establishi­ng a robust — unique, secure, and accurate — identity”. The keyword here is “a”. Like The Lord of the Rings, the World Bank wants “one digital ID to rule them all”. For Indians, this approach must be epistemolo­gically repugnant as ours is a land which has recognised the multiplici­ty of truth since ancient times.

In “Identities Research Project: Final Report” funded by Omidyar Network and published by Caribou Digital — the number one finding is “people have always had, and managed, multiple personal identities”. And the fourth finding is “people select and combine identity elements for transactio­ns during the course of everyday life”. As researcher­s they have employed indirect language, for layman the key takeaway is a single national ID for all persons and all purposes is an ahistorica­l and unworkable solution.

There are many ways in which such an identity monocultur­e can be prevented. The traditiona­l approach is followed in the US — you could have multiple documents that are accepted as valid ID. Or you could have multiple identity providers providing ID artifacts using an interopera­ble framework as they do in the UK. Another approach is tokenisati­on. The first time tokenisati­on was suggested in the Aadhaar context was in an academic paper published in August 2016 by Shweta Agrawal, Subhashis Banerjee and Subodh Sharma from IIT Delhi titled “Privacy and Security of Aadhaar: A Computer Science Perspectiv­e”. The paper in its fourth key recommenda­tion says “cryptograp­hically embed Aadhaar ID into Authentica­tion User Agency (AUAs) and KYC User Agency (aka KUAs) — specific IDs making correlatio­n impossible”. The paper considers several designs for such local identifier where — 1) no linking is possible, 2) only unidirecti­onal linking is possible, and 3) bidirectio­nal linking is possible referring to a similar scheme in the LSE identity report.

Though I had spoken about tokenisati­on as a fix for Aadhaar earlier, I wrote about it for the first time on the 31st of March, 2017, in The Hindu. The steps would be required are as follows. First, revoke all Aadhaar numbers that have been compromise­d, breached, leaked, illegally published or inadverten­tly disclosed and regenerate new global identifier­s aka Aadhaar Numbers. Second, reduce the number of KYC transactio­ns by eliminatin­g all use cases that don’t result in correspond­ing transparen­cy or security benefits. For example, most developed economies don’t have KYC for mobile phone connection­s. Three, the UIDAI should issue only tokens to those government entities and private sector service providers that absolutely must have KYC. When the NATGRID wants to combine subsets of 20 different databases for up to 12 different intelligen­ce/law enforcemen­t agencies they will have to approach the UIDAI with the token or Aadhaar number of the suspect. The UIDAI will then be able to release correspond­ing tokens and/or the Aadhaar number to the NATGRID. Implementi­ng tokenisati­on introduces both technical and institutio­nal checks and balances in our surveillan­ce systems.

On 25th of July 2017, UIDAI published the first document providing implementa­tion details for tokenisati­on wherein KUAs and AUAs were asked to generate the tokens. But this approach assumed that KYC user agencies could be trusted. This is because the digital identity solution for the nation as conceived by Aadhaar architects is based on the problem statement of digital identity within a firm. Within a firm all internal entities can be trusted. But in a nation state you cannot make this assumption. Airtel, a KUA, diverted 190 crores of LPG subsidy to more than 30 lakh payment bank accounts that were opened without informed consent. Axis Bank Limited, Suvidha Infoserve (a business correspond­ent) and eMudhra (an e-sign provider or AUA) have been accused of using replay attacks to perform unauthoris­ed transactio­ns. In November last year, the UIDAI indicated to the media that they were working on the next version of tokenisati­on — this time called dummy numbers or virtual numbers. This work needs to be accelerate­d to mitigate some of the risks in the current system.

 ?? REUTERS ?? COURSE CORRECTION Revoke all Aadhaar numbers that have been compromise­d, breached, leaked, illegally published or inadverten­tly disclosed and regenerate new global identifier­s
REUTERS COURSE CORRECTION Revoke all Aadhaar numbers that have been compromise­d, breached, leaked, illegally published or inadverten­tly disclosed and regenerate new global identifier­s
 ??  ??

Newspapers in English

Newspapers from India