To ensure that there is not an unnecessarily high through-put to secondary inspection, the inspection system must be designed to support the specific needs of the Receiving State. This will require…
Once the ePassport chip has been accessed, ePassport validation can begin. At a minimum, this will involve a process called passive authentication. Passive authentication is the process of…
For an inspection system in a receiving State to conduct ePassport validation, the inspection system must have access to certain information from the State that issued the travel document: Country…
Cryptography 101 Traditional cryptography uses the same key to encrypt information as it uses to decrypt information. As a result, it requires that the keys used for encryption and decryption be…
As CSCA certificates are the anchor in the trust chain for the ePassport validation process, it is very important to ensure that they are valid. Doc 9303 indicates that trust in a CSCA certificate…
Process description It is important to note that the process of validating an ePassport does not contribute to protecting the privacy of the information on the chip. To protect the privacy of…
Disclaimer – This information has been compiled as a tool and is not intended to replace Doc 9303 or any other supporting documents and technical reports. This document is subordinate to official…
A Master List is a list of CSCA certificates that has itself been produced and digitally signed by an issuing State. In simple terms, a PKD participant may bilaterally exchange CSCA certificates with…