+ All Categories
Home > Documents > Biometric Cryptosystems Presenters: Yeh Po-Yin Yang Yi-Lun.

Biometric Cryptosystems Presenters: Yeh Po-Yin Yang Yi-Lun.

Date post: 18-Dec-2015
Category:
Upload: dorothy-davidson
View: 215 times
Download: 0 times
Share this document with a friend
Popular Tags:
33
Biometric Cryptosystems Presenters: Yeh Po-Yin Yang Yi-Lun
Transcript
Page 1: Biometric Cryptosystems Presenters: Yeh Po-Yin Yang Yi-Lun.

Biometric Cryptosystems

Presenters:

Yeh Po-Yin

Yang Yi-Lun

Page 2: Biometric Cryptosystems Presenters: Yeh Po-Yin Yang Yi-Lun.

Cryptosystem

User authenticationCryptographic keys

Login password

RSA Public keys

Page 3: Biometric Cryptosystems Presenters: Yeh Po-Yin Yang Yi-Lun.

Cryptographic Keys

Long and random

Stored somewhereComputer

Smart card

Released base on user password

Page 4: Biometric Cryptosystems Presenters: Yeh Po-Yin Yang Yi-Lun.

User password

Short and simple

Easily guessed“password”

Same as account

Birth date

Tel #

Use the same password everywhere

Page 5: Biometric Cryptosystems Presenters: Yeh Po-Yin Yang Yi-Lun.

What if?

A single password is compromised while user uses the same password across different applications?

A complex password is written down some easily accessible locations?

The device which stores the cryptographic keys had been cracked?

Page 6: Biometric Cryptosystems Presenters: Yeh Po-Yin Yang Yi-Lun.

Traditional cryptosystems

Base on secret keys

Forgotten

Lost

Stolen

Repudiation

Page 7: Biometric Cryptosystems Presenters: Yeh Po-Yin Yang Yi-Lun.

Biometric authentication

More reliable

Can not be lost or forgotten

Difficult to copy, share, and distribute

Hard to forge

Unlikely to repudiate

Relatively equal security level

Page 8: Biometric Cryptosystems Presenters: Yeh Po-Yin Yang Yi-Lun.

Biometric

No biometric is optimal

Depends on the requirement of the application

Page 9: Biometric Cryptosystems Presenters: Yeh Po-Yin Yang Yi-Lun.

Comparison of biometricsProperties

Universality

Distinctiveness

Permanence

Collect ability

AttributesPerformance

Acceptability

Circumvention

Page 10: Biometric Cryptosystems Presenters: Yeh Po-Yin Yang Yi-Lun.
Page 11: Biometric Cryptosystems Presenters: Yeh Po-Yin Yang Yi-Lun.

Biometric signal variations

Inconsistent presentation

Irreproducible presentation

Imperfect signal acquisition

Page 12: Biometric Cryptosystems Presenters: Yeh Po-Yin Yang Yi-Lun.
Page 13: Biometric Cryptosystems Presenters: Yeh Po-Yin Yang Yi-Lun.
Page 14: Biometric Cryptosystems Presenters: Yeh Po-Yin Yang Yi-Lun.

Biometric Matcher

Exact match is not very useful

Aligning

Matching score

Fingerprint Identify minutiae neighbors

Page 15: Biometric Cryptosystems Presenters: Yeh Po-Yin Yang Yi-Lun.
Page 16: Biometric Cryptosystems Presenters: Yeh Po-Yin Yang Yi-Lun.

Performance

Two type of errorsFalse match ( false accept )

False non-match ( false reject )

Error ratesFalse match rate ( FMR )

False non-match rate ( FNMR )

Tradeoff relation

Page 17: Biometric Cryptosystems Presenters: Yeh Po-Yin Yang Yi-Lun.

Biometric keys

Biometric-based authentication

User authenticationBiometric component

Cryptographic systemKey release on positive match

Page 18: Biometric Cryptosystems Presenters: Yeh Po-Yin Yang Yi-Lun.

Biometric key database

Cryptographic key

User name

Biometric template

Access privileges

Other personal information

Page 19: Biometric Cryptosystems Presenters: Yeh Po-Yin Yang Yi-Lun.

What if?

The theft of biometric data crack into the biometric key database?

Page 20: Biometric Cryptosystems Presenters: Yeh Po-Yin Yang Yi-Lun.

Hacking Attack

Page 21: Biometric Cryptosystems Presenters: Yeh Po-Yin Yang Yi-Lun.

Definition

Hacker

Cracker

AttackDisturbance

Block

Incursion

Page 22: Biometric Cryptosystems Presenters: Yeh Po-Yin Yang Yi-Lun.

Attacking Step

Decide targetEasy

Worth

Purpose

Gain informationFirewall

System

Page 23: Biometric Cryptosystems Presenters: Yeh Po-Yin Yang Yi-Lun.

Detect pathPing

Traceroute

Hopping site

Bot

Make incursion

Page 24: Biometric Cryptosystems Presenters: Yeh Po-Yin Yang Yi-Lun.

Types of attack

Interruptionattack on availability

Interceptionattack on confidentiality

Modificationattack on integrity

Fabricationattack in authentication

Page 26: Biometric Cryptosystems Presenters: Yeh Po-Yin Yang Yi-Lun.

Common form of attack

Denial of Service (DoS) attacks

Distributed Denial of Service (DDoS) attacks

Trojan Horse

Virus

Websites

Worm

Page 27: Biometric Cryptosystems Presenters: Yeh Po-Yin Yang Yi-Lun.

Sniffing

Spoofing

Bug

Buffer overflow

Page 28: Biometric Cryptosystems Presenters: Yeh Po-Yin Yang Yi-Lun.

Protection

Firewall

Antivirus program

Update

Close non-necessary program

Close non-necessary internet service

Scan computer

Page 29: Biometric Cryptosystems Presenters: Yeh Po-Yin Yang Yi-Lun.

Back to biometric keys

Is it possible to issue a new biometric template if the biometric template in an application is compromised?

Is it possible to use different template on different applications?

Is it possible to generate a cryptographic key using biometric information?

Page 30: Biometric Cryptosystems Presenters: Yeh Po-Yin Yang Yi-Lun.

Solving Q1 and Q2

Store H(x) instead of x

H is the transform function

x is the original biometric signal

Page 31: Biometric Cryptosystems Presenters: Yeh Po-Yin Yang Yi-Lun.

Solving Q3

Hide the key within the user’s biometric template

Biometric key generation or binding

Bind a private key into the user biometric information

Both key and biometric are inaccessible to attacker

No biometric matching at all

Page 32: Biometric Cryptosystems Presenters: Yeh Po-Yin Yang Yi-Lun.

Conclusion

Combining difficulties

Existing biometric authentication technologies is not perfect

Difficult to align the representations in the encrypted domain

Should not have systematic correlation between the identity and the key

Page 33: Biometric Cryptosystems Presenters: Yeh Po-Yin Yang Yi-Lun.

Reference

Umut Uludag, Sharath Pankanti, Salil Probhakar, and Anil K. Jain “Biometric Cryptosystems: Issues and Challenges”, Proceedings of IEEE, 2004

Uludag U, Anil Jain “ Securing Fingerprint Template: Fuzzy Vault with Helper Data”, Computer Vision and Pattern Recognition Workshop, 2006 Conference on

http://www.crucialp.com/resources/tutorials/website-web-page-site-optimization/hacking-attacks-how-and-why.php

資安演習防護講義http://www.hacker.org.tw/?c=articles_show&articleid=882

http://www.gamez.com.tw/viewthread.php?tid=58607

http://www.symantec.com/region/tw/enterprise/article/todays_hack.html


Recommended