Coexistence Among Cryptography and Noisy Data Theory and Applications

Slides:



Advertisements
Similar presentations
Ari Juels RSA Laboratories Marty Wattenberg 328 W. 19th Street, NYC A Fuzzy Commitment Scheme.
Advertisements

Cryptanalysis of a Communication-Efficient Three-Party Password Authenticated Key Exchange Protocol Source: Information Sciences in review Presenter: Tsuei-Hung.
多媒體網路安全實驗室 An efficient and security dynamic identity based authentication protocol for multi-server architecture using smart cards 作者 :JongHyup LEE 出處.
ECE454/CS594 Computer and Network Security Dr. Jinyuan (Stella) Sun Dept. of Electrical Engineering and Computer Science University of Tennessee Fall 2011.
CS470, A.SelcukCryptographic Authentication1 Cryptographic Authentication Protocols CS 470 Introduction to Applied Cryptography Instructor: Ali Aydin Selcuk.
Fuzzy Stuff Lecture 24, Outline Motivation: Biometric Architectures Motivation: Biometric Architectures New Tool (for us): Error Correcting.
Biometrics based Cryptosystem Design. Cryptosystem A mechanism using which one can encode an information content to an incomprehensible form and also.
CS457 – Introduction to Information Systems Security Cryptography 1b Elias Athanasopoulos
Foundations of Cryptography Lecture 4 Lecturer: Moni Naor.
COEN 350: Network Security Authentication. Between human and machine Between machine and machine.
NON-MALLEABLE EXTRACTORS AND SYMMETRIC KEY CRYPTOGRAPHY FROM WEAK SECRETS Yevgeniy Dodis and Daniel Wichs (NYU) STOC 2009.
CS 483 – SD SECTION BY DR. DANIYAL ALGHAZZAWI (7) AUTHENTICATION.
Anonymous Biometrics: Privacy Protection of Biometric Templates Pim Tuyls, E. Verbitskiy, D. Denteneer, J.P. Linnartz, J. Goseling, T. Ignatenko
 Secure Authentication Using Biometric Data Karen Cui.
Session 5 Hash functions and digital signatures. Contents Hash functions – Definition – Requirements – Construction – Security – Applications 2/44.
Intro To Secure Comm. Exercise 2. Problem  You wish for your users to access a remote server via user and password.  All of the users have modems and.
Oblivious Transfer based on the McEliece Assumptions
CMSC 414 Computer and Network Security Lecture 21 Jonathan Katz.
An Improved Smart Card Based Password Authentication Scheme with Provable Security Source:Computer Standards & Interfaces, Vol. 31, No. 4, pp ,
A more efficient and secure dynamic ID- based remote user authentication scheme Yan-yan Wang, Jia-yong Liu, Feng-xia Xiao, Jing Dan in Computer Communications.
Computer Science CSC 774Dr. Peng Ning1 CSC 774 Advanced Network Security Topic 2. Review of Cryptographic Techniques.
Information Security for Managers (Master MIS)
(Multimedia University) Ji-Jian Chin Swee-Huay Heng Bok-Min Goi
Honey Encryption: Security Beyond the Brute-Force Bound
CS555Topic 251 Cryptography CS 555 Topic 25: Quantum Crpytography.
Lecture 2: Introduction to Cryptography
Department of Computer Engineering, Kyungpook National University Author : Eun-Jun Yoon, Wan-Soo Lee, Kee-Young Yoo Speaker : Wan-Soo Lee
COEN 350: Network Security Authentication. Between human and machine Between machine and machine.
Prepared by Dr. Lamiaa Elshenawy
IT 221: Introduction to Information Security Principles Lecture 5: Message Authentications, Hash Functions and Hash/Mac Algorithms For Educational Purposes.
Threshold password authentication against guessing attacks in Ad hoc networks ► Chai, Zhenchuan; Cao, Zhenfu; Lu, Rongxing ► Ad Hoc Networks Volume: 5,
 Encryption provides confidentiality  Information is unreadable to anyone without knowledge of the key  Hashing provides integrity  Verify the integrity.
Chapter Six: Authentication 2013 Term 2 Access Control Two parts to access control Authentication: Are you who you say you are?  Determine whether access.
A Secure Authentication Scheme with Anonymity for Wireless Communications IEEE COMMUNICATIONS LETTERS, VOL. 12, NO. 10, OCTOBER 2008 Chia-Chun Wu, Wei-Bin.
Security Handshake Pitfalls. Client Server Hello (K)
What is in a name? Identity-based cryptography. How public-key crypto works When you use public key cryptography, you can publish a value (public key)
Challenge/Response Authentication
Smart Card Based Authenticated Key Agreement Schemes
Security of Digital Signatures
Vocabulary Big Data - “Big data is a broad term for datasets so large or complex that traditional data processing applications are inadequate.” Moore’s.
TASHKENT UNIVERSITY OF INFORMATION TECHNOLOGIES NAMED AFTER MUHAMMAD AL-KHWARIZMI THE SMART HOME IS A BASIC OF SMART CITIES: SECURITY AND METHODS OF.
A Wireless LAN Security Protocol
Efficient password authenticated key agreement using smart cards
Password Cracking Lesson 10.
Group theory exercise.
Authentication.
Topic 14: Random Oracle Model, Hashing Applications
Cryptographic Hash Functions Part I
Recent Developments on Multimedia and Secure Networking Technologies
Fuzzy Identity Based Encryption
SSH: SECURE LOGIN CONNECTIONS OVER THE INTERNET
When are Fuzzy Extractors Possible?
PART VII Security.
When are Fuzzy Extractors Possible?
Efficient Short-Password Key Exchange (ESP-KE)
Faculty of Science IT Department Lecturer: Raz Dara MA.
Cryptographic Hash Functions Part I
Exercise: Hashing, Password security, And File Integrity
CSC 774 Advanced Network Security
Recent Developments on Multimedia and Secure Networking Technologies
Information Theoretical Analysis of Digital Watermarking
Hashing Hash are the auxiliary values that are used in cryptography.
The power of Pairings towards standard model security
Cryptography Lecture 15.
Cryptanalysis Network Security.
HMAC and its Design Objectives
Cryptography Lecture 23.
Privacy Protection for E-Health Systems by
How to Use Charm Crypto Lib
Presentation transcript:

Coexistence Among Cryptography and Noisy Data Theory and Applications Alawi A. Al-Saggaf, PhD. King Fahd University of Petroleum and Minerals, alawi@kfupm.edu.sa 28th April, 2014

Motivations for Current Research

Motivations for Current Research The bad news about Password and smart card breaches: Password may be forgotten, easy to guess, difficult to remember. Passwords cracking (such as John the Ripper) easily to defeat the hash value of the password. Smart cad may be lost, stolen, easy to share.

Who Are You?

Motivations for Current Research (Cont’d)

Why Biometrics?

Robustness Security Level Method

Usefulness The Future of Biometrics Market Research Report

Trends in biometric systems' deployment in the United States (2003)* *Frost and Sullivan. U.S. Biometric Network Authentication Markets, 2004.

Biometrics Template Attacks

Biometrics Templates Attacks Replacing Template Tempering Template Stolen Template

Biometrics is a Noisy Data Same Person h(1101111101111111……) h(1110011100111111……)

Mathematical framework For Coexistence among Cryptography and Noisy Data

Select security parameter k∊K Generate crisp PK Fk :g(M)×X→E Encode the committed message m: g(m)=c Witness chosen randomly x∊RX Fuzzy PK F:g(M)×X→Y Fuzzy Encryption y=(Fk(c,x) ,x-c)=(ε,δ) If (t<t3) Apply error correction f(c’)=f(x’- δ) Crisp Encryption ε’ =Fk(f(c’) , (δ + f(c’) )) Cd(ε’ )=1 Yes No Wait Reveal x’ to B B act g-1(f(c’))=m Error message t1 t2 t3 Fd(f(c’))=1 y Comm algorithm Party Ted: Setup phase Party A: Commit phase Setup algorithm Open algorithm Party B: Open phase

Security Analysis

Bound derivation for hiding property Theorem 5.1: Suppose that (witness space) and (error correcting code set) are two independent random variables over the same sample space , and let be a random variable (difference vector) obtained by “exclusive OR” of elements of and . Then the probability that an attacker is able to compute either or from the difference vector is no more than , where is the size of the error correcting code .

Bound derivation for Statistical hiding property Theorem 5.2: For any , let be a fuzzy public key. Then, an the proposed scheme based on is and the value of is always computed as: For and

Bound derivation for computational binding property Theorem 5.3: For any , let be a fuzzy public key. Then, the proposed scheme based on is and the value of is always computed as:

Applications

Crisp encryption algorithm 1. Secure Biometrics System Enrollment Procedure Authentication procedure Iris biometric Choose a codeword c Fuzzy Encryption Crisp encryption algorithm Encryption Concealing algorithm Difference vector δ Retrieve algorithm Iris extraction Iris biometric input B Iris extraction 20

key generation Procedure 2. Retrieve cryptographic key from biometrics template Registration Procedure key generation Procedure Fuzzy Encryption Difference vector Iris code extraction Retrieve Iris code extraction Encoding Encryption Decode Cryptographic key Encryption Yes Is Cryptographic key generated No Error message

PW PW 3. Biometrics based Remote User Authentication using Smart Cards Registration protocol Registration Center PW ♥ Alice Logon protocol Server ♥ Authentication PW

Thank you