Biometric Cryptosystems Presenters: Yeh Po-Yin Yang Yi-Lun
Cryptosystem User authentication Cryptographic keys Login password RSA Public keys
Cryptographic Keys Long and random Stored somewhere Computer Smart card Released base on user password
User password Short and simple Easily guessed “password” Same as account Birth date Tel # Use the same password everywhere
What if? A single password is compromised while user uses the same password across different applications? A complex password is written down some easily accessible locations? The device which stores the cryptographic keys had been cracked?
Traditional cryptosystems Base on secret keys Forgotten Lost Stolen Repudiation
Biometric authentication More reliable Can not be lost or forgotten Difficult to copy, share, and distribute Hard to forge Unlikely to repudiate Relatively equal security level
Biometric No biometric is optimal Depends on the requirement of the application
Comparison of biometrics Properties Universality Distinctiveness Permanence Collect ability Attributes Performance Acceptability Circumvention
Biometric signal variations Inconsistent presentation Irreproducible presentation Imperfect signal acquisition
Biometric Matcher Exact match is not very useful Aligning Matching score Fingerprint Identify minutiae neighbors
Performance Two type of errors False match ( false accept ) False non-match ( false reject ) Error rates False match rate ( FMR ) False non-match rate ( FNMR ) Tradeoff relation
Biometric keys Biometric-based authentication User authentication Biometric component Cryptographic system Key release on positive match
Biometric key database Cryptographic key User name Biometric template Access privileges Other personal information
What if? The theft of biometric data crack into the biometric key database?
Hacking Attack
Definition Hacker Cracker Attack Disturbance Block Incursion
Attacking Step Decide target Easy Worth Purpose Gain information Firewall System
Detect path Ping Traceroute Hopping site Bot Make incursion
Types of attack Interruption attack on availability Interception attack on confidentiality Modification attack on integrity Fabrication attack in authentication
Reference 資安演習防護講義 資安演習防護講義
Common form of attack Denial of Service (DoS) attacks Distributed Denial of Service (DDoS) attacks Trojan Horse Virus Websites Worm
Sniffing Spoofing Bug Buffer overflow
Protection Firewall Antivirus program Update Close non-necessary program Close non-necessary internet service Scan computer
Back to biometric keys Is it possible to issue a new biometric template if the biometric template in an application is compromised? Is it possible to use different template on different applications? Is it possible to generate a cryptographic key using biometric information?
Solving Q1 and Q2 Store H(x) instead of x H is the transform function x is the original biometric signal
Solving Q3 Hide the key within the user’s biometric template Biometric key generation or binding Bind a private key into the user biometric information Both key and biometric are inaccessible to attacker No biometric matching at all
Conclusion Combining difficulties Existing biometric authentication technologies is not perfect Difficult to align the representations in the encrypted domain Should not have systematic correlation between the identity and the key
Reference Umut Uludag, Sharath Pankanti, Salil Probhakar, and Anil K. Jain “Biometric Cryptosystems: Issues and Challenges”, Proceedings of IEEE, 2004 Uludag U, Anil Jain “ Securing Fingerprint Template: Fuzzy Vault with Helper Data”, Computer Vision and Pattern Recognition Workshop, 2006 Conference on page-site-optimization/hacking-attacks-how-and-why.php 資安演習防護講義 hack.html