Biometric Cryptosystems Presenters: Yeh Po-Yin Yang Yi-Lun.

Slides:



Advertisements
Similar presentations
CSC 386 – Computer Security Scott Heggen. Agenda Authentication Passwords Reducing the probability of a password being guessed Reducing the probability.
Advertisements

Fuzzy Vaults: Toward Secure Client-Side Matching Ari Juels RSA Laboratories 10th CACR Information Security Workshop 8 May 2002 LABORATORIES.
Securing Fingerprint Template - Fuzzy Vault with Helper Data
Security and Trust in E- Commerce. The E-commerce Security Environment: The Scope of the Problem  Overall size of cybercrime unclear; amount of losses.
Is There a Security Problem in Computing? Network Security / G. Steffen1.
COEN 350: Network Security Authentication. Between human and machine Between machine and machine.
Access Control Methodologies
Creating and Maintaining Databases Dr. Pushkin Kachroo.
Chapter 4 McGraw-Hill/Irwin Copyright © 2011 by The McGraw-Hill Companies, Inc. All rights reserved. Ethics and Information Security.
Authors: Anil K. Jain, Arun Ross and Sharath Pankanti Presented By: Payas Gupta.
Copyright © 2015 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of McGraw-Hill Education.
Silberschatz, Galvin and Gagne  Operating System Concepts The Security Problem A system is secure iff its resources are used and accessed as.
19.1 Silberschatz, Galvin and Gagne ©2003 Operating System Concepts with Java Chapter 19: Security The Security Problem Authentication Program Threats.
Client/Server Computing Model of computing in which very powerful personal computers (clients) are connected in a network with one or more server computers.
BIOMETRICS AND NETWORK AUTHENTICATION Security Innovators.
Introduction to Fingerprint Biometrics By Tamar Bar.
Biometrics II CUBS, University at Buffalo
Biometric Authentication: Security Issues M. Fahim Zibran February 23, 2009.
Security Awareness: Applying Practical Security in Your World
Silberschatz, Galvin and Gagne  Operating System Concepts Module 19: Security The Security Problem Authentication Program Threats System Threats.
Lesson 9-Securing a Network. Overview Identifying threats to the network security. Planning a secure network.
1J. M. Kizza - Ethical And Social Issues Module 16: Biometrics Introduction and Definitions Introduction and Definitions The Biometrics Authentication.
Module 14: Biometrics Introduction and Definitions The Biometrics Authentication Process Biometric System Components The Future of Biometrics J. M. Kizza.
Biometrics: Ear Recognition
Chapter 15: Security (Part 1). The Security Problem Security must consider external environment of the system, and protect the system resources Intruders.
ISNE101 Dr. Ken Cosh Week 14. This Week  Challenges (still) facing Modern IS  Reliability  Security.
© Paradigm Publishing Inc. 8-1 Chapter 8 Security Issues and Strategies.
© Paradigm Publishing Inc. 8-1 Chapter 8 Security Issues and Strategies.
CS 736 A methodology for Analyzing the Performance of Authentication Protocol by Laseinde Olaoluwa Peter Department of Computer Science West Virginia.
Internet Security facilities for secure communication.
Introduction to Biometrics Charles Tappert Seidenberg School of CSIS, Pace University.
Session 7 LBSC 690 Information Technology Security.
Lecture 7 Page 1 CS 236 Online Challenge/Response Authentication Authentication by what questions you can answer correctly –Again, by what you know The.
Chapter 01: Introduction to Network Security. Network  A Network is the inter-connection of communications media, connectivity equipment, and electronic.
Network security Network security. Look at the surroundings before you leap.
John Carpenter & lecture & Information Security 2008 Lecture 1: Subject Introduction and Security Fundamentals.
Not only business information, but a large amount of personal information too is now digitized and stored in computer connected to the internet. System.
Ch9QQ T F 1.Hacking is an example of unauthorized access. T F 2.A Trojan horse is a type of malware that masquerades as another type of program. T F 3.A.
G53SEC 1 Authentication and Identification Who? What? Where?
Lecture 7 Page 1 CS 236, Spring 2008 Challenge/Response Authentication Authentication by what questions you can answer correctly –Again, by what you know.
Security CS Introduction to Operating Systems.
1 Network and E-commerce Security Nungky Awang Chandra Fasilkom Mercu Buana University.
G53SEC 1 Authentication and Identification Who? What? Where?
COEN 350: Network Security Authentication. Between human and machine Between machine and machine.
Identification Authentication. 2 Authentication Allows an entity (a user or a system) to prove its identity to another entity Typically, the entity whose.
Chap1: Is there a Security Problem in Computing?.
Biometrics: A Tool for Information Security 1 Authors: Anil K. Jain, Arun Ross, Sharath Pankanti IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY,
Authentication What you know? What you have? What you are?
Virus Assignment JESS D. How viruses affect people and businesses  What is a virus? A computer virus is a code or a program that is loaded onto your.
INTRODUCTION TO COMPUTER & NETWORK SECURITY INSTRUCTOR: DANIA ALOMAR.
Matt Broman Kodiac Gamble Devin Nichol SECTION 4.2 INFORMATION SECURITY.
CSCE 201 Identification and Authentication Fall 2015.
UW CSEP 590 Term paper Biometric Authentication Shankar Raghavan.
LEARNING AREA 1 : INFORMATION AND COMMUNICATION TECHNOLOGY PRIVACY AUTHENTICATION VERIFICATION.
SECURITY. Security Threats, Policies, and Mechanisms There are four types of security threats to consider 1. Interception 2 Interruption 3. Modification.
Network Security and Security in Industry Paul Curtis.
Information Systems Design and Development Security Precautions Computing Science.
Cryptographic Hash Function. A hash function H accepts a variable-length block of data as input and produces a fixed-size hash value h = H(M). The principal.
Challenge/Response Authentication
USAGE OF CRYPTOGRAPHY IN NETWORK SECURITY
Challenge/Response Authentication
INFORMATION SECURITY The protection of information from accidental or intentional misuse of a persons inside or outside an organization Comp 212 – Computer.
The Security Problem Security must consider external environment of the system, and protect it from: unauthorized access. malicious modification or destruction.
Security in Networking
– Communication Technology in a Changing World
ISNE101 Dr. Ken Cosh Week 13.
برنامج أمن أنظمة الحاسب
Faculty of Science IT Department By Raz Dara MA.
Security.
Operating System Concepts
Presentation transcript:

Biometric Cryptosystems Presenters: Yeh Po-Yin Yang Yi-Lun

Cryptosystem User authentication Cryptographic keys Login password RSA Public keys

Cryptographic Keys Long and random Stored somewhere Computer Smart card Released base on user password

User password Short and simple Easily guessed “password” Same as account Birth date Tel # Use the same password everywhere

What if? A single password is compromised while user uses the same password across different applications? A complex password is written down some easily accessible locations? The device which stores the cryptographic keys had been cracked?

Traditional cryptosystems Base on secret keys Forgotten Lost Stolen Repudiation

Biometric authentication More reliable Can not be lost or forgotten Difficult to copy, share, and distribute Hard to forge Unlikely to repudiate Relatively equal security level

Biometric No biometric is optimal Depends on the requirement of the application

Comparison of biometrics Properties Universality Distinctiveness Permanence Collect ability Attributes Performance Acceptability Circumvention

Biometric signal variations Inconsistent presentation Irreproducible presentation Imperfect signal acquisition

Biometric Matcher Exact match is not very useful Aligning Matching score Fingerprint Identify minutiae neighbors

Performance Two type of errors False match ( false accept ) False non-match ( false reject ) Error rates False match rate ( FMR ) False non-match rate ( FNMR ) Tradeoff relation

Biometric keys Biometric-based authentication User authentication Biometric component Cryptographic system Key release on positive match

Biometric key database Cryptographic key User name Biometric template Access privileges Other personal information

What if? The theft of biometric data crack into the biometric key database?

Hacking Attack

Definition Hacker Cracker Attack Disturbance Block Incursion

Attacking Step Decide target Easy Worth Purpose Gain information Firewall System

Detect path Ping Traceroute Hopping site Bot Make incursion

Types of attack Interruption attack on availability Interception attack on confidentiality Modification attack on integrity Fabrication attack in authentication

Reference 資安演習防護講義 資安演習防護講義

Common form of attack Denial of Service (DoS) attacks Distributed Denial of Service (DDoS) attacks Trojan Horse Virus Websites Worm

Sniffing Spoofing Bug Buffer overflow

Protection Firewall Antivirus program Update Close non-necessary program Close non-necessary internet service Scan computer

Back to biometric keys Is it possible to issue a new biometric template if the biometric template in an application is compromised? Is it possible to use different template on different applications? Is it possible to generate a cryptographic key using biometric information?

Solving Q1 and Q2 Store H(x) instead of x H is the transform function x is the original biometric signal

Solving Q3 Hide the key within the user’s biometric template Biometric key generation or binding Bind a private key into the user biometric information Both key and biometric are inaccessible to attacker No biometric matching at all

Conclusion Combining difficulties Existing biometric authentication technologies is not perfect Difficult to align the representations in the encrypted domain Should not have systematic correlation between the identity and the key

Reference Umut Uludag, Sharath Pankanti, Salil Probhakar, and Anil K. Jain “Biometric Cryptosystems: Issues and Challenges”, Proceedings of IEEE, 2004 Uludag U, Anil Jain “ Securing Fingerprint Template: Fuzzy Vault with Helper Data”, Computer Vision and Pattern Recognition Workshop, 2006 Conference on page-site-optimization/hacking-attacks-how-and-why.php 資安演習防護講義 hack.html