biometric cryptosystems presenters: yeh po-yin yang yi-lun

33
Biometric Cryptosystems Presenters: Yeh Po-Yin Yang Yi-Lun

Upload: dorothy-davidson

Post on 18-Dec-2015

216 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Biometric Cryptosystems Presenters: Yeh Po-Yin Yang Yi-Lun

Biometric Cryptosystems

Presenters:

Yeh Po-Yin

Yang Yi-Lun

Page 2: Biometric Cryptosystems Presenters: Yeh Po-Yin Yang Yi-Lun

Cryptosystem

User authenticationCryptographic keys

Login password

RSA Public keys

Page 3: Biometric Cryptosystems Presenters: Yeh Po-Yin Yang Yi-Lun

Cryptographic Keys

Long and random

Stored somewhereComputer

Smart card

Released base on user password

Page 4: Biometric Cryptosystems Presenters: Yeh Po-Yin Yang Yi-Lun

User password

Short and simple

Easily guessed“password”

Same as account

Birth date

Tel #

Use the same password everywhere

Page 5: Biometric Cryptosystems Presenters: Yeh Po-Yin Yang Yi-Lun

What if?

A single password is compromised while user uses the same password across different applications?

A complex password is written down some easily accessible locations?

The device which stores the cryptographic keys had been cracked?

Page 6: Biometric Cryptosystems Presenters: Yeh Po-Yin Yang Yi-Lun

Traditional cryptosystems

Base on secret keys

Forgotten

Lost

Stolen

Repudiation

Page 7: Biometric Cryptosystems Presenters: Yeh Po-Yin Yang Yi-Lun

Biometric authentication

More reliable

Can not be lost or forgotten

Difficult to copy, share, and distribute

Hard to forge

Unlikely to repudiate

Relatively equal security level

Page 8: Biometric Cryptosystems Presenters: Yeh Po-Yin Yang Yi-Lun

Biometric

No biometric is optimal

Depends on the requirement of the application

Page 9: Biometric Cryptosystems Presenters: Yeh Po-Yin Yang Yi-Lun

Comparison of biometricsProperties

Universality

Distinctiveness

Permanence

Collect ability

AttributesPerformance

Acceptability

Circumvention

Page 10: Biometric Cryptosystems Presenters: Yeh Po-Yin Yang Yi-Lun
Page 11: Biometric Cryptosystems Presenters: Yeh Po-Yin Yang Yi-Lun

Biometric signal variations

Inconsistent presentation

Irreproducible presentation

Imperfect signal acquisition

Page 12: Biometric Cryptosystems Presenters: Yeh Po-Yin Yang Yi-Lun
Page 13: Biometric Cryptosystems Presenters: Yeh Po-Yin Yang Yi-Lun
Page 14: Biometric Cryptosystems Presenters: Yeh Po-Yin Yang Yi-Lun

Biometric Matcher

Exact match is not very useful

Aligning

Matching score

Fingerprint Identify minutiae neighbors

Page 15: Biometric Cryptosystems Presenters: Yeh Po-Yin Yang Yi-Lun
Page 16: Biometric Cryptosystems Presenters: Yeh Po-Yin Yang Yi-Lun

Performance

Two type of errorsFalse match ( false accept )

False non-match ( false reject )

Error ratesFalse match rate ( FMR )

False non-match rate ( FNMR )

Tradeoff relation

Page 17: Biometric Cryptosystems Presenters: Yeh Po-Yin Yang Yi-Lun

Biometric keys

Biometric-based authentication

User authenticationBiometric component

Cryptographic systemKey release on positive match

Page 18: Biometric Cryptosystems Presenters: Yeh Po-Yin Yang Yi-Lun

Biometric key database

Cryptographic key

User name

Biometric template

Access privileges

Other personal information

Page 19: Biometric Cryptosystems Presenters: Yeh Po-Yin Yang Yi-Lun

What if?

The theft of biometric data crack into the biometric key database?

Page 20: Biometric Cryptosystems Presenters: Yeh Po-Yin Yang Yi-Lun

Hacking Attack

Page 21: Biometric Cryptosystems Presenters: Yeh Po-Yin Yang Yi-Lun

Definition

Hacker

Cracker

AttackDisturbance

Block

Incursion

Page 22: Biometric Cryptosystems Presenters: Yeh Po-Yin Yang Yi-Lun

Attacking Step

Decide targetEasy

Worth

Purpose

Gain informationFirewall

System

Page 23: Biometric Cryptosystems Presenters: Yeh Po-Yin Yang Yi-Lun

Detect pathPing

Traceroute

Hopping site

Bot

Make incursion

Page 24: Biometric Cryptosystems Presenters: Yeh Po-Yin Yang Yi-Lun

Types of attack

Interruptionattack on availability

Interceptionattack on confidentiality

Modificationattack on integrity

Fabricationattack in authentication

Page 26: Biometric Cryptosystems Presenters: Yeh Po-Yin Yang Yi-Lun

Common form of attack

Denial of Service (DoS) attacks

Distributed Denial of Service (DDoS) attacks

Trojan Horse

Virus

Websites

Worm

Page 27: Biometric Cryptosystems Presenters: Yeh Po-Yin Yang Yi-Lun

Sniffing

Spoofing

Bug

Buffer overflow

Page 28: Biometric Cryptosystems Presenters: Yeh Po-Yin Yang Yi-Lun

Protection

Firewall

Antivirus program

Update

Close non-necessary program

Close non-necessary internet service

Scan computer

Page 29: Biometric Cryptosystems Presenters: Yeh Po-Yin Yang Yi-Lun

Back to biometric keys

Is it possible to issue a new biometric template if the biometric template in an application is compromised?

Is it possible to use different template on different applications?

Is it possible to generate a cryptographic key using biometric information?

Page 30: Biometric Cryptosystems Presenters: Yeh Po-Yin Yang Yi-Lun

Solving Q1 and Q2

Store H(x) instead of x

H is the transform function

x is the original biometric signal

Page 31: Biometric Cryptosystems Presenters: Yeh Po-Yin Yang Yi-Lun

Solving Q3

Hide the key within the user’s biometric template

Biometric key generation or binding

Bind a private key into the user biometric information

Both key and biometric are inaccessible to attacker

No biometric matching at all

Page 32: Biometric Cryptosystems Presenters: Yeh Po-Yin Yang Yi-Lun

Conclusion

Combining difficulties

Existing biometric authentication technologies is not perfect

Difficult to align the representations in the encrypted domain

Should not have systematic correlation between the identity and the key

Page 33: Biometric Cryptosystems Presenters: Yeh Po-Yin Yang Yi-Lun

Reference

Umut Uludag, Sharath Pankanti, Salil Probhakar, and Anil K. Jain “Biometric Cryptosystems: Issues and Challenges”, Proceedings of IEEE, 2004

Uludag U, Anil Jain “ Securing Fingerprint Template: Fuzzy Vault with Helper Data”, Computer Vision and Pattern Recognition Workshop, 2006 Conference on

http://www.crucialp.com/resources/tutorials/website-web-page-site-optimization/hacking-attacks-how-and-why.php

資安演習防護講義http://www.hacker.org.tw/?c=articles_show&articleid=882

http://www.gamez.com.tw/viewthread.php?tid=58607

http://www.symantec.com/region/tw/enterprise/article/todays_hack.html