Biometry and Security: Secure Biometric Authentication for Weak Computational Devices Author: Zelenevskiy Vladimir Based on the research by M.J. Atallah.

Slides:



Advertisements
Similar presentations
Smart Cards Our Inevitable Future Mark Shippy. What are smart cards? Credit card sized plastic card with an embedded chip. Credit card sized plastic card.
Advertisements

Key distribution and certification In the case of public key encryption model the authenticity of the public key of each partner in the communication must.
Lecture 6 User Authentication (cont)
ECE454/CS594 Computer and Network Security Dr. Jinyuan (Stella) Sun Dept. of Electrical Engineering and Computer Science University of Tennessee Fall 2011.
CS470, A.SelcukCryptographic Authentication1 Cryptographic Authentication Protocols CS 470 Introduction to Applied Cryptography Instructor: Ali Aydin Selcuk.
CSC 386 – Computer Security Scott Heggen. Agenda Authentication Passwords Reducing the probability of a password being guessed Reducing the probability.
Efficient Public Key Infrastructure Implementation in Wireless Sensor Networks Wireless Communication and Sensor Computing, ICWCSC International.
BIOMETRICS AND NETWORK AUTHENTICATION Security Innovators.
Biometrics Technology Jie Meng. What is Biometrics ? Biometrics is the science and technology of measuring and analyzing biological data. In information.
CMSC 414 Computer and Network Security Lecture 21 Jonathan Katz.
Apr 22, 2003Mårten Trolin1 Agenda Course high-lights – Symmetric and asymmetric cryptography – Digital signatures and MACs – Certificates – Protocols Interactive.
FIT3105 Biometric based authentication and identity management
CMSC 414 Computer and Network Security Lecture 22 Jonathan Katz.
Security Internet Management & Security 06 Learning outcomes At the end of this session, you should be able to: –Describe the reasons for having system.
CMSC 414 Computer and Network Security Lecture 14 Jonathan Katz.
CMSC 414 Computer (and Network) Security Lecture 24 Jonathan Katz.
Biometrics and Authentication Shivani Kirubanandan.
Marjie Rodrigues
Security-Authentication
Security systems need to be able to distinguish the “white hats” from the “black hats”. This all begins with identity. What are some common identifiers.
Practical Techniques for Searches on Encrypted Data Yongdae Kim Written by Song, Wagner, Perrig.
Karthiknathan Srinivasan Sanchit Aggarwal
Security Measures Using IS to secure data. Security Equipment, Hardware Biometrics –Authentication based on what you are (Biometrics) –Biometrics, human.
Biometrics. Outline What is Biometrics? Why Biometrics? Physiological Behavioral Applications Concerns / Issues 2.
By Alvaro E. Escobar 1 Biometrics Agenda I. Video II. Biometric Overview III. Biometric Technologies IV. Accuracy Metrics V. BioPrivacy Concerns.
Authentication Approaches over Internet Jia Li
Chapter 10: Authentication Guide to Computer Network Security.
Csci5233 Computer Security1 Bishop: Chapter 12 Authentication.
CS 736 A methodology for Analyzing the Performance of Authentication Protocol by Laseinde Olaoluwa Peter Department of Computer Science West Virginia.
Cryptanalysis of Two Dynamic ID-based Authentication
IT’s private. Ofcom report 80% of UK homes have access to the Internet 76% of UK homes have broadband 40% of UK adults use a smartphone Image by: VEER/Corina.
BIOMETRICS By: Lucas Clay and Tim Myers. WHAT IS IT?  Biometrics are a method of uniquely identifying a person based on physical or behavioral traits.
Lecture 7 Page 1 CS 236 Online Challenge/Response Authentication Authentication by what questions you can answer correctly –Again, by what you know The.
Biometrics Stephen Schmidt Brian Miller Devin Reid.
Lecture 7 Page 1 CS 236, Spring 2008 Challenge/Response Authentication Authentication by what questions you can answer correctly –Again, by what you know.
Biometrics Authentication Technology
Biometrics.
Pertemuan #9 Security in Practice Kuliah Pengaman Jaringan.
Power Point Project Michael Bennett CST 105Y01 ONLINE Course Editor-Paulette Gannett.
PRESENTATION ON BIOMETRICS
Iris Technology Presented By: D.SRIKANTH Biometrics Identifying individuals using their distinct physical or behavior characteristics. Features measured.
Biometric Technologies
BIOMETRICS.   technology/9742-1_ html.
Presented by Sharan Dhanala
Data Integrity Proofs in Cloud Storage Author: Sravan Kumar R and Ashutosh Saxena. Source: The Third International Conference on Communication Systems.
Lecture 9 Overview. Digital Signature Properties CS 450/650 Lecture 9: Digital Signatures 2 Unforgeable: Only the signer can produce his/her signature.
My topic is…………. - It is the fundamental building block and the primary lines of defense in computer security. - It is a basic for access control and.
IT 221: Introduction to Information Security Principles Lecture 5: Message Authentications, Hash Functions and Hash/Mac Algorithms For Educational Purposes.
Threshold password authentication against guessing attacks in Ad hoc networks ► Chai, Zhenchuan; Cao, Zhenfu; Lu, Rongxing ► Ad Hoc Networks Volume: 5,
9.2 SECURE CHANNELS JEJI RAMCHAND VEDULLAPALLI. Content Introduction Authentication Message Integrity and Confidentiality Secure Group Communications.
LEARNING AREA 1 : INFORMATION AND COMMUNICATION TECHNOLOGY PRIVACY AUTHENTICATION VERIFICATION.
 Encryption provides confidentiality  Information is unreadable to anyone without knowledge of the key  Hashing provides integrity  Verify the integrity.
BOPS – Biometric Open Protocol Standard Emilio J. Sanchez-Sierra.
Biometric Encryption Base RSA Algorithm Supervisor: Ass. Prof. Dr. Dang Tran Khanh Student: Dung Ngo Dinh.
Information Systems Design and Development Security Precautions Computing Science.
An Introduction to Biometrics
Michael Carlino. ROADMAP -Biometrics Definition -Different types -Future -Advantages -Disadvantages -Common Biometric Report -Current Issues.
Secure Biometric Authentication for Weak Computational Devices Mikhail Atallah (Purdue),Keith Frikken (Purdue), Michael Goodrich (UC- Irvine), Roberto.
Challenge/Response Authentication
MANAGEMENT of INFORMATION SECURITY, Fifth Edition
BLIND AUTHENTICATION: A SECURE CRYPTO-BIOMETRIC VERIFICATION PROTOCOL
Authentication.
Network Security Unit-VI
Biometrics.
Biometrics Reg: AMP/HNDIT/F/F/E/2013/067.
Seminar Presentation on Biometrics
Biometrics.
Biometric technology.
A SEMINAR REPORT ON BIOMETRICS
A Framework of Remote Biometric Authentication on the Open Network
Presentation transcript:

Biometry and Security: Secure Biometric Authentication for Weak Computational Devices Author: Zelenevskiy Vladimir Based on the research by M.J. Atallah and the others

Contents: Biometry: common information Purpose of the research Attacks on the biometric data Solution: general idea Security model Early protocols (“false starts”) Scheme for secure authentication Proof of the scheme security Conclusions 2

Biometrics is the science and technology of measuring and analyzing biological data. In IT, biometrics refers to technologies that measure and analyze human body characteristics, such as fingerprints, eye retinas and irises, voice patterns, facial patterns and hand measurements, for authentication purposes. [ Biometrics: 3

Two main groups:  Physiological are related to the shape of the body.  Behavioral are related to the behavior of a person. Biometrical Data: 4

Biometric identification schemes :  face: unique facial characteristics  fingerprint: an individual’s unique fingerprints  hand geometry: the shape of the hand and the length of the fingers  retina: the capillary vessels located at the back of the eye  iris: the colored ring that surrounds the eye’s pupil analysis of the  signature: the way a person signs his name.  vein: pattern of veins in the back of the hand and the wrist  voice: tone, pitch, cadence and frequency of a person’s voice. Biometrical Identification: 5

Highest level of security – “Who you are?” Unforgeable authentication Quickly and automatically Biometrics - advantages: 6

Privacy!  Storage  Transfer Variables between measurements  Encryption - ?  Comparison - ?  Hash-functions - ? 1 2 Biometrics - difficulties: 7

Highest level of security Weak computational devices:  Embedded processor  Low memory capacity  Battery-powered devices Cryptographic hashes NO: expensive cryptographic primitives and protocols NO: relying on physical tamper-resistance NO: single point of failure Purpose of the research : 8

Project Terminology: 9

Necessary security: 10

Security implementation: 11

Inexpensive operations:  The protocols use hash computation but not encryption  No multiplication No replay attacks are possible Information obtained from the comparison unit cannot be used to impersonate the user If the card is stolen and all its contents compromised, still the adversary cannot impersonate the user Correctness Privacy Solution requirements : 12

13 Security model: Definitions Confidentiality Adversary should not be able to learn information about user’s biometry Confidentiality Adversary should not be able to learn information about user’s biometry Integrity Adversary should not be able to impersonate the client Integrity Adversary should not be able to impersonate the client Availability Adversary should not be able to make the client unable to login Availability Adversary should not be able to make the client unable to login

14 Adversary is defined by the resources that he has: Smartcard Uncracked (SCU) Cracked (SCC) Fingerprint (FP) Eavesdrop Server Database (ESD): all user info on server Communication Channel (ECC): all info sent Comparison Unit (ECU): ESD + ECC + comparison result Malicious (MCC): ECC + change values Security model: Adversary

15 13 Security model: Summary ResourcesConfidentialityIntegrityAvailability FingerprintNOSTRONG Smartcard Cracked + Database NO Smartcard Uncracked + Fingerprint NO Malicious + DatabaseSTRONGNO Smartcard Uncracked + Malicious + Database NO MaliciousSTRONG NO Smartcard UncrackedSTRONG NO Smartcard Uncracked + Comparison Unit WEAK NO

16 Binary vectors Hamming distance  F 0 - stored reference vector (server)  F 1 – recently measured biometric vector (client)  Dist(F 0,F 1 ) – Hamming distance between F 0 and F 1  Identification: Dist(F 0,F 1 ) < Threshold  Correctness – the server correctly computes Dist(F 0,F 1 )  Privacy – the protocol reveals nothing about F 0 and F 1 other than Hamming distance Solution: Terminology

17 1.F 1 – sent to the server in clear text (encrypted) F 0 - stored on the server in clear text (encrypted) Disadvantages: Vulnerable to insider attacks on server  Correctness  Privacy 2.Server: stores h(F 0 ||r) – hash of F 0 and r – random vector Client: computes and sends h(F 1 ||r) Cryptographic hashing does not preserve the distance between objects!  Correctness  Privacy Solution: Preliminary protocols 1&2

18 3.Server: stores vector sum, R – vector known only to the client Client: sends  Correctness Dist(, ) = Dist(F 0, F 1 )  Privacy Information leakage on the server 4.Server: stores, П – fixed random permutation known only to the client Client: computes and sends  Correctness Dist(, ) = Dist(F 0,F 1 )  Privacy Some info leakage on the server, because same П is used each time. Solution: Preliminary protocols 3&4

19 Server and Client: small collection of values, recomputed each round Q – number of copies of this info on server and client Q – also a number of fingerprint mismatches before re- registration Client: F i+1 – boolean vector from biometrics on client П i, П i+1 – random permutations R i, R i+1, S i, S i+1, S i+2 – random boolean vectors Server:, H(S i ), H(S i, H(S i+1 )) Final Solution: Boolean case

20 Round: 1. Reads: F i+1 Generates: R i+1, S i+1 2., S i, T 3. Computes: H(S i ), compares it with stored H(S i ) (yes: proceeds, no: aborts) XOR S i → → Computes: Dist (, ) (yes: proceeds, no: aborts, info set –away) Final Solution: Boolean case

21 4. H(T) 5. Checks: H(T) (No: error message) Yes: Deletes: F i+1, R i, S i 6. Verifies: Updates storage: Final Solution: Boolean case

22 Modification: F i, F i+1 – arbitrary (non-binary) vectors Distance function depends on | F i - F i+1 | S i, S i+1, S i+2 – random boolean vectors R i, R i+1 – random arbitrary vectors Every is replaced by The above requires: O((log∑)n), where ∑ - size of alphabet, n – number of items Minimal information leakage (+ the values are permuted) For function → Hamming distance computation. Requires: O(∑n) Final Solution: Arbitrary case

23 3 Security of the solution ResourcesInformation FingerprintF Smartcard UncrackedAbility to probe small number of fingerprints Smartcard Cracked SCU + R i, S i, П i, K Database K and several sets of H(Si), H(Si, H(Si+1)), Communication channelSeveral sets of Comparison UnitDatabase + Communication channel + distances of several readings MaliciousCommunication channel + can change values

24 Lemma 1: The pair of values and reveals nothing other than the distance between each pair of vectors. Theorem 1: The only cases where an adversary learns the fingerprint are in:  FP  SCC + ESD  SCU + ESD + MCC  Any superset of this values and  SCU + ECU – weakly learns fingerprint (can probe different fingerprints) Confidentiality :

25 Theorem 2: The only cases where an adversary can impersonate a client: SCU +FP SCC + ESD MCC + ESD Any superset of this values And SCU + ECU – weakly impersonate the client The only cases where an adversary can attack the availability of the attack are in: SCU MCC Any superset of this values Integrity and Availability :

26 Protocol: q-fingerprint mismatches before re-registration Requires: O(1) – Storage O(q) – hashes to authenticate - x hashed j-times Server:, Client: П i, R i, S i, S i+1 After t fingerprint mismatches: Storage-Computation Tradeoff

27 Conclusion Highest level of security Weak computational devices:  Embedded processor  Low memory capacity  Battery-powered devices Cryptographic hashes Additional requirements: Client’s fingerprint is protected For every successful identification the database must update its entry to the a new value. Static database on server - ?

Thank you for your attention! Any questions? Author: Zelenevskiy Vladimir, 28