1 / 20

BIOMETRICS AND NETWORK AUTHENTICATION

BIOMETRICS AND NETWORK AUTHENTICATION. Security Innovators. Identification Methods. Traditional identification Something that you have E ntrance permit, key Something that you know U ser-id and password, PIN Problem s Unauthorized person takes control of these traditional identification

Download Presentation

BIOMETRICS AND NETWORK AUTHENTICATION

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. BIOMETRICS AND NETWORK AUTHENTICATION Security Innovators

  2. Identification Methods • Traditional identification • Something that you have • Entrance permit, key • Something that you know • User-id and password, PIN • Problems • Unauthorized person takes control of these traditional identification • Difficult to remember password and PIN

  3. Secure Authentication • In a PKI world: • Cryptographic key pair (private and public key) • If someone gains access to the password that secures the cryptographic keys, he also gains access to every cryptographically protected application. • Solution • Something that you are • Biometric

  4. What is Biometrics? • Biometric technology uses a physical or psychological trait for identification and authentication • Key properties: • Universal - common characteristic • Unique - no two persons is the same in term of characteristic • Permanent - time invariant • Collectable - quantitatively measurable

  5. Why Biometrics? • Enhance security • "Who you claim to be" • NOT "what you know" • Convenient • Fast, easy-to-use, reliable, and less expensive authentication • Avoid • Lost, stolen, duplicated, or left at home • Forgotten, shared, or observed

  6. How Does Biometrics Work? • Signal processing • Minutia extraction • Representation • Compression • Encryption • Transmission • Decryption • Decompress • Template generation

  7. If Match… • Smart card data converted into a number • Used as a symmetric cryptographic key to decrypt the private key • A nonce passed from the computer application to smart card • Private key on smart card encrypted nonce. • The application verifies: • certified public key obtained from the network-based directory service • decrypt the encrypted message from the card

  8. Types of Biometrics • Fingerprint • Face Pattern • Voice Pattern • Retina Identification • Hand • DNA • Signature • Etc…

  9. Fingerprint • Reasons to use • 100 to 600 bytes of data size can easily be fitted into the smart cards • It cannot be easily reproduced from the templates • Possible Attack • Surgery to alter print • Latex finger • Solution • Monitor pulse, sweat, temperature and more • Best solution: Measure the amount of oxygenated hemoglobin in the blood

  10. Fingerprint Matching Algorithm • Three types of minutia features: • Ridge Ending, Bifurcation, and Short Ridge • mi = (type, xi, yi, θi, W) • where • mi is the minutia vector • type is the type of feature (ridge ending, bifurcation, short ridge) • xi is the x-coordinate of the location • yi is the y-coordinate of the location • θi is the angle of orientation of the minutia • W is a weight based on the quality of the image at that location

  11. Face Pattern • Face recognition algorithms create a numerical code from facial measurements called “face print” • Possible Attack • Surgery • Artificial mask • If only 2-D scan, duplication of photo • Protection • 3-D images from varies viewing angle

  12. Retina Identification • Based on the unique configuration of blood vessels 360 degree circular scan in the retina • Most accurate • Possible attack • Surgery • prosthetic eye

  13. Eye Scan

  14. Voice Pattern • Automatic speaker recognition and verification system • Possible attack • DAT voice recording • Sound-alike voice

  15. How Biometrics Applies to Network Security? • Authentication • Biometrics technology replace Username and Password • Can be used on • Workstation and network access • Single sign-on • Application logon • Data Protection • Remote access to resources • Transaction security • Web security • Encrypt sensitive data transmitted over the internet

  16. Biometric Authentication for J2EE Architecture

  17. Issues and Concerns • Accuracy • False acceptance rate (FAR) and False Rejection Rate (FRR) • Tradeoff between security and convenience • Stability • Suitability • Difficulty of usage • Availability • Comparison failure

  18. Summary • Biometric is one more layer on top of PIN, physical token, and it makes themmore secure • Highest level of security is the combination of: • Something you know • Something you have • Something you are

  19. Reference • [1] David Corcoran, "Smart Cards and Biometrics: Your Key to PKI” • [2] Paul Reid, “Biometrics for Network Security,” Prentice Hall PTR, December 30, 2003. • [3] “Smart Cards and Biometrics in Privacy-Sensitive Secure Personal Identification Systems,” A Smart Card Alliance White Paper, May 2002. • [4] Anil Jain, “BIOMETRICS Personal Identification in Networked Society,” Kluwer Academic Publishers, 2002

More Related