140 likes | 258 Views
A flexible biometrics remote user authentication scheme. Authors: Chu-Hsing Lin and Yi-Yi Lai. Sources: Computer Standards & Interfaces, 27(1),. pp.19-23, 2004. Adviser: Min-Shiang Hwang. Speaker: Chun-Ta Li ( 李俊達 ). Outline. Introduction The Lee-Ryu-Yoo scheme
E N D
A flexible biometrics remote user authentication scheme Authors:Chu-Hsing Lin and Yi-Yi Lai Sources:Computer Standards & Interfaces, 27(1), pp.19-23, 2004. Adviser:Min-Shiang Hwang Speaker:Chun-Ta Li (李俊達)
Outline • Introduction • The Lee-Ryu-Yoo scheme • Cryptanalysis of the Lee-Ryu-Yoo scheme • The proposed scheme • Conclusions • Comments
Introduction • Remote password authentication – [Lamport, 1981] • Insecure channel • User authentication (identity & password) • Remote password authentication scheme using smart cards – [Hwang and Li, 2000] • Based on ElGamal’s cryptosystem • Only one secret key without password table
Introduction (cont.) • Biometrics remote user authentication scheme using smart cards – [Lee et al., 2002] • Based on ElGamal’s cryptosystem (two secret keys) • Smart card owner’s fingerprint • Minutiae extraction – [Bae et al., 2000] • Matching – [Ratha et al., 1996] • Lin and Lai point out their scheme is vulnerable to masquerade attack • Lin and Lai propose a flexible scheme (change password)
The Lee-Ryu-Yoo scheme • Three phases in the Lee-Ryu-Yoo scheme • Registration phase (Ui offers IDi and fingerprint of Ui) • Login phase (Ui inserts smart card and offers IDi, PWi and fingerprint of Ui) – fingerprint verification[Jain et al. 1999] • Generate r using minutiae extracted from the imprint fingerprint • Compute C1 = (IDi)r mod P • Compute t = f(T⊕PWi) mod (P-1) • Compute M = (IDi)t mod P • Compute C2 = M(PWi)r mod P • Send the message C = (IDi, C1, C2, T) to the remote system Smart card:f(.), P and Ui’s fingerprint data Secure channel
The Lee-Ryu-Yoo scheme (cont.) • Authentication phase • The system check the validity of IDi • If (T` ﹣T) > △T, rejects the login request • The system check the validity of equation as follows: C2(C1SK2)-1 mod P = (IDi)SK1*f(T⊕PWi) =M(PWi)r * (1/(IDir)SK2) mod P = (IDi)t(IDi) SK2*r * (1/IDi r*SK1*SK2) mod P = (IDi)SK1*f(T⊕PWi) * IDiSK1*SK2*r / IDi r*SK1*SK2 mod P ?
Cryptanalysis of the Lee-Ryu-Yoo scheme • A legal user Ui (owns a pair of IDi and PWi ) • Ui wants to masquerade another pair of valid (IDd, PWd) without knowing the two secret keys SK1 and Sk2 • Ui computes IDd = IDiq mod P • Ui computes PWd = (IDd)SK1*SK2mod P = (IDiq mod P)SK1*SK2 mod P = (IDiq)SK1*SK2 mod P = (IDiSK1*SK2 mod P)q mod P = (PWi)q mod P
The proposed scheme • Three phases in Lin-Lai scheme • Registration phase (Ui offers IDi, PWi and fingerprint of Ui) • Compute PWi` = h(PWi⊕Si), where Si denotes Ui’s minutiae template • Compute Yi = (IDiXs mod P) ⊕ PWi`, where Xs denotes the secret key kept securely in the system • Login phase(Ui inserts smart card, imprint the fingerprint and offers PWi) – fingerprint verification [Jain et al. 1999] Smart card:h(.), P, Yi, Si and IDi
The proposed scheme (cont.) • Login phase • Generate r using minutiae extracted from the imprint fingerprint • Compute PWi”= h(PWi ⊕Si) mod P • Compute Yi` = Yi⊕PWi” • Compute C1 = (IDi)r mod P • Compute M = h(Yi` ⊕ T) mod P • Compute C2 = M(Yi`)r mod P • Send the message C = (IDi, C1, C2, T) to the remote system
The proposed scheme (cont.) • Authentication phase • The system check the validity of IDi • If (T` ﹣T) > △T, rejects the login request • The system check the validity of equation as follows: C2(C1Xs)-1 mod P = h((IDiXs mod P) ⊕ T) mod P ? = h(Yi ⊕h(PWi⊕Si) ⊕ T)*(Yi ⊕h(PWi⊕Si))r *(1/(IDi)rXs)mod P = h(((IDiXs mod P)⊕h(PWi⊕Si))⊕h(PWi⊕Si)⊕T)*(((IDiXs mod P)⊕h(PWi⊕Si))⊕h(PWi⊕Si))r /(IDi)rXsmod P
The proposed scheme (cont.) • Change password (Ui imprint his fingerprint, pass fingerprint verification, inputs old password PWi and the new password PWi*) • Compute PWi” = h(PWi ⊕Si) mod P • Compute Yi`= Yi ⊕ PWi” = IDiXs mod P • Compute new Yi* = Yi` ⊕ h(PWi* ⊕ Si) • Replace the old Yi with the new Yi* on the smart card
Conclusions • Presented a cryptanalysis of the Lee-Ryu-Yoo scheme • Proposed an improved and flexible scheme that allows user to change their password • Needs only to maintain one secret key, without password tables and identity tables
Comments • Biometric key password-based authentication fingerprint-based authentication
Comments (cont.) • Biometric-based security applications • Internet • Distributed network • Mobile network • … • Key authentication • Conference key • Key hierarchy • E-Voting • … Biometric characteristics Information security Network environments