180 likes | 313 Views
Secure Biometric Authentication for Weak Computational Devices. Mikhail Atallah (Purdue) ,Keith Frikken (Purdue), Michael Goodrich (UC-Irvine), Roberto Tamassia (Brown) March 3, 2005. Introduction. Biometric Authentication Pros: Provides simple authentication mechanism
E N D
Secure Biometric Authentication for Weak Computational Devices Mikhail Atallah (Purdue) ,Keith Frikken (Purdue), Michael Goodrich (UC-Irvine), Roberto Tamassia (Brown) March 3, 2005
Introduction • Biometric Authentication • Pros: Provides simple authentication mechanism • Cons: Changing is difficult and privacy concerns • Difficulties: • Readings vary each measurement • Standard techniques such as hashing won’t work FC 2005
Related Work • Many schemes • [Chaum and Pedersen, 1993] • [Davida et al, 1998] • [Bleumer, 1998] • [Davida and Frankel, 1999] • [Juels and Wattenburg, 1999] • [Davida et al, 1999] • [Juels and Sudan, 2002] • [Clancy et al, 2003] • [Impagliazzo and More, 2003] • [Kershbaum et al, 2004] • [Dodis, 2004] FC 2005
Our Goals • Lightweight Authentication Scheme • Nothing more than hash functions • Smartcard based • No single point of failure • Not smartcard • Not server • Server compromise should not lead to the ability to impersonate user (even to the server) • Goal is to have a Biometric PIN for banking systems FC 2005
Framework • Reader: Can be on card or other device, but this is what the user uses to read biometric • Server: Stores information about clients • Comparison Unit: Makes the comparison between the client’s information and server data and grants access • Two biometrics are “close” if their hamming distance is below some threshold (we generalize this to other distances) FC 2005
Adversary Model • Adversary is defined by resources • Smartcard • Uncracked (SCU) • Cracked (SCC) • Fingerprint (FP) • Eavesdrop • Communication Channel (ECC) • Server’s Database (ESD) • Comparison Unit (ECU) = ESD+ECC+”outcome” • Malicious • Communication Channel (MCC) • Things that are outside our model • Adversaries that crack smartcard and give it back to user • Malicious Server’s Database • Malicious Comparison Unit FC 2005
Security Requirements • Confidentiality: An adversary should not be able to learn the user’s fingerprint • Integrity: An adversary should not be able to impersonate the user to the comparison unit • Availability: An adversary should not be able to prevent a user from authenticating FC 2005
Confidentiality • Have 3 oracles which are acceptable • Oracle A: {0,1}|f’|→{0,1} where A(f) returns true if f is a match • Oracle B: →{0,1}log|f’| where B() returns various distances between readings • Oracle C: {0,1 }|f’|→{0,1}log|f’| where C(f) returns the distance between f and f’ (this is weakly secure) FC 2005
False Starts • Suppose f0 and f1 are readings of a fingerprint • How does “bank” determine if f0 is close to f1 without revealing private information • Correctness: The distance should be computed correctly • Privacy: Minimal information should be revealed about f0 and f1 FC 2005
False Starts • False Start #1: • Client sends f1 to bank which compares to f0 in the clear • Correct but not private • False Start #2: • Client sends H(f1) to bank which compares to H(f0)in the clear • Private but not correct FC 2005
False Starts (cont.) • False Start #3: • Client sends f1r to server that compares it to f0r • Correct as dist(f1r,f0r) = dist(f1,f0) • Kind of private: individual bits are protected, but it leaks locations where things change • False Start #4: • Client sends Π(f1r) to server that compares it to Π(f0r) for a permutation Π • Correct as dist(Π(f1r), Π(f0r)) = dist(f1,f0) • Private if permutation is only used once • If it is reused, then it has similar problems as #3 FC 2005
Our Protocol • Goal is to be able to update r value and permutation Π between each authentication • Assume H is a keyed hash function • Before a round, server has • siΠi(firi),H(si),H(si,H(si+1)) • Before a round client(smartcard) has: • Πi, ri, si, si+1 FC 2005
Protocol -- Authentication • Client obtains fi+1, and generates ri+1, si+2, and Πi+1 • It sends to the server Πi(fi+1ri), si, and some transaction information T • Server tests if • H(si) matches previously stored value • siΠi(fi+1ri) is close to the previously stored siΠi(firi) • If there is a match, then server temporarily performs T, and it sends H(T) back to the user FC 2005
Protocol -- Update • Client tests if transaction information matches request • Yes then continue to 2 • No then abort wipe out this set of key information • Client sends to server si+1Πi+1(fi+1ri+1), H(si+1), and H(si+1,H(si+2)) • The server verifies that H(si,H(si+1)) matches the previous value • If yes, then it commits transaction and updates values • If no, it aborts FC 2005
Security Summary • Confidentiality: The cases where the adversary learns the fingerprint are : (FP) or (SCC and ESD) or (SCU, ESD, and MCC) or weakly in the case of (SCU and ECU) or any superset of these cases • Integrity: The cases where the adversary can impersonate the user are : (SCU and FP) or (SCC and ESD) or (ESD and MCC) or weakly in the case of (SCU and ECU) or any superset of these cases • Availability: The cases where the adversary can deny access to the user are : (SCU) or (MCC) or any superset of these cases FC 2005
Security Summary FC 2005
Extensions • Extended to other distances • Storage-Computation Tradeoff: • Previous scheme requires several values to be stored on smartcard (in case of mismatches) • Can reduce storage by increasing computation (similar to SKEY) FC 2005
Summary • Have introduced lightweight biometric scheme that uses only hash functions • No single point of failure • Future Work: • Must update values in our protocol FC 2005