350 likes | 497 Views
LABORATORIES. Fuzzy Vaults: Toward Secure Client-Side Matching. Ari Juels RSA Laboratories 10th CACR Information Security Workshop 8 May 2002. Fingerprint scanning. Iris scanning. Voice recognition. Face recognition. Body odor. Many types of biometric authentication. Authenticating.
E N D
LABORATORIES Fuzzy Vaults: Toward Secure Client-Side Matching Ari Juels RSA Laboratories 10th CACR Information Security Workshop 8 May 2002
Fingerprint scanning • Iris scanning • Voice recognition • Face recognition • Body odor Many types of biometric authentication... Authenticating... • Many others...
Alice Registration Alice Template
Alice Template is stored
Alice Alice Authentication
Alice Authentication ? It’s Alice!
The big questions • Where is the match performed? • Determines architecture • How is the template protected? • Critical because….
First password Second password Limited password changes
Alice Alice Templates represent intrinsic information about you Theft of a template is theft of identity
An Important Note • Biometrics no more secure than PINs! • Static values • False acceptance rates imply, e.g., 1/100,000 security (i.e., perhaps 17 bits) • Thus, it is at present unwise to protect cryptographic systems with biometrics alone • Biometrics are a good second factor, i.e., PIN replacement
The Three Architectures:Server-side, Client-side, andOn-device
Alice Server-side matching Client Server
Alice Alice “access granted” Server-side matching Client Server
Server-side matching: Drawbacks • Risk of template compromise en bloc • Hundreds of thousands of fingerprints make an excellent hacker target • Privacy, liability concerns considerable • Architecturally complex • Matching is CPU-intensive for server
Alice “It’s Alice!” “Hi, Alice!” Client-side matching Server
Client-side matching • Most convenient and simple to build • Fine for, e.g., locking desktop with screen saver • Not secure for remote authentication... client can be made to lie!
Alice “It’s Alice!” “It’s Alice!” “Hi, Alice!” Client-side matching Server
Alice Alice SecurID On-device matching
Alice Alice Alice SecurID On-device matching
On-device matching • On-device security provides full privacy and integrity • With smartcard, biometric unlocks card, thus no need for modification of client or server software But...
On-device matching • But Alice must always have her smart card with her -- portability lost • At present, true on-device match available only with expensive (i.e., $200) units • Most “on-card” matching systems process data on PC, reducing security
h h(“password”) “password” UNIX protection of passwords “password” “password”
Alice Alice Alice Template protection? h h( )
Alice Fingerprint is variable • Differing angles of presentation • Differing amounts of pressure • Chapped skin Don’t have exact key! So hashing won’t work...
We want “fuzzy” vault • Differing angles of presentation • Differing amounts of pressure • Chapped skin
Alice We want “fuzzy” vault My PIN
How do we do it? • Fuzzy vault is just a piece of encrypted data • Uses error-correcting codes • Technology used to eliminate “noise” in telecommunications, CD players, etc. • We make counterintuitive use of error-correcting codes • Jettison the message space!
Alice Fingerprint (features) not stored in clear What do we get?
Client Directory Fuzzy vault Vault can be stored in directory and unlocked on client My PIN
Fuzzy vault: Caveats Basic fuzzy vault: • Does not achieve security of on-card matching • Not secure against Trojan horses • Still provides adequate security as second factor, e.g., PIN replacement
Fuzzy vault pros • Provable security characterization • Similar (dubious) schemes lack proofs • No need for biometric server • No need for smart card • Fuzzy vault can be placed on smart or dumb card for added flexibility, though • Can build secure readers without crypto • All the benefits of secure, client-side match!
When can I buy a fuzzy vault? • Fuzzy vault is a research concept • Validated in early prototype • Needs development on biometrics side • RSA Labs is looking for research partner
To learn more... • Fuzzy vault I -- Suitable for iris? • “A Fuzzy Commitment Scheme”, ACM CCS ‘99 • Joint work with Martin Wattenberg, IBM • Fuzzy vault II -- Suitable for fingerprints? • “A Fuzzy Vault Scheme”, ISIT ‘01 • Joint work with Madhu Sudan, MIT • Patents pending • Papers at www.ari-juels.com • Ari Juels at ajuels@rsasecurity.com