2tom_20100305NIST
-
Upload
himanshu-mittal -
Category
Documents
-
view
214 -
download
0
Transcript of 2tom_20100305NIST
-
8/3/2019 2tom_20100305NIST
1/11
Security and Privacy in Biometric Systems -
The purpose of Biometric EncryptionNIST INTERNATIONAL BIOMETRIC PERFORMANCE CONFERENCE, March 1-5, 2010
Joint BSI-project with: Ulrike Korte (BSI), Matthias Niesing (secunet), Johannes Merkle (secunet)
www.priv-id.com
-
8/3/2019 2tom_20100305NIST
2/11
Overview
High level overview of a biometric system A perfectly private biometric system The purpose of Biometric Encryption
-
8/3/2019 2tom_20100305NIST
3/11
High level overview of a biometric system
SENS SENS
FE COMP FE
T
Accept/Reject
-
8/3/2019 2tom_20100305NIST
4/11
High level overview of a biometric system
Enrollment Verification
ecur y an pr vacy vu nera es
SENS SENS
stealing,
masquerade stealing
,
masquerade,
similarity
FE COMP FE
wire tapping
replay,
tamperingreplay,
tamperingwire tapping wire tapping
STOR
T
replay,
tampering
replay,
tampering
substitution copying
wire tapping
Accept/Reject
replay,
tampering
-
8/3/2019 2tom_20100305NIST
5/11
High level overview of a biometric system
Security(ingoing arrows) defines how difficult it is to illegitimately be
ecur y an pr vacy vu nera es
accepted by the system. Privacy(outgoing arrows) is related to the difficulty to obtain any
relevant information from a provided biometric characteristic other thana verification decision.
See also:ISO/IEC JTC1 SC27 2ndCD 24745 Biometric information protection. -, , ,protection, the need for open standards. Datenschutz und Datensicherheit - DuD, Volume33, No 5, May 2009, Vieweg Verlag, pp299-304.
-
8/3/2019 2tom_20100305NIST
6/11
A Perfectly Private Biometric system
Enrolment Verification
SENS SENS
FE COMP FESTOR
T
Accept/Reject
-
8/3/2019 2tom_20100305NIST
7/11
A Perfectly Private Biometric systemprac ca mp emen a on
This PPB system is perfectly privatein the sense that it outputs theminimal required amount of information in the form of a binaryAccept/Reject decision.
Furthermore, assuming a sensor leaving no latent prints (e.g. atouchless sensor), the system has no eavesdropping vulnerabilities.
occasionally make a wrong decision.
All vulnerabilities can be solved using standard encryption techniqueswithout the need for lon -term secretsexce tthe rotection of storedbiometric information
-
8/3/2019 2tom_20100305NIST
8/11
A Perfectly Private Biometric systemprac ca mp emen a on
Long-term secrets to protect stored biometric information access to the secrets means access to the biometric information secrets must be protected
by the system owner (which assumes that the owner can betrusted)
by the user (secret is password, passphrase, stored on token etc.).
No duplicate check possible
-
8/3/2019 2tom_20100305NIST
9/11
The purpose of Biometric Encryptioner ec y r va e ome r c ncryp on sys em
COMP FESTOR
T
PPBE system
Accept/Reject
-
8/3/2019 2tom_20100305NIST
10/11
-
8/3/2019 2tom_20100305NIST
11/11
Conclusion
All vulnerabilities of a biometric system can be solved using standardcryptographic techniques without long-term secrets
The only exception is protecting stored biometric information whichrequires long-term secrets
The goal of Biometric Encryption technology is to prevent relevantbiometric information to be obtained from storage facilities in biometric
systems without the need for long-term secrets.
www.priv-id.com