blind authentication.pptx

29
Blind Authentication: A Secure Crypto-Biometric Verification Protocol Rohan Abraham 223 R7 Guided by Prof L

Upload: rohan-abraham

Post on 20-Dec-2015

215 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Blind Authentication.pptx

Blind Authentication: A Secure Crypto-BiometricVerification Protocol

Rohan Abraham223R7

Guided byProf L

Page 2: Blind Authentication.pptx

In a Nutshell

•A protocol for blind biometric authentication

•Blind - does not reveal biometric information to the authenticating server or vice versa

•Secure – encrypted biometrics, template protection

Page 3: Blind Authentication.pptx

CONTENTS

•Biometric Authentication •Blind Biometric Authentication Protocol

using a linear classifier•Security & Privacy Issues•Implementation using SVM•Analysis – Accuracy and Biometric

Verification•Future Possibilities

Page 4: Blind Authentication.pptx

Biometrics

• Sensor-based recognition of identity using biological signatures like face, fingerprints, hand geometry and iris which are unique to an individual

• Primary concerns 1. Template Protection – biometric of a person does not

change and cannot be replaced once compromised.

2. User’s privacy need to be preserved

3. Trust between user & Server

Server may not be trustworthy or competent to handle user’s plain biometric while the server has to find out if the user is genuine.

4. Network Security (third party intruders)

Page 5: Blind Authentication.pptx

What is Blind Authentication ?

A biometric authentication protocol that does not reveal any:

▫information about the biometric samples to the authenticating server.

▫information regarding the classifier, employed by the server, to the user or client

Page 6: Blind Authentication.pptx

How it works

Page 7: Blind Authentication.pptx

Affiliated terms

•x- Feature vector of the sample (length n)•ω- Feature vector of the template(length

n)•τ- Threshold value•E(x)- encryption function•λ,r- random numbers generated as a part

of the encryption scheme•n- Number of features recognized by the

sensor and is static for a given biometric.

Page 8: Blind Authentication.pptx

Homomorphic Encryption • An encryption scheme using which some

algebraic operation , like addition or multiplication, can be directly done on the cipher text

Page 9: Blind Authentication.pptx

Identity Validation Process

Page 10: Blind Authentication.pptx

Algorithm: Authentication

Page 11: Blind Authentication.pptx

BLIND SECURE PRODUCT PROTOCOL

Receive from client

Server computes kn+k random numbers such that

Server computes

and send it to the client.Client decrypts it.

Client computes

to the server

Server computes

Send

Page 12: Blind Authentication.pptx

Algorithm analysis

•The server carries out all its computation in the encrypted domain and hence does not get any information about x or ω.

•Privacy is based on the server’s ability to generate random numbers. The server has access to a random number generator(PRNG)

•Encrypted information is unable to be deciphered and the final SOP expression is obtained which is congruent with the original weighted product

Page 13: Blind Authentication.pptx

•The following condition is the reason why the server is able to compute S in step(8).

Page 14: Blind Authentication.pptx

Enrollment Phase

Enrollment based on a trusted third party(TTP).At the time of registering with the website, the encrypted version of the user’s biometric template is made available to the website.

Page 15: Blind Authentication.pptx

Algorithm: Enrollment

Page 16: Blind Authentication.pptx

System Security

• Biometric systems are more secure when compared to passwords or tokens as they are difficult to reproduce.

• The security is further enhanced by the fact that the attacker needs to get access to both the user’s biometric as well as the private key to be able to pose as an enrolled user.

• Security breaches can occur at the server, client or the network.

Page 17: Blind Authentication.pptx

Server Security

•Case 1: Hacker gains access to the template database.

•Case 2: Hacker is in the database server during authentication.

•Case 3:Impostor trying blind attacks from a remote machine.

Page 18: Blind Authentication.pptx

Client Security•Case 4:

Hacker gains access to the user’s biometric or private key.

•Case 5:Passive attack at the user’s computer.

Page 19: Blind Authentication.pptx

Network security

•Attacker gains access to the network•The confidentiality of the data flow over

the network can be ensured using standard cryptographic methods like ciphers and digital signatures.

•All traffic is encrypted either using client’s public key or random numbers generated by server.

Page 20: Blind Authentication.pptx

Privacy

•Concern of revealing personal information: Since original template or test sample is not revealed to the server, only identity is established.

•Concern of being tracked: Different keys for different applications(servers), thereby avoid being tracked across uses.

Page 21: Blind Authentication.pptx

• An SVM (Support Vector Machine) classifier based on client- server architecture for the evaluation of the protocol was implemented in GNU/C• SVM is a supervised learning method which can be used for classification. Given a set of training examples, each marked as belonging to one of two categories, an SVM training algorithm builds a model that assigns new examples into one category or the other.•An SVM model is a representation of the examples as points in space  mapped so that the examples of the separate categories are divided by a clear gap

Implementation and Analysis

Page 22: Blind Authentication.pptx

• RSA and Paillier cryptosystems are used to generate keys, both of which are public key encryption schemes. They are public-key cryptosystems and are widely used for secure data transmission. The encryption key is public and differs from the decryption key which is kept secret.

•The feature vectors of the SVM are scaled and rounded off to integers. An implicit sign representation is used to handle negative numbers. If the range is (0,M) we use (0,M/2) for positive numbers and the remaining numbers for negative. Let M=256,then -95 is represented as -95modulo256=-95+256=161

•A parameter is encrypted by mapping the integral number to implicit sign representation and reverse mapping is done by the server on the results.

Page 23: Blind Authentication.pptx

Page 24: Blind Authentication.pptx

IMPLEMENTATION AND ANALYSIS•Experiments designed to evaluate the efficiency and accuracy of proposed approach.•For evaluation, an SVM based verifier based on client- server architecture was implemented.

Verification time for various key sizes and feature vector lengths

Page 25: Blind Authentication.pptx

ROC CURVES FOR VERIFICATION

Page 26: Blind Authentication.pptx

Advantages of Blind Authentication• Fast and Provably Secure authentication

without trading off accuracy.• Supports generic classifiers such as Neural

Network and SVMs.• Useful with wide variety of fixed-length

biometric- traits.• Ideal for applications such as biometric

ATMs, login from public terminals.

Page 27: Blind Authentication.pptx

Disadvantages

• Foolproof Enrollment procedures are necessary to ensure that the biometric is secure from any type of attacks (e.g. a malicious enrollment server)

• Success of Biometric authentication is solely dependent on the invariance of physical features. Therefore, if the biometric is damaged by injury (hand geometry) or disease (cataract for iris recognition) or presence of foreign substances (like water or oil), then the encryption algorithm may not give expected results.

Page 28: Blind Authentication.pptx

Conclusions• Verification can be done in real-time with the

help of available hardware

• Keep the interaction between the user and the

server to a minimum

• Extensions to this work includes secure

enrollment protocols and encryption

methods to reduce computations

• Dynamic warping based matching of variable

length feature vectors can further enhance the

utility of the approach

Page 29: Blind Authentication.pptx

References

•N. K. Ratha, J. H. Connell, and R. M. Bolle, “Enhancing security and privacy in biometrics-based authentication systems”

•Maneesh Upmanyu, Anoop M. Namboodiri, K. Srinathan and C.V. Jawahar, “Blind authentication: A secure crypto-biometric verification protocol”

IEEE-Transactions on Information Forensics and Security (IEEE-TIFS, June 2010)