Hacking Attack
Download
Report
Transcript Hacking Attack
Biometric Cryptosystems
Presenters:
Yeh Po-Yin
Yang Yi-Lun
Cryptosystem
User authentication
Cryptographic keys
Login password
RSA Public keys
Cryptographic Keys
Long and random
Stored somewhere
Computer
Smart card
Released base on user password
User password
Short and simple
Easily guessed
“password”
Same as account
Birth date
Tel #
Use the same password everywhere
What if?
A single password is compromised
while user uses the same password
across different applications?
A complex password is written down
some easily accessible locations?
The device which stores the
cryptographic keys had been cracked?
Traditional cryptosystems
Base on secret keys
Forgotten
Lost
Stolen
Repudiation
Biometric authentication
More reliable
Can not be lost or forgotten
Difficult to copy, share, and distribute
Hard to forge
Unlikely to repudiate
Relatively equal security level
Biometric
No biometric is optimal
Depends on the requirement of the
application
Comparison of biometrics
Properties
Universality
Distinctiveness
Permanence
Collect ability
Attributes
Performance
Acceptability
Circumvention
Biometric signal variations
Inconsistent presentation
Irreproducible presentation
Imperfect signal acquisition
Biometric Matcher
Exact match is not very useful
Aligning
Matching score
Fingerprint
Identify minutiae neighbors
Performance
Two type of errors
False match ( false accept )
False non-match ( false reject )
Error rates
False match rate ( FMR )
False non-match rate ( FNMR )
Tradeoff relation
Biometric keys
Biometric-based authentication
User authentication
Biometric component
Cryptographic system
Key release on positive match
Biometric key database
Cryptographic key
User name
Biometric template
Access privileges
Other personal information
What if?
The theft of biometric data crack into
the biometric key database?
Hacking Attack
Definition
Hacker
Cracker
Attack
Disturbance
Block
Incursion
Attacking Step
Decide target
Easy
Worth
Purpose
Gain information
Firewall
System
Detect path
Ping
Traceroute
Hopping site
Bot
Make incursion
Types of attack
Interruption
attack on availability
Interception
attack on confidentiality
Modification
attack on integrity
Fabrication
attack in authentication
Reference 資安演習防護講義
Common form of attack
Denial of Service (DoS) attacks
Distributed Denial of Service (DDoS)
attacks
Trojan Horse
Virus
Websites
Worm
Sniffing
Spoofing
Bug
Buffer overflow
Protection
Firewall
Antivirus program
Update
Close non-necessary program
Close non-necessary internet service
Scan computer
Back to biometric keys
Is it possible to issue a new biometric
template if the biometric template in
an application is compromised?
Is it possible to use different template
on different applications?
Is it possible to generate a
cryptographic key using biometric
information?
Solving Q1 and Q2
Store H(x) instead of x
H is the transform function
x is the original biometric signal
Solving Q3
Hide the key within the user’s
biometric template
Biometric key generation or binding
Bind a private key into the user
biometric information
Both key and biometric are
inaccessible to attacker
No biometric matching at all
Conclusion
Combining difficulties
Existing biometric authentication
technologies is not perfect
Difficult to align the representations in
the encrypted domain
Should not have systematic
correlation between the identity and
the key
Reference
Umut Uludag, Sharath Pankanti, Salil Probhakar, and Anil K.
Jain “Biometric Cryptosystems: Issues and Challenges”,
Proceedings of IEEE, 2004
Uludag U, Anil Jain “ Securing Fingerprint Template: Fuzzy
Vault with Helper Data”, Computer Vision and Pattern
Recognition Workshop, 2006 Conference on
http://www.crucialp.com/resources/tutorials/website-webpage-site-optimization/hacking-attacks-how-and-why.php
資安演習防護講義
http://www.hacker.org.tw/?c=articles_show&articleid=882
http://www.gamez.com.tw/viewthread.php?tid=58607
http://www.symantec.com/region/tw/enterprise/article/todays_
hack.html