...
首页> 外文期刊>Entropy >User-Centric Key Entropy: Study of Biometric Key Derivation Subject to Spoofing Attacks
【24h】

User-Centric Key Entropy: Study of Biometric Key Derivation Subject to Spoofing Attacks

机译:以用户为中心的密钥熵:遭受欺骗攻击的生物统计密钥派生研究

获取原文

摘要

Biometric data can be used as input for PKI key pair generation. The concept of not saving the private key is very appealing, but the implementation of such a system shouldn’t be rushed because it might prove less secure then current PKI infrastructure. One biometric characteristic can be easily spoofed, so it was believed that multi-modal biometrics would offer more security, because spoofing two or more biometrics would be very hard. This notion, of increased security of multi-modal biometric systems, was disproved for authentication and matching, studies showing that not only multi-modal biometric systems are not more secure, but they introduce additional vulnerabilities. This paper is a study on the implications of spoofing biometric data for retrieving the derived key. We demonstrate that spoofed biometrics can yield the same key, which in turn will lead an attacker to obtain the private key. A practical implementation is proposed using fingerprint and iris as biometrics and the fuzzy extractor for biometric key extraction. Our experiments show what happens when the biometric data is spoofed for both uni-modal systems and multi-modal. In case of multi-modal system tests were performed when spoofing one biometric or both. We provide detailed analysis of every scenario in regard to successful tests and overall key entropy. Our paper defines a biometric PKI scenario and an in depth security analysis for it. The analysis can be viewed as a blueprint for implementations of future similar systems, because it highlights the main security vulnerabilities for bioPKI. The analysis is not constrained to the biometric part of the system, but covers CA security, sensor security, communication interception, RSA encryption vulnerabilities regarding key entropy, and much more.
机译:生物识别数据可以用作生成PKI密钥对的输入。不保存私钥的概念非常吸引人,但是不应急于实施这种系统,因为与目前的PKI基础设施相比,它可能被证明不那么安全。一种生物特征很容易被欺骗,因此人们认为多模式生物特征将提供更高的安全性,因为欺骗两个或更多生物特征将非常困难。多模态生物识别系统的安全性得到提高的这一观点已被拒绝用于身份验证和匹配,研究表明,不仅多模态生物识别系统并不更安全,而且还会引入其他漏洞。本文是对欺骗生物特征数据对于检索派生密钥的含义的研究。我们证明了欺骗生物特征可以产生相同的密钥,这反过来又会导致攻击者获取私钥。提出了一种利用指纹和虹膜作为生物特征以及模糊提取器进行生物特征密钥提取的实用方法。我们的实验表明,对单模式系统和多模式系统的生物特征数据进行欺骗时会发生什么。如果是多模式系统,则在欺骗一个或两个生物特征时进行测试。我们提供有关成功测试和总体关键熵的每个方案的详细分析。我们的论文定义了生物识别PKI方案以及对此的深入安全性分析。该分析可以凸显出bioPKI的主要安全漏洞,因此可以视为实现未来类似系统的蓝图。该分析不限于系统的生物识别部分,而是涵盖CA安全性,传感器安全性,通信拦截,与密钥熵有关的RSA加密漏洞等。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号