Authentication Identification
How do servers know their client?
Basis of Authentication
What you know PINs
Passwords …
What you have Cards
What you are
Where you are
Basis of Authentication
What you know
What you have
What you are
Where you are
Standard Human Authentication Options
Password Problems
Weak Password
Need to store the passwords
Need to transmit password from user to host
But: Weak passwords are weak passwords…
Dictionary Attacks on Passwords
Attack 1:
Attack 2:
Attack 3:
Cure: Check user passwd’s comply to policies, use “salt”
Unix Password Salt
“Salt” is a 12 bit number between 0 and 4095
Using salt, the same password is computed in 4096 ways
Biometric Authentication
less common:
Categories of Biometric Application
Authentication
Identification
Vetting against a Blacklist
Duplicate Detection
FAR vs FRR
Performance
Advantages
R&D Focus
Iris
Performance
Comment: 95 % accuracy still means: does not scale…
Advantages
R&D Focus
Facial Recognition
Performance
(90 % accuracy means: does not scale…)
Advantages
R&D Focus
Machine Readable Travel Documents (MRTD)
Backoffice
Reader:
Transponder tag
Machine readable travel documents
+ Optional biometric information
+ electronic device (RF-chip) storing these and other information
Electronic Passport
Physical document:
Digital document (RFID)
Information Stored on the Chip
(m = mandatory, o = optional)
Data groups (DG)
Securing Electronic Data (Summary)
Passive authentication (m)
Passive Authentication: Comparison of MRZs (o)
Active Authentication (o)
Basic Access Control (o)
Extended Access Control (o)
Access Control – Biometric Data
Face and MRZ (less-sensitive)
Fingerprints, Iris (sensitive)
Basic Access Control
After successful authentication:
Extended Access Control
Secure sensitive biometric data
PKI based approach (EU)
IS has its individual public key pair
IS requires certificate of passport-issueing country specifying access rights
Inspection System - Revocation
Problem of lost or stolen inspection systems
Proposed solution: certificate revocation
Threats to Biometric Systems