{"id":733,"date":"2007-03-31T15:09:36","date_gmt":"2007-03-31T23:09:36","guid":{"rendered":"\/?p=733"},"modified":"2007-04-01T11:06:04","modified_gmt":"2007-04-01T19:06:04","slug":"will-biometrics-grow-up-2","status":"publish","type":"post","link":"https:\/\/www.identityblog.com\/?p=733","title":{"rendered":"Will biometrics grow up?"},"content":{"rendered":"<p><a href=\"http:\/\/www.ipc.on.ca\/index.asp?navid=34\" class=\"broken_link\">Ann Cavoukian<\/a> has really thought about biometrics &#8211; and fingerprinting. As the Privacy Commissioner of Ontario, she hasn&#39;t hesitated to join the conversation we have been having as technologists &#8211; and has contributed to it in concrete ways. For example, beyond bringing the Laws of Identity to the attention of policy makers, <a href=\"\/wp-content\/resources\/7_laws_brochure.pdf\" class=\"broken_link\">she extended them <\/a>to make all the privacy implications explicit.<\/p>\n<p>Now she and Alex Stoianov, a biometrics scientist, have published a joint paper called <a href=\"http:\/\/www.ipc.on.ca\/images\/Resources\/up-1bio_encryp.pdf\" class=\"broken_link\">Biometric Encrypton:  A Positive-Sum Technology that Achieves Strong Authentication, Security AND Privacy<\/a>.  It is too early to know to what extent Biometric Encryption (BE) will achieve its promise and become a mainstream technology.  But everyone who reads the paper will understand why it is absolutely premature to begin using &#8220;conventional biometrics&#8221; in schools &#8211; or pubs.  The following table, taken from the paper, summarizes the benefits BE could hold out for us:<\/p>\n<p style=\"clear: both\">\n<table cellPadding=\"10\">\n<tr bgColor=\"#ffe895\">\n<td><\/td>\n<td><span style=\"font-weight: bold; font-size: 12pt; text-align: center\">Traditional Biometrics:<\/span><br \/>\n<span style=\"font-weight: bold; font-size: 10pt; align: text-center\">Privacy OR Security<br \/>\nA Zero-Sum Game<\/span><\/td>\n<td><span style=\"font-weight: bold; font-size: 12pt; text-align: center\">Biometric Encryption:<\/span><br \/>\n<span style=\"font-weight: bold; font-size: 10pt; text-align: center\">Privacy AND Security &#8211; A Positive-Sum Game<\/span><\/td>\n<\/tr>\n<tr>\n<td>1<\/td>\n<td>The biometric template stored is an identifier unique to the individual.<\/td>\n<td>There is no conventional biometric template, therefore no unique biometric identifier may be tied to the individual. (pp. 16, 17)<\/td>\n<\/tr>\n<tr bgColor=\"#fff3ca\">\n<td>2<\/td>\n<td>Secondary uses of the template (unique identifier) can be used to log transactions if biometrics become widespread.<\/td>\n<td>Without a unique identifier, transactions cannot be collected or tied to an individual. (pp. 17, 25)<\/td>\n<\/tr>\n<tr>\n<td>3<\/td>\n<td>A compromised database of individual biometrics or their templates affects the privacy of all individuals.<\/td>\n<td>No large databases of biometrics are created, only biometrically encrypted keys. Any compromise would have to take place one key at a time. (pp. 23)<\/td>\n<\/tr>\n<tr bgColor=\"#fff3ca\">\n<td>4<\/td>\n<td>Privacy and security not possible.<\/td>\n<td>Privacy and security easily achieved. (pp. 17-20, 26-28)<\/td>\n<\/tr>\n<tr>\n<td>5<\/td>\n<td>Biometric cannot achieve a high level of challenge-response security.<\/td>\n<td>Challenge-response security is an easily available option. (pp. 26-28)<\/td>\n<\/tr>\n<tr bgColor=\"#fff3ca\">\n<td>6<\/td>\n<td>Biometrics can only indirectly protect privacy of personal information in large private or public databases.<\/td>\n<td>BE can enable the creation of a private and highly secure anonymous database structure for personal information in large private or public databases. (pp. 19, 20, 27)<\/td>\n<\/tr>\n<tr>\n<td>7<\/td>\n<td><em>1:many <\/em>identification systems suffer from serious privacy concerns if the database is compromised.<\/td>\n<td><em>1:many <\/em>identification systems are both private and secure. (pp. 17, 20)<\/td>\n<\/tr>\n<tr bgColor=\"#fff3ca\">\n<td>8<\/td>\n<td>Users\u00e2\u20ac\u2122 biometric images or templates cannot easily be replaced in the event of a breach, theft or account compromise.<\/td>\n<td>Biometrically encrypted account identifiers can be revoked and a new identifier generated in the event of breach or database compromise. (pp. 17)<\/td>\n<\/tr>\n<tr>\n<td>9<\/td>\n<td>Biometric system is vulnerable to potential attacks.<\/td>\n<td>BE is resilient to many known attacks. (pp. 18)<\/td>\n<\/tr>\n<tr bgColor=\"#fff3ca\">\n<td>10<\/td>\n<td>Data aggregation<\/td>\n<td>Data minimization (pp. 17)<\/td>\n<\/tr>\n<\/table>\n<p>I&#39;ll be writing about the basic idea involved in BE.  But I advise downloading the paper since beyond BE, it provides an excellent and well structured discussion of the issues with biometrics in general.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Reading this paper will explain why it is way too early to use biometrics in schools &#8211; or pubs.<\/p>\n","protected":false},"author":68,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":[],"categories":[6,17,3,11],"tags":[],"_links":{"self":[{"href":"https:\/\/www.identityblog.com\/index.php?rest_route=\/wp\/v2\/posts\/733"}],"collection":[{"href":"https:\/\/www.identityblog.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.identityblog.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.identityblog.com\/index.php?rest_route=\/wp\/v2\/users\/68"}],"replies":[{"embeddable":true,"href":"https:\/\/www.identityblog.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=733"}],"version-history":[{"count":0,"href":"https:\/\/www.identityblog.com\/index.php?rest_route=\/wp\/v2\/posts\/733\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.identityblog.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=733"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.identityblog.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=733"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.identityblog.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=733"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}