{"id":735,"date":"2007-04-01T12:27:12","date_gmt":"2007-04-01T20:27:12","guid":{"rendered":"\/?p=735"},"modified":"2007-04-01T12:36:54","modified_gmt":"2007-04-01T20:36:54","slug":"biometric-encryption","status":"publish","type":"post","link":"https:\/\/www.identityblog.com\/?p=735","title":{"rendered":"Biometric encryption"},"content":{"rendered":"<p>This diagram from Cavoukian and Stoianov&#39;s recent <a href=\"http:\/\/www.ipc.on.ca\/images\/Resources\/up-1bio_encryp.pdf\" class=\"broken_link\">paper on biometric encryption<\/a> (introduced <a href=\"\/?p=733\">here<\/a>) provides an overiew of the possible attacks on conventional biometric systems (C<em>lick to enlarge;<\/em> consult the original paper, which discusses each of the attacks).<\/p>\n<table class=\"image\">\n<tr>\n<td><a href=\"\/wp-content\/images\/2007\/03\/conventional-flow.jpg\" class=\"broken_link\"><img loading=\"lazy\" caption=\"Click to enlarge.\" width=\"401\" src=\"\/wp-content\/images\/2007\/03\/conventional-flow.jpg\" height=\"265\" style=\"width: 401px; height: 265px\" \/><\/a><\/td>\n<\/tr>\n<tr>\n<td class=\"caption\">Click to enlarge<\/td>\n<\/tr>\n<\/table>\n<p><a href=\"\/?p=734\">Having looked <\/a>at&nbsp;how template-based biometric systems work,&nbsp;we&#39;re ready&nbsp;to consider&nbsp;biometric encyption.&nbsp; The basic idea&nbsp;is that a function of the biometric is used to encrypt&nbsp;(bind to) an arbitrary key.&nbsp; The key is stored in&nbsp;the database, rather than either the biometric or a template.&nbsp; The authors explain,<\/p>\n<blockquote><p>Because of its variability, the biometric image or template itself cannot serve as a cryptographic key. However, the amount of information contained in a biometric image is quite large: for example, a typical image of 300&#215;400 pixel size, encoded with eight bits per pixel has 300x400x8 = 960,000 bits of information. Of course, this information is highly redundant. One can ask a question: Is it possible to consistently extract a relatively small number of bits, say 128, out of these 960,000 bits? Or, is it possible to bind a 128 bit key to the biometric information, so that the key could be consistently regenerated? While the answer to the first question is problematic, the second question has given rise to the new area of research, called Biometric Encryption<\/p>\n<p>Biometric Encryption is a process that securely binds a PIN or a cryptographic key to a biometric,so that neither the key nor the biometric can be retrieved from the stored template. The key is re-created only if the correct live biometric sample is presented on verification.<\/p><\/blockquote>\n<p>The process is represented visually as follows (click to enlarge):<\/p>\n<table class=\"image\">\n<tr>\n<td><a href=\"\/wp-content\/images\/2007\/03\/be-flow.jpg\" class=\"broken_link\"><img loading=\"lazy\" caption=\"Click to enlarge.\" width=\"401\" src=\"\/wp-content\/images\/2007\/03\/be-flow.jpg\" height=\"265\" style=\"width: 401px; height: 265px\" \/><\/a><\/td>\n<\/tr>\n<tr>\n<td class=\"caption\">Click to enlarge<\/td>\n<\/tr>\n<\/table>\n<p>Perhaps the most interesting aspect of this technology is that the identifier associated with an individual&nbsp;includes the entropy&nbsp;of an arbitrary key.&nbsp; This is very different from&nbsp;using a template that will be more or less&nbsp;identical as long as the template algorithm remains constant.&nbsp; With BE, I can delete&nbsp;an identifier from the database, and generate a new one by feeding a new random key into the biometric &#8220;binding&#8221; process.&nbsp; The authors thus say the identifiers are &#8220;revokable&#8221;.<\/p>\n<p>This&nbsp;is a step forward in terms of normal usage,&nbsp;but the&nbsp;technology still suffers from&nbsp;the &#8220;glass slipper&#8221; effect.&nbsp; A given individual&#39;s biometric will be capable of revealing&nbsp;a given&nbsp;key forever, while other people&#39;s biometrics won&#39;t.&nbsp; So&nbsp;I don&#39;t see that it offers&nbsp;any&nbsp;advantage in preventing future mining of databases for biometric matches.&nbsp; Perhaps someone will explain what I&#39;m missing.<\/p>\n<p>The authors describe&nbsp;some of the practical difficulties in building real-world systems (although it appears that already Phillips has a commercial system).&nbsp;&nbsp;It is argued that for technical&nbsp;reasons, fingerprints lend themselves less to this technology than iris and facial scans.&nbsp;<\/p>\n<p>Several&nbsp;case studies are included in the paper that demonstrate potential benefits of the system.&nbsp; Reading them makes the ideas more comprehensible.<\/p>\n<p>The authors conclude:<\/p>\n<blockquote><p>Biometric Encryption technology is a fruitful area for research and has become sufficiently mature for broader public policy consideration, prototype development, and consideration of applications.<\/p><\/blockquote>\n<p>Andy Adler at the University of Ottawa has <a href=\"http:\/\/www.springerlink.com\/content\/dh2h13atatue0204\/\" class=\"broken_link\">a paper<\/a> looking at some of the vulnerabilities of BE.<\/p>\n<p>Certainly, Cavoukian and Stoianov&#39;s fine discussion of the problems with conventional biometrics leaves one more skeptical than ever about their use today&nbsp;in schools and pubs.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>The fine discussion of the problems with conventional biometrics leaves one more skeptical than ever about their use in schools and pubs<\/p>\n","protected":false},"author":68,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":[],"categories":[6,17,3,11],"tags":[],"_links":{"self":[{"href":"https:\/\/www.identityblog.com\/index.php?rest_route=\/wp\/v2\/posts\/735"}],"collection":[{"href":"https:\/\/www.identityblog.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.identityblog.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.identityblog.com\/index.php?rest_route=\/wp\/v2\/users\/68"}],"replies":[{"embeddable":true,"href":"https:\/\/www.identityblog.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=735"}],"version-history":[{"count":0,"href":"https:\/\/www.identityblog.com\/index.php?rest_route=\/wp\/v2\/posts\/735\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.identityblog.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=735"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.identityblog.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=735"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.identityblog.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=735"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}