SlideShare a Scribd company logo
1 of 38
14.1
Entity Authentication
By
Mrs.T.Veiluvanthal
Objectives
• To distinguish between message authentication and
entity authentication
• To define witnesses used for identification
• To discuss some methods of entity authentication
using a password
• To introduce some challenge-response protocols for
entity authentication
• To introduce some zero-knowledge protocols for
entity authentication
• To define biometrics and distinguish between
physiological and behavioral techniques
14.3
INTRODUCTION
Entity authentication is a technique designed to
let one party prove the identity of another party. An
entity can be a person, a process, a client, or a server.
The entity whose identity needs to be proved is called
the claimant; the party that tries to prove the identity of
the claimant is called the verifier.
There are two differences between message authentication
(data-origin authentication).
1) Message authentication might not happen in real time;
entity authentication does.
2) Message authentication simply authenticates one
message; the process needs to be repeated for each new
message. Entity authentication authenticates the
claimant for the entire duration of a session.
Data Origin Vs Entity Authentication
Verification Categories
Something known
Something possessed
Something inherent
A secret known only by the claimant that can be
checked by the verifier. Example Password.
Something that can prove the claimant’s identity.
Example Passport.
An inherent characteristic of the claimant. Example
conventional signature,fingerprint,voice etc.
14.6
This chapter discusses entity authentication. The next
chapter discusses key managment. These two topics are
very closely related., key management protocols use entity
authentication protocols.
Entity Authentication and Key Management
PASSWORDS
The simplest and oldest method of entity authentication
is the password-based authentication, where the
password is something that the claimant knows.A
password is used when a user needs to access a system
to use the system’s resources.
A Fixed Password is a password that is used over
and over again for every access.
Fixed Password
Fixed Password
First Approach
The System keeps a table that is sorted by user
identification.The user sends her identification and
password to the system.The system used the identification
to find the password in the table
Figure User ID and password file
Second Approach
To store the hash of the password. Any user can read the contents of the file,
because the hash function is a one way function.
Figure Hashing the password
Third Approach
This is called salting password, when the password string is created, a random
string called the salt, is concatenated to the password, then it is hashed.The Id,the salt
and the hash are stored in the file.
Figure Salting the password
14.11
Fourth Approach
In the fourth approach, two identification techniques are
combined. A good example of this type of authentication
is the use of an ATM card with a PIN (personal
identification number).
14.12
One-Time Password
First Approach
In the first approach, the user and the system agree upon
a list of passwords.
Second Approach
In the second approach, the user and the system agree to
sequentially update the password.
Third Approach
In the third approach, the user and the system create a
sequentially updated password using a hash function.
14.13
Figure Lamport one-time password
CHALLENGE-RESPONSE
In password authentication, the claimant proves her
identity by demonstrating that she knows a secret, the
password. In challenge-response authentication, the
claimant proves that she knows a secret without
sending it.
Using a Symmetric-Key Cipher
Using Keyed-Hash Functions
Using an Asymmetric-Key Cipher
Using Digital Signature
Topics discussed in this section:
14.15
In challenge-response authentication, the claimant
proves that she knows a secret without sending it to
the verifier.
Note
The challenge is a time-varying value sent by the
verifier; the response is the result
of a function applied on the challenge.
Note
Using a Symmetric-Key Cipher
First Approach
The verifier sends a nonce, a random number used only once to challenge the
claimant. A nonce must be time varying. Every time is created it is different.
Figure Nonce challenge
14.17
Second Approach
The time varying value is time stamp,The challenge message is the current
time sent from the verifier to the claimant.
Figure Timestamp challenge
14.18
Third Approach
The first and second appraches are unidirectional authentication.But we need
bidirectional
Figure Bidirectional authentication
Instead of using encryption/decryption for entity
authentication, we can also use a keyed-hash function
(MAC).
Using Keyed-Hash Functions
Figure Keyed-hash function
14.20
Using an Asymmetric-Key Cipher
First Approach
B encrypts the challenge using a’s public key.A decrypts the message with a’s
private key.
Figure Unidirectional, asymmetric-key authentication
Second Approach
Two public keys are used,one in each direction.A sends her identity and nonce
encrypted with b’s public key.
Figure Bidirectional, asymmetric-key
Using Digital Signature
First Approach
B uses a plaintext challenge and A signs the response
Figure Digital signature, unidirectional
14.23
Second Approach
Figure Digital signature, bidirectional authentication
ZERO-KNOWLEDGE
In zero-knowledge authentication, the claimant does
not reveal anything that might endanger the
confidentiality of the secret. The claimant proves to the
verifier that she knows a secret, without revealing it.
The interactions are so designed that they cannot lead
to revealing or guessing the secret.
Fiat-Shamir Protocol
Feige-Fiat-Shamir Protocol
Guillou-Quisquater Protocol
Topics discussed in this section:
14.25
Fiat-Shamir Protocol
Figure 14.13 Fiat-Shamir protocol
14.26
Cave Example
Figure Cave example
14.27
Feige-Fiat-Shamir Protocol
Figure Feige-Fiat-Shamir protocol
14.28
Guillou-Quisquater Protocol
Figure Guillou-Quisquater protocol
14.29
Figure Guillou-Quisquater protocol
14.30
BIOMETRICS
Biometrics is the measurement of physiological or
behavioral features that identify a person
(authentication by something inherent). Biometrics
measures features that cannot be guessed, stolen, or
shared.
Components
Enrollment
Authentication
Techniques
Accuracy
Applications
Topics discussed in this section:
14.31
Several components are needed for biometrics, including
capturing devices, processors, and storage devices..
Components
14.32
Before using any biometric techniques for authentication,
the corresponding feature of each person in the
community should be available in the database. This is
referred to as enrollment.
Enrollment
14.33
Authentication
Verification
Identification
14.34
Techniques
Figure Techniques
14.35
Physiological Techniques
Fingerprint
Iris
Retina
Face
Hands
Voice
DNA
14.36
Behavioral Techniques
Signature
Keystroke
14.37
Accuracy
False Rejection Rate (FRR)
False Acceptance Rate (FAR)
14.38
Several applications of biometrics are already in use. In
commercial environments, these include access to
facilities, access to information systems, transaction at
point-ofsales, and employee timekeeping. In the law
enforcement system, they include investigations (using
fingerprints or DNA) and forensic analysis. Border
control and immigration control also use some biometric
techniques.
Applications

More Related Content

What's hot

E-mail Security in Network Security NS5
E-mail Security in Network Security NS5E-mail Security in Network Security NS5
E-mail Security in Network Security NS5
koolkampus
 
Intruders
IntrudersIntruders
Intruders
techn
 
Dasar – dasar metodologi latihan taktik
Dasar – dasar metodologi latihan taktikDasar – dasar metodologi latihan taktik
Dasar – dasar metodologi latihan taktik
Hendrik Hasibuan
 
Cryptography full report
Cryptography full reportCryptography full report
Cryptography full report
harpoo123143
 
منهج الثقافة الصحية_جذرىجداجدا
منهج الثقافة الصحية_جذرىجداجدامنهج الثقافة الصحية_جذرىجداجدا
منهج الثقافة الصحية_جذرىجداجدا
sammani97
 

What's hot (20)

E-mail Security in Network Security NS5
E-mail Security in Network Security NS5E-mail Security in Network Security NS5
E-mail Security in Network Security NS5
 
Fundamentals of cryptography
Fundamentals of cryptographyFundamentals of cryptography
Fundamentals of cryptography
 
Key distribution code.ppt
Key distribution code.pptKey distribution code.ppt
Key distribution code.ppt
 
Topic1 substitution transposition-techniques
Topic1 substitution transposition-techniquesTopic1 substitution transposition-techniques
Topic1 substitution transposition-techniques
 
3D PASSWORD SEMINAR
3D PASSWORD SEMINAR3D PASSWORD SEMINAR
3D PASSWORD SEMINAR
 
CNS - Unit - 4 - Public Key Cryptosystem
CNS - Unit - 4 - Public Key Cryptosystem CNS - Unit - 4 - Public Key Cryptosystem
CNS - Unit - 4 - Public Key Cryptosystem
 
Rsa
RsaRsa
Rsa
 
Intruders
IntrudersIntruders
Intruders
 
Dasar – dasar metodologi latihan taktik
Dasar – dasar metodologi latihan taktikDasar – dasar metodologi latihan taktik
Dasar – dasar metodologi latihan taktik
 
Kerberos
KerberosKerberos
Kerberos
 
Cryptography full report
Cryptography full reportCryptography full report
Cryptography full report
 
Public private key
Public private keyPublic private key
Public private key
 
Data Encryption Standard
Data Encryption StandardData Encryption Standard
Data Encryption Standard
 
Introduction of cryptography and network security
Introduction of cryptography and network securityIntroduction of cryptography and network security
Introduction of cryptography and network security
 
Message AUthentication Code
Message AUthentication CodeMessage AUthentication Code
Message AUthentication Code
 
منهج الثقافة الصحية_جذرىجداجدا
منهج الثقافة الصحية_جذرىجداجدامنهج الثقافة الصحية_جذرىجداجدا
منهج الثقافة الصحية_جذرىجداجدا
 
Cryptography
CryptographyCryptography
Cryptography
 
Cryptography
CryptographyCryptography
Cryptography
 
Cryptography using rsa cryptosystem
Cryptography using rsa cryptosystemCryptography using rsa cryptosystem
Cryptography using rsa cryptosystem
 
Cryptography Intro
Cryptography IntroCryptography Intro
Cryptography Intro
 

Similar to Cryptography

Biometric Authentication Technology - Report
Biometric Authentication Technology - ReportBiometric Authentication Technology - Report
Biometric Authentication Technology - Report
Navin Kumar
 
Ijarcet vol-2-issue-7-2258-2261
Ijarcet vol-2-issue-7-2258-2261Ijarcet vol-2-issue-7-2258-2261
Ijarcet vol-2-issue-7-2258-2261
Editor IJARCET
 
Ijarcet vol-2-issue-7-2258-2261
Ijarcet vol-2-issue-7-2258-2261Ijarcet vol-2-issue-7-2258-2261
Ijarcet vol-2-issue-7-2258-2261
Editor IJARCET
 
Two-factor authentication- A sample writing _Zaman
Two-factor authentication- A sample writing _ZamanTwo-factor authentication- A sample writing _Zaman
Two-factor authentication- A sample writing _Zaman
Asad Zaman
 

Similar to Cryptography (20)

Cryptography
CryptographyCryptography
Cryptography
 
AV_CNS__Entity Authentication_CNS_EA.pptx
AV_CNS__Entity Authentication_CNS_EA.pptxAV_CNS__Entity Authentication_CNS_EA.pptx
AV_CNS__Entity Authentication_CNS_EA.pptx
 
IS - User Authentication
IS - User AuthenticationIS - User Authentication
IS - User Authentication
 
Unit 5
Unit 5Unit 5
Unit 5
 
Comparative analysis of authentication and authorization security in distribu...
Comparative analysis of authentication and authorization security in distribu...Comparative analysis of authentication and authorization security in distribu...
Comparative analysis of authentication and authorization security in distribu...
 
Enhancing a Dynamic user Authentication scheme over Brute Force and Dictionar...
Enhancing a Dynamic user Authentication scheme over Brute Force and Dictionar...Enhancing a Dynamic user Authentication scheme over Brute Force and Dictionar...
Enhancing a Dynamic user Authentication scheme over Brute Force and Dictionar...
 
Biometric Authentication Technology - Report
Biometric Authentication Technology - ReportBiometric Authentication Technology - Report
Biometric Authentication Technology - Report
 
Mutual Authentication For Wireless Communication
Mutual Authentication For Wireless CommunicationMutual Authentication For Wireless Communication
Mutual Authentication For Wireless Communication
 
B017230816
B017230816B017230816
B017230816
 
Cryptanalysis and Security Enhancement of a Khan et al.'s Scheme
Cryptanalysis and Security Enhancement of a Khan et al.'s SchemeCryptanalysis and Security Enhancement of a Khan et al.'s Scheme
Cryptanalysis and Security Enhancement of a Khan et al.'s Scheme
 
E commerce security
E commerce securityE commerce security
E commerce security
 
Empirical Study of a Key Authentication Scheme in Public Key Cryptography
Empirical Study of a Key Authentication Scheme in Public Key CryptographyEmpirical Study of a Key Authentication Scheme in Public Key Cryptography
Empirical Study of a Key Authentication Scheme in Public Key Cryptography
 
PRIVACY PRESERVING USER AUTHENTICATION SCHEME BASED ON SMART CARD
PRIVACY PRESERVING USER AUTHENTICATION SCHEME BASED ON SMART CARDPRIVACY PRESERVING USER AUTHENTICATION SCHEME BASED ON SMART CARD
PRIVACY PRESERVING USER AUTHENTICATION SCHEME BASED ON SMART CARD
 
Us20140380431 Patent: COMPUTER IMPLEMENTED METHOD TO PREVENT ATTACKS AGAINST...
Us20140380431 Patent: COMPUTER IMPLEMENTED METHOD TO  PREVENT ATTACKS AGAINST...Us20140380431 Patent: COMPUTER IMPLEMENTED METHOD TO  PREVENT ATTACKS AGAINST...
Us20140380431 Patent: COMPUTER IMPLEMENTED METHOD TO PREVENT ATTACKS AGAINST...
 
Biometricsppt
BiometricspptBiometricsppt
Biometricsppt
 
AN EFFICIENT IDENTITY BASED AUTHENTICATION PROTOCOL BY USING PASSWORD
AN EFFICIENT IDENTITY BASED AUTHENTICATION PROTOCOL BY USING PASSWORDAN EFFICIENT IDENTITY BASED AUTHENTICATION PROTOCOL BY USING PASSWORD
AN EFFICIENT IDENTITY BASED AUTHENTICATION PROTOCOL BY USING PASSWORD
 
Chapter 3 security principals
Chapter 3 security principalsChapter 3 security principals
Chapter 3 security principals
 
Ijarcet vol-2-issue-7-2258-2261
Ijarcet vol-2-issue-7-2258-2261Ijarcet vol-2-issue-7-2258-2261
Ijarcet vol-2-issue-7-2258-2261
 
Ijarcet vol-2-issue-7-2258-2261
Ijarcet vol-2-issue-7-2258-2261Ijarcet vol-2-issue-7-2258-2261
Ijarcet vol-2-issue-7-2258-2261
 
Two-factor authentication- A sample writing _Zaman
Two-factor authentication- A sample writing _ZamanTwo-factor authentication- A sample writing _Zaman
Two-factor authentication- A sample writing _Zaman
 

Recently uploaded

Recently uploaded (20)

Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
 
Making communications land - Are they received and understood as intended? we...
Making communications land - Are they received and understood as intended? we...Making communications land - Are they received and understood as intended? we...
Making communications land - Are they received and understood as intended? we...
 
SOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning PresentationSOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning Presentation
 
Graduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - EnglishGraduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - English
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.ppt
 
How to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptxHow to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptx
 
Google Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptxGoogle Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptx
 
ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.
 
Unit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxUnit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptx
 
How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17
 
General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...
 
How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17
 
How to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSHow to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POS
 
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
 
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
 
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdfUnit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdf
 
Towards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptxTowards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptx
 
Micro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfMicro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdf
 
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptxHMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
 
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
 

Cryptography

  • 2. Objectives • To distinguish between message authentication and entity authentication • To define witnesses used for identification • To discuss some methods of entity authentication using a password • To introduce some challenge-response protocols for entity authentication • To introduce some zero-knowledge protocols for entity authentication • To define biometrics and distinguish between physiological and behavioral techniques
  • 3. 14.3 INTRODUCTION Entity authentication is a technique designed to let one party prove the identity of another party. An entity can be a person, a process, a client, or a server. The entity whose identity needs to be proved is called the claimant; the party that tries to prove the identity of the claimant is called the verifier.
  • 4. There are two differences between message authentication (data-origin authentication). 1) Message authentication might not happen in real time; entity authentication does. 2) Message authentication simply authenticates one message; the process needs to be repeated for each new message. Entity authentication authenticates the claimant for the entire duration of a session. Data Origin Vs Entity Authentication
  • 5. Verification Categories Something known Something possessed Something inherent A secret known only by the claimant that can be checked by the verifier. Example Password. Something that can prove the claimant’s identity. Example Passport. An inherent characteristic of the claimant. Example conventional signature,fingerprint,voice etc.
  • 6. 14.6 This chapter discusses entity authentication. The next chapter discusses key managment. These two topics are very closely related., key management protocols use entity authentication protocols. Entity Authentication and Key Management
  • 7. PASSWORDS The simplest and oldest method of entity authentication is the password-based authentication, where the password is something that the claimant knows.A password is used when a user needs to access a system to use the system’s resources. A Fixed Password is a password that is used over and over again for every access. Fixed Password
  • 8. Fixed Password First Approach The System keeps a table that is sorted by user identification.The user sends her identification and password to the system.The system used the identification to find the password in the table Figure User ID and password file
  • 9. Second Approach To store the hash of the password. Any user can read the contents of the file, because the hash function is a one way function. Figure Hashing the password
  • 10. Third Approach This is called salting password, when the password string is created, a random string called the salt, is concatenated to the password, then it is hashed.The Id,the salt and the hash are stored in the file. Figure Salting the password
  • 11. 14.11 Fourth Approach In the fourth approach, two identification techniques are combined. A good example of this type of authentication is the use of an ATM card with a PIN (personal identification number).
  • 12. 14.12 One-Time Password First Approach In the first approach, the user and the system agree upon a list of passwords. Second Approach In the second approach, the user and the system agree to sequentially update the password. Third Approach In the third approach, the user and the system create a sequentially updated password using a hash function.
  • 14. CHALLENGE-RESPONSE In password authentication, the claimant proves her identity by demonstrating that she knows a secret, the password. In challenge-response authentication, the claimant proves that she knows a secret without sending it. Using a Symmetric-Key Cipher Using Keyed-Hash Functions Using an Asymmetric-Key Cipher Using Digital Signature Topics discussed in this section:
  • 15. 14.15 In challenge-response authentication, the claimant proves that she knows a secret without sending it to the verifier. Note The challenge is a time-varying value sent by the verifier; the response is the result of a function applied on the challenge. Note
  • 16. Using a Symmetric-Key Cipher First Approach The verifier sends a nonce, a random number used only once to challenge the claimant. A nonce must be time varying. Every time is created it is different. Figure Nonce challenge
  • 17. 14.17 Second Approach The time varying value is time stamp,The challenge message is the current time sent from the verifier to the claimant. Figure Timestamp challenge
  • 18. 14.18 Third Approach The first and second appraches are unidirectional authentication.But we need bidirectional Figure Bidirectional authentication
  • 19. Instead of using encryption/decryption for entity authentication, we can also use a keyed-hash function (MAC). Using Keyed-Hash Functions Figure Keyed-hash function
  • 20. 14.20 Using an Asymmetric-Key Cipher First Approach B encrypts the challenge using a’s public key.A decrypts the message with a’s private key. Figure Unidirectional, asymmetric-key authentication
  • 21. Second Approach Two public keys are used,one in each direction.A sends her identity and nonce encrypted with b’s public key. Figure Bidirectional, asymmetric-key
  • 22. Using Digital Signature First Approach B uses a plaintext challenge and A signs the response Figure Digital signature, unidirectional
  • 23. 14.23 Second Approach Figure Digital signature, bidirectional authentication
  • 24. ZERO-KNOWLEDGE In zero-knowledge authentication, the claimant does not reveal anything that might endanger the confidentiality of the secret. The claimant proves to the verifier that she knows a secret, without revealing it. The interactions are so designed that they cannot lead to revealing or guessing the secret. Fiat-Shamir Protocol Feige-Fiat-Shamir Protocol Guillou-Quisquater Protocol Topics discussed in this section:
  • 30. 14.30 BIOMETRICS Biometrics is the measurement of physiological or behavioral features that identify a person (authentication by something inherent). Biometrics measures features that cannot be guessed, stolen, or shared. Components Enrollment Authentication Techniques Accuracy Applications Topics discussed in this section:
  • 31. 14.31 Several components are needed for biometrics, including capturing devices, processors, and storage devices.. Components
  • 32. 14.32 Before using any biometric techniques for authentication, the corresponding feature of each person in the community should be available in the database. This is referred to as enrollment. Enrollment
  • 37. 14.37 Accuracy False Rejection Rate (FRR) False Acceptance Rate (FAR)
  • 38. 14.38 Several applications of biometrics are already in use. In commercial environments, these include access to facilities, access to information systems, transaction at point-ofsales, and employee timekeeping. In the law enforcement system, they include investigations (using fingerprints or DNA) and forensic analysis. Border control and immigration control also use some biometric techniques. Applications