SlideShare a Scribd company logo
Presented By:
 Introduction to Cryptography & Biometric Security

 Principle & Standards Of Biometrics

 Methods to secure a key using Biometrics

 Biometric Encryption

 User Based Cryptographic Keys & their Generation

 Similarities & Differences Between UserID and Biometric-based Keys

 Advantages & Threats to Biometric System

 Applications of Biometric Systems

 Conclusion
Encryption   Decryption
Cryptography is an important feature of computer security. It is dependent on
the secrecy of the secret or private key.

The user chooses an easily remembered pass code that is used to encrypt the
cryptographic key and this key is then stored in a database.

Security of the cryptographic key is weak due to practical problems of
remembering pass codes.

Since the pass code is not directly tied to a user, the system is unable to
differentiate between the legitimate user and the attacker.
“BIOS” ► life

                    “METRON”        measurement
Study of automated methods for uniquely recognizing humans based upon
one or more intrinsic physical or behavioral traits for authentication
purposes.

Measurable characteristics of the individual based on their physiological
features / behavioral patterns that can be used to recognize or verify their
identity.
“Everyone in the world is unique, and this uniqueness

                can be used for identity verification.”



Uniqueness : Distinction between individuals

Permanence : Resistance to ageing

Collectability : Ease to obtain a biometric for measurement.

Performance : Accuracy, speed, robustness of the biometric system.

Acceptability :Degree of approval of a technology.

Circumvention : Anomalies in the authentication system.
BIOMETRICS



BEHAVIORAL                            BEHAVIORAL
                   PHYSICAL           & PHYSICAL
ATTRIBUTES
                  ATTRIBUTES          ATTRIBUTES
 •Signature
              •Fingerprints             •Voice
•Keystrokes
              •Eye retinas & irises
              •Facial patterns
              •Hand measurement
              •Ear shape.
Fingerprints are unique to each individual and no two fingerprints are alike.
Fingerprint recognition is most widely accepted         biometrics among the
technology being used today.

Converts the image of a fingerprint into a mathematical template of the print's
minutiae points.

Fingerprints contains pattern of ridges and valleys as well as minutia points.

Scanners : Optical    scanners, Thermal scanners, Capacitances (solid state
scanner), Minutia based, Correlation based.
Creates a voiceprint based on the
inflection   points   of   your   speech,
emphasizing the highs and lows specific
to your way of talking.
An authenticam takes the pictures of
person’s iris. The image is analyzed and a
512 byte code is generated. The code is then
compared with the iris imprints in the
database    and    used     to     determine    the
individual’s authorisation level.

Discriminate      between        individuals   with
identical DNA like monozygotic twins.
A camera captures the image of the face.
 Face Recognition    Features and discrete areas are analyzed.


                     The system analyses the characteristic rhythm
Keystroke Dynamics   of a person's typing.


                     A picture of the hand is taken. Features like3D
  Hand Geometry      shape, length, width of fingers and shape of
                     knuckles are recorded.

    Signature        Users signature digital graphic tablet. The
   verification      system analyses speed, stroke order, stroke
                     count and pressure .
First one involves remote template matching and key storage. In this method
biometric image is captured and compared with a corresponding template. If
the user is verified, the key is released.



Drawback :
      The main problem here is use of an insecure storage media
Hide the cryptographic key within the enrollment template itself via a secret
bit-replacement algorithm. When the user is successfully authenticated, this
algorithm extracts the key bits from the appropriate locations and releases
the key.



Drawback:
      The key will be retrieved from the same location in a template
 each time a different user is authenticated
Using data derived directly from a biometric image is another method. In
this manner biometric templates are used as a cryptographic key.



Drawback:
     Sensitivities due to environmental and physiological factors, and
 compromising of the cryptographic keys stand as a big obstacle
A new and exciting technique is developed by Mytec Technologies Inc.
and named as Biometric Encryption™.



      During the enrollment phase, the process combines the biometric image
with a digital key to create a secure block of data known as BioScrypt™ and
then the key is retreived using the biometric during the verification phase.
It provides a mechanism for the linking and retrieval of a digital key using a
biometric. This biometric might be a 2D image such as fingerprint, palm
print, face, iris or retina.

The resulting digital key is then used as a cryptographic key.



   Note: The key is completely independent of the biometric data so that the
           use of the biometric is not forfeited if the key is ever compromised
           and can be easily modified or updated.
Cryptographic systems require a secret key or a random number which must
be tied to an individual through an identifier. This identifier indeed could be a
globally unique user id or biometric data.

Pseudorandom numbers are generated by a PRNG (pseudo random number
generator). The resulting pseudorandom number can be used directly as a
key or adjusted with user-dependent data (userID or biometric data).
User dependent key generation is done in two ways:

   First the key generation algorithm could be modified by using the user-
   dependent data.

   Second PRNG could be modified which is accomplished using a front-end or
   back-end approach. In front-end manner, the definition of the key is extended
   to   include   a   user-specific   data   component.   In   back-end   manner,
   pseudorandom numbers are treated as intermediate values and processed
   further.
Similar to image-type biometrics, human voice is a good biometric to

generate a cryptographic key.


For the goal of unpredictability, i.e. applying automatic speech recognition to

recognize the password spoken and then simply using the password, as a

cryptographic key is way. But it is not secure.
One solution is a user utters a password to his/her device and that

device would generate a key. Repeated utterance of the same password

by the same user would improve the security of the key after successful

matches with his/her previous recorded utterances.
Both of them are different for each user.

Both of them are non-secret data. It is clear to see that userID data is non-secret.
Similarly biometric data is insecure in some sense because there is no practical
way to prevent the capture of user biometric data outside the biometric system.
Biometric data is obtained or derived from the user whereas userID is
assigned to a user.

Except the accidents biometric data can not be changed. But userID can easily
be changed.

Set of userIDs may be dense and it is easy to enumerate the set. Unlikely, set of
biometric data is not dense and this makes it infeasible to enumerate the
biometric data for each user.
Biometrics directly authenticates the person, not indirectly through a
password or token.

Biometrics features are difficult to steal; thereby making biometrics
authentication very strong.

The Biometrics feature is eminently portable, and is unlikely to be lost.

Another advantage of biometrics authentication systems is user cannot share
or forget his retina or fingerprint, while a password and username are easily
forgotten.
Software

             Organizational

                                         Physical


    As with any IT security system, biometric-based security policy must
deal with the threats from the workers of the organization who can
damage any software or hardware component of the system. Attackers
may also change the statistical recognition parameters of the components
and decrease the recognition rates.
•   Attacks on the biometric sensor/Acquisition device
         Example: usage of artificial or disembodied dead features like a cut-off
    finger in the fingerprint case.


•   Communication channel attacks (man-in-the-middle attacks)
         The first type is just eavesdropping. If the channel between the sensor
    and the feature extraction unit or the one between the reference database and
    the matching unit is attacked, the attacker will gain information about the
    biometric data. In the second type, purposeful use or change is done to the
    intercepted data for subsequent introduction back into the system
•   Iris Recognition
         It is Relatively expensive; requires large amount of computer storage; may
    not be generally accepted by public.


•   Voice Verification
          Works well over the telephone but requires large amount of computer
    storage; people's voices can change; background noises can interfere.
PC access and internet security (Computer network security, Internet
transaction, Laptop security, Application level security)

Physical area security(military, government, banking, voting, prisons)

Employee record check

Mobile phones: network access & theft protection

Mobile financial transaction: Credit cards & ATM cards.
Reliable user authentication is highly significant in this web enabled world.
Consequences of an insecure authentication system can be catastrophic and
may include loss of information, denial of service and loss of data integrity.

Biometric Encryption™ and Bioscrypt™ are high security means of protecting
the critical data of government, police departments, army and big firms.

The current generation of biometric identification devices offer cost and
performance advantages over manual security procedures.

All these methods have shown that, using biometrics for identification or
verification-based security systems and cryptosystems, is a promising
technology
 www.ieeexplore.ieee.org

 www.cscjournals.org

 www.en.wikipedia.org

 C.Soutar, D.Roberge, A.Stoianov, R.Gilroy and B.V.K.V.Kumar,

    “Biometric Encryption™ using image processing”

 M. Peyravian, S. M. Matyas, A. Roginsky, N. Zunic, “Generating user-

    based Cryptographic keys and random numbers”
Biometric security using cryptography

More Related Content

What's hot

Message authentication
Message authenticationMessage authentication
Message authentication
CAS
 
Fingerprint Technology
Fingerprint TechnologyFingerprint Technology
Fingerprint Technology
Joy Dutta
 
cyber security and forensic tools
cyber security and forensic toolscyber security and forensic tools
cyber security and forensic toolsSonu Sunaliya
 
Bio-metrics Authentication Technique
Bio-metrics Authentication TechniqueBio-metrics Authentication Technique
Bio-metrics Authentication TechniqueRekha Yadav
 
Cryptography and network security Nit701
Cryptography and network security Nit701Cryptography and network security Nit701
Cryptography and network security Nit701
Amit Pathak
 
Email Forensics
Email ForensicsEmail Forensics
Email Forensics
primeteacher32
 
Fingerprint Based Biometric ATM Authentication System
Fingerprint Based Biometric ATM Authentication SystemFingerprint Based Biometric ATM Authentication System
Fingerprint Based Biometric ATM Authentication System
International Journal of Engineering Inventions www.ijeijournal.com
 
Biometric Security advantages and disadvantages
Biometric Security advantages and disadvantagesBiometric Security advantages and disadvantages
Biometric Security advantages and disadvantages
Prabh Jeet
 
Biometric technology
Biometric technologyBiometric technology
Biometric technology
Madugula Kumar
 
face recognition
face recognitionface recognition
face recognition
vipin varghese
 
Biometrics Technology In the 21st Century
Biometrics Technology In the 21st CenturyBiometrics Technology In the 21st Century
Biometrics Technology In the 21st Century
Star Link Communication Pvt Ltd
 
Biometric Signature Recognization
 Biometric Signature Recognization Biometric Signature Recognization
Biometric Signature Recognization
Faimin Khan
 
Face Recognition
Face RecognitionFace Recognition
Face Recognition
arvind carpenter
 
Digital Signature
Digital SignatureDigital Signature
Digital Signature
Mohamed Talaat
 
Biometric Systems and Security
Biometric Systems and SecurityBiometric Systems and Security
Biometric Systems and Security
Shreyans Jain
 
Information Security Principles - Access Control
Information Security  Principles -  Access ControlInformation Security  Principles -  Access Control
Information Security Principles - Access Control
idingolay
 
Seminar Presentation | Network Intrusion Detection using Supervised Machine L...
Seminar Presentation | Network Intrusion Detection using Supervised Machine L...Seminar Presentation | Network Intrusion Detection using Supervised Machine L...
Seminar Presentation | Network Intrusion Detection using Supervised Machine L...
Jowin John Chemban
 
Mobile forensics
Mobile forensicsMobile forensics
Mobile forensics
noorashams
 

What's hot (20)

Message authentication
Message authenticationMessage authentication
Message authentication
 
Fingerprint Technology
Fingerprint TechnologyFingerprint Technology
Fingerprint Technology
 
cyber security and forensic tools
cyber security and forensic toolscyber security and forensic tools
cyber security and forensic tools
 
Bio-metrics Authentication Technique
Bio-metrics Authentication TechniqueBio-metrics Authentication Technique
Bio-metrics Authentication Technique
 
Cryptography and network security Nit701
Cryptography and network security Nit701Cryptography and network security Nit701
Cryptography and network security Nit701
 
Email Forensics
Email ForensicsEmail Forensics
Email Forensics
 
Biometrics
BiometricsBiometrics
Biometrics
 
Fingerprint Based Biometric ATM Authentication System
Fingerprint Based Biometric ATM Authentication SystemFingerprint Based Biometric ATM Authentication System
Fingerprint Based Biometric ATM Authentication System
 
Biometric Security advantages and disadvantages
Biometric Security advantages and disadvantagesBiometric Security advantages and disadvantages
Biometric Security advantages and disadvantages
 
Biometrics
BiometricsBiometrics
Biometrics
 
Biometric technology
Biometric technologyBiometric technology
Biometric technology
 
face recognition
face recognitionface recognition
face recognition
 
Biometrics Technology In the 21st Century
Biometrics Technology In the 21st CenturyBiometrics Technology In the 21st Century
Biometrics Technology In the 21st Century
 
Biometric Signature Recognization
 Biometric Signature Recognization Biometric Signature Recognization
Biometric Signature Recognization
 
Face Recognition
Face RecognitionFace Recognition
Face Recognition
 
Digital Signature
Digital SignatureDigital Signature
Digital Signature
 
Biometric Systems and Security
Biometric Systems and SecurityBiometric Systems and Security
Biometric Systems and Security
 
Information Security Principles - Access Control
Information Security  Principles -  Access ControlInformation Security  Principles -  Access Control
Information Security Principles - Access Control
 
Seminar Presentation | Network Intrusion Detection using Supervised Machine L...
Seminar Presentation | Network Intrusion Detection using Supervised Machine L...Seminar Presentation | Network Intrusion Detection using Supervised Machine L...
Seminar Presentation | Network Intrusion Detection using Supervised Machine L...
 
Mobile forensics
Mobile forensicsMobile forensics
Mobile forensics
 

Similar to Biometric security using cryptography

Biometric encryption
Biometric encryptionBiometric encryption
Biometric encryption
Deepák Soni
 
Ranjith_Bm
Ranjith_BmRanjith_Bm
Ranjith_Bm
branjith
 
Biometrics security
Biometrics securityBiometrics security
Biometrics security
Vuda Sreenivasarao
 
13 biometrics - fool proof security
13 biometrics  - fool proof security13 biometrics  - fool proof security
13 biometrics - fool proof securitySrikanth457
 
Bio Metrics
Bio MetricsBio Metrics
Bio Metrics
nayakslideshare
 
BSI Biometrics Standards Presentation
BSI Biometrics Standards PresentationBSI Biometrics Standards Presentation
BSI Biometrics Standards Presentation
BSI British Standards Institution
 
Biometrics/fingerprint sensors
Biometrics/fingerprint sensorsBiometrics/fingerprint sensors
Biometrics/fingerprint sensors
Jeffrey Funk
 
Fingerprint Authentication Using Biometric And Aadhar Card Fingerprint
Fingerprint Authentication Using Biometric And Aadhar Card FingerprintFingerprint Authentication Using Biometric And Aadhar Card Fingerprint
Fingerprint Authentication Using Biometric And Aadhar Card Fingerprint
SonuSawant
 
Fingerprint detection
Fingerprint detectionFingerprint detection
Fingerprint detection
Mudit Mishra
 
Biometric authentication
Biometric authenticationBiometric authentication
Biometric authentication
Abduhalim Beknazarov
 
IRJET - Human Identification using Major and Minor Finger Knuckle Pattern
IRJET -  	  Human Identification using Major and Minor Finger Knuckle PatternIRJET -  	  Human Identification using Major and Minor Finger Knuckle Pattern
IRJET - Human Identification using Major and Minor Finger Knuckle Pattern
IRJET Journal
 
IRJET- Human Identification using Major and Minor Finger Knuckle Pattern
IRJET- Human Identification using Major and Minor Finger Knuckle PatternIRJET- Human Identification using Major and Minor Finger Knuckle Pattern
IRJET- Human Identification using Major and Minor Finger Knuckle Pattern
IRJET Journal
 
Feature Level Fusion of Multibiometric Cryptosystem in Distributed System
Feature Level Fusion of Multibiometric Cryptosystem in Distributed SystemFeature Level Fusion of Multibiometric Cryptosystem in Distributed System
Feature Level Fusion of Multibiometric Cryptosystem in Distributed System
IJMER
 
BIOMETRICS AUTHENTICATION TECHNIQUE FOR INTRUSION DETECTION SYSTEMS USING FIN...
BIOMETRICS AUTHENTICATION TECHNIQUE FOR INTRUSION DETECTION SYSTEMS USING FIN...BIOMETRICS AUTHENTICATION TECHNIQUE FOR INTRUSION DETECTION SYSTEMS USING FIN...
BIOMETRICS AUTHENTICATION TECHNIQUE FOR INTRUSION DETECTION SYSTEMS USING FIN...
IJCSEIT Journal
 
Security Issues Related to Biometrics
Security Issues Related to BiometricsSecurity Issues Related to Biometrics
Security Issues Related to Biometrics
YogeshIJTSRD
 
Biometrics
BiometricsBiometrics
Biometrics
Mufaddal AunAli
 

Similar to Biometric security using cryptography (20)

Biometrics
BiometricsBiometrics
Biometrics
 
Biometric encryption
Biometric encryptionBiometric encryption
Biometric encryption
 
Biometrics poster
Biometrics posterBiometrics poster
Biometrics poster
 
Ranjith_Bm
Ranjith_BmRanjith_Bm
Ranjith_Bm
 
Biometrics security
Biometrics securityBiometrics security
Biometrics security
 
13 biometrics - fool proof security
13 biometrics  - fool proof security13 biometrics  - fool proof security
13 biometrics - fool proof security
 
Biometrics
BiometricsBiometrics
Biometrics
 
Bio Metrics
Bio MetricsBio Metrics
Bio Metrics
 
BSI Biometrics Standards Presentation
BSI Biometrics Standards PresentationBSI Biometrics Standards Presentation
BSI Biometrics Standards Presentation
 
Biometrics/fingerprint sensors
Biometrics/fingerprint sensorsBiometrics/fingerprint sensors
Biometrics/fingerprint sensors
 
Fingerprint Authentication Using Biometric And Aadhar Card Fingerprint
Fingerprint Authentication Using Biometric And Aadhar Card FingerprintFingerprint Authentication Using Biometric And Aadhar Card Fingerprint
Fingerprint Authentication Using Biometric And Aadhar Card Fingerprint
 
Fingerprint detection
Fingerprint detectionFingerprint detection
Fingerprint detection
 
Biometric authentication
Biometric authenticationBiometric authentication
Biometric authentication
 
IRJET - Human Identification using Major and Minor Finger Knuckle Pattern
IRJET -  	  Human Identification using Major and Minor Finger Knuckle PatternIRJET -  	  Human Identification using Major and Minor Finger Knuckle Pattern
IRJET - Human Identification using Major and Minor Finger Knuckle Pattern
 
IRJET- Human Identification using Major and Minor Finger Knuckle Pattern
IRJET- Human Identification using Major and Minor Finger Knuckle PatternIRJET- Human Identification using Major and Minor Finger Knuckle Pattern
IRJET- Human Identification using Major and Minor Finger Knuckle Pattern
 
Feature Level Fusion of Multibiometric Cryptosystem in Distributed System
Feature Level Fusion of Multibiometric Cryptosystem in Distributed SystemFeature Level Fusion of Multibiometric Cryptosystem in Distributed System
Feature Level Fusion of Multibiometric Cryptosystem in Distributed System
 
BIOMETRICS AUTHENTICATION TECHNIQUE FOR INTRUSION DETECTION SYSTEMS USING FIN...
BIOMETRICS AUTHENTICATION TECHNIQUE FOR INTRUSION DETECTION SYSTEMS USING FIN...BIOMETRICS AUTHENTICATION TECHNIQUE FOR INTRUSION DETECTION SYSTEMS USING FIN...
BIOMETRICS AUTHENTICATION TECHNIQUE FOR INTRUSION DETECTION SYSTEMS USING FIN...
 
Security Issues Related to Biometrics
Security Issues Related to BiometricsSecurity Issues Related to Biometrics
Security Issues Related to Biometrics
 
Biometrics
BiometricsBiometrics
Biometrics
 
Biometrics
BiometricsBiometrics
Biometrics
 

More from Sampat Patnaik

Infosys - The Ethical Perspective
Infosys - The Ethical PerspectiveInfosys - The Ethical Perspective
Infosys - The Ethical PerspectiveSampat Patnaik
 
Basics Of Social Media
Basics Of Social MediaBasics Of Social Media
Basics Of Social MediaSampat Patnaik
 
The TATA Group & Ratan Tata
The TATA Group & Ratan TataThe TATA Group & Ratan Tata
The TATA Group & Ratan TataSampat Patnaik
 
Collaborative Planning Forecasting & Replenishment
Collaborative Planning Forecasting & ReplenishmentCollaborative Planning Forecasting & Replenishment
Collaborative Planning Forecasting & ReplenishmentSampat Patnaik
 
Hydrogen car development process
Hydrogen car development processHydrogen car development process
Hydrogen car development processSampat Patnaik
 

More from Sampat Patnaik (8)

Infosys - The Ethical Perspective
Infosys - The Ethical PerspectiveInfosys - The Ethical Perspective
Infosys - The Ethical Perspective
 
Basics Of Social Media
Basics Of Social MediaBasics Of Social Media
Basics Of Social Media
 
The TATA Group & Ratan Tata
The TATA Group & Ratan TataThe TATA Group & Ratan Tata
The TATA Group & Ratan Tata
 
Tata Nano - My Take
Tata Nano - My TakeTata Nano - My Take
Tata Nano - My Take
 
Collaborative Planning Forecasting & Replenishment
Collaborative Planning Forecasting & ReplenishmentCollaborative Planning Forecasting & Replenishment
Collaborative Planning Forecasting & Replenishment
 
Coca Cola vs Pepsi
Coca Cola vs PepsiCoca Cola vs Pepsi
Coca Cola vs Pepsi
 
Pharma Patenting
Pharma PatentingPharma Patenting
Pharma Patenting
 
Hydrogen car development process
Hydrogen car development processHydrogen car development process
Hydrogen car development process
 

Recently uploaded

GIÁO ÁN DẠY THÊM (KẾ HOẠCH BÀI BUỔI 2) - TIẾNG ANH 8 GLOBAL SUCCESS (2 CỘT) N...
GIÁO ÁN DẠY THÊM (KẾ HOẠCH BÀI BUỔI 2) - TIẾNG ANH 8 GLOBAL SUCCESS (2 CỘT) N...GIÁO ÁN DẠY THÊM (KẾ HOẠCH BÀI BUỔI 2) - TIẾNG ANH 8 GLOBAL SUCCESS (2 CỘT) N...
GIÁO ÁN DẠY THÊM (KẾ HOẠCH BÀI BUỔI 2) - TIẾNG ANH 8 GLOBAL SUCCESS (2 CỘT) N...
Nguyen Thanh Tu Collection
 
How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...
Jisc
 
Model Attribute Check Company Auto Property
Model Attribute  Check Company Auto PropertyModel Attribute  Check Company Auto Property
Model Attribute Check Company Auto Property
Celine George
 
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXXPhrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
MIRIAMSALINAS13
 
Polish students' mobility in the Czech Republic
Polish students' mobility in the Czech RepublicPolish students' mobility in the Czech Republic
Polish students' mobility in the Czech Republic
Anna Sz.
 
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup   New Member Orientation and Q&A (May 2024).pdfWelcome to TechSoup   New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
TechSoup
 
How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17
Celine George
 
Overview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with MechanismOverview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with Mechanism
DeeptiGupta154
 
The Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official PublicationThe Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official Publication
Delapenabediema
 
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCECLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
BhavyaRajput3
 
1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx
JosvitaDsouza2
 
The French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free downloadThe French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free download
Vivekanand Anglo Vedic Academy
 
Fish and Chips - have they had their chips
Fish and Chips - have they had their chipsFish and Chips - have they had their chips
Fish and Chips - have they had their chips
GeoBlogs
 
Digital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and ResearchDigital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and Research
Vikramjit Singh
 
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
siemaillard
 
How to Create Map Views in the Odoo 17 ERP
How to Create Map Views in the Odoo 17 ERPHow to Create Map Views in the Odoo 17 ERP
How to Create Map Views in the Odoo 17 ERP
Celine George
 
Cambridge International AS A Level Biology Coursebook - EBook (MaryFosbery J...
Cambridge International AS  A Level Biology Coursebook - EBook (MaryFosbery J...Cambridge International AS  A Level Biology Coursebook - EBook (MaryFosbery J...
Cambridge International AS A Level Biology Coursebook - EBook (MaryFosbery J...
AzmatAli747758
 
Template Jadual Bertugas Kelas (Boleh Edit)
Template Jadual Bertugas Kelas (Boleh Edit)Template Jadual Bertugas Kelas (Boleh Edit)
Template Jadual Bertugas Kelas (Boleh Edit)
rosedainty
 
PART A. Introduction to Costumer Service
PART A. Introduction to Costumer ServicePART A. Introduction to Costumer Service
PART A. Introduction to Costumer Service
PedroFerreira53928
 
MARUTI SUZUKI- A Successful Joint Venture in India.pptx
MARUTI SUZUKI- A Successful Joint Venture in India.pptxMARUTI SUZUKI- A Successful Joint Venture in India.pptx
MARUTI SUZUKI- A Successful Joint Venture in India.pptx
bennyroshan06
 

Recently uploaded (20)

GIÁO ÁN DẠY THÊM (KẾ HOẠCH BÀI BUỔI 2) - TIẾNG ANH 8 GLOBAL SUCCESS (2 CỘT) N...
GIÁO ÁN DẠY THÊM (KẾ HOẠCH BÀI BUỔI 2) - TIẾNG ANH 8 GLOBAL SUCCESS (2 CỘT) N...GIÁO ÁN DẠY THÊM (KẾ HOẠCH BÀI BUỔI 2) - TIẾNG ANH 8 GLOBAL SUCCESS (2 CỘT) N...
GIÁO ÁN DẠY THÊM (KẾ HOẠCH BÀI BUỔI 2) - TIẾNG ANH 8 GLOBAL SUCCESS (2 CỘT) N...
 
How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...
 
Model Attribute Check Company Auto Property
Model Attribute  Check Company Auto PropertyModel Attribute  Check Company Auto Property
Model Attribute Check Company Auto Property
 
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXXPhrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
 
Polish students' mobility in the Czech Republic
Polish students' mobility in the Czech RepublicPolish students' mobility in the Czech Republic
Polish students' mobility in the Czech Republic
 
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup   New Member Orientation and Q&A (May 2024).pdfWelcome to TechSoup   New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
 
How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17
 
Overview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with MechanismOverview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with Mechanism
 
The Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official PublicationThe Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official Publication
 
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCECLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
 
1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx
 
The French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free downloadThe French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free download
 
Fish and Chips - have they had their chips
Fish and Chips - have they had their chipsFish and Chips - have they had their chips
Fish and Chips - have they had their chips
 
Digital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and ResearchDigital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and Research
 
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
 
How to Create Map Views in the Odoo 17 ERP
How to Create Map Views in the Odoo 17 ERPHow to Create Map Views in the Odoo 17 ERP
How to Create Map Views in the Odoo 17 ERP
 
Cambridge International AS A Level Biology Coursebook - EBook (MaryFosbery J...
Cambridge International AS  A Level Biology Coursebook - EBook (MaryFosbery J...Cambridge International AS  A Level Biology Coursebook - EBook (MaryFosbery J...
Cambridge International AS A Level Biology Coursebook - EBook (MaryFosbery J...
 
Template Jadual Bertugas Kelas (Boleh Edit)
Template Jadual Bertugas Kelas (Boleh Edit)Template Jadual Bertugas Kelas (Boleh Edit)
Template Jadual Bertugas Kelas (Boleh Edit)
 
PART A. Introduction to Costumer Service
PART A. Introduction to Costumer ServicePART A. Introduction to Costumer Service
PART A. Introduction to Costumer Service
 
MARUTI SUZUKI- A Successful Joint Venture in India.pptx
MARUTI SUZUKI- A Successful Joint Venture in India.pptxMARUTI SUZUKI- A Successful Joint Venture in India.pptx
MARUTI SUZUKI- A Successful Joint Venture in India.pptx
 

Biometric security using cryptography

  • 2.  Introduction to Cryptography & Biometric Security  Principle & Standards Of Biometrics  Methods to secure a key using Biometrics  Biometric Encryption  User Based Cryptographic Keys & their Generation  Similarities & Differences Between UserID and Biometric-based Keys  Advantages & Threats to Biometric System  Applications of Biometric Systems  Conclusion
  • 3. Encryption Decryption
  • 4. Cryptography is an important feature of computer security. It is dependent on the secrecy of the secret or private key. The user chooses an easily remembered pass code that is used to encrypt the cryptographic key and this key is then stored in a database. Security of the cryptographic key is weak due to practical problems of remembering pass codes. Since the pass code is not directly tied to a user, the system is unable to differentiate between the legitimate user and the attacker.
  • 5. “BIOS” ► life “METRON” measurement Study of automated methods for uniquely recognizing humans based upon one or more intrinsic physical or behavioral traits for authentication purposes. Measurable characteristics of the individual based on their physiological features / behavioral patterns that can be used to recognize or verify their identity.
  • 6. “Everyone in the world is unique, and this uniqueness can be used for identity verification.” Uniqueness : Distinction between individuals Permanence : Resistance to ageing Collectability : Ease to obtain a biometric for measurement. Performance : Accuracy, speed, robustness of the biometric system. Acceptability :Degree of approval of a technology. Circumvention : Anomalies in the authentication system.
  • 7. BIOMETRICS BEHAVIORAL BEHAVIORAL PHYSICAL & PHYSICAL ATTRIBUTES ATTRIBUTES ATTRIBUTES •Signature •Fingerprints •Voice •Keystrokes •Eye retinas & irises •Facial patterns •Hand measurement •Ear shape.
  • 8.
  • 9. Fingerprints are unique to each individual and no two fingerprints are alike. Fingerprint recognition is most widely accepted biometrics among the technology being used today. Converts the image of a fingerprint into a mathematical template of the print's minutiae points. Fingerprints contains pattern of ridges and valleys as well as minutia points. Scanners : Optical scanners, Thermal scanners, Capacitances (solid state scanner), Minutia based, Correlation based.
  • 10. Creates a voiceprint based on the inflection points of your speech, emphasizing the highs and lows specific to your way of talking.
  • 11. An authenticam takes the pictures of person’s iris. The image is analyzed and a 512 byte code is generated. The code is then compared with the iris imprints in the database and used to determine the individual’s authorisation level. Discriminate between individuals with identical DNA like monozygotic twins.
  • 12. A camera captures the image of the face. Face Recognition Features and discrete areas are analyzed. The system analyses the characteristic rhythm Keystroke Dynamics of a person's typing. A picture of the hand is taken. Features like3D Hand Geometry shape, length, width of fingers and shape of knuckles are recorded. Signature Users signature digital graphic tablet. The verification system analyses speed, stroke order, stroke count and pressure .
  • 13. First one involves remote template matching and key storage. In this method biometric image is captured and compared with a corresponding template. If the user is verified, the key is released. Drawback : The main problem here is use of an insecure storage media
  • 14. Hide the cryptographic key within the enrollment template itself via a secret bit-replacement algorithm. When the user is successfully authenticated, this algorithm extracts the key bits from the appropriate locations and releases the key. Drawback: The key will be retrieved from the same location in a template each time a different user is authenticated
  • 15. Using data derived directly from a biometric image is another method. In this manner biometric templates are used as a cryptographic key. Drawback: Sensitivities due to environmental and physiological factors, and compromising of the cryptographic keys stand as a big obstacle
  • 16. A new and exciting technique is developed by Mytec Technologies Inc. and named as Biometric Encryption™. During the enrollment phase, the process combines the biometric image with a digital key to create a secure block of data known as BioScrypt™ and then the key is retreived using the biometric during the verification phase.
  • 17. It provides a mechanism for the linking and retrieval of a digital key using a biometric. This biometric might be a 2D image such as fingerprint, palm print, face, iris or retina. The resulting digital key is then used as a cryptographic key. Note: The key is completely independent of the biometric data so that the use of the biometric is not forfeited if the key is ever compromised and can be easily modified or updated.
  • 18. Cryptographic systems require a secret key or a random number which must be tied to an individual through an identifier. This identifier indeed could be a globally unique user id or biometric data. Pseudorandom numbers are generated by a PRNG (pseudo random number generator). The resulting pseudorandom number can be used directly as a key or adjusted with user-dependent data (userID or biometric data).
  • 19. User dependent key generation is done in two ways: First the key generation algorithm could be modified by using the user- dependent data. Second PRNG could be modified which is accomplished using a front-end or back-end approach. In front-end manner, the definition of the key is extended to include a user-specific data component. In back-end manner, pseudorandom numbers are treated as intermediate values and processed further.
  • 20. Similar to image-type biometrics, human voice is a good biometric to generate a cryptographic key. For the goal of unpredictability, i.e. applying automatic speech recognition to recognize the password spoken and then simply using the password, as a cryptographic key is way. But it is not secure.
  • 21. One solution is a user utters a password to his/her device and that device would generate a key. Repeated utterance of the same password by the same user would improve the security of the key after successful matches with his/her previous recorded utterances.
  • 22. Both of them are different for each user. Both of them are non-secret data. It is clear to see that userID data is non-secret. Similarly biometric data is insecure in some sense because there is no practical way to prevent the capture of user biometric data outside the biometric system.
  • 23. Biometric data is obtained or derived from the user whereas userID is assigned to a user. Except the accidents biometric data can not be changed. But userID can easily be changed. Set of userIDs may be dense and it is easy to enumerate the set. Unlikely, set of biometric data is not dense and this makes it infeasible to enumerate the biometric data for each user.
  • 24. Biometrics directly authenticates the person, not indirectly through a password or token. Biometrics features are difficult to steal; thereby making biometrics authentication very strong. The Biometrics feature is eminently portable, and is unlikely to be lost. Another advantage of biometrics authentication systems is user cannot share or forget his retina or fingerprint, while a password and username are easily forgotten.
  • 25. Software Organizational Physical As with any IT security system, biometric-based security policy must deal with the threats from the workers of the organization who can damage any software or hardware component of the system. Attackers may also change the statistical recognition parameters of the components and decrease the recognition rates.
  • 26. Attacks on the biometric sensor/Acquisition device Example: usage of artificial or disembodied dead features like a cut-off finger in the fingerprint case. • Communication channel attacks (man-in-the-middle attacks) The first type is just eavesdropping. If the channel between the sensor and the feature extraction unit or the one between the reference database and the matching unit is attacked, the attacker will gain information about the biometric data. In the second type, purposeful use or change is done to the intercepted data for subsequent introduction back into the system
  • 27. Iris Recognition It is Relatively expensive; requires large amount of computer storage; may not be generally accepted by public. • Voice Verification Works well over the telephone but requires large amount of computer storage; people's voices can change; background noises can interfere.
  • 28. PC access and internet security (Computer network security, Internet transaction, Laptop security, Application level security) Physical area security(military, government, banking, voting, prisons) Employee record check Mobile phones: network access & theft protection Mobile financial transaction: Credit cards & ATM cards.
  • 29. Reliable user authentication is highly significant in this web enabled world. Consequences of an insecure authentication system can be catastrophic and may include loss of information, denial of service and loss of data integrity. Biometric Encryption™ and Bioscrypt™ are high security means of protecting the critical data of government, police departments, army and big firms. The current generation of biometric identification devices offer cost and performance advantages over manual security procedures. All these methods have shown that, using biometrics for identification or verification-based security systems and cryptosystems, is a promising technology
  • 30.  www.ieeexplore.ieee.org  www.cscjournals.org  www.en.wikipedia.org  C.Soutar, D.Roberge, A.Stoianov, R.Gilroy and B.V.K.V.Kumar, “Biometric Encryption™ using image processing”  M. Peyravian, S. M. Matyas, A. Roginsky, N. Zunic, “Generating user- based Cryptographic keys and random numbers”