CS 166: Information Security
- Prof. Tom Austin
Authentication: Beyond Passwords Prof. Tom Austin San Jos State - - PowerPoint PPT Presentation
CS 166: Information Security Authentication: Beyond Passwords Prof. Tom Austin San Jos State University Biometrics Something You Are Biometric You are your key Schneier Examples Fingerprint Are Handwritten
Are Know Have
Loop (double) Whorl Arch
q A popular biometric q Measures shape of hand
q Human hands not unique q Hand geometry sufficient for
q OK for authentication q Not useful for ID problem
distance
distance Fraud rate
== equal error rate Distance between the same eye, measured twice
Distance between 2 different eyes
Famous picture of a girl in Afghanistan from National Geographic.
– http://news.bbc.co.uk/2/hi/south_asia/1870382.stm
Alice Bob, K 1.
2.
5.
3.
4.
password generator
K