authentication of people
play

Authentication of People what you know (passwords) what you have - PowerPoint PPT Presentation

people 1 Authentication of People what you know (passwords) what you have (keys) what you are (biometric devices) where you are (physical) October 26, 2000 people 2 Passwords initial password distribution (students)


  1. people 1 Authentication of People � what you know (passwords) � what you have (keys) � what you are (biometric devices) � where you are (physical) October 26, 2000

  2. people 2 Passwords � initial password distribution (students) � limit password guessing ➠ denial-of-service � make pronouncable, add punctuation, numbers � need 64 bits of secret: – 20 random digits – letters, digits, punctuation: 11 characters – pronounceable: 4 bits/character ➠ 16 characters – own password: 2 bits/character ➠ 32 characters October 26, 2000

  3. people 3 Trojan Horses � limit appearance (border, characters, interrupts) � show failed attempts at next successful login � prevent login by user programs October 26, 2000

  4. people 4 Initial Passwords � need to meet root � ATM PIN entry � pre-expired passwords � difficulty: can’t change passwords (locks, Windows’95) October 26, 2000

  5. people 5 Authenticating Tokens � magnetic cards, memory cards (European phone cards) � smart cards: challenge/response � cryptographic calculator: typing, display encrypted time October 26, 2000

  6. people 6 Biometrics – Accuracy False acceptance rate (FAR): The percentage of unauthorised persons accepted in error. False rejection rate (FRR): The percentage of authorised persons who are incorrectly denied acceptance. � one-try � three-try � remove “unstable” population � can adversary select impostors? � identical twins, family members vs. random impostor � fraud: with or without cooperation of Alice? October 26, 2000

  7. people 7 Fingerprints False rejection rate: 1 to 5 % (three tries). False acceptance rate: 0.01 - 0.0001 % (three tries). Vulnerability: Dummy fingers and dead fingers Ease of use: Easy to use, but “suspect” Suitable: Not for people with damaged fingerprints due to daily handling of rough material. Speed: 2 seconds Storage: 800–1203 bytes Stability: change for children October 26, 2000

  8. people 8 Hand Geometry False rejection rate: 0.2 % (one-try) False acceptance rate: 0.2 % (one-try) Vulnerability: difficult without cooperation Suitable: rheumatic hands Speed: < 3 seconds Storage: 9 bytes Stability: change for children, weight gain Use: Kennedy Airport October 26, 2000

  9. people 9 Retinal Scans retinal vascular pattern False rejection rate: 12.4 % (one-try), 0.4 % (three-try); False acceptance rate: 0 Vulnerability: None; false eyes, contact lenses and eye transplants Ease of use: difficult, socially unacceptable Suitable: everyone with eyes Speed: 1.5 seconds; Storage: 40 bytes Stability: very stable; changed by some diseases/injuries October 26, 2000

  10. people 10 Voice Recognition � single phrase ➠ tape recorder � changing phrases ➠ unreliable � background noise � colds � use with public phone October 26, 2000

  11. people 11 Signature � shape and dynamics � some signatures easily faked, some variable � signing surface properties October 26, 2000

  12. people 12 Other Biometrics � keystroke timing ➠ network? � hand veins � finger geometry � facial recognition ➠ perspective October 26, 2000

  13. people 13 Recognizing Machines Detect differences even if “output signal” is the same: � reflective multi-faceted surfaces (ICBMs); � magnetic particles on credit card; � RF spectrum for phones October 26, 2000

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend