distributed systems
play

Distributed Systems On-computer keychain file Need there be more? - PDF document

Carrying certificates around How do you use your [digital] identity? Install your certificate in browser Distributed Systems On-computer keychain file Need there be more? Smart Cards, Biometrics, & CAPTCHA Paul Krzyzanowski


  1. Carrying certificates around How do you use your [digital] identity? – Install your certificate in browser Distributed Systems – On-computer keychain file Need there be more? Smart Cards, Biometrics, & CAPTCHA Paul Krzyzanowski pxk@cs.rutgers.edu Except as otherwise noted, the content of this presentation is licensed under the Creative Commons Attribution 2.5 License. Page 1 Page 1 Page 2 Smart cards Smart cards • Smart card Capabilities – Portable device – Memory cards • credit card, , key fob, button with IC on it • Magnetic stripe: stores 125 bytes • Communication • Smart cards typically store 32-64 KB – Contact-based • Optional security for data access – Contactless – Microcontroller cards • Near Field Communication (NFC) • OS + programs + cryptographic hardware + memory • Communication within a few inches of reader • May draw power from reader’s EMF signal • 106-424 kbps – Hybrid: contact and contactless Page 3 Page 4 Smart card advantages Smart card applications • Security • Stored-value cards (electronic purses) – Developed for small-value transactions – on-board encryption, hashing, signing – Mid 1990s in Europe and Asia – data can be securely transferred • GSM phone SIM card – Store biometric data & verify against user – key store • Credit/Debit – Stored account numbers, one-time numbers • store public keys (your certificates) – EMV System (Europay, MasterCard, VISA) • do not divulge private keys • perform digital signatures on card • Passports • Convenience – Encoded biometric information, account numbers – more data can be carried on the card • Toll collection & telephone cards • Personalization – Account number (EZ-Pass) or stored value (mass transit) – e.g. GSM phone card • Cryptographic smart cards – Authentication: pin-protected signing with private key Page 5 Page 6 1

  2. Example: Passport Example: Octopus • Contactless communication • Stored value card - contactless • Stores: – Provision for automatic replenishment – Descriptive data – Asynchronous transaction recording to banks – Digitized facial image – Two-way authentication based on public keys – Fingerprints, iris scan, etc. optional – Certificate of document signer & personal • All communications is encrypted public key • Widely used in Hong Kong & Shenzen • Basic Access Control (BAC) – Buses, stores, supermarkets, fast food, parking – Negotiate session key using: passport #, date of birth, expiration date – Logs $10.8 million per day on more than 50,000 – This data is read optically – so you need physical access readers – Generates 3DESS “document basic access keys” • Available in: • Fixed for life – German proposal to use Diffie-Hellman key negotiation – Cards, fobs, watches, toys Page 7 Page 8 Biometrics • Statistical pattern recognition – Thresholds • Each biometric system has a characteristic ROC plot – (receiver operator curve, a legacy from radio electronics) Biometric authentication (false non-match) secure false rejects trade-off convenient false accepts (false match) Page 9 Page 9 Page 10 Biometrics: forms Biometrics: forms • Iris Fingerprints – Analyze pattern of spokes: excellent uniqueness, – identify minutia signal can be normalized for fast matching • Retina scan – Excellent uniqueness but not popular for non-criminals • Fingerprint – Reasonable uniqueness • Hand geometry – Low guarantee of uniqueness: generally need 1:1 match • Signature, Voice – Behavioral vs. physical system – Can change with demeanor, tend to have low recognition rates • Facial geometry source: http://anil299.tripod.com/vol_002_no_001/papers/paper005.html Page 11 Page 12 2

  3. Biometrics: desirable characteristics Biometrics: desirable characteristics • Robustness – Repeatable, not subject to large changes over time Biometric Robustness Distinctiveness Fingerprints & iris patterns are more robust than voice Fingerprint Moderate High Hand Geometry Moderate Low • Distinctiveness Voice Moderate Low – Differences in the pattern among population Iris High High Fingerprints: typically 40-60 distinct features Signature Low Moderate Irises: typically >250 distinct features Hand geometry: ~1 in 100 people may have a hand with measurements close to yours. Page 13 Page 14 Irises vs. Fingerprints Irises vs. Fingerprints • Number of features measured: • False accept rates – High-end fingerprint systems: ~40-60 features – Fingerprints: ~ 1:100,000 (varies by vendor) – Iris systems: ~240 features – Irises: ~ 1:1.2 million • Ease of data capture • Ease of searching – More difficult to damage an iris – Fingerprints cannot be normalized 1:many searches are difficult – Feature capture more difficult for fingerprints: – Irises can be normalized to generate a unique • Smudges, gloves, dryness, … IrisCode 1:many searches much faster Page 15 Page 16 Biometrics: desirable characteristics Identification vs. Verification • Cooperative systems (multi-factor) • Identification: Who is this? – User provides identity, such as name and/or PIN – 1:many search • Non-cooperative • Verification: Is this X? – Users cannot be relied on to identify themselves – Present a name, PIN, token – Need to search large portion of database – 1:1 (or 1:small #) search • Overt vs. covert identification • Habituated vs. non-habituated – Do users regularly use (train) the system Page 17 Page 18 3

  4. Biometric: authentication process Biometric: authentication process 1. Sensing 3. Pattern matching – User’s characteristic must be presented to a – Sample compared to original signal in database sensor – Closely matched patterns have “small distances” – Output is a function of: between them • Biometric measure – Distances will hardly ever be 0 (perfect match) • The way it is presented • Technical characteristics of sensor 4. Decisions 2. Signal Processing – Decide if the match is close enough – Feature extraction – Trade-off: – Extract the desired biometric pattern false non-matches leads to false matches • remove noise and signal losses • discard qualities that are not distinctive/repeatable • Determine if feature is of “good quality” Page 19 Page 20 Biometric: authentication process 0. Enrollment – The user’s entry in a database of biometric signals must be populated. – Initial sensing + feature extraction. Detecting Humanness – May be repeated to ensure good feature extraction Page 21 Page 22 Page 22 Gestalt Psychology (1922-1923) Gestalt Psychology • Max Wertheimer, Kurt Koffka • Laws of organization – Proximity • We tend to group things together that are close together in space – Similarity • We tend to group things together that are similar – Good Continuation • We tend to perceive things in good form – Closure • We tend to make our experience as complete as possible – Figure and Ground • We tend to organize our perceptions by distinguishing between a figure and a background 18 x 22 pixels Source: http://www.webrenovators.com/psych/GestaltPsychology.htm Page 23 Page 24 4

  5. Gestalt Psychology Gestalt Psychology HELLO Page 25 Page 26 Authenticating humanness CAPTCHA • Battle the Bots – Create a test that is easy for humans but extremely difficult for computers • CAPTCHA – C ompletely A utomated P ublic T uring test to tell C omputers and H umans A part – Image Degradation • Exploit our limits in OCR technology • Leverages human Gestalt psychology: reconstruction – 2000: Yahoo! and Manuel Blum & team at CMU Hotmail • EZ-Gimpy : one of 850 words – Henry Baird @ CMU & Monica Chew at UCB • BaffleText : generates a few words + random non-English Yahoo words See captchas.net Source: http://www.sciam.com/print_version.cfm?articleID=00053EA7-B6E8-1F80-B57583414B7F0103 http://tinyurl.com/dg2zf Page 27 Page 28 The end. Page 29 Page 29 5

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend