secure authentication using biometric data
Post on 18-Feb-2016
31 Views
Preview:
DESCRIPTION
TRANSCRIPT
Secure Secure Authentication Authentication
Using Biometric Using Biometric Data Data Andrew AckermanAndrew Ackerman
Professor OstrovskyProfessor Ostrovsky
BackgroundBackground Secure Authentication Using Secure Authentication Using
Biometric DataBiometric Data By Xavier Boyen, Yevgeniy Dodis, By Xavier Boyen, Yevgeniy Dodis,
Jonathan Katz, Rafail Ostrovsky, Adam Jonathan Katz, Rafail Ostrovsky, Adam SmithSmith
Trying to implement designTrying to implement design Interested in CryptographyInterested in Cryptography
The PlanThe Plan Using Biometric Data in a Using Biometric Data in a
Cryptographic protocolCryptographic protocol Using FingerprintsUsing Fingerprints
GoalGoal Use fingerprint reader to read in dataUse fingerprint reader to read in data Use algorithm to overcome Use algorithm to overcome
“randomness”“randomness” Use readout as secret in a cryptographic Use readout as secret in a cryptographic
protocolprotocol
Possible End StatesPossible End States Low Knowledge of FingerprintsLow Knowledge of Fingerprints
Assumptions made by paper might not fitAssumptions made by paper might not fit Possible end GoalsPossible end Goals
Build the system and test itBuild the system and test it If fingerprints aren’t hamming distance, try If fingerprints aren’t hamming distance, try
to come up with algorithm to make them soto come up with algorithm to make them so Come up with new way of analyzing Come up with new way of analyzing
fingerprintsfingerprints Modify the protocol in paper to work with Modify the protocol in paper to work with
fingerprint distribution (if not hamming).fingerprint distribution (if not hamming).
CheckpointsCheckpoints 3 Quarter Project3 Quarter Project Projected Quarter Goals:Projected Quarter Goals:
Understand of Fingerprints and Understand of Fingerprints and Recognition TechniquesRecognition Techniques
Software Prototype (if possible)Software Prototype (if possible) Add Encryption Protocol (if possible)Add Encryption Protocol (if possible)
First GoalFirst Goal Understand Fingerprint ReaderUnderstand Fingerprint Reader Understand Fingerprint Recognition Understand Fingerprint Recognition
TechniquesTechniques
top related