secure authentication using biometric data

5
Secure Secure Authentication Authentication Using Biometric Using Biometric Data Data Andrew Ackerman Andrew Ackerman Professor Ostrovsky Professor Ostrovsky

Upload: moya

Post on 18-Feb-2016

31 views

Category:

Documents


1 download

DESCRIPTION

Secure Authentication Using Biometric Data . Andrew Ackerman Professor Ostrovsky. Background. Secure Authentication Using Biometric Data By Xavier Boyen, Yevgeniy Dodis, Jonathan Katz, Rafail Ostrovsky, Adam Smith Trying to implement design Interested in Cryptography. The Plan. - PowerPoint PPT Presentation

TRANSCRIPT

Secure Secure Authentication Authentication

Using Biometric Using Biometric Data Data Andrew AckermanAndrew Ackerman

Professor OstrovskyProfessor Ostrovsky

BackgroundBackground Secure Authentication Using Secure Authentication Using

Biometric DataBiometric Data By Xavier Boyen, Yevgeniy Dodis, By Xavier Boyen, Yevgeniy Dodis,

Jonathan Katz, Rafail Ostrovsky, Adam Jonathan Katz, Rafail Ostrovsky, Adam SmithSmith

Trying to implement designTrying to implement design Interested in CryptographyInterested in Cryptography

The PlanThe Plan Using Biometric Data in a Using Biometric Data in a

Cryptographic protocolCryptographic protocol Using FingerprintsUsing Fingerprints

GoalGoal Use fingerprint reader to read in dataUse fingerprint reader to read in data Use algorithm to overcome Use algorithm to overcome

“randomness”“randomness” Use readout as secret in a cryptographic Use readout as secret in a cryptographic

protocolprotocol

Possible End StatesPossible End States Low Knowledge of FingerprintsLow Knowledge of Fingerprints

Assumptions made by paper might not fitAssumptions made by paper might not fit Possible end GoalsPossible end Goals

Build the system and test itBuild the system and test it If fingerprints aren’t hamming distance, try If fingerprints aren’t hamming distance, try

to come up with algorithm to make them soto come up with algorithm to make them so Come up with new way of analyzing Come up with new way of analyzing

fingerprintsfingerprints Modify the protocol in paper to work with Modify the protocol in paper to work with

fingerprint distribution (if not hamming).fingerprint distribution (if not hamming).

CheckpointsCheckpoints 3 Quarter Project3 Quarter Project Projected Quarter Goals:Projected Quarter Goals:

Understand of Fingerprints and Understand of Fingerprints and Recognition TechniquesRecognition Techniques

Software Prototype (if possible)Software Prototype (if possible) Add Encryption Protocol (if possible)Add Encryption Protocol (if possible)

First GoalFirst Goal Understand Fingerprint ReaderUnderstand Fingerprint Reader Understand Fingerprint Recognition Understand Fingerprint Recognition

TechniquesTechniques