Identification and Key Distribution Based on Biometric...

31
Identification and Key Distribution Based on Biometric Information Prof. Dr. Valery Korzhik University of Telecommunications St. Petersburg (Russia) -2007-

Transcript of Identification and Key Distribution Based on Biometric...

Page 1: Identification and Key Distribution Based on Biometric ...departements.imt-atlantique.fr/data/sc/seminaires/seminaire_korzhik… · 1. Recognition on biometrics. (Then the parameters

Identification and Key Distribution Based on Biometric Information

Prof. Dr. Valery KorzhikUniversity of Telecommunications

St. Petersburg (Russia)-2007-

Page 2: Identification and Key Distribution Based on Biometric ...departements.imt-atlantique.fr/data/sc/seminaires/seminaire_korzhik… · 1. Recognition on biometrics. (Then the parameters

2

1. Identification of users

Alice y(password)

?

f(.) – one way function

Important remark:With the use of one-way function it is assumed that “y” is distributed trullyrandomly. Otherwise – nothing is taken for granted.

Defects of this approach:• Good password can be forgotten by Alice,• Storing of password in memory increases the risk of its theft,• Short password can be easy memorized but it can be easy found by

adversary

Access controlx=f(y)

x

Page 3: Identification and Key Distribution Based on Biometric ...departements.imt-atlantique.fr/data/sc/seminaires/seminaire_korzhik… · 1. Recognition on biometrics. (Then the parameters

3

Conventional key applicationAlice

К(secret key)

Shortcoming of this approach:The key that is storing in some memory can be stolen or erased

How can we remove this defect?Use Alice’s biometric or her psychology.

«My body is my password»[1]+

Psychology: say Alice’s preferences are: young, rich and healthy men.

КEncryption/decryption,

Digital signature

Page 4: Identification and Key Distribution Based on Biometric ...departements.imt-atlantique.fr/data/sc/seminaires/seminaire_korzhik… · 1. Recognition on biometrics. (Then the parameters

4

Biometrics as a source of passwords and keys

The main types of biometrics:• Palmprint verification,• Iris biometric,• Face recognition,• Fingerprint system,• Speaker recognition,• Signature system,• Keystroke biometrics,• Using a small subset of values from a large universe (e.g. favorite movies),• A combining of methods.

Remark:Both hardware and software to transform human biometrics into digital form were designed by many companies [1].

Defects of biometrical approach:Digital data producing by biometrics are not truly random and it is very difficult to reproduce them repeatedly.

• Vein pattern• Ear• Facial thermogram• Gait

Page 5: Identification and Key Distribution Based on Biometric ...departements.imt-atlantique.fr/data/sc/seminaires/seminaire_korzhik… · 1. Recognition on biometrics. (Then the parameters

5

Configuration of pattern recognition system [1]

The main methods using in recognition:• Image segmentation• Pattern classification• Discriminant functions• Bayes and non-Bayes classification• Neural networks• Support vector machine

Model of recognition:-set of features

-the feature of i-th userThen it is possible to store data as ,where h – OWF (one way function)However, if the recognition follows to the rule , then - cannot be used.

Dataacquisition

Datapreprocessing

Featureextraction

Decisionclassification

preprocessing

Physicalvariables

∑ =−′=

L

j ijiji

xxArgi1

2 )(min ρ)( ijxh

)( ijxh

1X

1ix

2X

2ix

LX

iLx

Class

Page 6: Identification and Key Distribution Based on Biometric ...departements.imt-atlantique.fr/data/sc/seminaires/seminaire_korzhik… · 1. Recognition on biometrics. (Then the parameters

6

Methods to remove defects:1. Recognition on biometrics. (Then the parameters have to store in secret)2. The use of secure sketch [2] – SS3. The use of fuzzy extractors [2] – FE

Definition and properties of SS and FE.Non-formal definition:

SS:(for identification on BI)

FE:(for key generation on BI)

ω s = f(ω)

ω’ω’ ω’is “close” to ω

ω

ω’

R = R(ω)

P = P(ω)

ω’ ω’ is “close” toω

R – is truly random even if it is known Pthat is stored publicly

Page 7: Identification and Key Distribution Based on Biometric ...departements.imt-atlantique.fr/data/sc/seminaires/seminaire_korzhik… · 1. Recognition on biometrics. (Then the parameters

7

1. Hamming metrics)',( ωωρH = is the number of position in which binary vectors ω and 'ω are

differentExample. 10011=ω 3)',( =ωωρH

01010'=ω(This metrics is very natural for BI)2. Set difference

where “ ” is symmetric difference of the sets A and 'A .|B| is a cardinality of B.Example. },6,5,4,3,2,1{=U 4,3,2,1, =⊆ AUA

6,5,2,1,6,5,4,3, =Δ=⊆ BABUB

2),( =BASρ

Psychometry: A selection of small subset from a large universe (e.g. favorite movies)

,'21)',()',( AAAASS Δ== ρωωρ

Specification of the notion “ is close to “:'ω ω

Δ

Δ

Page 8: Identification and Key Distribution Based on Biometric ...departements.imt-atlantique.fr/data/sc/seminaires/seminaire_korzhik… · 1. Recognition on biometrics. (Then the parameters

8

3. Edit distance

21)',( =ωωρe (is the minimum number of omissions and insertions that

are needed in order to transform ω into 'ω ) Example. 1̂10101 /=ω 110111'=ω 1)',( =ωωρe (This distance is very natural in recognition of handwritten text.)

Page 9: Identification and Key Distribution Based on Biometric ...departements.imt-atlantique.fr/data/sc/seminaires/seminaire_korzhik… · 1. Recognition on biometrics. (Then the parameters

9

3. Exact definition SS and FE: Let us Μ be metrix space,

- is given metrix

),',,( tmmΜ - SS is randomized mapping

*

)(}0,1{→Μ

ω with a following properties:

(i) (...)Rec∃ such that ))(,'(Rec ωωω SS= for all t≤Μ∈ )',(,', ωωρωω .

(ii) '))(|(~

mWSSWH ≥∞ for any random variable W on Μ , having mWH =∞ )( , where ))Pr(maxlog()( WWH

W−=∞

})2{log())(|( ))(|( sWSSWHsEWSSWH =−

∞∞−=

Remark: The condition (ii) makes impossible to recover W given )(WSSs = unconditionally (that means that it cannot be recovered

independently on computing power of opponent!)

)(,, ρN=Μ

Page 10: Identification and Key Distribution Based on Biometric ...departements.imt-atlantique.fr/data/sc/seminaires/seminaire_korzhik… · 1. Recognition on biometrics. (Then the parameters

10

),,,,( εtlmΜ - FE is determined by two procedures: (Gen, Rep): (i) Gen – is randomized mapping

lRW }1,0{∈⇒Μ∈ P ,

for which ε≤),,,( PUPRSD l , if mWH ≥∞ )( . (ii) Rep – is deterministic procedure P),'Rep(ω=R , if t≤)',( ωωρ , where ),( YXSD - is statistical distance between two probability distributions on X and Y , e.g.:

∑ =−==v

rr vYPvXPYXSD )()(21),( .

Remark: The small value (...)SD means that the probability distribution on lR }1,0{∈ is close to uniform distribution )( lU even known P , (e.g. it is

close to truly random variable).

Page 11: Identification and Key Distribution Based on Biometric ...departements.imt-atlantique.fr/data/sc/seminaires/seminaire_korzhik… · 1. Recognition on biometrics. (Then the parameters

11

Identification based on BI using SS

Remarks:1. Storing s in memory does not require a protection2. One way functions are not needed3. Good statistical properties (close to truly randomness) for

s=SS(ω) are not provided (but they are not required)4. It is necessary to provide a condition mH ≥∞

Server for access control

Identification

Alice (BI)Initialization ω

ω′

Calculation ( ) sSS =ωMemory (s)

Calculation ( ) s~~SS =ω

Calculation( ) ωω ~s,cRe =′

Comparison s with .Taking a decision.

s~

Page 12: Identification and Key Distribution Based on Biometric ...departements.imt-atlantique.fr/data/sc/seminaires/seminaire_korzhik… · 1. Recognition on biometrics. (Then the parameters

12

Key generation based on BI using FE

Remarks:1. Key R is close to truly random value.2. Storing Р, Е in memory does not require protection.3. Calculation and storing P can be performed in a reader of BI.4. It is necessary to protect P against a forgery by adversary (the use

of digital signature or “robust fuzzy extractors” – see further)

Alice (BI) ω

ω′Alice (BI)

Calculation the key RCalculation PMemory (P, E)Encryption

( )R,MfE =Calculation the key

( )ω′,PRDecryption

( )R,EM ϕ=

Page 13: Identification and Key Distribution Based on Biometric ...departements.imt-atlantique.fr/data/sc/seminaires/seminaire_korzhik… · 1. Recognition on biometrics. (Then the parameters

13

4. Design of FE given SS and SE (strong extractors)

Definition SE.

SE – is randomized mapping: { } { } { }ldn 1,01,0,1,0 → such that for input strings { }n1,0∈ω with arbitrary probability distribution but with min entropy at least m′ ;

( )( ) ,X,U,X,WSESD l ε≤

if { }d,X 10∈ , ( ) lUXPr = . Clear demonstration of SE. This is a generator of “good” output randomness (close touniform distribution) presented as binary string of shorter lengthl than it’s input binary string of the length n that has “bad” randomness given short (length d) truly random seed, whereasthe knowledge of this seed does not affect on good outputrandomness.

Page 14: Identification and Key Distribution Based on Biometric ...departements.imt-atlantique.fr/data/sc/seminaires/seminaire_korzhik… · 1. Recognition on biometrics. (Then the parameters

14

How to design FE given SE and SS?Let us assume that there is SS(M, m, m′, t) and SE(n, m′, l, ε) with

( )ε/1log2−′= ml . Then the following construction (Gen, Rep) gives FE(M, m, l, t, ε):

– Gen(X

X,X;W 21 ): ( )( )21 ,; XXWSSP = , ( )2X,WSER = .

– ( )P,WRep ′ : ( )P,WcReW SS ′= , ( )2X,WSER = .

2x

2x( )2X,WSS

ωSSREC

Ω

X 1X2X

ω

ω′1

X2

X2

Page 15: Identification and Key Distribution Based on Biometric ...departements.imt-atlantique.fr/data/sc/seminaires/seminaire_korzhik… · 1. Recognition on biometrics. (Then the parameters

15

Conclusion: In order to design FE we have to design both SS and SE.

Construction SS for Hamming distance.Let C is (n,k,2t+1) error correcting code (not necessary linear).Then:SS(ω,x)= ω⊕C(x), where x is chosen randomly and С(x) is a code word,

Rec(ω',SS(ω): ω' ⊕ SS(ω,x)= ω' ⊕ω⊕C(x)=e⊕C(x), te ≤// ,where /e/ is Hamming weight of e.D(ω' ⊕ SS(ω,x))=D(e⊕C(x))=x, where D is a decoding procedure under the condition that C corrects at least t errors. Thenω= SS(ω,x) ⊕C(x).It can be proved [2] that: m'≥m-r, ∀ m,r.

SS(ω,x)

ω

x Encoder

Page 16: Identification and Key Distribution Based on Biometric ...departements.imt-atlantique.fr/data/sc/seminaires/seminaire_korzhik… · 1. Recognition on biometrics. (Then the parameters

Practical implementation of SS:If C is linear code then (syndrom to w on the code C),e.g. , where H is check matrix of the code C.In this case a randomness X is not required at all!In fact, let us take s=SS(ω)= ωH and ω’= ω e, where e is error pattern over the weight at most t. Then we have ω’H=(ω e)H== ωH eH that gives relation eH= ω’H s. Since C is capable to correct all errors of the weight at most t, we can recover e on givensyndrom eH. After that we can recover ω as follows: ω = ω’ e.If , e.g. , then we getFE: R=X,

This construction does not work in general case, because if , then P gives a leakage of information about X=R.

)()( ωω csynSS =

HSS ωω =)(

nU∉ω

nmWH ==∞ )(

),(XCP ⊕=ω

nUW ∈

)(),( ωω ′⊕=′ PDPREP

16

⊕⊕

⊕ ⊕

Page 17: Identification and Key Distribution Based on Biometric ...departements.imt-atlantique.fr/data/sc/seminaires/seminaire_korzhik… · 1. Recognition on biometrics. (Then the parameters

In order to design FE it is necessary to design SE.Trevisan’s extractor:

Parameters of Trevisan’s extractor:

vnnvcc

ncWHl 2~;logO ,log;

log1logOd ;)(

222

22 =⎟

⎠⎞

⎜⎝⎛==⎟⎟

⎞⎜⎜⎝

⎛⎟⎠⎞

⎜⎝⎛== ∞

ελ

ε

Error correcting code

…1 2 l

w),~( nn

Block schemes

S1 :

0 11

2

d

1

1

0

0

1

... …

00 … 0 … 00

00 … 0 … 01

00 … 1 … 11

11 … 1 … 11

a1, a2, … , av

u

1

0

0

1

Random binarysequence(seed)

s11,s12,…,s1v

s21,s22,…,s2vS2 :

sl1,sl2,…,slv

si1,si2,…,sivSi :

Sl :

0

0

1

Boolean functionγ

)(af

i0...

17

Page 18: Identification and Key Distribution Based on Biometric ...departements.imt-atlantique.fr/data/sc/seminaires/seminaire_korzhik… · 1. Recognition on biometrics. (Then the parameters

Almost universal class of hash functions[6]

.

Definition. A family of mapping }{ ihH = ln }1,0{}1,0{ → is called δ -almost universal )( AU−δ , if for any

:xx ≠′ δ≤′= ))()(Pr( xhxh ii under uniformly selected ih from the set H. In a particular case when l−= 2δ we get a conventional family of universal hash functions. Asymptotic behavior of parameters for some classes of AU hash functions has been considered in [6]. However constructive methods todesign such hash functions are not sufficiently advanced. In application to authentication problem AU functions were used in [7].

18

Page 19: Identification and Key Distribution Based on Biometric ...departements.imt-atlantique.fr/data/sc/seminaires/seminaire_korzhik… · 1. Recognition on biometrics. (Then the parameters

Reducing AU to SE

Statement [8].Let us consider any m, and . Then if

is AU for , it results in the fact that H is SE.Thus, if it is known how to design AU then it is known also how to design SE with some given parameters. But constructive methods to design AU are known not so much

0>ε lml 2−≤{ } { }{ }ln

ihH 1,01,0: →= )1(2 2εδ += −l

Reducing of linear q-ary codes to SE If qTqkT ])/11(,,[ δ−− is some q-ary linear code with given parameters, then the exists )2/,/1( δδ q - extractor that can be presented as ixCxExtr == )]([),( ωω , where )(ωC - code words corresponding to ω and ix=[.] - is a random choice of i-th symbol. 19

Page 20: Identification and Key Distribution Based on Biometric ...departements.imt-atlantique.fr/data/sc/seminaires/seminaire_korzhik… · 1. Recognition on biometrics. (Then the parameters

20

How to use SE in a solution of key distribution problem [3, 4]

Two main techniques to solve key distribution problem:1. Privacy amplification (РА)2. The use of SE

Model of key distribution:

s

A B

E

Channel of publicdiscussion

а) Е - is passive eavesdropper

Y ( )BεX ( )Aε б) Е - is active eavesdropper but

EB ,, εεεΑ are any but :( )02

1 >≠ ΕΑ εεε ,, B

( ),, B ΕΕΑ << εεεε

Z ( )Eε

Page 21: Identification and Key Distribution Based on Biometric ...departements.imt-atlantique.fr/data/sc/seminaires/seminaire_korzhik… · 1. Recognition on biometrics. (Then the parameters

21

1. Privacy amplification (РА)

X, Y – the strings received by A and B, C – the string of check symbols to X (on the code V), h – hash function

( ) ( ) 1~Pr1~Pr ≈=⇒≈= KKYX

A B

X

Ch

K

Y

C

hY~

K~Noiseless channelof public discussion

Page 22: Identification and Key Distribution Based on Biometric ...departements.imt-atlantique.fr/data/sc/seminaires/seminaire_korzhik… · 1. Recognition on biometrics. (Then the parameters

22

Privacy amplification (continuation)

( ) ( ) 2ln2;;/ lttn chCZKI −−−−≤ , if AEAB εε < . where: n – the length of the strings X,Y,Z;

Z – the string received by E; t – the number of bits in С; l – the length of the key К; ct – Renyi information about the string X given Z.

For BSC ZX → with error probability AEε ,

( )( )( )22 1 AEAEc logNt εε −+−= , where EAEAAEBABAAB εε εεεεεεεε 2 ,2 −+=−+= If AEAB εε > , then it is necessary to perform some information exchange protocol over public discussion channel before hashing.

Page 23: Identification and Key Distribution Based on Biometric ...departements.imt-atlantique.fr/data/sc/seminaires/seminaire_korzhik… · 1. Recognition on biometrics. (Then the parameters

23

Hashing with class of universal hash functions

[ ]lhxK ×= , where «×» is multiplication over the field ( )nGF 2 , [ ]l – a choice of l bits from the string of the length ln ≥ . The strings h should be taken uniformly distributed.

Defects of this technique:

1. If X(Y) are not truly random, then truly randomness of K is not taken for granted.

2. The strings h of the length n should be generated as truly randomand transmitted over the channel.

3. Security of key distribution system is determined by Shannon’s information leaking to eavesdropper. This criterion is not alwaysconvenient in order to estimate an efficiency of brute force attackagainst the key.

Page 24: Identification and Key Distribution Based on Biometric ...departements.imt-atlantique.fr/data/sc/seminaires/seminaire_korzhik… · 1. Recognition on biometrics. (Then the parameters

24

2. The use of SE in a key distribution

Y~

K~

mP

( )mP

ωP

Г– is the string (seed) of the length d ( ) ( ) 1~Pr1~Pr ≈=⇒≈= KKYX

Г),,( XSEK = Г),,~(~ YSEK =

Channel of public discussion

S

Page 25: Identification and Key Distribution Based on Biometric ...departements.imt-atlantique.fr/data/sc/seminaires/seminaire_korzhik… · 1. Recognition on biometrics. (Then the parameters

25

The use of SE in a key distribution (continuation)

( ) εlK/Z;C;ΓI 2≤ [4], where ( )( )dl UUГXSESD ,,,=ε

( ) ( )( ) sAE stnCZXentropy −

∞ −≥−−−≥= 21)1(;HminPr ε ε – is a function of ( )∞H , d and l and depends on a construction of SE (see below). Asymptotic [5]:

( ) SEmHn ∃→≥∀ ∞ 0,, ε with the parameters: ( ) ( ) ( )11log2log Omnd ++−= ε

( ) ( )11log2 Odml −−+= ε

Page 26: Identification and Key Distribution Based on Biometric ...departements.imt-atlantique.fr/data/sc/seminaires/seminaire_korzhik… · 1. Recognition on biometrics. (Then the parameters

26

The use of FE in a broadcast key distribution [9]

K′=?

noiseless channel

PZK

K K K

ωmω3ω2ω1

PP

Center of broadcasting

E

noisy channels (Pm,Pw)

kH ≥∞

. . .

X2 X2 SE(X2,w)SS(w) w

K

RECSS(X2,w1)

SE(w,X2)

… …

U1 U2 U3 Um

Page 27: Identification and Key Distribution Based on Biometric ...departements.imt-atlantique.fr/data/sc/seminaires/seminaire_korzhik… · 1. Recognition on biometrics. (Then the parameters

27

Broadcast key distribution(continuation)

tiH ≤),( ωωρ , ⇒≥∞ kzH )/(ω ε≤),/,( ZPUKSD

It is obviously that this approach fails if wiretap channel is better than main (legal) channel. However it is still unclearly if it is better or not than the methods considered above as Pm<Pw .

Page 28: Identification and Key Distribution Based on Biometric ...departements.imt-atlantique.fr/data/sc/seminaires/seminaire_korzhik… · 1. Recognition on biometrics. (Then the parameters

28

Selection of SS parameters),',( tmm :

mWH =∞ )( , '))(|(~

mWSSWH ≥∞ , t≤)',( ωωρ

HsynWSS c ωω == )()( ,where H is check matrix of some (n,n-r) linear code .n is the length of the string ω, r is the number of check symbols .

Interconnect ion of the parameters n, r and t is due to Varshamov -Gilbert bound: r=nH(2t/n); H(x)= − xlogx + (1-x)log(1-x).How to determine the requirement to m′?If the best method of statistical finding ω on SS(ω) is used, then the probability of success after sL 2= trails of ω is

msP ′−= 2 .How to find m for BI ?This is open problem . (Experimental testing with an estimation Н(ω) and then

an estimation of )(ω∞H ).

Page 29: Identification and Key Distribution Based on Biometric ...departements.imt-atlantique.fr/data/sc/seminaires/seminaire_korzhik… · 1. Recognition on biometrics. (Then the parameters

29

Robust fuzzy extractors (RFE)Definition

This is ordinary FE with the parameters (m, l, t, ε), that in addition provides the probability of undetected substitution P to any PP ≠′ at most δ for any strings ( ',ωω ).

Parameters of RFE: (m, l, t, ε, δ). Interconnection between parameters is determined by the followingassertion[9]: Let n=ω and (m, m-k, t) is SS for Hamming metrix. Then there exists construction [9] of (m, l, t, ε, δ) robust extractor for appropriated choice of v and any m, l, t, ε, δ, if

( ) ( ) ( )1222 2 Of/nlogt/enlogtknml −−−−−≤ ε . However construction of RFE is complex enough and it isquestionably the need in protection against active attack when the keyis generated from BI.

Page 30: Identification and Key Distribution Based on Biometric ...departements.imt-atlantique.fr/data/sc/seminaires/seminaire_korzhik… · 1. Recognition on biometrics. (Then the parameters

30

Open problems

1. Which of BI is preferentially?2. How can we estimate H∝(ω), where ω is BI?3. How can be established a secure level of H∝(ω/SS (ω)) for SS and ε for FE. 4. Constructive design of SE given its complexity.5. Parameter optimization for SS and FE. 6. Parameter optimization for broadcast key distribution system based on FE technique. 7. Practical implementation of identification systems based on particular types of BI.8. Design of SS and FE for Euclidian metrics on the plane.

Page 31: Identification and Key Distribution Based on Biometric ...departements.imt-atlantique.fr/data/sc/seminaires/seminaire_korzhik… · 1. Recognition on biometrics. (Then the parameters

31

References1. Zhang D.D. Automated Biometrics. Technologies and Systems. Wiley and

Sons,2002. 2. Dodis Y., Reyzin L., Smith A. Fuzzy Extractors: How to Generate Strong Keys from

Biometrics and Other Noisy Data. Lecture Notes in Computer Science 3027, p. 523-540, Springer-Verlag, 2004.

3. Maurer U., Wolf S. Secret-key agreement over unauthenticated public channels - part III: Privacy amplification. IEEE Transactions on Information Theory, 2003, April, Vol. 49, No. 4, pp. 839 – 851.

4. V. Yakovlev, V. Korzhik, M. Bakaev, “Key Distribution protocols with the use of extractors based on noisy channels under the condition of active eavesdropper” Problems of Information Security (in Russian), N2, 2006, pg. 63-84.

5. Trevisan L. Construction of extractors using pseudo-random generator. Proceedings of the 31 annual ACM symposium on theory of computing, Atlanta, 1999, pp. 141 – 148.

6. Stinson D.R. Universal hashing and authentication codes. LNCS, v. 576. 7. Korjik V., Morales-Luna G. Hybrid authentication based on noisy channels .

International Journal of information security, 2003, vol. 1, No. 4, pp.203 – 210. 8. Hasted J. et. al, Construction of pseudorandom generator from any one-way

function. SIAM J. of Computing, 28(4), 1999, p. 1369 –1396. 9. Dodis Y. et. al, Robust Fuzzy Extractors and Authenticated Key Agreement from Close Secrets. Proc. of EUROCRYPT 2004. 10. Maurer U. Information-theoretically secure secret-key agreement by NOT

authenticated public discussion . Advances in Cryptology – EUROCRYPT 97. Berlin, Germany: Springer-Verlag, 1997, vol. 1233, pp. 209 – 225.

11. V. Yakovlev, V. Korzhik, G. Morales-Luna, “Key Distribution Protocols Based on Noisy Channels in Presence of Active Adversary: Conventional and New Versions with Parameter Optimization”, IEEE Trans. on IT, Special Issue on Information Security. (submitted, 2007)

12. Bernadette Dorizzi and Carmen Garcia-Mateo, “Multimedia Biometrics”, Annals of telecommunications, vol.62,No.1,2, 2007.