SlideShare a Scribd company logo
Authentication with Smartcards and Fingerprints Himanshu Khurana Joe Muggli NCSA, UIUC March 30, 2006
Outline Introduction Smartcards Biometrics: fingerprints Illinois Terrorism Task Force (ITTF) Project Interactive Demonstration
Authentication Goals Basic Goal Verify the unique identity of the requestor Additional goals in a networked world Prevent leak of secrets Prevent replay attacks Global scalability Offline operation capability High assurance  …
Passwords are not enough Basic Goal Verify the unique identity of the requestor Additional goals in a networked world Prevent leak of secrets Prevent replay attacks Global scalability Offline operation capability High assurance … X X X Passwords are vulnerable to  dictionary attacks theft collusion attacks (users can share passwords)
Solution: Multi-factor Authentication Multi-factor authentication: combination of What you know; e.g., passwords, PINs What you have; e.g., OTP tokens, smartcards  What you are (biometrics); e.g., fingerprints, iris scans, face recognition Typically two-factor authentication is used; e.g., PIN + Card (e.g. ATMs) Password + One-time-password (OTP) token Fingerprint + Smartcard Main vendors : Entrust, RSA, Aladdin, Todos,  TaraSekure, Vaco, SafeNet, ...
Public-Key Infrastructure (PKI) Public Key Cryptography Sign with private key,  verify signature with public key Encrypt with public key,  decrypt with private key Key Distribution Who does a public key belong to? Certification Authority (CA) verifies user’s identity and signs certificate Certificate is a document that binds the user’s identity to a public key Authentication Signature [ h ( random, … ) ] Subject: CA signs Issuer: CA Subject: Jim Issuer: CA Source: Jim Basney’s MyProxy presentation
Authentication with Digital Signatures Alice Bob Nonce Hash Signing key  SK A Enc Nonce Request Signed Nonce Dec Verif. key  PK A Hash Match?
Authentication with Smartcards and PKI Unlike passwords private keys cannot be remembered (typically, 1024 bits) File based storage provides weak security and no mobility Smartcards provide secure, tamper-resistant storage with mobility Less easily shared than passwords Drawbacks: card cost, readers
Smartcards CPU: 8, 16, 32 bit ROM: ~ 1 - 32kb RAM: ~ Several kb EEPROM: ~ 16 - 64 kb Programming Java .Net Various levels of memory access control Protected Memory  holds secrets and is accessible  only to the cryptoprocessor
Example Authentication with Smartcards Source: Dang et al., AINA’05 Unlocked by a PIN
Security Concerns and Authentication Goals High assurance Smartcards and PINs can get lost, be stolen, or shared A Solution: combine biometrics with smartcards Source: Renaudin et al., Design, Automation and Test in Europe Conference and Exhibition, 2004
Biometrics: Fingerprints Uniquely refers to an individual using biometric identifiers Pattern recognition system Enrollment  captures digital representation (template) of biometric identifier Recognition  captures characteristics and matches against template Ideal properties: universal, unique, permanent, collectable Practical properties: performance, acceptability, resistance to circumvention Examples: Face recognition,  fingerprints , iris scans, retinal scans, hand geometry, etc.
Minutiae Based Fingerprint Recognition Digital image of fingerprint contain features Ridge bifurcations and endings Called  Minutiae Minutiae features  represented using location (x,y) and direction   Set of measurements forms template Matching attempts to calculate degree of similarity  taking into account Rotation, elastic distortion, sensor noise, etc. Never 100%: false acceptance rate and false rejection rate
Combining Fingerprints and Smartcards for Authentication Replace PINs with fingerprint verification Store template on card Match provided fingerprint on card Reader extracts minutiae features Security and privacy advantages Match-on-card leverages smartcard as trusted computing platform Match-on-card requires no additional trusted entity Mimics PIN verification Template stored on card as opposed to accessible database
ITTF Credentialing Project* Goal : provide trustworthy identification at secure incident perimeter Requirements : credential based, offline operation, unique identification, counterfeit resistance Approach : smartcard and fingerprint based authentication * Work done with Jim Basney; Partner Institutions: Illinois State Police, Entrust, U. of Chicago
ITTF Background Provide trustworthy identification of response team members at secure incident perimeter - Fire, EMT, Police, HazMat, Techs, TaraSekure etc. Two factor authentication in the field  Offline operation, web portals for registration and authentication Highly usable but also resistant to counterfeiting Prototype not production unit
Featured Technologies State of Illinois PKI Certificate Authority Web interfaced central authentication service –  Entrust GetAccess™ & TruePass™ MatchOnCard™ fingerprint templates on smartcards –  Precise Biometrics Role based authentication
Credentialing Portal Roles  Team Member Team Leader Card Distributor Credential Review Committee Member  Administrator One Responder Can Have Multiple Roles
Credentialing Portal Architecture State of Illinois PKI Entrust Servers: GetAccess SelfAdmin TruePass+Portal IBM Websphere ITTF Database Oracle 10g Illinois Internal Network Internet Internet Registration Station Field Station Web Server MS IIS with Entrust Modules Open Ports: SSL 443,9443 SMTP 25 LDAP 389 SQL*Net 1521 PKIX-CMP 829 Entrust 710, 50000,50001 Firewall +
ITTF Registration Procedure Prerequisites Demographic Information  Team Membership Portrait  Fingerprint Scan Criminal History Review State of Illinois PKI Level I Digital ID Registration Portal Station 1. User Logs Into Registration Portal, Edits Record 2. Team Leader Logs In, Approves Team Member 3. Smartcard Produced & Shipped to Card Distributor 4. Card Distributor Meets User, Confirms Identity 5. User Logs Into Portal Using SC & Level I Digital ID 6. Logging In Upgrades Digital ID To Level III 7. User Authenticates to Smartcard Using The Pre-loaded Fingerprint Template 8. Level IV Digital Certificate Created On User’s SC 9. Portal Date Stamps & Activates Smartcard 10. User Tests Credential Functionality
Field Authentication Tasks + Pre-event: Team Leader Downloads Updated Team Member and Certificate Revocation Lists Event: Using SC & FP Team Leader & Members Log Into Portal, SC Time & Event Stamped Post-Event: Team Leader and Members Log Out Using SC & FP, SC Time Stamped; Team Leader Uploads Log To ITTF Web Portal Windows Laptop Windows CE Handheld Data Uplink
NCSA PKI Lab Demo Windows 2003 Server - Domain Controller & CA Windows XP Clients Safenet (formerly DataKey) No Boundaries Login Software & Biometric Enabled Smartcards Precise Biometrics Fingerprint & Smartcard Readers Registration Station Login Test Station NCSA PKI Lab Domain CA  Wireless Network
Fingerprint Scanning Hints Don’t Point – Touch the 2 Dots Use the Fleshy Middle of the Fingertip Don’t Drag or Move Place Your Finger Down Like Patting a Dog  One Time & Only One Finger
Authentication with Smartcards and Fingerprints Any Questions?? http://www.ncassr.org/ http://www.ncsa.uiuc.edu/Projects/cybertechnologies.html#security http://pkilab.ncsa.uiuc.edu Himanshu Khurana   [email_address] Joe Muggli   [email_address]

More Related Content

PPTX
Authentication(pswrd,token,certificate,biometric)
PDF
Two-factor Authentication
PDF
Two factor authentication-in_your_network_e_guide
PDF
2 factor authentication 3 [compatibility mode]
PDF
Two factor authentication
PDF
Session 7 e_raja_kailar
PDF
Sp 29 two_factor_auth_guide
PPTX
The Road to Identity 2.0
Authentication(pswrd,token,certificate,biometric)
Two-factor Authentication
Two factor authentication-in_your_network_e_guide
2 factor authentication 3 [compatibility mode]
Two factor authentication
Session 7 e_raja_kailar
Sp 29 two_factor_auth_guide
The Road to Identity 2.0

What's hot (20)

PDF
Securing corporate assets_with_2_fa
PDF
User Authentication Overview
PDF
Stronger/Multi-factor Authentication for Enterprise Applications
PDF
Combat the Latest Two-Factor Authentication Evasion Techniques
PPTX
FrontOne our new and different solutions
PPTX
FirstNet ICAM
PDF
Why Two-Factor Authentication?
PPTX
Identity as a Matter of Public Safety
PPTX
Digital signature and certificate authority
PPT
Eds user authenticationuser authentication methods
PPT
Digital certificates
PDF
Government Citizen ID using Java Card Platform
PPTX
Seminar-Two Factor Authentication
PPTX
Webinar - Easy multi factor authentication strategies and PCI DSS
PPTX
Insights Into Modern Day Threat Protection
PPTX
Digital certificates and information security
PPTX
Two factor authentication 2018
PDF
A MOBILE BASED ANTI-PHISHING AUTHENTICATION SCHEME USING CHALLENGE-RESPONSE A...
PDF
3 reasons your business can't ignore Two-Factor Authentication
PDF
Avoiding Two-factor Authentication? You're Not Alone
Securing corporate assets_with_2_fa
User Authentication Overview
Stronger/Multi-factor Authentication for Enterprise Applications
Combat the Latest Two-Factor Authentication Evasion Techniques
FrontOne our new and different solutions
FirstNet ICAM
Why Two-Factor Authentication?
Identity as a Matter of Public Safety
Digital signature and certificate authority
Eds user authenticationuser authentication methods
Digital certificates
Government Citizen ID using Java Card Platform
Seminar-Two Factor Authentication
Webinar - Easy multi factor authentication strategies and PCI DSS
Insights Into Modern Day Threat Protection
Digital certificates and information security
Two factor authentication 2018
A MOBILE BASED ANTI-PHISHING AUTHENTICATION SCHEME USING CHALLENGE-RESPONSE A...
3 reasons your business can't ignore Two-Factor Authentication
Avoiding Two-factor Authentication? You're Not Alone
Ad

Similar to Ynamono Hs Lecture (20)

PPT
Authentication
PDF
#MFSummit2016 Secure: Mind the gap strengthening the information security model
PDF
Authentication V.Vinotha II M.Sc computer science Bon secours college for women
PDF
Identity Assertions Draftv5
PPTX
Qafis, Regular smartcards 150313001
PPT
PDF
Access Control
PPTX
Biometric security using cryptography
PPTX
Authentication Methods authauthauthauthauthautha
PDF
CISSP Prep: Ch 6. Identity and Access Management
PDF
Access Control Presentation
PPT
ISS SA le presenta IdentityGuard de Entrust
PPTX
Chapter-Six.pptxhyjhgjghjghjghjghjghjghjghjg
PDF
5. Identity and Access Management
PDF
CNIT 125 6. Identity and Access Management
PPTX
Introduction to Biometrics for Beginners.pptx
PDF
Digital Identities and the Promise of the Technology Trio: PKI, Smart Cards, ...
PDF
OWASP AppSec USA 2015, San Francisco
PDF
Psdot 19 four factor password authentication
PPTX
Authentication
#MFSummit2016 Secure: Mind the gap strengthening the information security model
Authentication V.Vinotha II M.Sc computer science Bon secours college for women
Identity Assertions Draftv5
Qafis, Regular smartcards 150313001
Access Control
Biometric security using cryptography
Authentication Methods authauthauthauthauthautha
CISSP Prep: Ch 6. Identity and Access Management
Access Control Presentation
ISS SA le presenta IdentityGuard de Entrust
Chapter-Six.pptxhyjhgjghjghjghjghjghjghjghjg
5. Identity and Access Management
CNIT 125 6. Identity and Access Management
Introduction to Biometrics for Beginners.pptx
Digital Identities and the Promise of the Technology Trio: PKI, Smart Cards, ...
OWASP AppSec USA 2015, San Francisco
Psdot 19 four factor password authentication
Ad

Recently uploaded (20)

PPTX
Cloud computing and distributed systems.
PDF
Bridging biosciences and deep learning for revolutionary discoveries: a compr...
PPTX
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
PDF
Network Security Unit 5.pdf for BCA BBA.
PPTX
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
PPT
“AI and Expert System Decision Support & Business Intelligence Systems”
PPTX
Big Data Technologies - Introduction.pptx
PPTX
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
PDF
NewMind AI Monthly Chronicles - July 2025
PDF
Reach Out and Touch Someone: Haptics and Empathic Computing
PDF
Spectral efficient network and resource selection model in 5G networks
PDF
KodekX | Application Modernization Development
PDF
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
PDF
Diabetes mellitus diagnosis method based random forest with bat algorithm
PDF
The Rise and Fall of 3GPP – Time for a Sabbatical?
PDF
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
PDF
Machine learning based COVID-19 study performance prediction
PDF
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
PDF
Encapsulation theory and applications.pdf
PPTX
20250228 LYD VKU AI Blended-Learning.pptx
Cloud computing and distributed systems.
Bridging biosciences and deep learning for revolutionary discoveries: a compr...
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
Network Security Unit 5.pdf for BCA BBA.
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
“AI and Expert System Decision Support & Business Intelligence Systems”
Big Data Technologies - Introduction.pptx
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
NewMind AI Monthly Chronicles - July 2025
Reach Out and Touch Someone: Haptics and Empathic Computing
Spectral efficient network and resource selection model in 5G networks
KodekX | Application Modernization Development
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
Diabetes mellitus diagnosis method based random forest with bat algorithm
The Rise and Fall of 3GPP – Time for a Sabbatical?
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
Machine learning based COVID-19 study performance prediction
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
Encapsulation theory and applications.pdf
20250228 LYD VKU AI Blended-Learning.pptx

Ynamono Hs Lecture

  • 1. Authentication with Smartcards and Fingerprints Himanshu Khurana Joe Muggli NCSA, UIUC March 30, 2006
  • 2. Outline Introduction Smartcards Biometrics: fingerprints Illinois Terrorism Task Force (ITTF) Project Interactive Demonstration
  • 3. Authentication Goals Basic Goal Verify the unique identity of the requestor Additional goals in a networked world Prevent leak of secrets Prevent replay attacks Global scalability Offline operation capability High assurance …
  • 4. Passwords are not enough Basic Goal Verify the unique identity of the requestor Additional goals in a networked world Prevent leak of secrets Prevent replay attacks Global scalability Offline operation capability High assurance … X X X Passwords are vulnerable to dictionary attacks theft collusion attacks (users can share passwords)
  • 5. Solution: Multi-factor Authentication Multi-factor authentication: combination of What you know; e.g., passwords, PINs What you have; e.g., OTP tokens, smartcards What you are (biometrics); e.g., fingerprints, iris scans, face recognition Typically two-factor authentication is used; e.g., PIN + Card (e.g. ATMs) Password + One-time-password (OTP) token Fingerprint + Smartcard Main vendors : Entrust, RSA, Aladdin, Todos, TaraSekure, Vaco, SafeNet, ...
  • 6. Public-Key Infrastructure (PKI) Public Key Cryptography Sign with private key, verify signature with public key Encrypt with public key, decrypt with private key Key Distribution Who does a public key belong to? Certification Authority (CA) verifies user’s identity and signs certificate Certificate is a document that binds the user’s identity to a public key Authentication Signature [ h ( random, … ) ] Subject: CA signs Issuer: CA Subject: Jim Issuer: CA Source: Jim Basney’s MyProxy presentation
  • 7. Authentication with Digital Signatures Alice Bob Nonce Hash Signing key SK A Enc Nonce Request Signed Nonce Dec Verif. key PK A Hash Match?
  • 8. Authentication with Smartcards and PKI Unlike passwords private keys cannot be remembered (typically, 1024 bits) File based storage provides weak security and no mobility Smartcards provide secure, tamper-resistant storage with mobility Less easily shared than passwords Drawbacks: card cost, readers
  • 9. Smartcards CPU: 8, 16, 32 bit ROM: ~ 1 - 32kb RAM: ~ Several kb EEPROM: ~ 16 - 64 kb Programming Java .Net Various levels of memory access control Protected Memory holds secrets and is accessible only to the cryptoprocessor
  • 10. Example Authentication with Smartcards Source: Dang et al., AINA’05 Unlocked by a PIN
  • 11. Security Concerns and Authentication Goals High assurance Smartcards and PINs can get lost, be stolen, or shared A Solution: combine biometrics with smartcards Source: Renaudin et al., Design, Automation and Test in Europe Conference and Exhibition, 2004
  • 12. Biometrics: Fingerprints Uniquely refers to an individual using biometric identifiers Pattern recognition system Enrollment captures digital representation (template) of biometric identifier Recognition captures characteristics and matches against template Ideal properties: universal, unique, permanent, collectable Practical properties: performance, acceptability, resistance to circumvention Examples: Face recognition, fingerprints , iris scans, retinal scans, hand geometry, etc.
  • 13. Minutiae Based Fingerprint Recognition Digital image of fingerprint contain features Ridge bifurcations and endings Called Minutiae Minutiae features represented using location (x,y) and direction  Set of measurements forms template Matching attempts to calculate degree of similarity taking into account Rotation, elastic distortion, sensor noise, etc. Never 100%: false acceptance rate and false rejection rate
  • 14. Combining Fingerprints and Smartcards for Authentication Replace PINs with fingerprint verification Store template on card Match provided fingerprint on card Reader extracts minutiae features Security and privacy advantages Match-on-card leverages smartcard as trusted computing platform Match-on-card requires no additional trusted entity Mimics PIN verification Template stored on card as opposed to accessible database
  • 15. ITTF Credentialing Project* Goal : provide trustworthy identification at secure incident perimeter Requirements : credential based, offline operation, unique identification, counterfeit resistance Approach : smartcard and fingerprint based authentication * Work done with Jim Basney; Partner Institutions: Illinois State Police, Entrust, U. of Chicago
  • 16. ITTF Background Provide trustworthy identification of response team members at secure incident perimeter - Fire, EMT, Police, HazMat, Techs, TaraSekure etc. Two factor authentication in the field Offline operation, web portals for registration and authentication Highly usable but also resistant to counterfeiting Prototype not production unit
  • 17. Featured Technologies State of Illinois PKI Certificate Authority Web interfaced central authentication service – Entrust GetAccess™ & TruePass™ MatchOnCard™ fingerprint templates on smartcards – Precise Biometrics Role based authentication
  • 18. Credentialing Portal Roles Team Member Team Leader Card Distributor Credential Review Committee Member Administrator One Responder Can Have Multiple Roles
  • 19. Credentialing Portal Architecture State of Illinois PKI Entrust Servers: GetAccess SelfAdmin TruePass+Portal IBM Websphere ITTF Database Oracle 10g Illinois Internal Network Internet Internet Registration Station Field Station Web Server MS IIS with Entrust Modules Open Ports: SSL 443,9443 SMTP 25 LDAP 389 SQL*Net 1521 PKIX-CMP 829 Entrust 710, 50000,50001 Firewall +
  • 20. ITTF Registration Procedure Prerequisites Demographic Information Team Membership Portrait Fingerprint Scan Criminal History Review State of Illinois PKI Level I Digital ID Registration Portal Station 1. User Logs Into Registration Portal, Edits Record 2. Team Leader Logs In, Approves Team Member 3. Smartcard Produced & Shipped to Card Distributor 4. Card Distributor Meets User, Confirms Identity 5. User Logs Into Portal Using SC & Level I Digital ID 6. Logging In Upgrades Digital ID To Level III 7. User Authenticates to Smartcard Using The Pre-loaded Fingerprint Template 8. Level IV Digital Certificate Created On User’s SC 9. Portal Date Stamps & Activates Smartcard 10. User Tests Credential Functionality
  • 21. Field Authentication Tasks + Pre-event: Team Leader Downloads Updated Team Member and Certificate Revocation Lists Event: Using SC & FP Team Leader & Members Log Into Portal, SC Time & Event Stamped Post-Event: Team Leader and Members Log Out Using SC & FP, SC Time Stamped; Team Leader Uploads Log To ITTF Web Portal Windows Laptop Windows CE Handheld Data Uplink
  • 22. NCSA PKI Lab Demo Windows 2003 Server - Domain Controller & CA Windows XP Clients Safenet (formerly DataKey) No Boundaries Login Software & Biometric Enabled Smartcards Precise Biometrics Fingerprint & Smartcard Readers Registration Station Login Test Station NCSA PKI Lab Domain CA Wireless Network
  • 23. Fingerprint Scanning Hints Don’t Point – Touch the 2 Dots Use the Fleshy Middle of the Fingertip Don’t Drag or Move Place Your Finger Down Like Patting a Dog One Time & Only One Finger
  • 24. Authentication with Smartcards and Fingerprints Any Questions?? http://www.ncassr.org/ http://www.ncsa.uiuc.edu/Projects/cybertechnologies.html#security http://pkilab.ncsa.uiuc.edu Himanshu Khurana [email_address] Joe Muggli [email_address]