Top Banner
Exploitation of Exploitation of smart cards and smart cards and human biometrics human biometrics attributes attributes RNDr. Luděk Smolík Martin Drahanský
16

Exploitation of smart cards and human biometrics attributes RNDr. Luděk Smolík Martin Drahanský.

Dec 18, 2015

Download

Documents

Leona Nash
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: Exploitation of smart cards and human biometrics attributes RNDr. Luděk Smolík Martin Drahanský.

Exploitation of smart Exploitation of smart cards and human cards and human

biometrics attributesbiometrics attributes

RNDr. Luděk Smolík

Martin Drahanský

Page 2: Exploitation of smart cards and human biometrics attributes RNDr. Luděk Smolík Martin Drahanský.

Smart CardA card-shaped portable data carrier that contains one or more integrated circuits for data storage and processing. A typical smart card chip includes a microprocessor or CPU, ROM (for storing operating instructions), RAM (for storing data during processing) and EPROM (or

EEPROM) memory for nonvolatile storage of information.

BiometricsThe automated technique of measuring a physical characteristic or personal trait of an individual and comparing that characteristic to a comprehensive

database for purposes of identification.

Page 3: Exploitation of smart cards and human biometrics attributes RNDr. Luděk Smolík Martin Drahanský.

Biometrics

Physical Behavioural

Hand

Face

Finger Signature Keystroke

VoiceRetina

Iris

Page 4: Exploitation of smart cards and human biometrics attributes RNDr. Luděk Smolík Martin Drahanský.

Usage of the Different Biometric Characteristics (1999)

Page 5: Exploitation of smart cards and human biometrics attributes RNDr. Luděk Smolík Martin Drahanský.

Fingerprint Sensors

Optical sensor

Ultrasonic sensor

E-field sensor

Polymer TFT sensor (Thin Film Transistor)

Thermal sensor

Capacitive sensor

Page 6: Exploitation of smart cards and human biometrics attributes RNDr. Luděk Smolík Martin Drahanský.

T

R

papillary lines

Ultrasonic method of acquiring fingerprint representation is based on sending acoustic signals towards the finger surface and detecting the echo.

Ultrasonic Transducer short pulse ~ 20 ns

Ultrasonic Receiver

0.3 - 0.9 mm

ridge

valey

Page 7: Exploitation of smart cards and human biometrics attributes RNDr. Luděk Smolík Martin Drahanský.

= =

SW1 SW2+

VCC

VRef

Comparator

Counter0.......255CC

Finger surface CP

224

288

8-bit per pixel

Capacitive Sensor in CMOS Technology(infineon)

2550wat

er air

N

Page 8: Exploitation of smart cards and human biometrics attributes RNDr. Luděk Smolík Martin Drahanský.

Fingerprint classes

Plain Arch Left Loop Right Loop

Tended Arch Whorl

Page 9: Exploitation of smart cards and human biometrics attributes RNDr. Luděk Smolík Martin Drahanský.

Minutiae

Ridge Ending

Bifurcation

Island

Lake

Dot

Back

Bridge

Diagonal

X

Trifurcation

Hook

Break

DiversionDelta

Double Bifurcation

Page 10: Exploitation of smart cards and human biometrics attributes RNDr. Luděk Smolík Martin Drahanský.

How the Technology Works

Original Orientation Binarized Thinned Minutiae Minutia Graph

Vectors:

V1.....Vn

Template

one way

Page 11: Exploitation of smart cards and human biometrics attributes RNDr. Luděk Smolík Martin Drahanský.

Identification / Verification

Identification (One-to-Many)

Verification (One-to-One)

Fingerprint search that compares the minutiae from a candidate

fingerprint image against the fingerprint minutiae database to

determine whether or not the candidate exists in the database.

Fingerprint search that compares the minutiae from an individual's

live fingerprint image against fingerprint minutiae stored on a card

or in a specific database record to determine whether or not the

individual is who he or she claims to be.

ABCDEFF ,

ABCDEF

Page 12: Exploitation of smart cards and human biometrics attributes RNDr. Luděk Smolík Martin Drahanský.

Smart Card - Logical Structure

NPU RAM

CPU EEPROM

ROM

I/OCLKRSTVCC

GND

NPU : numerical processing unit (cryptographic co-processor),

Page 13: Exploitation of smart cards and human biometrics attributes RNDr. Luděk Smolík Martin Drahanský.

Smart Card - File Structure

Container for data (cryptographic key)or “programs”

Access with PIN

Page 14: Exploitation of smart cards and human biometrics attributes RNDr. Luděk Smolík Martin Drahanský.

Problem & Solution

SensorSmart Card Microprocessor

Page 15: Exploitation of smart cards and human biometrics attributes RNDr. Luděk Smolík Martin Drahanský.

Problem & Solution

NPU RAM

CPU EEPROM

ROM

I/O

Readout

Cryptography

Com.

“VP-Channel”

Page 16: Exploitation of smart cards and human biometrics attributes RNDr. Luděk Smolík Martin Drahanský.

Conclusion• Protection of the users “private keys” is very important

• PKI solutions store keys in a PSE (Personal Security Environment) or on smart card

• Access control is traditionally done by password or PIN

• Biometrics can replace password and PIN

• Access to the private keys can be controlled by a biometric characteristic

• Non-transferability of biometric characteristics is important for Electronic Signature

• There is no “real” smart card with fingerprint sensor “on board”

• There is no “real matching” on a smart card, existing CPU for smart card have not sufficient computing power (~20 mips needed)

• The existing recognition algorithms are not faulty tolerant enough

f ( ) = 010......0100101