Top Banner
The Fuzzy Vault for fingerprints is Vulnerable to Brute Force Attack, the Collusion Attack Bastian Fischer Seminar Biometry & Security b-it WS '09/'10
21

The Fuzzy Vault for fingerprints is Vulnerable to Brute ... · PDF fileMotivation •Fuzzy Vault scheme is an encryption scheme, which can tolerate errors in the keys (e.g. fingerprint

Mar 06, 2018

Download

Documents

VũDương
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: The Fuzzy Vault for fingerprints is Vulnerable to Brute ... · PDF fileMotivation •Fuzzy Vault scheme is an encryption scheme, which can tolerate errors in the keys (e.g. fingerprint

The Fuzzy Vault for fingerprints is Vulnerable to Brute Force Attack,

the Collusion Attack

Bastian FischerSeminar Biometry & Security

b-it WS '09/'10

Page 2: The Fuzzy Vault for fingerprints is Vulnerable to Brute ... · PDF fileMotivation •Fuzzy Vault scheme is an encryption scheme, which can tolerate errors in the keys (e.g. fingerprint

Overview

• Motivation

• Short reminder of the Fuzzy Vault for fingerprints

• Vulnerability to Brute Force Attack

• The Collusion Attack

• Solution to increase security: Quiz

Page 3: The Fuzzy Vault for fingerprints is Vulnerable to Brute ... · PDF fileMotivation •Fuzzy Vault scheme is an encryption scheme, which can tolerate errors in the keys (e.g. fingerprint

Motivation

• Fuzzy Vault scheme is an encryption scheme, which can tolerate errors in the keys (e.g. fingerprint scanning issues)

• Since an attacker could get access to the message of a vault, he will be able to obtain the key by brute force attack

• If multiple vaults are known, it is even easier to obtain the key by just comparing x-values

• The Fuzzy Vault scheme can be improved by implementing additional features which increase Security

Page 4: The Fuzzy Vault for fingerprints is Vulnerable to Brute ... · PDF fileMotivation •Fuzzy Vault scheme is an encryption scheme, which can tolerate errors in the keys (e.g. fingerprint

Reminder: Fuzzy Vault (encoding)

• Polynomial

of degree k

identifies a secret S

Page 5: The Fuzzy Vault for fingerprints is Vulnerable to Brute ... · PDF fileMotivation •Fuzzy Vault scheme is an encryption scheme, which can tolerate errors in the keys (e.g. fingerprint

Reminder: Fuzzy Vault (encoding)

• Polynomial

of degree k

identifies a secret S

• hiding f using t > kminutiae locations, thelocking set

Page 6: The Fuzzy Vault for fingerprints is Vulnerable to Brute ... · PDF fileMotivation •Fuzzy Vault scheme is an encryption scheme, which can tolerate errors in the keys (e.g. fingerprint

Reminder: Fuzzy Vault (encoding)

• Polynomial

of degree k

identifies a secret S

• hiding f using t > kminutiae locations, thelocking set

• Evaluating the lockingset with f to thegenuine set

Page 7: The Fuzzy Vault for fingerprints is Vulnerable to Brute ... · PDF fileMotivation •Fuzzy Vault scheme is an encryption scheme, which can tolerate errors in the keys (e.g. fingerprint

Reminder: Fuzzy Vault (encoding)

• Generate random ChaffPoints to hide thegenuine set

• The Vault is now:

Page 8: The Fuzzy Vault for fingerprints is Vulnerable to Brute ... · PDF fileMotivation •Fuzzy Vault scheme is an encryption scheme, which can tolerate errors in the keys (e.g. fingerprint

Reminder: Fuzzy Vault (open the Vault)

• K + 1 genuine pointsmust be known to open the vault and tocompute itsinterpolatingpolynomial

• False points result in a completely different curve.

Page 9: The Fuzzy Vault for fingerprints is Vulnerable to Brute ... · PDF fileMotivation •Fuzzy Vault scheme is an encryption scheme, which can tolerate errors in the keys (e.g. fingerprint

Reminder: Fuzzy Vault (decode)

• A second genuine setof the same fingerprintmight not be identicalto the original genuine set (distortion, rotation)

• If the distance is not tofar, an error correctionalgorithm makes a successful decodingpossible

Page 10: The Fuzzy Vault for fingerprints is Vulnerable to Brute ... · PDF fileMotivation •Fuzzy Vault scheme is an encryption scheme, which can tolerate errors in the keys (e.g. fingerprint

Vulnerability to Brute Force Attack

• Choose t + 1 distinctpoints at random

Page 11: The Fuzzy Vault for fingerprints is Vulnerable to Brute ... · PDF fileMotivation •Fuzzy Vault scheme is an encryption scheme, which can tolerate errors in the keys (e.g. fingerprint

Vulnerability to Brute Force Attack

• Choose t + 1 distinctpoints at random

• Compute byinterpolating thechosen points.

Page 12: The Fuzzy Vault for fingerprints is Vulnerable to Brute ... · PDF fileMotivation •Fuzzy Vault scheme is an encryption scheme, which can tolerate errors in the keys (e.g. fingerprint

Vulnerability to Brute Force Attack

• Choose t + 1 distinctpoints at random

• Compute byinterpolating thechosen points.

• If the graph of fcontains t vault points, output f, otherwisestart all over again.

Page 13: The Fuzzy Vault for fingerprints is Vulnerable to Brute ... · PDF fileMotivation •Fuzzy Vault scheme is an encryption scheme, which can tolerate errors in the keys (e.g. fingerprint

• Choose t + 1 distinctpoints at random

• Compute byinterpolating thechosen points.

• If the graph of fcontains t vault points, output f, otherwisestart all over again.

Brute Force Attack will finally lead to…

Page 14: The Fuzzy Vault for fingerprints is Vulnerable to Brute ... · PDF fileMotivation •Fuzzy Vault scheme is an encryption scheme, which can tolerate errors in the keys (e.g. fingerprint

Vulnerability to Brute Force Attack• Given the Vault , the probability P

that a brute force attack by randomly chosingk + 1 vault points an interpolate them will result in the correct f is:

• Computing the interpolation polynomial f canbe done in operations.

• is the probability that t points lie on the graph of the polynomial f

Page 15: The Fuzzy Vault for fingerprints is Vulnerable to Brute ... · PDF fileMotivation •Fuzzy Vault scheme is an encryption scheme, which can tolerate errors in the keys (e.g. fingerprint

Vulnerability to Brute Force Attack

• Complexity: An Intruder with the knowledgeof an intercepted can recover the secret S in

operations, where C < 8rk.

Proof: Since wie have

an attacker has to compute the interpolated

polynomial f to his randomly chosen vault points

each try, which can be done in 6.5*log^2(k) =: K.

Page 16: The Fuzzy Vault for fingerprints is Vulnerable to Brute ... · PDF fileMotivation •Fuzzy Vault scheme is an encryption scheme, which can tolerate errors in the keys (e.g. fingerprint

Vulnerability to Brute Force Attack

So computing all interpolated polynomials can be done in < 7.2*k*log^2(k)*(r/t)^k operations.

Search a point (U,W) ϵ such that g(U)=W. This requires r/K interpolations. When no point is found,

discard . If it was not discarded, search for a furtherpoint, which has this properties. This step has theprobability 1/q. If a point has been found, add it to , otherwise discard it.

This continues until the attack is finished. Adding up all Numbers of those steps with weights given by theprobability of occurrence, one finds:

Page 17: The Fuzzy Vault for fingerprints is Vulnerable to Brute ... · PDF fileMotivation •Fuzzy Vault scheme is an encryption scheme, which can tolerate errors in the keys (e.g. fingerprint

Factors that influence the complexityof a b.f.a.

• Restricting the region of interest– irrelevant, when minutiae uniformly distributet, because r and t are scaled by

the same factor, r/t and the complexity remain unchanged.

• Increasing k– complexity grows– requires large unlocking sets– might be a problem for fingerprint scanners

• Increasing #Chaffpoints– complexity grows– smaller distances between points in the vault– can compromise error corrections during unlocking

• Reducing t in the genuine List– Lesser points of interest– Could reduce the size of the unlocking set below the required minimum

Page 18: The Fuzzy Vault for fingerprints is Vulnerable to Brute ... · PDF fileMotivation •Fuzzy Vault scheme is an encryption scheme, which can tolerate errors in the keys (e.g. fingerprint

The Collusion Attack

• Possible Attack, if an attacker is aware ofmore than one Fuzzy Vault, e.g. a fewsmartcards carrying the same biometricinformation (fingerprint).

• Attacker can compare the x-coordinates ofboth templates.

• Some may be different because ofdifferent scanners, but a few might beidentical.

• All found identical x-coordinates arestored during this attack, the others arerecognized as Chaffpoints and removed. The remaining points result in theeffective vault.

• With these x-coordinates, the polynomialcould be interpolated to unlock the vault, because it could be successfullyauthentificated after error correction

• More known Vaults meens higherprobability to find identical x-coordinates.

Page 19: The Fuzzy Vault for fingerprints is Vulnerable to Brute ... · PDF fileMotivation •Fuzzy Vault scheme is an encryption scheme, which can tolerate errors in the keys (e.g. fingerprint

Fuzzy Vault with Quiz

• Additional minutiaeinformation increasessecurity

• Def.:Let a genuine vault pointand α the orientationwith granularity π/n, n small.

• α is used to change Y-Coordinates of thegenuine vault points.

Page 20: The Fuzzy Vault for fingerprints is Vulnerable to Brute ... · PDF fileMotivation •Fuzzy Vault scheme is an encryption scheme, which can tolerate errors in the keys (e.g. fingerprint

Fuzzy Vault with Quiz

• Choose random β• j encodes transformation

• Compute j so that j*π/n = α – β mod π.

• Now genuine points aretransformed to thepattern (X,Y‘, β), withY‘=T(Y).

• Chaffpoints are treatedthe same way

Page 21: The Fuzzy Vault for fingerprints is Vulnerable to Brute ... · PDF fileMotivation •Fuzzy Vault scheme is an encryption scheme, which can tolerate errors in the keys (e.g. fingerprint

More improvement ideas…

• Using more fingers

• Non-random Chaff points

– Guaranteed distances between vault points

– Easier to maximize the number of points in theField

• CRC

– Additional checksum makes decoding easier