Skip to main content

The practical subtleties of biometric key generation

Publication ,  Conference
Ballard, L; Kamara, S; Reiter, MK
Published in: Proceedings of the 17th USENIX Security Symposium
January 1, 2008

The inability of humans to generate and remember strong secrets makes it difficult for people to manage cryptographic keys. To address this problem, numerous proposals have been suggested to enable a human to repeatably generate a cryptographic key from her biometrics, where the strength of the key rests on the assumption that the measured biometrics have high entropy across the population. In this paper we show that, despite the fact that several researchers have examined the security of BKGs, the common techniques used to argue the security of practical systems are lacking. To address this issue we reexamine two well known, yet sometimes misunderstood, security requirements. We also present another that we believe has not received adequate attention in the literature, but is essential for practical biometric key generators. To demonstrate that each requirement has significant importance, we analyze three published schemes, and point out deficiencies in each. For example, in one case we show that failing to meet a requirement results in a construction where an attacker has a 22% chance of finding ostensibly 43-bit keys on her first guess. In another we show how an attacker who compromises a user’s cryptographic key can then infer that user’s biometric, thus revealing any other key generated using that biometric. We hope that by examining the pitfalls that occur continuously in the literature, we enable researchers and practitioners to more accurately analyze proposed constructions.

Duke Scholars

Published In

Proceedings of the 17th USENIX Security Symposium

Publication Date

January 1, 2008

Start / End Page

61 / 74
 

Citation

APA
Chicago
ICMJE
MLA
NLM
Ballard, L., Kamara, S., & Reiter, M. K. (2008). The practical subtleties of biometric key generation. In Proceedings of the 17th USENIX Security Symposium (pp. 61–74).
Ballard, L., S. Kamara, and M. K. Reiter. “The practical subtleties of biometric key generation.” In Proceedings of the 17th USENIX Security Symposium, 61–74, 2008.
Ballard L, Kamara S, Reiter MK. The practical subtleties of biometric key generation. In: Proceedings of the 17th USENIX Security Symposium. 2008. p. 61–74.
Ballard, L., et al. “The practical subtleties of biometric key generation.” Proceedings of the 17th USENIX Security Symposium, 2008, pp. 61–74.
Ballard L, Kamara S, Reiter MK. The practical subtleties of biometric key generation. Proceedings of the 17th USENIX Security Symposium. 2008. p. 61–74.

Published In

Proceedings of the 17th USENIX Security Symposium

Publication Date

January 1, 2008

Start / End Page

61 / 74