Follow Slashdot blog updates by subscribing to our blog RSS feed

 



Forgot your password?
typodupeerror
×
IT Security Encryption

Exchanging Pictures To Generate Passwords 123

Roland Piquepaille writes "Today, Ileana Buhan, a Romanian computer scientist, is presenting her PhD Thesis at the University of Twente in the Netherlands. She is using biometrics to protect confidential information when it is exchanged between two mobile devices. This is a very innovative approach to security. Buhan's biometric application will generate almost unbreakable passwords from photos taken by the connected users. Here is how it works. 'To do this, two users need to save their own photos on their PDAs. They then take photos of each other. The PDA compares the two photos and generates a security code for making a safe connection.'"
This discussion has been archived. No new comments can be posted.

Exchanging Pictures To Generate Passwords

Comments Filter:
  • Re:biometrics ? (Score:2, Informative)

    by gsgriffin ( 1195771 ) on Thursday October 23, 2008 @09:45PM (#25492053)
    Biometrics is using something about you, your person, to measure or provide unique indentity. This is as much a biometric as a thumb scanner.
  • by pclminion ( 145572 ) on Thursday October 23, 2008 @09:48PM (#25492087)
    I just want to tell you how AWESOME that idea is.
  • Re:Crack (Score:3, Informative)

    by gsgriffin ( 1195771 ) on Thursday October 23, 2008 @09:53PM (#25492137)
    Still missing it. It has nothing to do with who is in the picture. It has to do with the actual data in the file that stores the image. Put a badge on a person in a photo and the data of the jpg file will change. You could take 20 pictures of the same person standing in the same spot, and you will come up with 20 different files (binary code in the jpg, that is). This process only works by handing over the exact image file that you are using as your ID. If they don't have that exact image file, it wouldn't work.
  • Re:Oh Dear (Score:5, Informative)

    by ASBands ( 1087159 ) on Thursday October 23, 2008 @10:42PM (#25492573) Homepage

    An image is random enough, but you can take a cryptographic hash of anything you want to - a password, a phone number, a song, an image, etc. How many ticks the processor has made in it's lifetime or the total value of all the bytes added up (modulus something) currently in memory will also be quite random, so the "using a picture" thing isn't really solving any problems. However, it does provide the basis of a framework that would allow you to move that picture (along with the one of yourself) to other devices in order to keep the shared secret key so you can continue to verify the person you're communicating with, since you can re-generate that key. Although there was nothing preventing you from just moving a keyfile in the first place. Don't forget - the more places the key is, the easier it will be for attackers to obtain.

    As for the secure transmission of those keys - it's called the Diffie-Hellman Key Exchange [wikipedia.org] and it has been around for over 3 decades and remains unbroken. Alice and Bob communicate some numbers which allow them to generate the same key, but Eve has no way of generating the same number.

    I also replied here [slashdot.org], so if you think this post is unclear, read there, too.

  • Re:Oh Dear (Score:5, Informative)

    by smallfries ( 601545 ) on Friday October 24, 2008 @06:58AM (#25495759) Homepage

    No you've completely missed the point. Each user takes their own photograph of themselves. This never leaves their device. When a connection is to be setup the other user photographs them. There are now 4 photos in the set:

    Alice's photo of Alice
    Alice's photo of Bob
    Bob's photo of Alice
    Bob's photo of Bob

    Each user now has a pair of images that should be similar (but are not the same). Alice has a photo of her and Bob, Bob has different photos of Alice and himself.

    The images are hashed in some sense to generate a seed for the key. The assumption is that the image hash is robust enough that the two different images of Alice generate the same seed, and the same for Bob.

    So if I now take a third pair of pictures, one of Alice and one of Bob, and the hash is robust then I can recompute their seed, and derive their key. As I said originally, it's some interesting vision work to come with a robust hash like that, but it is not actually secure.

    If you still don't believe me, then reread the article and consider that the security of the system relies on Alice's picture never leaving her device. The same applies for Bob. To perform key agreement that means the same seed must be derived from the separate images.

This file will self-destruct in five minutes.

Working...