Hashing Out the Next Step in Biometric Security 117
ergo98 writes "CNN is running a story about biometric hashing. Using this technique, biometric inputs (such as facial characteristics) are altered based upon individual characteristics in a hopefully one-way process. The goal is to continue to reduce the risk of a back-end data exposure."
Compromises? (Score:5, Insightful)
Re:Compromises? (Score:3, Interesting)
Re:Compromises? (Score:2)
Re:Compromises? (Score:5, Insightful)
Re:Compromises? (Score:1)
Re:Compromises? (Score:1)
(granted these are a bit finicky and i had to send mine back)
Re:Compromises? (Score:3, Interesting)
- iris ID combined with testing of the accommodation reflex, to make sure a real, functioning eye is looking at the camera.
- fingerprinting combined with infrared scanning, to verify that an unaltered living finger is used.
- voiceprinting of unique and varying phrases to eliminate recordings.
and so on.
Re:Compromises? (Score:1, Interesting)
Re:Compromises? (Score:2)
For high security -- very high security -- environments, perhaps. But my personal feeling is that this isn't where we're going (thumbprint scanners on iPaq's and
Re:Compromises? (Score:5, Interesting)
In many protocols, when a session is initiated, the beginning of the transaction includes a handshake. One side says hello are you there, the other replies yes I'm here and the session continues.
Why not make an actual, physical handshake verifier? I'm sure most people are consistent with their real handshakes, and there are a wide variety of measurable parameters a handshake can provide. For example, when shaking someone's hand, you apply very specific pressure, grip a particular way that spreads pressure to consistent points on your buddy's hand, hand temperature (which can vary depending on a number of factors but we're talking average), hand placement, duration and motion of the shake, etc. You could take it one step further and teach your employees and the system some jive handshakes that involve many steps. The admin could have the most intricate handshake of all.
The beauty to all this is that handshakes tend to be very personal and never given out. How could someone hack or even learn a secret handshake? It'd be pretty damn hard to do and even harder to replicate once you figured out the sequence due to pressure and duration, etc.
Schneier should give this one some thought. All you really need is a rubber jointed hand sticking out of the wall (or hidden inside it, retractable) that feels appropriately like a real human hand. Ask the RealDoll people for advice on this. Load it up with sensors and start training it.
Re:Compromises? (Score:2)
Except that in that movie, it was a complex choreographed action.
Never saw "Undercover Brother", but... (Score:1)
Re:Compromises? (Score:2)
I just tried to explain to my wife why I was laughing so hard, and I just got a confused stare... geek I am most certainly.
Re:Compromises? (Score:2)
You could have a backup identifier at that point, but then your security is only as secure as the backup identifier.
Fingerprints never change, and only are lost if you lose the finger. Most people don't lose fingers during their lifetimes, but people do injure their hands for a day or two.
Re:Compromises? (Score:2)
Re:Compromises? (Score:1)
Re:Compromises? (Score:1)
Re:Compromises? (Score:2)
Isn't there something similar device under development for gun triggers? It senses the pressure pattern during the shot and not fires if the pattern doesn't match.
Sounds like a terrible idea to me. That jittery second in which one would decide to use lethal force to defend himself would most certainly (I should hope) be different than just any regular day at the firing range.
Re:Compromises? (Score:2, Informative)
Re:Compromises? (Score:2)
Umm... isn't that fairly irrelevant, since the input (real OR faked) would remain exactly the same?
Maybe I'm missing something here, but this seems like changing the way a password hash is stored in the database without actually changing the password itself.
The password is the input -- your retina, your fingerprint, etc.. You can't change that, so once someone has a reliable method to duplicate wh
Agreed. (Score:2)
The only biometric I've seen with promise uses fingernail etchings. If your password is compromised, zero the old etching and use another fingernail. About 30K of data fits, apparently.
I'd still prefer a private key on disk or SecureID token.
Re:Agreed. (Score:2)
Re:Compromises? (Score:1)
Re:Compromises? (Score:2)
Re:Compromises? (Score:1)
Recent convert from anti-biometric to pro-biometri (Score:2)
The three categories are listed again as something you: HAVE, REMEMBER, and ARE.
Perhaps, we're a bit hasty in throwing out the biometric equation as being harshly non-revokable (no amount of hashing marketspeak can shake that solid notion).
What if "ARE" is being used as a first-line of defense, albiet a very weak defense. It would make the whole authentication/authorization more casu
Please sit here to confirm your identity. (Score:5, Funny)
Re:Please sit here to confirm your identity. (Score:1)
The executives of my firm (Score:5, Funny)
Seriously.
They cited Demolition Man.
For real.
Re:The executives of my firm (Score:2)
Demolition Man has proved to be an oddly prophetic movie. "Schwarzenegger Presidential Library", anyone?
Re:The executives of my firm (Score:3, Funny)
I real life you just rip off the head.
KFG
Other Hollywood lessons (Score:1, Funny)
Re:The executives of my firm (Score:2)
And for a reason (Score:4, Informative)
Re:And for a reason (Score:2)
One Way Process (Score:5, Funny)
Re:One Way Process (Score:1, Funny)
Re:One Way Process (Score:1)
The BOFH:
"Using this Force Induced Steganographic Technique I can rehash your face, so nobody will recognize you... wanna try?"
Re:One Way Process (Score:1)
Cue the Muppet Show sketch "Vend-a-face".
Man, I miss that show...
Process schmocess (Score:5, Funny)
Heck, they need billion dollar research grants to figure out these "techniques"? Bubba, Sparky and his pals downtown would irreversibly alter an individual's facial characteristics given $100.00, 10 minutes and enough motivation.
Re:Process schmocess (Score:2)
Oh great. (Score:1)
Oh joy, the wonders of modern technology.
Re:Oh great. (Score:1)
Not all hackers are white!
Reducing the risk. (Score:1)
Nothing is one way. (Score:2)
Re:Nothing is one way. (Score:2)
About MD5, if someone had a fast enough computer, that can be reversed into the original, with some possible duplications. But I don't know how fast. Perhaps NSA computer fast.
Re:Nothing is one way. (Score:3, Insightful)
Re:Nothing is one way. (Score:1)
Wow. You have some fscked up porn on there. Wow.
Re:Nothing is one way. (Score:2)
Some? Shouldn't that be "infinite"?
Re:Nothing is one way. (Score:1)
What you are describing is possible with any type of encryption imaginable (that's why our encryption standards are always changing), but not with a hash function. With hash functions you
Re:Nothing is one way. (Score:2)
Re:Nothing is one way. (Score:2, Interesting)
Think about it: it's basically a check-sum.
Example: I'm thinking of 10 numbers from 0 to 255 inclusive. The sum of those numbers modulo 256 is 123. Now tell me what those numbers are, in the same order that I was thinking of.
"some possible duplications" indeed
Re:Nothing is one way. (Score:2)
Re:Nothing is one way. (Score:1)
If you were designing cryptographic hash functions, I would have just stolen your biometric data. Or, effectively, that of your identical twin.
Re:Nothing is one way. (Score:1)
Re:Nothing is one way. (Score:2)
Re:Nothing is one way. (Score:2, Funny)
You've obviously never seen what happens when the marketing department, accounting department, and human resources department intercept and edits the requirements report from senior executive management for new software before it gets to the programming department have you?
Isn't there a -1, WRONG? (Score:3, Informative)
Anyway, the RSA is constantly working on getting better and better hashes. We got SHA-256, SHA-512 and SHA-1024. And these are way more advanced than SHA1.
Unless of course, you're running quantum cryptography.
Anyway, all it has to be done to create a "virtually unbreakable" has
Re:Isn't there a -1, WRONG? (Score:2, Informative)
Although I agree that the GP seems pretty clueless with respect to basic cryptography, as you say, I have to correct you and the numerous following posters about the "irreversibility" of cryptographic hash functions.
It is true that theoretically, these functions map an infinite domain of messages into hashes and therefore every hash has an infinite number of possible pre-images. This theoretical irreversibility is dependent on any random string being considered a possible pre-image.
In practice, if one
Re:Isn't there a -1, WRONG? (Score:2, Insightful)
in the calculations of my previous post.
It looks less impressive when you have to divide
by 8 to get bytes...
That still doesn't make doubling the
hash lengths every time they're broken a good idea.
Unless you think the minimum message length will
be increasing similarly?
Bio-metrics, my ass! (Score:4, Funny)
The goal is to continue to reduce the risk of a back-end data exposure.
Sure, today they promise that they only want to do biometrics on my face and fingers. But its just the tip of the slippery slope. You know we can't trust them. Just like the social security cards used to all say "not to be used for identification" and look what good that did.
I say that if we don't fight these biometric overlords, it is only a matter of time before they are forcing us to sit naked on copiers so they can xerox our asses! Make a stand now while you still have some dignity, and your pants!
Re:Bio-metrics, my ass! (Score:2)
"Place a hair into the reader."
"YOU INSENSITIVE PRICK!"
Re:Bio-metrics, my ass! (Score:1)
Which is even funnier!
Re:Bio-metrics, my ass! (Score:1)
Biometric Encryption (Score:5, Informative)
What I found funny (Score:2)
They show a fingerprint scanner, and how the print gets warped before being stored. Then along comes John Q. Hacker, who manages to hack the database, extract the stored (and presumably encrypted) fingerprint data, build a fake fingerprint out of that data... and BOOM! He is foiled because of that warping step.
Wow, that hacker went to a huge amount of work just to get that fingerprint data.. meanwhile, the user is happily going abo
Re:What I found funny (Score:2)
Back-end data exposure? (Score:1, Funny)
~~~
DNA Hashes (Score:4, Interesting)
This actually seems easy to do. Combining various biological inputs to derive a unique identitfier.
It doesn't seem like a GOOD idea quite yet, but it certainly seems like something that companies will pursue since I'm sure there are people willing to pay money for it.
DNA spray for biometrics? (Score:2)
Its relatively easy to spread someone elses DNA all over a crime scene (google 'DNA spray'). I don't think it'd be that difficult to do with DNA based biometrics.
Re:DNA Hashes (Score:1)
But, given those circumstances, it would narrow down the list of possible suspects quite substantially
What about equipment maintenance? (Score:4, Insightful)
the inevitable (Score:1)
Maybe global warming will get us a
More Misdirection from the Biometric Community (Score:5, Informative)
A story that is still relavent whenever biometrics is brought up:
[hindustantimes.com]http://www.hindustantimes.com/news/7242_1301216,00 180008.htm [hindustantimes.com]
Re:More Misdirection from the Biometric Community (Score:3, Insightful)
Re:More Misdirection from the Biometric Community (Score:2)
* something you can forget
* something you can lose
* something that can change as you age
More like:
Re:More Misdirection from the Biometric Community (Score:2)
I take it you've never seen a real fingerprint latent or done any real latent lifting.
You know, CSI is 99% bullshit and the fingerprint scene in "National Treasure" is utterly ridiculous.
Re:More Misdirection from the Biometric Community (Score:2)
Re:More Misdirection from the Biometric Community (Score:2)
Then again, if the biometric access device is in such a place (eg. alone, unguarded, nobody sees you trying to lift a latent or to put a rubber thingy on it), then itd be even easier to break the lock than to go to all the trouble to bypa
This isn't a hash, it's a salt (Score:1, Informative)
SEERRR EEEEEE OOOOOO SLY (Score:1)
attacking the lower risk issue (Score:2)
However, the complexity in stealing the back-end pales in comparison to stealing the actual biome
won't work... (Score:2)
Even the mighty RFID chip under the skin will fail as hackers and evil doers don't take no for an answer.
In the end, when the people are BEGGING to be protected from the evil doers, BIG BROTHER will step in with the ultimate biometric system, the "Soul Sucker Chip" whereby part of your soul is taken and stored in the Universal Comparator, aka "The Approver". Every transaction, every movement will be handled by the "The
Hash for Hash? (Score:1)
i got an idea? (Score:1)
Pimple troubles (Score:1)
2) Put a "Acne Trouble? click here" link and force to buy lots of acne cream
3) ???
4) Profit!!!
Biometric Hash Reversal (Score:2)
Fingerprint Readers: http://chris.fornax.net/biometrics.html [fornax.net]
Face Recognizers
http://www.site.uottawa.ca/~adler/publications/200 3/adler-2003-fr-templates.pdf [uottawa.ca]
Both attacks are based on the idea that the algorithms are necessarily fuzzy, and as such emit not just an oracular "match/not match" but a weighting regarding how accurate the matching is. As such, you basically can perturb the underlying data slightly, run it through the algorithm, and
Vender Lock-in for Questionable benefit (Score:3, Informative)
Now perhaps I am jumping to conclusions and IBM has implemented some kind of removable card interface for hashing but I find that doubtful. Moreover, hashing biometric data is of questionable benefit in any case. Most biometric data is more easily collectable by simple investagatory techniques (covert photography, dusting for prints) than reconstructing a face from the security data. Moreover, since biometric characteristics are necessarily unchangeable potential hackers could merely use the data from some other less secure biometric security system one of your users also uses. Heck, creating a fake biometric id system and using social engineering to get someone to use it would be way easier than reversing these hashes.
Furthermore designing a secure hash to accomodate the inexact nature of biometric identification seems difficult. By it's very nature a secure hash cannot be guaranteed to map similar inputs to similar hashs. Thus either the hash will be insecure, the system too prone to false negatives to be usefull, or the biometric data must first be rounded to exact values (or for borderline cases just hash both possible ways to round). Yet a rounding scheme which avoids too many false negatives will significantly reduce the 'password' space.
In a normal system the sensor would report all the biometric measurments to the authorization server which would compare the measurements to the stored measurements and see if they are sufficently close to an authorized user. Since a secure hash can't be 'close enough' the measurements must be rounded sufficently to always give the same value for the same user. The net result will be a reduction, not increase, in security. I actually suspect IBM isn't using a secure hash in the cryptographic sense.
A more promising option in my opinion would be to implement a distinct algorithm in the sensor to check that the person had normal human features. Thus even if a hacker steals the biometric info and attempts to produce a fake he must not only duplicate those particular measurements but incorporate them into an image/texture which is otherwise human normal. Since these two algorithms can use different information it would be difficult to defeat. Furthermore since the human detection can be isolated in the sensor no vendor incompatibility issues arise and the algorithm can even be upgraded.
Re:Vender Lock-in for Questionable benefit (Score:1)
I believe that a similar trick has been demonstrated with contact lenses for iris recognition; the base problem is that it's too easy to change appearance to match someone else at a
What is the point of biometrics? (Score:1)
This is particularly true when crytographic research goes on in public, while this biometric stuff is closed and proprietary. Can we tell how secure the protocols and algorithms are? Not a chance. Given that it is highly likely th
The goal is to continue to reduce the risk of ... (Score:2)
So you can't turn a hash of my fingerprints back into my fingerprints.
Big deal.
You can still collate my hashed fingerprint in THIS database with my hashed fingerprint in THAT database etc. etc. until you stumble on a database that has my hashed fingerprint and my name.
In other words, all the data-mining junk still works. You can still track me, SPAM me, sell my information, even find out my name and where I live.
Solutions excisting already (Score:1)
Using hash functions in biometric identification has been already around for awhile. Working everyday examples can be found for example from http://www.deltabit.fi/ [deltabit.fi]. They're used in hospitals, homes, even fitness centers.
In their appliance no fingerprints are saved to anywhere (!), only the numerical value, which is product of one-way-only hash function. I repeat, no image of one's finger print is stored anywhere, it's not even possible with the equipment used. You simply can not reverse the numerical val
But will it be real "hashing"? (Score:3, Interesting)
They gave me a sheet of paper to sign, with small print that most people probably ignore. As I was interested, I looked through to find out how they protect my information. It turns out that they store a "hash" of the fingerprint which cannot be used to recover the print except by a method which only certain people at the company which sold the system know.
So rather than a real secure hash, my fingerprint is protected by security through obscurity. I suspect it's much more like weak encryption than a hash, and that anyone who was really interested could get my fingerprint out, if they had the library's software available to reverse engineer.
There's very little motive in a school, but if this type of system spreads to offices or even banks, there are going to be real problems.
Wouldn't life be so incredibly simpler... (Score:2, Interesting)
You must be able to trust the reader (Score:1)