Analysis of Biometric-Based Cryptographic Key Exchange Protocols-BAKE and BRAKE

被引:1
作者
Gorski, Maksymilian [1 ]
Wodo, Wojciech [1 ]
机构
[1] Wroclaw Univ Sci & Technol, Fac Informat & Commun Technol, Wybrzeze Wyspianskiego 27, PL-50370 Wroclaw, Poland
关键词
cryptography; biometrics; key exchange; protocol; fuzzy vault; OPRF; AKE; BAKE; BRAKE;
D O I
10.3390/cryptography8020014
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Biometric authentication methods offer high-quality mechanisms to confirm the identity of individuals in security systems commonly used in the modern world, such as physical access control, online banking, or mobile device unlocking. They also find their application in cryptographic solutions, which allow the biometrically authenticated exchange of cryptographic keys between users and services on the internet, despite the fuzziness of biometric data. Such solutions are BAKE (biometrics-authenticated key exchange) and BRAKE (biometric-resilient authenticated key exchange) protocols, upon which our work is based. However, the direct application of fuzzy biometrics in cryptography, which relies heavily on the accuracy of single-bit secret values, is not trivial. Therefore, this paper is devoted to analyzing the security of this idea and the feasibility of implementing biometric AKE (authenticated key exchange) protocols, with an emphasis on the BRAKE protocol. As the results of our analysis, we discuss BRAKE's limitations and vulnerabilities, which need to be appropriately addressed to implement the protocol in modern systems.
引用
收藏
页数:15
相关论文
共 9 条
[1]  
Bauspie P., 2022, BRAKE: Biometric Resilient Authenticated Key Exchange
[2]   SoK: Oblivious Pseudorandom Functions [J].
Casacuberta, Silvia ;
Hesse, Julia ;
Lehmann, Anja .
2022 IEEE 7TH EUROPEAN SYMPOSIUM ON SECURITY AND PRIVACY (EUROS&P 2022), 2022, :625-646
[3]   Improved decoding of Reed-Solomon and algebraic-geometric codes [J].
Guruswami, V ;
Sudan, M .
39TH ANNUAL SYMPOSIUM ON FOUNDATIONS OF COMPUTER SCIENCE, PROCEEDINGS, 1998, :28-37
[4]   A fuzzy vault scheme [J].
Juels, A ;
Sudan, M .
ISIT: 2002 IEEE INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY, PROCEEDINGS, 2002, :408-408
[5]  
Ostrovsky R., 2006, arXiv, DOI [10.48550/ARXIV.CS/0602007, DOI 10.48550/ARXIV.CS/0602007]
[6]   POLYNOMIAL CODES OVER CERTAIN FINITE FIELDS [J].
REED, IS ;
SOLOMON, G .
JOURNAL OF THE SOCIETY FOR INDUSTRIAL AND APPLIED MATHEMATICS, 1960, 8 (02) :300-304
[7]   Cybersecurity and Sustainable Development [J].
Sulich, Adam ;
Rutkowska, Malgorzata ;
Krawczyk-Jezierska, Agnieszka ;
Jezierski, Jaroslaw ;
Zema, Tomasz .
KNOWLEDGE-BASED AND INTELLIGENT INFORMATION & ENGINEERING SYSTEMS (KSE 2021), 2021, 192 :20-28
[8]   Unlinkable minutiae-based fuzzy vault for multiple fingerprints [J].
Tams, Benjamin .
IET BIOMETRICS, 2016, 5 (03) :170-180
[9]   Biometrics-Authenticated Key Exchange for Secure Messaging [J].
Wang, Mei ;
He, Kun ;
Chen, Jing ;
Li, Zengpeng ;
Zhao, Wei ;
Du, Ruiying .
CCS '21: PROCEEDINGS OF THE 2021 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2021, :2618-2631