Analysis of Biometric-Based Cryptographic Key Exchange Protocols-BAKE and BRAKE

被引:1
作者
Gorski, Maksymilian [1 ]
Wodo, Wojciech [1 ]
机构
[1] Wroclaw Univ Sci & Technol, Fac Informat & Commun Technol, Wybrzeze Wyspianskiego 27, PL-50370 Wroclaw, Poland
关键词
cryptography; biometrics; key exchange; protocol; fuzzy vault; OPRF; AKE; BAKE; BRAKE;
D O I
10.3390/cryptography8020014
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Biometric authentication methods offer high-quality mechanisms to confirm the identity of individuals in security systems commonly used in the modern world, such as physical access control, online banking, or mobile device unlocking. They also find their application in cryptographic solutions, which allow the biometrically authenticated exchange of cryptographic keys between users and services on the internet, despite the fuzziness of biometric data. Such solutions are BAKE (biometrics-authenticated key exchange) and BRAKE (biometric-resilient authenticated key exchange) protocols, upon which our work is based. However, the direct application of fuzzy biometrics in cryptography, which relies heavily on the accuracy of single-bit secret values, is not trivial. Therefore, this paper is devoted to analyzing the security of this idea and the feasibility of implementing biometric AKE (authenticated key exchange) protocols, with an emphasis on the BRAKE protocol. As the results of our analysis, we discuss BRAKE's limitations and vulnerabilities, which need to be appropriately addressed to implement the protocol in modern systems.
引用
收藏
页数:15
相关论文
共 9 条
  • [1] Bauspie P., 2022, BRAKE: Biometric Resilient Authenticated Key Exchange
  • [2] SoK: Oblivious Pseudorandom Functions
    Casacuberta, Silvia
    Hesse, Julia
    Lehmann, Anja
    [J]. 2022 IEEE 7TH EUROPEAN SYMPOSIUM ON SECURITY AND PRIVACY (EUROS&P 2022), 2022, : 625 - 646
  • [3] Improved decoding of Reed-Solomon and algebraic-geometric codes
    Guruswami, V
    Sudan, M
    [J]. 39TH ANNUAL SYMPOSIUM ON FOUNDATIONS OF COMPUTER SCIENCE, PROCEEDINGS, 1998, : 28 - 37
  • [4] A fuzzy vault scheme
    Juels, A
    Sudan, M
    [J]. ISIT: 2002 IEEE INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY, PROCEEDINGS, 2002, : 408 - 408
  • [5] Ostrovsky R., 2006, arXiv, DOI [10.48550/ARXIV.CS/0602007, DOI 10.48550/ARXIV.CS/0602007]
  • [6] POLYNOMIAL CODES OVER CERTAIN FINITE FIELDS
    REED, IS
    SOLOMON, G
    [J]. JOURNAL OF THE SOCIETY FOR INDUSTRIAL AND APPLIED MATHEMATICS, 1960, 8 (02): : 300 - 304
  • [7] Cybersecurity and Sustainable Development
    Sulich, Adam
    Rutkowska, Malgorzata
    Krawczyk-Jezierska, Agnieszka
    Jezierski, Jaroslaw
    Zema, Tomasz
    [J]. KNOWLEDGE-BASED AND INTELLIGENT INFORMATION & ENGINEERING SYSTEMS (KSE 2021), 2021, 192 : 20 - 28
  • [8] Unlinkable minutiae-based fuzzy vault for multiple fingerprints
    Tams, Benjamin
    [J]. IET BIOMETRICS, 2016, 5 (03) : 170 - 180
  • [9] Biometrics-Authenticated Key Exchange for Secure Messaging
    Wang, Mei
    He, Kun
    Chen, Jing
    Li, Zengpeng
    Zhao, Wei
    Du, Ruiying
    [J]. CCS '21: PROCEEDINGS OF THE 2021 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2021, : 2618 - 2631