Analysis of Biometric-Based Cryptographic Key Exchange Protocols—BAKE and BRAKE
-
Published:2024-04-06
Issue:2
Volume:8
Page:14
-
ISSN:2410-387X
-
Container-title:Cryptography
-
language:en
-
Short-container-title:Cryptography
Author:
Gorski Maksymilian1, Wodo Wojciech1ORCID
Affiliation:
1. Faculty of Information and Communication Technology, Wroclaw University of Science and Technology, Wybrzeze Wyspianskiego 27, 50-370 Wroclaw, Poland
Abstract
Biometric authentication methods offer high-quality mechanisms to confirm the identity of individuals in security systems commonly used in the modern world, such as physical access control, online banking, or mobile device unlocking. They also find their application in cryptographic solutions, which allow the biometrically authenticated exchange of cryptographic keys between users and services on the internet, despite the fuzziness of biometric data. Such solutions are BAKE (biometrics-authenticated key exchange) and BRAKE (biometric-resilient authenticated key exchange) protocols, upon which our work is based. However, the direct application of fuzzy biometrics in cryptography, which relies heavily on the accuracy of single-bit secret values, is not trivial. Therefore, this paper is devoted to analyzing the security of this idea and the feasibility of implementing biometric AKE (authenticated key exchange) protocols, with an emphasis on the BRAKE protocol. As the results of our analysis, we discuss BRAKE’s limitations and vulnerabilities, which need to be appropriately addressed to implement the protocol in modern systems.
Reference9 articles.
1. Wang, M., He, K., Chen, J., Li, Z., Zhao, W., and Du, R. (2021, January 15–19). Biometrics-Authenticated Key Exchange for Secure Messaging. Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications Security, Virtual Event, Republic of Korea. 2. Bauspieß, P., Silde, T., Poljuha, M., Tullot, A., Costache, A., Rathgeb, C., Kolberg, J., and Busch, C. (2022). BRAKE: Biometric Resilient Authenticated Key Exchange, IEEE. Available online: https://eprint.iacr.org/2022/1408. 3. Dodis, Y., Ostrovsky, R., Reyzin, L., and Smith, A. (2006). Fuzzy Extractors: How to Generate Strong Keys from Biometrics and Other Noisy Data. arXiv. 4. Juels, A., and Sudan, M. (2002). A Fuzzy Vault Scheme, IEEE. Available online: https://eprint.iacr.org/2002/093. 5. Unlinkable minutiae-based fuzzy vault for multiple fingerprints;Tams;IET Biom.,2016
Cited by
1 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
|
|