Review of Security with Noisy Data by Pim Tuyls , Boris Skoric and Tom
نویسندگان
چکیده
This book describes how to use biometric features such as finger prints or iris patterns to construct private keys for cryptography. It is a very interesting topic, as, nowadays, cryptographic protocols can store/produce thousands of bits of secure information, while the user needs a password to make the exchange secure. The major weakness in a cryptographic protocols is the user himself. Biometric features are methods to efficiently provide a large unique private key for a user. Unfortunately, the measurement equipment to acquire biometric data is inherently noisy and consequently a biometric matching operation is only approximate. The aim of this book is to study how the presence of noise has an impact on information security and how it can be dealt with.
منابع مشابه
Robust Key Extraction from Physical Uncloneable Functions
Physical Uncloneable Functions (PUFs) can be used as a cost-e ective means to store key material in an uncloneable way. Due to the fact that the key material is obtained by performing measurements on a physical system, noise is inevitably present in each readout. In this paper we present a number of methods that improve the robustness of bit-string extraction from noisy PUF measurements in gene...
متن کاملAn efficient fuzzy extractor for limited noise
A fuzzy extractor is a security primitive that allows for reproducible extraction of an almost uniform key from a non-uniform noisy source. We analyze a fuzzy extractor scheme that uses universal hash functions for both information reconciliation and privacy amplification. This is a useful scheme when the number of error patterns likely to occur is limited, regardless of the error probabilities...
متن کاملInformation-theoretic analysis of coating PUFs
Physical Uncloneable Functions (PUFs) can be used as a cost-e ective means to store cryptographic key material in an uncloneable way. In coating PUFs, keys are generated from capacitance measurements of a coating containing many randomly distributed particles with di erent dielectric constants. We introduce a physical model of coating PUFs by simplifying the capacitance sensors to a parallel pl...
متن کاملALGSICS - Combining Physics and Cryptography to Enhance Security and Privacy in RFID Systems
RFID-tags can be seen as a new generation of bar codes with added functionality. They are becoming very popular tools for identification of products in various applications such as supply-chain management. The widespread deployment of RFID technology will depend to a large extent on its acceptance by the general public. Thus, developing privacy and security technologies specifically suited to t...
متن کاملAnti-counterfeiting, key distribution, and key storage in an ambient world via physical unclonable functions
Virtually all applications which provide or require a security service need a secret key. In an ambient world, where (potentially) sensitive information is continually being gathered about us, it is critical that those keys be both securely deployed and safeguarded from compromise. In this paper, we provide solutions for secure key deployment and storage of keys in sensor networks and RFID syst...
متن کامل