1 / 5

Secure Authentication Using Biometric Data

Secure Authentication Using Biometric Data . Andrew Ackerman Professor Ostrovsky. Background. Secure Authentication Using Biometric Data By Xavier Boyen, Yevgeniy Dodis, Jonathan Katz, Rafail Ostrovsky, Adam Smith Trying to implement design Interested in Cryptography. The Plan.

moya
Télécharger la présentation

Secure Authentication Using Biometric Data

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Secure Authentication Using Biometric Data Andrew Ackerman Professor Ostrovsky

  2. Background • Secure Authentication Using Biometric Data • By Xavier Boyen, Yevgeniy Dodis, Jonathan Katz, Rafail Ostrovsky, Adam Smith • Trying to implement design • Interested in Cryptography

  3. The Plan • Using Biometric Data in a Cryptographic protocol • Using Fingerprints • Goal • Use fingerprint reader to read in data • Use algorithm to overcome “randomness” • Use readout as secret in a cryptographic protocol

  4. Possible End States • Low Knowledge of Fingerprints • Assumptions made by paper might not fit • Possible end Goals • Build the system and test it • If fingerprints aren’t hamming distance, try to come up with algorithm to make them so • Come up with new way of analyzing fingerprints • Modify the protocol in paper to work with fingerprint distribution (if not hamming).

  5. Checkpoints • 3 Quarter Project • Projected Quarter Goals: • Understand of Fingerprints and Recognition Techniques • Software Prototype (if possible) • Add Encryption Protocol (if possible) • First Goal • Understand Fingerprint Reader • Understand Fingerprint Recognition Techniques

More Related