Share on Facebook Tweet on Twitter Share on LinkedIn Share by email
The Practical Subtleties of Biometric Key Generation

Lucas Ballard, Seny Kamara, and Michael K. Reiter

Abstract

The inability of humans to generate and remember strong secrets makes it difficult for people to manage cryptographic keys. To address this problem, numerous proposals have been suggested to enable a human to repeatably generate a cryptographic key from her biometrics, where the strength of the key rests on the assumption that the measured biometrics have high entropy across the population. In this paper we show that, despite the fact that several researchers have examined the security of BKGs, common techniques used to argue the security of practical systems are lacking. To address this we reexamine two well known, yet sometimes misunderstood, requirements. We also present another that we believe has not received adequate attention in the literature, but is essential for practical biometric key generators. To demonstrate that each requirement has significant importance, we analyze three published schemes, and point out deficiencies in each. For example, in one case we show that failing to meet a requirement results in a construction where an attacker has a 22% chance of finding ostensibly 43 bit keys on her first guess. In another we show how an attacker who compromises a user's cryptographic key can then infer that user's biometric, thus revealing any other key generated using that biometric. We hope that by examining the pitfalls that occur continuously in the literature, we enable researchers and practitioners to correctly analyze proposed constructions.

Details

Publication typeInproceedings
Published inAnnual USENIX Security Symposium
PublisherUSENIX
> Publications > The Practical Subtleties of Biometric Key Generation