Studying Potential Side Channel Leakages on an Embedded Biometric Comparison System

نویسندگان

  • Maël Berthier
  • Yves Bocktaels
  • Julien Bringer
  • Hervé Chabanne
  • Taoufik Chouta
  • Jean-Luc Danger
  • Mélanie Favre
  • Tarik Graba
چکیده

We study in this work the potential side channel leakages of a hardware biometric comparison system that has been designed for fingerprints. An embedded biometric system for comparison aims at comparing a stored biometric data with a freshly acquired one without the need to send the stored biometric data outside the system. Here one may try to retrieve the stored data via side channel, similarly as for embedded cryptographic modules where one may try to exploit side channel for attacking the modules. On one hand, we show that we can find partial information by the means of simple Side Channel Analysis that may help to retrieve the stored fingerprint. On the other hand, we illustrate that reconstructing the fingerprint remains not trivial and we give some simple countermeasures to protect further the comparison algorithm.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Biometric Cryptosystem based Energy Attack Analysis

Biometric cryptosystem provides a seamless connection between the biometrics and traditional password, and it represents a new development in the next generation cryptography. Even if the biometric cryptosystem is secure in algorithmic design, it may still be vulnerable to side-channel attack due to the physical leakage. To assess the possible side-channel attack on biometric cryptosystem, a se...

متن کامل

Side Channel Analysis on Biometric-based Key Generation Algorithms on Resource Constrained Devices

Side channel analysis is a technique that enables the adversary to benefit from information leakages occurring due to the implementation of encryption algorithms on hardware. Since its introduction, side channel analysis has been extensively used in cryptology, more precisely in cryptanalysis. In this paper we describe a novel method, according to which side channel analysis is applied to biome...

متن کامل

Template Protection For 3D Face Recognition

The human face is one of the most important biometric modalities for automatic authentication. Three-dimensional face recognition exploits facial surface information. In comparison to illumination based 2D face recognition, it has good robustness and high fake resistance, so that it can be used in high security areas. Nevertheless, as in other common biometric systems, potential risks of identi...

متن کامل

A Comparative Study of Mutual Information Analysis under a Gaussian Assumption

In CHES 2008 a generic side-channel distinguisher, Mutual Information, has been introduced to be independent of the relation between measurements and leakages as well as between leakages and data processed. Assuming a Gaussian model for the side-channel leakages, correlation power analysis (CPA) is capable of revealing the secrets efficiently. The goal of this paper is to compare mutual informa...

متن کامل

Side channel parameter characteristics of code injection attacks

Embedded systems are suggestive targets for code injection attacks in the recent years. Software protection mechanisms, and in general computers, are not usually applicable in embedded systems since they have limited resources like memory and process power. In this paper we investigate side channel characteristics of embedded systems and their applicability in code injection attack detection. T...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:
  • IACR Cryptology ePrint Archive

دوره 2014  شماره 

صفحات  -

تاریخ انتشار 2014