Publication Details

Exploitation of chip cards and human biometric attributes

SMOLÍK Luděk and DRAHANSKÝ Martin. Exploitation of chip cards and human biometric attributes. In: IDET - Security and Protection of Information 2001 (CATE). -. Brno, 2001, pp. 265-272.
Type
conference paper
Language
english
Authors
Smolík Luděk, Dr. ()
Drahanský Martin, Ing. (DCSE FEECS BUT)
Annotation

At present chip cards are used to identify people. People are identified by inserting the chip card into the chip card reader. The token information is ciphered by own secret key, which is stored on the chip card. The system then deciphers the token information by the public key. Following validity and integrity test of users certificate, stored on the chip card, is checked, if user, who used the chip card, is right owner. The most frequent method used for authentication of user against the operating chip card system is the weakest point in the chain. If the aggressor gained chip cards PIN, there has not been any problem to penetrate illegally into the system. Nowadays the method using PIN has been desisted and new methods have been searching. Biometric attributes of human beings belong to new methods. Two individual persons with identical biometric attributes could not exist in the world, what is impossible to ensure from PIN. There is nearly impossible to gain biometric attribute from foreign person. At present time the identification systems based on comparison of different biometric human attributes are on the market. The most frequent used method is based on template comparison - one pattern is stored in the database and other pattern is got from biometric attributes that person. As good result is considered if the comparison is equal or better than a set threshold (e.g. agreement > 90%). The main problem of this system is the large amount of data, which must be stored in the database. If large amount of patterns has been stored than, among others, the claim of time can be huge and consequently the results do not correspond to practice demands. Database disturbance is the other risk to block the whole system. Solution of this problems is to use the chip cards as a biometric template carrier. The pattern will be stored on the chip card, unique representing the given biometric attribute the chip cards owner. The user will identify himself to the system by ciphering with the secret key on the chip card, but authentication of the user against the chip cards operating system will be led through the comparison of the certain biometric attribute of this user and the pattern stored on the chip card. Now the new transformation is developed, which will after insertion generate certain human biometric output vector that will unique represent this biometric attribute as well as by consideration of the less changes of this attribute (human grow, aging). The output vector could be used as the new generation cryptographic key, which would be generated always before reciprocate apply and would not be anywhere stored. This transformation will be integrated into the complex identification system.

Published
2001
Pages
265-272
Proceedings
IDET - Security and Protection of Information 2001 (CATE)
Series
-
Conference
CATE 2001, Brno, CZ
Place
Brno, CZ
BibTeX
@INPROCEEDINGS{FITPUB6803,
   author = "Lud\v{e}k Smol\'{i}k and Martin Drahansk\'{y}",
   title = "Exploitation of chip cards and human biometric attributes",
   pages = "265--272",
   booktitle = "IDET - Security and Protection of Information 2001 (CATE)",
   series = "-",
   year = 2001,
   location = "Brno, CZ",
   language = "english",
   url = "https://www.fit.vut.cz/research/publication/6803"
}
Back to top