Side-Channel Attack on Biometric Cryptosystem Based on Keystroke Dynamics

The security of biometric template is generally based on the security of algorithms, such as key binding algorithm or hash function. However, we focus on a different aspect of the problem, and note that even if the biometric template is secure in algorithmic design, it may still be vulnerable to side-channel attack due to the physical leakage. To assess the possible side-channel attack on biometric template, a secure biometric key system (BKS) is designed firstly, which combines keystroke dynamics with secret sharing scheme. Then, by measuring the power consumption leaked from the proposed BKS, we extract the correct biometric template through differential power attack (DPA).

[1]  Wei Rao,et al.  A new family of combination blind equalization with a new constant modulus algorithm based on variable slope error function , 2006, 2006 8th international Conference on Signal Processing.

[2]  M. Mambo,et al.  Proxy Signatures: Delegation of the Power to Sign Messages (Special Section on Information Theory and Its Applications) , 1996 .

[3]  Maria Cristina Felippetto de Castro,et al.  Concurrent blind deconvolution for channel equalization , 2001, ICC 2001. IEEE International Conference on Communications. Conference Record (Cat. No.01CH37240).

[4]  Philip Schniter,et al.  Blind equalization using the constant modulus criterion: a review , 1998, Proc. IEEE.

[5]  Jacques Stern,et al.  Security Arguments for Digital Signatures and Blind Signatures , 2015, Journal of Cryptology.

[6]  Hung-Min Sun,et al.  An efficient nonrepudiable threshold proxy signature scheme with known signers , 1999, Comput. Commun..

[7]  Anil K. Jain,et al.  Biometric cryptosystems: issues and challenges , 2004, Proceedings of the IEEE.

[8]  Sharath Pankanti,et al.  Biometrics: a tool for information security , 2006, IEEE Transactions on Information Forensics and Security.

[9]  Paul C. Kocher,et al.  Differential Power Analysis , 1999, CRYPTO.

[10]  Sun,et al.  A Novel Biometric Key Scheme , 2006 .

[11]  D. Godard,et al.  Self-Recovering Equalization and Carrier Tracking in Two-Dimensional Data Communication Systems , 1980, IEEE Trans. Commun..

[12]  Jacques Stern,et al.  Efficient Revocation in Group Signatures , 2001, Public Key Cryptography.

[13]  Min-Shiang Hwang,et al.  A Practical (t, n) Threshold Proxy Signature Scheme Based on the RSA Cryptosystem , 2003, IEEE Trans. Knowl. Data Eng..

[14]  Michael K. Reiter,et al.  Password hardening based on keystroke dynamics , 2002, International Journal of Information Security.

[15]  Jan Camenisch,et al.  Efficient group signature schemes for large groups , 1997 .

[16]  Lee Luan Ling,et al.  Biometric Access Control Through Numerical Keyboards Based on Keystroke Dynamics , 2006, ICB.

[17]  Dengguo Feng,et al.  Side-Channel Attacks: Ten Years After Its Publication and the Impacts on Cryptographic Module Security Testing , 2005, IACR Cryptol. ePrint Arch..