35
Biometrics and its Hacking Neel Parikh 3 rd year CP 110110107020

Biometrics and its hacking

Embed Size (px)

DESCRIPTION

Computer Engineering Biometrics Hacking Biometric hacking

Citation preview

Page 1: Biometrics and its hacking

Biometrics and its Hacking

Neel Parikh3rd year CP110110107020

Page 2: Biometrics and its hacking

Subtopics

• Introduction to the term Biometrics• How it is connected to Computers..??• Parameters • How it works..??• Applications• Future of this field• Conclusion

Page 3: Biometrics and its hacking

‘Biometrics’

BIO + M ETROS

BIOMETRICS

Page 4: Biometrics and its hacking

Relation between BIOMETRICS and COMPUTERS

• Authentication • Make the work easier, faster• Managing accounts and users with ease

Page 5: Biometrics and its hacking

Types based on characteristics1. Physiological characteristics : Finger-Print Face recognition DNA Palm Print hand geometry Iris recognition odour/scent2. Behavioural characteristics : Typing rhythm Gait Voice

Page 6: Biometrics and its hacking

Parameters A.K. Bolle, R. Pankanti eds. (1999). Biometrics:

Personal Identification in Networked Society. Kluwer Academic Publications

• Universality• Uniqueness• Permanence• Measurability• Performance• Acceptability• Circumvention

Page 7: Biometrics and its hacking
Page 8: Biometrics and its hacking

How Templates are Generated???

Page 9: Biometrics and its hacking

Applications

• Industries, Offices• Schools, Colleges, Classes• Smart cards, Passports, License • Residential security (Door locks etc.)• Gun safe• Cell phones

Page 10: Biometrics and its hacking

Attendance systems

Page 11: Biometrics and its hacking

Security purpose

Page 12: Biometrics and its hacking

Future

Page 13: Biometrics and its hacking
Page 14: Biometrics and its hacking

Value Chain Market Sizing 2013-2017 ($m USD X 10000)

2013 2014 2015 2016 20170

1

2

3

4

5

6

Biometrics Core Tech-nologyTechnical Integrated so-lutionApplication/point solution

Page 15: Biometrics and its hacking

•Apple takes a Giant Leap in Future “Biometrics”

•Intel's McAfee brings biometric authentication to cloud storage

Page 16: Biometrics and its hacking

Companies in race for Biometrics

Page 17: Biometrics and its hacking

Conclusion

Biometrics is the safest and easiest way for authentication and security. It has its advantages as well as disadvantages but finally it’s the newest and smartest solution to security problems…

Page 18: Biometrics and its hacking

Questions???

Page 19: Biometrics and its hacking
Page 20: Biometrics and its hacking

Biometrics and its Hacking

Neel Parikh3rd year CP110110107020

Page 21: Biometrics and its hacking

Summary

• Introduction to the term Biometrics• How it is connected to Computers..??• Parameters • How it works..??• Applications• Future of this field• Conclusion

Page 22: Biometrics and its hacking

Subtopics

• Brief introduction• Major contributor• Methods: 1) On basic level 2) On professional level• Major Issues• Conclusion

Page 23: Biometrics and its hacking

The 6th Day

•Science Fiction Action Thriller Movie•Directed by Roger Spottiswoode •Starring Arnold Schwarzenegger

Page 24: Biometrics and its hacking

iPhone 5S fingerprint sensor hacked by Germany's Chaos Computer Club

Chaos Computer Club (CCC)

Europe's largest association of hackers.

Page 25: Biometrics and its hacking

Major Contributor

• Prof. Tsutomu Matsumoto • “gummy finger” concept:

1)Direct experiment2)Professional level

Page 26: Biometrics and its hacking

Required Material

Freeplastic used for finger print moldGelatin sheet used for gummyfinger

Page 27: Biometrics and its hacking

Creation of fingerprint mold

Page 28: Biometrics and its hacking

Creation of gummy finger

Page 29: Biometrics and its hacking

Professional Level

Page 30: Biometrics and its hacking

Creation of gummy finger from latent fingerprint mold

Page 31: Biometrics and its hacking

Hacking from the another point of view

• In another test of biometric security, an Australian National University student was able to hack through the device using the information stored within the system itself.

• Chris Hill worked on discovering the way the system stored the template information and then created images that had enough similar “features” of the desired fingerprint to trick the device.

• He said, “Really all I had to do was crack the code of the template, so the images I created that were accepted by the security system did not even look like thumbprints they just displayed the characteristics required by the computer program.”

Page 32: Biometrics and its hacking

Major Issues

• Other issues needing discussion are: What happens when the part of the body getting validated is somehow damaged, such as a finger getting badly burned or deeply cut Or if someone does manage to create a fake fingerprint from your finger, how is that issue resolved, since a finger can’t be easily changed like a password can?

Page 33: Biometrics and its hacking

CONCLUSION

Biometric devices have flaws, but so does every other security hardware and software solution. Biometric security measures offer such a strong level of security, that they cannot be thrown out or ignored simply because a few flaws have been discovered. They need to be incorporated into an organization’s already strong defence in depth. Biometrics, especially in conjunction with passwords or passcards, offers the level of security that we need at this stage in the development of information security…

Page 34: Biometrics and its hacking
Page 35: Biometrics and its hacking