In this paper we analyze different biometric authentication protocols considering an internal adversary. Our contribution takes place at two levels. On the one hand, we introduce a new comprehensive framework that encompasses the various schemes we want to look at. On the other hand, we exhibit actual attacks on recent schemes such as those introduced at ACISP 2007, ACISP 2008, and SPIE 2010, and some others. We follow a blackbox approach in which we consider components that perform operations on the biometric data they contain and where only the input/output behavior of these components is analyzed.
翻译:在本文中,我们分析不同的生物鉴别认证协议,其中考虑到内部对立。我们的贡献分为两个层面。一方面,我们引入了一个新的全面框架,包含我们想要研究的各种计划。另一方面,我们展示了对近期计划的实际攻击,比如在ACISP2007、ACISP2008和SPIE2010以及其他一些计划中实施的计划。我们采用了黑匣子方法,在黑盒方法中,我们考虑对包含的生物鉴别数据进行操作的组件,并且只分析这些部件的输入/输出行为。