Analysis of Hardware Controls for Secure Authentication Report

advertisement
Georgia Institute of Technology
CS4235: Introduction to Information Security
Analysis of Hardware Controls for Secure Authentication
Karan Asnani, John Bowen, Michael Ellis, Nirav Shah
July 19th, 2006
CS4235: Introduction to Information Security
Table of Contents
Abstract ........................................................................................................................................... 3
1. Introduction ................................................................................................................................. 4
2. Smart Cards................................................................................................................................. 5
2.1 History................................................................................................................................... 5
2.2 Functionality ......................................................................................................................... 6
2.3 Pros and Cons ....................................................................................................................... 8
2.4 Future .................................................................................................................................. 11
3. Hardware Tokens ...................................................................................................................... 12
3.1 History................................................................................................................................. 12
3.2 Functionality ....................................................................................................................... 13
3.2.1 Multi-Factor Authorization .......................................................................................... 14
3.2.2 USB Hardware Tokens ................................................................................................ 14
3.2.3 Authorization Levels .................................................................................................... 15
3.3 Market ................................................................................................................................. 15
3.4 Pros and Cons ..................................................................................................................... 17
3.5 Future .................................................................................................................................. 18
4. Biometrics and Face Recognition ............................................................................................. 18
4.1 History................................................................................................................................. 19
4.2 Functionality ....................................................................................................................... 21
4.2.1 Eigenface...................................................................................................................... 21
4.2.2 3D Methods .................................................................................................................. 22
4.2.3 Weaknesses of Eigenfaces ........................................................................................... 23
4.3 Research and Market........................................................................................................... 25
4.4 Pros and Cons ..................................................................................................................... 26
5. Voice Recognition and Fingerprint Authentication .................................................................. 27
5.1 History................................................................................................................................. 27
5.2 Functionality ....................................................................................................................... 29
5.2.1 Fingerprinting .............................................................................................................. 29
5.2.2 Voice ............................................................................................................................ 30
5.3 Market ................................................................................................................................. 31
5.4 Pros and Cons ..................................................................................................................... 32
5.5 Future .................................................................................................................................. 33
6. Conclusion ................................................................................................................................ 34
7. Notes ......................................................................................................................................... 36
8. Bibliography ............................................................................................................................. 37
Analysis of Hardware Controls for Secure Authentication
2
CS4235: Introduction to Information Security
Abstract
Although many organizations are placing increasing emphasis on the protection of
their data and electronic assets, one often neglected area is the first step in information
security – access control. The protection of access to resources is a key deterrent in reducing
information loss, and therefore should be given equal importance in an organization’s
security policy.
Although numerous methods are available for implementing access control, hardware
authenticators are quite powerful due to their separation from data itself. This paper analyzes
three major types of hardware controls for authentication – smart cards, hardware tokens, and
biometrics, where specific attention is paid to face recognition, fingerprint scanning, and
voice recognition. Each of the technologies is discussed in detail along with a weighted
analysis of their associated pros and cons, and an attempt is made to determine the future path
each industry may take relative to its current position.
Analysis of Hardware Controls for Secure Authentication
3
CS4235: Introduction to Information Security
1. Introduction
Information security is a rapidly growing field that is finally beginning to gain the
attention it deserves from private industry. Business managers are recognizing that attacks on
their organization’s data and computing infrastructure can have a direct impact on the bottom
line, and spending on protection of electronic resources is well worth the investment involved.
However, most of the research and investment in this field tends to concentrate on the
protection of data when a user already has access to a system, or protecting against invaders
over a network. In non-governmental organizations, the risk of attack via physical break-ins
is often overlooked in the name of a trusting “open-door” policy, or the initial prohibitive cost
of setting up access control systems. This not only leaves an organization exposed to outside
threats, but inside threats as well, since it is widely accepted that insiders make up about 60%
of all information security attacks.
When looking at the three major information security principles of Confidentiality,
Integrity, and Availability, which are all crucial to the maintenance of a secure system, access
control is most relevant to the Availability aspect. An ideal access control scheme would
provide both authentication and authorization. The former refers to verifying the digital
identity of a user, whereas authorization is the process of checking to see if the user has the
necessary privileges to access a particular resource. Therefore, a good access control system
needs to both authorize and authenticate users effectively, thus making the right resources
available to the right person when they require it, while preventing access to unauthorized
users.
This paper discusses and analyzes three separate authenticators: hardware tokens,
smart cards, and biometrics; the latter category being further divided into related recognition
methods such as face recognition, voice recognition, and fingerprint scanning. Each
technology is discussed in terms of its history, an explanation of the technology’s pros and
Analysis of Hardware Controls for Secure Authentication
4
CS4235: Introduction to Information Security
cons is provided, and a prediction is made regarding the future direction that the technology
or industry may take. When discussing the potential use of these technologies, an emphasis is
placed on their suitability for private organizations, since that is a sector of the economy still
lacking in its deployment of access control schemes.
2. Smart Cards
2.1 History
Smart cards have evolved from magnetic stripe plastic cards which commonly
function as credit cards, membership cards for loyalty programs, or perhaps most importantly,
for the purpose of basic identification. However, data stored on the magnetic stripes of these
cards suffers from a major weakness, namely the ease with which the information can be
skimmed onto another card with someone possessing the right type of (cheap and readily
available) equipment. Therefore, the use of smart cards is now a much safer option available
to organizations implementing access control systems, as they have numerous applications
(“What’s so Smart about Smart Cards” 5):

Protect the privacy of individuals and keep their informational assets safe from
hacking

Restrict access on to networks or computer systems, in combination with hardware
tokens

Storage and encryption of sensitive data like certificates or passwords, usually in
conjunction with a Public Key Infrastructure (PKI) that involves a certified digital
certificate

Restrict physical access to protected areas
Although smart cards are the youngest member of the plastic card family, and indeed,
still have huge scope for growth in their deployment, the technology itself is fairly old.
Analysis of Hardware Controls for Secure Authentication
5
CS4235: Introduction to Information Security
Various inventors in Germany, Japan, and France all applied for patents for plastic cards that
could carry microchip technology in the late 1960s and early 1970s (Dhar 2). Since then,
smart cards have grown widely in use in Europe, but the technology has not yet fully tapped
into its global potential, especially in private industry in the United States.
2.2 Functionality
Before delving into an explanation of smart cards, it is appropriate to first analyze the
technology behind the magnetic stripe and why these cards do not offer an appropriate level
of security for access control systems. A typical magnetic stripe contains three tracks which
are further divided into tiny domains, each being 1/75 of an inch long and magnetized in a
particular fashion. The direction of magnetization of each domain represents either a 0 or 1
bit, and thus when the stripe is read, the reader obtains the data from the card in binary form.
The use of skimming card readers, or other materials that can alter the polarization of a
magnetic domain, means that information on these cards is not secure.
Smart cards are an improvement on simple magnetic-strip cards because they are
essentially cards with very tiny computers in them, containing a microprocessor and memory.
The underlying technology behind smart cards is relatively uncomplicated, but information is
often not readily available due to manufacturers protecting their business secrets, and so the
technical description here is relatively brief. However, numerous variations do exist in the
types of smart cards manufactured, and these can be analyzed based on any number of
parameters, the key ones being memory and interface.
Memory cards are the simplest and cheapest types of smart cards. They usually
contain an area for permanent information, and another area where changing information can
be stored. Prepaid phone cards are often considered to be the ideal application for such cards.
The permanent information is perhaps the card number, whereas the changing information
Analysis of Hardware Controls for Secure Authentication
6
CS4235: Introduction to Information Security
would be the talk time remaining. However, based on their technical capabilities,
microprocessor or chip based cards are the more appropriate type of smart card for access
control in organizations. Chip based smart cards contain four components:

Read Only Memory (ROM): An area to store permanent data, usually the Operating
System of the smart card. These are called Smart-Card Operating Systems (SCOS)
and usually use up to 16 kB of space in the ROM. Many SCOSs are available, notable
ones being MultOS, JavaCard, and StarCOS.

Electrically Erasable Programmable Read Only Memory (EEPROM): An area to store
application data and instructions

Random Access Memory (RAM): Runtime volatile memory used by the processor to
run desired functions

Central Processing Unit (CPU): The heart of the card that performs instructions
These cards are usually more expensive than simple memory cards, but are more appropriate
for information-sensitive applications like banking and finance or indeed, access control.1
With regards to classification based on interface, each type is fairly self explanatory.
Contact cards contain between six and eight gold plated contacts that can be inserted into a
reader, where physical contact is made, and data communicated via electrical contact between
the card and the card reader2. Chip based contactless cards can simply be passed near a reader
in order for a transaction to be performed, making them extremely convenient and easy to use.
A radio frequency (RFID) transmission originates from the reader, and information on the
cards themselves is read via an antenna which is also part of the reader. Interestingly, this
radio frequency transmission is what supplies the energy that the card needs to run its
microprocessor. A series of standards govern contactless smart card manufacture, namely
ISO 7816-1 through to ISO 7816-7 (Shelfer and Procaccino 86). The technology of
contactless cards is in turn governed by two more standards – ISO/IEC 14443, which allows
Analysis of Hardware Controls for Secure Authentication
7
CS4235: Introduction to Information Security
for communications up to 10 cm, and ISO 15693, which is an alternative standard that allows
for communications up to 50 cm.
The use of contactless cards also helps to reduce the risk of vandalism to card readers
themselves; for example, a card reader at the entrance to a company’s building could be
placed low and to the side of the door frame, and can scan the card as the employee passes by
with the card in his/her pocket or purse (Security 32). In fact, many banks are jumping upon
the contactless card bandwagon due to the numerous retail possibilities it presents, and are
trying to meet high consumer demand for increasingly convenient services (Noe). Finally,
hybrid cards offer users both possibilities, making them quite flexible and extremely secure.
2.3 Pros and Cons
The first and most obvious benefit of smart cards is that they counter threats to
information loss from physical attacks where a potential criminal attempts to gain access to
an area or resources that he/she should not be using. Smart cards’ actions are twofold –
protecting the actual physical resource itself, and also authenticating the identity of an
individual trying to get access to an electronic resource (“Logical Access Security: The Role
of Smart Cards in Strong Authentication”). A pervasive and consistent access control system
therefore greatly reduces the risk of physical attacks, not just through preventing access when
someone attempts to break in, but also as a deterrent to potential criminals. Smart cards can
also be combined with other authentication technology, biometrics for example, to provide
economic and security advantages through a “two-factor” authentication system, which is
described in more detail later in this paper.
Along with the previously described ease of use and convenience of contactless smart
cards, another advantage of smart cards is their large capacity. Smart cards can hold up to 32
kB of data, which means that each card can contain multiple pieces of identification and
Analysis of Hardware Controls for Secure Authentication
8
CS4235: Introduction to Information Security
permissions information for a user. Instead of maintaining separate access methods for
different systems, information storage can be centralized, with information pertaining to
logical access, physical access, and secure data storage all maintained on the same card.
Some smart cards can even perform encryption on the data they contain.
An indirect benefit of a large storage capacity is that smart cards can also be used for
multiple functions. This is an approach being taken by the government of the United Arab
Emirates as it implements a new national scheme aimed at providing all residents with
National ID cards. These are simply multifunctional smart cards which residents can use as
their labor identification card, a substitute for a passport, clearing immigration at the airport,
and other daily activities. In addition to the relatively large storage capacity, smart cards also
offer the capability of on-card data processing through the on-card microprocessor. However,
this approach of “placing all your eggs in one basket” does raise a security concern if the card
is lost or physically damaged, and that is also an issue that is addressed later in this section.
Smart cards also have a very long lifetime. In fact, unlike contact cards where the
contacts may wear out, the life of a contactless smart card is practically unlimited as long as
the information stays relevant. The risk of data being erased or altered by malicious use of
skimmers or other magnetic devices is also minimized, since credential information is solely
on the card, and not actually on a network or in software. Therefore, the life of smart cards
goes above and beyond the Principle of Timeliness, which states that data need only be
protected for as long as it is valuable. With smart cards, data can be protected, with no
significant increase in cost, well beyond its useful life.
Finally, smart cards are quite secure themselves. Cards can be designed to be
multilayered, a process that involves the use of tamper-proof security measures such as
innovative color patterns and designs, nano printing of text, and holograms. These are
intended to prove the card’s genuineness and make it difficult to forge (Fontanella 1).
Analysis of Hardware Controls for Secure Authentication
9
CS4235: Introduction to Information Security
As alluded to earlier, a major disadvantage of using smart cards is the security risk
associated with the card being lost, stolen, or physically damaged due to misuse or natural
elements like rain. The risk of data loss is magnified if a multifactor authentication scheme is
not used. However, a solution to this problem can be fairly simple to implement, and is
similar to the scheme used by banks for credit cards. If the card is lost, the owner can call
his/her own company’s Information Technology or Security department and notify them that
the card should be disabled, with all future use being potentially fraudulent. Having the
company itself maintain a centralized system may be cost-ineffective, but it does reduce the
risk of information having to be shared with a third party organization, and allows a company
to tailor its access control system to meet its own specific needs. Unlike a suggested British
national ID card scheme, allowing each company to set up its own database would also mean
there are no problems with having to accredit various organizations to give them access to a
central database (Hilley 10).
The other major disadvantage, and arguably the one that may play the biggest part in
the lack of widespread deployment of smart card technology thus far, is the high initial
capital expenditure involved. When implementing a hardware-based access control system, a
company will need to purchase cards for each of its employees, install the hardware needed to
read the cards, and also set up databases and associated systems required for the entire project.
Other costs involved are protection of information in the databases, protecting the
transmission of information between a smart card and its reader, and implementing strong
training schemes and security policies for employees (which should be in place anyway).
These costs are typically unavoidable because they are associated with crucial components of
any access control system.
However, innovative schemes do exist that can simplify the cost and administrative
issues associated with installing an access control system. For example, Liaw, Lin, and Wu
Analysis of Hardware Controls for Secure Authentication
10
CS4235: Introduction to Information Security
suggest a scheme of remote authentication that does not require a dictionary of verification
tables to authenticate users, does not require timestamps, and promises a low communication
and computational cost (223-8).
A third major disadvantage arises from the issue of a lack of human trust, and the risk
of reduced productivity if employees constantly require authorization before accessing their
own computer or other physical resources. The latter can be minimized with the use of
contactless cards, but the main issue here is the urgent need for management to realize the
importance of good physical security. As cynical as it may sound, a lack of trust is perhaps
the soundest way to protect an organization’s information, and often some compromises have
to be made on an emotional level if a company’s reputation and profits are to be protected.
2.4 Future
The future of smart cards is still wide open. With regards to research in the field,
advances are continually being made on innovative methods to protect the cards themselves,
and improving the processing and storage capabilities of the cards. Many researchers are also
seeking to tackle the cost issue by proposing schemes that can reduce the expenditure of
setting up a hardware-based access control system. Perhaps more research could be aimed at
tackling the issue of disabling a smart card that is reported lost or stolen; despite being an
idea put forward in this paper, current research in the field seems to be lacking in this area. In
addition, the legal and privacy issues associated with smart card based access control systems
are always a concern.
Research by the Smart Card Forum in 1999 showed that U. S. smart card shipments
were expected to grow at a rate of 60% between 1998 and 2003. Sumit Dhar also points out
that the “smart card market is set for exponential growth in the next few years” (8).
Analysis of Hardware Controls for Secure Authentication
11
CS4235: Introduction to Information Security
Undoubtedly, the market will move towards more sophisticated on-card technology, and
further exploitation of the multifunctional abilities of smart cards.
In conclusion, relatively few organizations outside of the Federal sector are actually
using smart cards for the purpose of authenticating identity (Everett 22). Therefore,
tremendous potential for growth still exists, especially if the multifunctional capability of
smart cards is fully exploited. It is therefore up to private firms to also realize that protection
against physical attacks is just as important as protecting their network, and smart cards are
one of the most effective technologies available to provide this physical security, especially
when combined with other hardware controls like hardware tokens or biometrics.
3. Hardware Tokens
As today's enterprises and individuals participate in an increasing amount of mobile
activity, a dynamic technology is needed to keep applications secure, while making
technological freedom a reality. This freedom comes in the form of an authenticator known
as a hardware token. Today's tokens vary wildly in terms of size and advanced specifications,
but they all have the same goal: to safeguard authentication while allowing for dynamic
security.
3.1 History
Hardware tokens were created as a way to limit access to confidential or protected
information. They are portable devices which allow a user to access this protected
information. In essence, a hardware token could be anything as simple as a key to one's front
door. The modern hardware token analyzed in this paper is somewhat more complex, but it
provides much of the same functionality: using something a user possesses to authenticate
their identity.
Analysis of Hardware Controls for Secure Authentication
12
CS4235: Introduction to Information Security
The earliest form of the modern hardware token evolved in the 1970s. Originally
called "dongles," these devices used hardware to connect to a computer and allow access to
software (Elsom 3). Many of the first dongles connected to parallel or serial ports to block the
flow of data (essentially to protect from information being copied).
Today hardware tokens are still used to restrict access to applications; however they
now are almost always defined by a changing (dynamic) pass code to aid in security.
3.2 Functionality
Hardware tokens take a variety of shapes and sizes, from calculator-like cards to small
shells that can be hooked to key chains. Hardware tokens typically have a LED (LightEmitting Diode) display which contains a special code the user enters to a system for
authentication.3 Depending on the particular token being used, the code will change after a set
period of time or after some event takes place.
For time-changing hardware tokens, the code is usually updated within a period of 60
seconds or less.4 The hardware token and the system the user is trying to access are originally
setup to concurrently cycle so that the code on the user's token matches that of the machine.
For algorithms which are not time-based, examples of code-changing events are insertion into
a drive (as with the USB-1 Token from CRYPTOCard) or the press of a button located on a
token (as with the KT-1 Key Chain from CRYPTOCard).5
Because the password on hardware tokens can never be used again, it is sometimes
called a one-time password, or OTP (Pfleeger 220). One-time passwords offer excellent
security. These special passwords prevent "shoulder surfing," the act of watching somebody
type a password in order to gain access to a system.
Analysis of Hardware Controls for Secure Authentication
13
CS4235: Introduction to Information Security
3.2.1 Multi-Factor Authorization
In addition to the special dynamic code, most often a static code known to a user is
also used to provide a new dimension to the token's security. This static code is generally
entered before the dynamic code into an authentication system (via keyboard) in the
following way:
STATICDYNAMIC
One way to group authenticators is to label them as knowledge-based (something
known to a user such as a password/PIN sometimes used with a smart card), object-based
(something a user possesses such as smart-cards or tokens) or ID-based (using a unique
feature in biometrics) authentication. A policy of using two or more forms of authentication
is called “multifactor authentication” (O’Gorman 2024). The combination of static code and
dynamic code is a form of multifactor authentication and "this example of token plus
password constitutes the vast majority of current multifactor implementations" (O'Gorman
2025). O'Gorman goes on to explain this multifactor authentication implementation combines
something a user has (an object-based authenticator) with something a user knows (a
knowledge-based authenticator) and is commonly called two-factor authorization.6
3.2.2 USB Hardware Tokens
Some hardware tokens have now merged with Universal Serial Bus (USB) storage
devices. They also contain a dynamic security code to be entered by the user for access to a
system if a company desires this option. Additionally, the extra storage capacity a USB drive
offers allows a user to save documents on the drive by means of encryption using a public
key infrastructure (PKI). In other words, as a user loads a document to the USB it is
encrypted using public key cryptography.
Analysis of Hardware Controls for Secure Authentication
14
CS4235: Introduction to Information Security
The decryption takes place automatically when the user enters a memorized personal
identification number. This leads one to question the existence of the encryption in the first
place; if the PIN is all that is necessary to decrypt (why not just use the PIN to protect the
data)? The answer is to fend off any intruder who could somehow extract the data from the
USB without having to authenticate on an outside computer. There are also tamper-proof
USB keys to keep an unauthorized user from extracting data. Also, because of the extra space
associated with USB keys, they may also allow for digital signing.7
3.2.3 Authorization Levels
Authentication options range for token vendors and also changes based on the needs
of the client. Most of the time users just type in their dynamic and static codes along with a
username into authentication software in order to gain access to information (as described
above). Some USB keys just require the user to plug the key into a system to allow access.
The level of access which is granted also ranges for vendors and clients. For some secure
systems, a token may be necessary to access any information on a computer. Some
authentication software only restricts access to the internet or perhaps a certain server.
3.3 Market
The largest single producer of hardware tokens is RSA Security. Their product,
SecurID, is used by the "White House, the U.S. Senate, NSA, CIA, The U.S. Department of
Defense, and a majority of the Fortune 100 companies" (Biryukov 130). Originally,
according to Biryukov, Lano, and Preneel, the SecurID hash function used the "secret key,
unique to one single authenticator, and the current time (expressed in seconds since 1986)" to
produce its secret key. (Biryukov 131) The algorithm was breakable and RSA has now
moved to an AES-based algorithm. Typically the code-producing algorithms of vendors are
Analysis of Hardware Controls for Secure Authentication
15
CS4235: Introduction to Information Security
kept secret, making technical information and statistics of the actual security technology hard
to come by.
RSA makes three distinctions among its OTP products. They offer a plain OTP
generator, a USB key which has the ability to encrypt documents stored on it, and a key
which will combine a user pin with an OTP generator all on the token. These three different
versions are a good representation of the vast majority of hardware tokens on the market.
VeriSign (and its original equipment manufacturer Aladdin Knowledge Systems) are
active participants in the field of hardware authenticators as well. VeriSign offers similar
products to RSA Security; however they also have an event-based password generating token.
VeriSign uses the OATH (The Initiative for Open Authentication) standard for authentication.
OATH is a consortium of technology companies that have a goal to standardize
authentication technology to be used across commerce and government networks. OATH
seeks to "deliver solutions that allow for strong authentication of all users on all devices,
across all networks" (OpenAuthentication Vison). It seems profit-margins could ultimately be
the bottom line for this group and not security as the official website states a goal to "reduce
the cost and complexity of strong authentication to drive broad enterprise and consumer
adoption." More consumer adoption may mean better business over better security.
There are many other companies in competition with RSA. VASCO is a company
which has been targeting an international audience as well as financial institutions.
Companies look to VASCO for a cheaper token, VASCO's "tokens cost about $8 each, vs.
$20 or more for RSA tokens" (Swartz). Many institutions are holding out until a price war
begins to heat up. For banks, spending $8 per customer is a huge ordeal given a large
customer base. As more and more companies such as VASCO evolve to compete with the
larger companies, cheaper alternatives become a reality.
Analysis of Hardware Controls for Secure Authentication
16
CS4235: Introduction to Information Security
3.4 Pros and Cons
There are many advantages for using hardware tokens. One big advantage is the onetime password (OTP) which prevents shoulder-surfing and guessing. The biggest advantage,
however, is the common two-factor authentication: combining a password and the pseudorandom pass code generated. This way, even if the token is stolen, it is virtually unusable.
Additionally, if a token is stolen, the user will know. While many times an intrusion is tough
to detect over a network, it is quite obvious when a token is missing. In this case, a
disconnect between a token and an authentication server needs to be made.
Modern hardware tokens also allow for increased mobility. Research and confidential
data that could once be only accessed within labs can now be accessed from a user's home, or
even in another country. For example, to gain access to a Virtual Private Network, all one
needs is their token and PIN. This information can be entered into a security application or
interface on a computer and then sent to an authentication server. If the user possessed the
correct credential, the user is then granted access. The added security of a hardware token
enables this foreign access which should never be provided with single-factor authentication.
Hardware tokens are far from perfect. If the problem is not the user remembering
his/her PIN, it is the user remembering the token itself! If a user just lost their keys, they may
have lost their hardware token as well. Also, a user may be tempted to write down their PIN
as not to forget it. This basically negates the two-factor authentication and as long as
somebody has the hardware token, access to the system/portal and the PIN, they can be
granted authentication. Additionally, hardware tokens can cost users time. They are great for
commercial enterprises, research, and government organizations; however they have not been
accepted for widespread consumer use. Banks are hesitant to ask for another form of
identification for transactions besides a PIN because it is an inconvenience (taking more time
for a single transaction). Customers who don't like the inconvenience may even decide to
Analysis of Hardware Controls for Secure Authentication
17
CS4235: Introduction to Information Security
leave the bank. Additionally, hardware tokens are currently expensive. For a major financial
institution, the cost to deliver hardware tokens to its customers would be millions (if not
billions over time). Similarly to smart cards, setup of a hardware token security scheme is
rather expensive. This added expense is scaring companies away from incorporating better
security into its business plans. Most companies choose to not upgrade their current security
until it become problematic.
3.5 Future
As radio-signal based technology Bluetooth becomes more common in mobile
devices, there may be a move away from random password generators. With a Bluetooth
token, a user could have access to a machine by taking the token within 10 meters of the
machine.8 The radio-signal's “Zero-Interaction Authentication,” or ZIA, adds to convenience
but has many of the same limitations as a password generating token (Abdelhameed 200).
Bluetooth has encouraging money-saving possibilities. Instead of issuing a new token, it is
now possible to program a token into a PDA or cell phone to enable authentication.
Recently Bank of America has announced a deal with VeriSign in which "select
online users are issued token devices, electronic gadgets that generate one-time passwords"
for online transactions (Schnieder 1). Hardware tokens are on the verge of hitting the
consumer market, however even Bank of America's policy is voluntary. It could take several
years before hardware tokens become accepted by consumers and private institutions make
widespread policy changes to include this form of two-factor authentication.
4. Biometrics and Face Recognition
Identification before the days of hardware methodologies and even before passwords
was a matter of human instinct, based simply on the appearance of an individual: his face,
build, and other physical attributes. These characteristics assist in defining an individual’s
Analysis of Hardware Controls for Secure Authentication
18
CS4235: Introduction to Information Security
identity, and even today, they are pivotal in much of societal interaction. It is no surprise,
then, that security professionals now employ these features in the context of access control.
This field is known as biometrics. In particular, face recognition in security has recently
received much attention, some of which is evidenced by the rise of face recognition
conferences such as AFGR (IEEE International Conference on Automatic Face Gesture
Recognition) and AVBPA (Conference on Audio- and Video-based Biometric Person
Authentication) as well as “empirical evaluations of face recognition techniques” (Zhao 1).
This technology provides means of personal identification and verification within some
degree of certainty, and face recognition plays a unique role in security surveillance.
Understanding the full implications of face recognition in the security (and access control)
arena requires some knowledge of the history, technologies and techniques, testing and
standards, research, and markets of the two individual fields.
4.1 History
Face recognition has obviously been practiced by security personnel for some time,
but automated face recognition is a relatively new concept (National Science and Technology
Council: Subcommittee on Biometrics npa). The very nature of face recognition makes it
useful in some unique ways and at the same time difficult to implement; these two themes
become apparent early in the history of face recognition, and it is this history that one should
first realize. During the 1960s, Woody Bledsoe, Helen Chan Wolf, and Charles Bisson
developed the first semi-automated (computerized) system for face recognition. This early
system required an administrator to locate facial features such as eyes, ears, and nose on a
photograph, which were then used to calculate distances and ratios to a common reference
point. These data were then compared to reference data by the computer for recognition,
thereby identifying an individual within some degree of certainty. Unfortunately, some
Analysis of Hardware Controls for Secure Authentication
19
CS4235: Introduction to Information Security
difficulties arose concerning the orientation of the individual’s face—difficulties that still
persist. According to Bledsoe, “...the correlation is very low between two pictures of the
same person with two different head rotations” (Scheentra 891). Each set of data, then, must
be normalized to represent the face in a frontal orientation.
Later, in the 1970s, Goldstein, Harmon, and Lesk utilized characteristics such as hair
color and lip thickness to aid in automation, but the real breakthrough came in 1988 when
Kirby and Sirovich applied “principle component analysis” (a technique of linear algebra) to
the face recognition problem. This showed that “less than one hundred values were required
to accurately code a suitably aligned and normalized face image” and became known as the
“eigenface technique”. In 1991, Turk and Pentland extended this technique by realizing that
residual error could be used to detect the faces in images, further automating the face
recognition process and creating significant interest in further development of the technology
(National Science and Technology Council: Subcommittee on Biometrics npa).
Furthermore, much interest in face recognition stems from the fact that, according to
“Face Recognition: A Literature Survey,”
Although extremely reliable methods of biometric
personal identification exist, e.g., fingerprint
analysis and retinal or iris scans, these methods
rely on the cooperation of the participants, whereas
a personal identification system based on analysis
of frontal or profile images of the face is often
effective without [italics added] the participant’s
cooperation or knowledge. (Zhao 1)
In other words, because faces can be captured from far away, no physical contact is required
for face recognition. As a result, face recognition has applications in security surveillance
(identification) as well as verification problems (and thus access control). In identification
problems, the input to the system is an unknown face, and the system attempts to determine
Analysis of Hardware Controls for Secure Authentication
20
CS4235: Introduction to Information Security
an identity from a database of known individuals, but in verification problems, the system
attempts to confirm or reject the claimed identity of the input face (Zhao 1).
4.2 Functionality
Regardless of specific application, implementing face recognition can be summarized
in five steps. The first step is acquiring an image of the face, which can be accomplished
using anything from an existing photograph to a snapshot from a live camera. Second, the
location of the face must be detected, whether in a crowd or in front of a standard background.
Third, the face must be analyzed using one or more of a variety of algorithms. Fourth, the
data gathered must be compared to some reference (e.g., an individual face or a database of
known faces). Finally, the results of the comparison must be analyzed to determine whether
or not an accurate match exists (Woodware npa). Some particular algorithms include the
aforementioned eigenface method as well as fisherface, the Hidden Markov model, the
“neuronal motivated” Dynamic Link Matching, elastic bunch graph matching (EBGM), and
more recently, three-dimensional face recognition. The eigenface, or Principal Component
Analysis, method, because of its widespread application, is worthy of further discussion.
Three-dimensional recognition is also worthy of further discussion because of its future
potential.
4.2.1 Eigenface
The eigenface technique (a linear algebra-based technique) corresponds to “one of the
most successful methodologies for the computational recognition of faces in digital images.”
In fact, it is the basis for a number of variations known as eigenspace-based approaches,
which differ in the kind of projection method, the projection algorithm, the use of simple or
differential images before/after projection, and the similarity matching criterion. The starting
point for the use of any eigenspace-based method is realizing that the amount of data carried
Analysis of Hardware Controls for Secure Authentication
21
CS4235: Introduction to Information Security
in an image is much greater than what is needed to describe a face, since “faces are similar in
appearance and contain significant statistical regularities”. This approach works by first
projecting input faces onto a dimensional reduced space where recognition is carried out. As
previously stated, Sirovich and Kirby used PCA (principal component analysis) to derive a
reduced representation of face images. According to Javier Ruiz-del-Solar,
PCA is a general method for identifying the linear
directions in which a set of [data-containing]
vectors are best represented in a least-squares
sense, allowing a dimensional reduction by choosing
the directions of largest variance.(Navarrete 820)
In terms of representing a face, PCA reduces the dimensions of facial data by means
of data compression basics, revealing the most effective low dimensional structure of facial
patterns (National Science and Technology Council: Subcommittee on Biometrics npa). The
term “eigenfaces” comes from the fact that the face structure is decomposed into orthogonal
components (eigenfaces), similar to the standard linear algebra technique of eigenvector
reduction. In more mathematical terms, PCA determines the orthogonal projection that
maximizes the determinant of the total scatter matrix of the projected sample images (Cohn
7-8). A face image is then represented as a weighted sum of the eigenfaces.9 As a final step in
the recognition process, the input image is compared to a reference image by measuring the
distance between the respective weighted sums of eigenfaces (National Science and
Technology Council: Subcommittee on Biometrics npa). Close mathematical matches are
considered facial matches.
4.2.2 3D Methods
3D face recognition is a much newer field within face recognition, but holds much
promise. Three-dimensional technology captures facial images using a number of cameras
placed around an individual’s face (Greenemeier npa). 3D models hold more information
Analysis of Hardware Controls for Secure Authentication
22
CS4235: Introduction to Information Security
than 2D models, and this information can be used for face recognition or subject
discrimination (verification). Mavridis designed the original approach to 3D facial models,
which was very similar to eigenfaces for two dimensions, but others have since extended this
approach to take advantage of Gaussian curvatures. However, according to “A Survey of 3D
Face Recognition Methods,” 2D face recognition seems to outperform 3D face recognition
methods, but it is expected that this will change in the near future (Scheentra 891).
4.2.3 Weaknesses of Eigenfaces
Six specific difficulties outlined in “Quo vadis Face Recognition” hinder the
algorithms described above and are all functions of face image acquisition and individual
differences in subjects.
1. Viewing angle affects the appearance of the face because of projective deformation
(stretching, etc. of different parts of the face) and self-occlusion and dis-occlusion of
parts of the face.
2. Illumination can accentuate or diminish certain facial features.
3. Expressions of emotion and “paralinguistic communication” can cause large
variations in facial appearance.
4. Objects in the scene or on the face may obscure the face.
5. Faces change over time, whether in response to aging or fashion. However, it is the
same individual behind the face.
6. Other individual factors such as sensitivity to gender or ethnicity may affect the
output of the algorithm.
(Cohn 2-3). It should be noted, though, that over the last few years, face recognition
algorithms such as eigenfaces have been improved and tested on less than perfect images
(Scheentra 891).
Analysis of Hardware Controls for Secure Authentication
23
CS4235: Introduction to Information Security
4.2.4 Testing & Standards
With the rise of face these recognition applications, the government has responded by
establishing two major entities to encourage and test face recognition technology: FERET
and FRVT. A number of standards have appeared as well. The Department of Defense, for
one, sponsored the Face Recognition Technology (FERET) program, which began in 1993.
The FERET program comprised three major elements. First, it sponsored research for
promoting recognition algorithms from theory to application. Second, it collected and
distributed the FERET database of facial images, which is used as a standard for testing
algorithms. Finally, and most importantly, FERET performed evaluations that compared the
abilities of race recognition algorithms (FERET).
FRVT, the Face Recognition Vendor Test, specifically targets commercial systems.
Its primary goal is “to measure progress of prototype systems/algorithms and commercial
face recognition systems…” Participating agencies include the FBI, NIST, and DHS (Face
Recognition Vendor Test 2006 - Introduction). One may now question the accuracy of the
face recognition, especially in the context of verification since it applies directly to access
control. In response, FRVT 2002 has verification performance data for the top three face
recognition companies tested.10 Surprisingly, for a desired “false alarm rate” of 0.1%, the
average verification rate was only near 80% (Phillips npa).
While a number of standards for biometrics in general exist, INCITS M1 and ISO
SC37 Face Recognition Data Interchange Format specifically target face recognition. These
“[ensure] that enrolled images will meet a quality standard needed for both automated face
recognition and human inspection of facial images; [facilitate] the use of face information in
applications that have limited storage…and [allow] interoperability among facial recognition
vendors” (Identix - Standards). In addition, it should be noted that in October of 2004, the
U.S. Department of Homeland Security adopted its first biometric face recognition standard.
Analysis of Hardware Controls for Secure Authentication
24
CS4235: Introduction to Information Security
This standard is used in applications such as travel documents, specifying definitions of
photographic properties for the purposes of “computer automated face recognition”
(“Department of Homeland Security Adopts Facial Recognition Standard).
4.3 Research and Market
With face recognition receiving both government support and commercial interest, it
is no surprise that researchers and vendors alike seek to further face recognition technology.
While improving the accuracy of recognition algorithms is obviously one major goal of
current research, “significant research efforts have [also] been focused on video-based face
modeling, processing, and recognition” (Zhao 2). A large number of research groups exist in
the U.S. alone. For example:

Advanced Multimedia Processing Lab, Carnegie Mellon University

Center for Automation Research, University of Maryland

Face Perception and Research Laboratories, University of Texas at Dallas

Perceptual Science Laboratory, University of California – Santa Cruz
(Face Recognition Homepage – Research Groups).
Accordingly, in 2005, “Q-Tel, a CIA-backed venture group…disclosed about $6
million in investments in A4Vision Inc., a provider of 3-D facial-scanning and –recognition
software and equipment.” Also, since the beginning of 2005, the French Civil Aviation
Authority has employed A4Vision’s 3-D recognition systems in the Lyon airport to create
security badges for pilots, mechanics, and other employees to access the highly secure tarmac.
There have been only a few incidents in which the system failed to meet expectations
(Greenemeier npa). One other popular 2D face recognition vendor is Identix, Inc., which is
named in FRVT as one of the most reliable face recognition software companies. Identix
software was used at Super Bowl XXXV to search for potential criminals and terrorists.
Analysis of Hardware Controls for Secure Authentication
25
CS4235: Introduction to Information Security
It is obvious that even through the weakness of face recognition technology, advances
driven by research and growing commercial availability could in fact make face recognition a
viable security feature within businesses. One can perhaps expect the aforementioned largescale implementations of the technology to trickle into the smaller private market, further;
coupling face recognition technology with other security measures (multifactor authentication)
may provide greater levels of security. For example, some research into embedding a face
image as a watermark into iris images allows for establishing the authenticity of the iris and
user in iris recognition (another biometric technology). This scheme resists “malicious
manipulations of an iris image” during the iris patter matching process (Ji 1).
4.4 Pros and Cons
Despite the rise of face recognition technology, it is somewhat tarnished by its
deficiencies. Even the more accurate 3D recognition still faces a number of hurdles,
especially in the context of verification (Greenemeier npa). According to Stan Li, the
challenges—many of which were mentioned previously—come “from high nonconvexity of
face manifolds [mathematical projections of the face], in the image space, under variations in
lighting, pose, and so on”. In layman’s terms, face recognition involves just too many
variables. It is this flexibility, however, that makes face recognition the main route in
automated security surveillance while at the same time tempering its use as a means of
verification in access control. Still, future research in two directions may provide possible
“solutions.” First is the construction of a “‘good’ feature space [the mathematical space onto
which face manifolds are projected] in which face manifolds become less complex.” Second
is the construction of more capable “classification engines,” which utilize common face
attributes to aid in recognition (Li 3). In fact, few studies have tested face recognition in the
Analysis of Hardware Controls for Secure Authentication
26
CS4235: Introduction to Information Security
context of individual differences in subjects regarding ethnicity, etc. (Cohn 1). In light of this
information, one may conclude that face recognition is still a future technology.
Furthermore, while surveying information on face recognition, one is likely to
encounter the topic of iris recognition, which in fact may be a more accurate alternative to
general face recognition. The inventor of this technology, J. Daugman, describes the accuracy
in his essay, “High Confidence Visual Recognition of Persons by a Test of Statistical
Independence,” offering evidence that in a typical recognition case, the confidence levels of
his algorithm correspond formally to a conditional false accept probability of one in about
1031 (Daugman 1148). This patented and tested technology is thus perhaps the superior option
in biometrics in the context of access control.
5. Voice Recognition and Fingerprint Authentication
5.1 History
The process of fingerprinting a person has been around for hundreds, perhaps
thousands of years, as handprints have been found impressed in various artifacts, from
Chinese and Babylonian tablets, to pre-historic Native American petroglyphs. (History of
Fingerprinting 4) However, the use of fingerprints to identify a person has comparatively
been around for only a short period of time. The idea of using fingerprints as identification
was first circulated by Dr. Henry Faulds, who in 1880 was the first scientist to publish a
paper mentioning the use of fingerprints for identification. While Faulds wrongfully believed
that fingerprints were not unique to each individual, his observation that fingerprints could be
used as identification would have far reaching implications. Subsequently, in the 1890’s, Sir
Francis Galton, a famous British scientist, was the first to put fingerprinting on a scientific
basis, as he proved the individuality/permanence of fingerprints through the publishing of
dozens of scholarly works, articles, and two major books (History of Fingerprinting 5). Later
Analysis of Hardware Controls for Secure Authentication
27
CS4235: Introduction to Information Security
on, Sir Edward Richard Henry, a British official in India, created a way of classifying
fingerprints, called the Henry Classification System, in 1897 after consulting with Galton on
the issue. Later on, in the early 20th century fingerprinting became extremely common, as it
became commonly used in law enforcement to catch criminals. Today, fingerprint
identification, has become more widely used then ever, as the use of Automated Fingerprint
Identification System (AFID), an electronic database of fingerprints, has caused the use of
fingerprint identification to skyrocket. (History of Fingerprinting 6)
Voice recognition technology, on the other hand, is a relatively new technology
compared to fingerprint identification. The first attempt at synthesizing speech occurred in
1936, with the innovation of a robot-like machine called Voder that emitted speech.
Demonstrated at the World Fair, it sparked interest in voice recognition, as the U.S.
Department of Defense funded research in voice recognition in the 1940s, in an attempt to
decode enemy messages. However, this turned out to be a failure, as the technology required
for such an innovation was ahead of its time. Years later, during the 1970s - 1980s,
commercial viable products began to enter the mainstream, as the VIP 100 product from
Threshold Technologies began a new wave of voice recognition research/technology. While
innovative, the VIP 100 and other products during this time period were very limited, as they
could usually only recognize a handful of words and were not very accurate. As personal
computers became more and more powerful during the mid-1990s, voice recognition became
more advanced, as continuous speech products such as “Naturally Speaking” from Dragon
Systems became more and more popular (Zumalt 181). Today, there are many different
companies, such as IBM, Dragon Systems, Microsoft, etc striving to provide high quality
voice recognition technology (Weston).
Analysis of Hardware Controls for Secure Authentication
28
CS4235: Introduction to Information Security
5.2 Functionality
5.2.1 Fingerprinting
Fingerprint authentication is a type of id-based authentication (uniqueness to one
person), as each person’s fingerprint is unique to that individual. There are three main ridge
patterns, or types of fingerprints – arches, whorls and loops.11
Fingerprints usually also have minor patterns or special features, called minutia, that
cause each fingerprint to be unique. Examples of these include ridge endings, (point at which
a ridge terminates), bifurcations (where a ridge splits into two) and divergences (ridges so
small that they appear like dots). Fingerprint scanners typically differentiate fingerprints first
through the ridge patterns (arch, loop, etc) and then by the various minutia points on each
finger, as they characterize each minutia point based upon its orientation, spatial frequency,
curvature, and position (Weaver 97). While there are many different ways to scan a
fingerprint, two methods dominate – optical scanning and capacitance scanning. Other
methods include ultrasonic sensors, electric field scanning, and temperature scanning.
The first is the method of optical finger scanning, in which a digital image of the
finger is taken in a process similar to the process that takes place in digital cameras. In an
optical scanner, a charge coupled device (CCD) composed of thousands of photosites, or
light-sensitive diodes, generates a digital image of the fingerprint, as each photosite in the
CCD records a pixel corresponding to the light that hit it (Khuwaja). Because optical
scanning relies on light to scan in a fingerprint, it can sometimes read in a bad image, as a
dirty finger can result in an improper image or no image at all.
The second method of finger scanning is the process of capacitance scanning, in
which a capacitor puts together an image of the fingerprint, similar to the image of an optical
scanner. In capacitance scanning, a capacitive sensor uses the property of capacitance to scan
Analysis of Hardware Controls for Secure Authentication
29
CS4235: Introduction to Information Security
in the image of a fingerprint. The sensor is made up of one or more semiconductor chips,
each which contain a collection of cells. In each cell, there are two conductor plates which act
as a capacitor, and the finger (to be scanned) acts as the third capacitance plate, as moving the
finger closer or further away from the capacitor changes the total capacitance of the capacitor.
Because of this, the capacitance in a valley will have a different capacitance then that of a
ridge, as each cell will have a different capacitance. A feedback loop connects the conductor
plates to the amplifier, which then outputs the final voltage. Using the voltage output from
each cell in the sensor, an image of the fingerprint is put together, as the capacitance in each
cell will determine if a valley or ridge is being mapped. One upside to capacitance scanning
is that the final image is not subject to distortion or trickery, as it does not require an actual
image of the fingerprint in order to form a digital one. Additionally, because a semiconductor
chip is much smaller then a CCD, capacitive scanners are much smaller and lightweight.
5.2.2 Voice
Voice recognition technology is also a type of id-based authentication. While
fingerprinting and most other biometrics technology (iris, facial, etc) utilizes image-based
information to process an authentication request, voice, or speech recognition technology
uses acoustic information to process such a request. There are two different types of voice
biometrics: speaker verification and speaker identification. In speaker verification, the system
confirms the identity of the person he/she claims to be, while in speaker identification, the
system finds and assigns an identity to an unidentified person (Markowitz 69). For example,
in speaker verification, a person would state his/her name or phrase and wait to be
authenticated, while in speaker identification, a person would say anything and wait until the
system found his/her identity and confirmed it. There are many parameters which affect the
performance of a voice recognition system.12
Analysis of Hardware Controls for Secure Authentication
30
CS4235: Introduction to Information Security
Voice recognition technology involves two main steps: feature extraction and acoustic
modeling/classification. Feature extraction is the process of breaking up audio data into
individual windows, called “frames.” The vast majority of speech recognition technology
utilizes mel frequency cepstral coefficients (MFCC) to extract the raw data from the acoustic
signal. MFCC, also used in various types of speakers around the world, are coefficients used
to represent audio features. In the MFCC process, each individual frame is converted into an
MFCC, or feature vector. After the entire audio signal is transformed into feature vectors,
acoustic modeling/classification is employed in order to actually recognize and translate each
individual word.
For this, several different models/systems are used, as models such as Dynamic Time
Warping, Neural Networks, and Hidden Markov Model (HMM) translate data into
recognizable words. HMM is the most widely used model in voice recognition technology, as
most new voice recognition systems use it to recognize words in speech. It utilizes finite state
machines to model words, as it compares feature vectors it receives to mappings it already
contains in its system (Rabiner 27). For example, it is similar to that of a person getting
directions to a particular place. A person going to location B using a set of directions (take
left down Peachtree Street, right on 10th Street, etc) is analogous to the patterns the system
already has, mapping a particular auditory signal to a word. If that person were to follow a
friend to location B, the person would then be able to compare his/her memory to the set of
directions they received, similar to when a set of feature vectors are sent to the system to
determine their meanings.
5.3 Market
While in the past, only a few major companies were able to produce fingerprint
scanners due to the amount of research and investment required, today fingerprint scanners
Analysis of Hardware Controls for Secure Authentication
31
CS4235: Introduction to Information Security
have become extremely inexpensive. In recent years, a host of different companies have
started to manufacture fingerprint reading/scanning products. Companies such as Identix Inc.,
Bioscrypt Inc, and Ultra-Scan Corporation have become industry leaders through finger
scanning products such as LiveScan, V-Pass™, and UltraTouch®. Many manufacturers have
also begun to combine multiple biometric technologies – for example, Bioscrypt Inc. offers
the V-Smart™ reader, which reads both a smart card and a fingerprint at the same time,
therefore providing even more security to users.
Voice recognition technology, on the other hand, is only just beginning to take off, resulting
in far fewer companies then fingerprint scanning. For example, the field includes huge multinational corporations such as Microsoft and IBM, but also smaller, well established
companies such as Nuance and QVoice Inc, which offer speech verification products such as
Verifier and VoiceLock.
5.4 Pros and Cons
Since fingerprints are natural and unique to each individual, they have clear
advantages over most other authentication technologies, as fingerprint recognition is
extremely stable (hard to lose a finger, unlike a password) and also very hard to forge. It is
also relatively accurate, as the false match rate (the rate at which a user is misidentified in a
database) is in the range of 0.01% - 0.15%, similar to the rate for voice and hand biometrics,
and less then the rate for facial biometrics (O’Gorman 2027). Additionally, fingerprint
scanners are very easy to use, meaning little training is required to use it. They are also
extremely small, use very little power, and in recent years, have become relatively
inexpensive. Conversely, fingerprint recognition cannot be used by everybody – for example,
the elderly may have a tough time scanning their fingers in such a small device. In addition,
while scanners are fairly accurate, they are not 100% accurate – for example, dirty, moist
Analysis of Hardware Controls for Secure Authentication
32
CS4235: Introduction to Information Security
fingers can easily cause a false rejection. Lastly, a strong cultural stigma is still connected
with fingerprint scanning, as in the past, fingerprinting has been associated with criminal
behavior.
In contrast to fingerprint scanning, voice recognition technology is an instable
biometric, as it can be altered. While it is not as difficult to forge as fingerprint scanning, it is
still harder to deceive than other authentication systems, such as smart cards, hardware tokens,
etc., as in the case of the latter, fooling a security system simply requires the physical object.
As mentioned earlier, speech recognition is fairly accurate, as it is about as accurate as hand
or fingerprint biometrics. One major advantage voice recognition has over other
authentication technologies is the fact that it needs no extra hardware or training in order to
operate, as it can utilize existing telephone lines. Because of this, it is easier to use and fairly
low-cost compared to other authentication technologies. Conversely, voice recognition is
subject to background noise and other distortions, which can affect its accuracy by causing
false negatives or false positives. Additionally, because human voice is an unstable biometric,
the physical state of the voice can also affect the accuracy rate, as old age (the voice changes
over time) and sickness can distort the readings, and cause a false negative. Also, an attacker
could potentially hack into the system by using an advanced recording that imitates the voice
of a legitimate user (Markowitz 68).
5.5 Future
Overall, fingerprint scanning stands as a fairly established authentication technology, as its
longevity, its uniqueness, and its ease of use has caused it to become widely used across the
world today. While huge growth in the field of fingerprint recognition is not expected
because of its relatively old age, fingerprint scanning is projected to grow at a steady pace.
Analysis of Hardware Controls for Secure Authentication
33
CS4235: Introduction to Information Security
Through research and technological gains, a whole new generation of more accurate, lower
cost fingerprint scanners are anticipated to flood the market in the near future.
Because of its fairly recent entry into the field of authentication technology, speech
recognition is a technology that is considered to still be in its infancy, as problems such as
reading distortions and vulnerabilities plague it. However, it has a bright future ahead of it, as
the use of voice recognition in biometrics is expected to rise – especially as technological
breakthroughs and greater computational power allow more powerful, accurate, and low-cost
voice recognition solutions to be developed. Text-independent (systems that can accept input
continuously) speech recognition systems as well as speech systems that use multiple
biometric technologies are expected to grow tremendously in the near future (Markowitz 73).
6. Conclusion
As security becomes an increasingly important part of digital systems, the utilization
of hardware controls becomes more pertinent. Systems with confidential military, business,
and research information necessitate authentication which is nearly impossible to reproduce.
In addition, private sector organizations are also beginning to realize the importance of
protecting their seemingly insignificant data, due to the financial damage an information
security attack can cause.
Smart cards, hardware tokens, and biometrics are all hardware schemes which
incorporate something a person possesses (whether it be knowledge, object, or ID-based) in
order to strengthen the accuracy of authentication. Because technologies used in each of these
fields of study are so hard to reproduce or break without possession, they are an excellent
standard for the future of authentication.
A smart card allows for quick access to secured areas and electronic resources. They
are relatively cheap and can even store some simple user information. Unfortunately the
Analysis of Hardware Controls for Secure Authentication
34
CS4235: Introduction to Information Security
smart card does not allow for remote access (or remote access is a bit of a hassle with a
mobile card reader).
While the hardware token can take a variety of forms, typically a one-time-password
(OTP) is generated allowing the user access to a system. This authentication is strengthened
when this dynamic OTP is combined with a memorized password to create two-factor
authorization. An important aspect of hardware tokens is that they can allow access to remote
systems. USB tokens allow a user to encrypt files, store certificates, and digitally sign
documents. Upcoming technologies including Bluetooth could make authentication even
easier.
Biometrics is a field which is constantly becoming more reliable. By analyzing the
physical features of an individual, this technology provides relatively accurate and convenient
means of verification. There are, however, a number of external variables that limit the
accuracy of biometrics.
It is evident that the more factors of authentication a security system contains, the
more secure it is. Ultimately combining smart cards, hardware tokens, and biometrics for
three-factor (knowledge, object and ID) authorization would be ideal, but the level of security
provided must be balanced with the weight of the information being protected. Adoption of
more secure methods is slow as private sector companies (a) do not have unlimited funding
when it comes to security and (b) do not want to inconvenience or alienate their customers
and employees. Security constantly needs to be updated as crackers are able to penetrate the
existing security systems of institutions, however many institutions are reluctant to do so until
a breach occurs. The irony is that as usage of hardware authentication increases, research and
cheaper technology will become more prevalent. Institutions need to recognize the
importance of protecting their electronic assets, and hardware authentication is a powerful,
viable solution for this purpose.
Analysis of Hardware Controls for Secure Authentication
35
CS4235: Introduction to Information Security
7. Notes
1
See Appendix A for a diagram representing the architecture of a chip card.
2
See Appendix A for diagrams illustrating the layout of a contact smart card.
3
See Appendix B for pictures of some popular hardware tokens.
4
All of RSA Security's current products generate a token once every sixty seconds. This includes them
SecurID models 200, 600, 700, 800, and 900.
5
Images of KT-1 and USB-1 from CRYPTOCard are available in Appendix B. VeriSign's One-Time
Password is also an example of an event triggered token.
6
O'Gorman goes explains two-factor authentication on page 2024 of Comparing Passwords, Tokens,
and Biometrics for User Authentication, and how it applies to hardware tokens on page 2033.
7
The Aladdin Knowledge Systems, Verisign, and RSA are USB tokens which allow for encryption and
digital signing.
8
Ten meters is based off of a class-two Bluetooth signal. Information on range is taken from
Bluetooth.com, the official Bluetooth website.
9
See Appendix A for sample eigenfaces (Figure A3, source: National Science and Technology Council:
Subcommittee on Biometrics).
10
See Appendix A for FRVT 2002 sample data (Figure A4, source: Phillips).
11
See Appendix A for arch, whol and loop prints (Figure A5).
12
See Appendix A for the parameters affecting the performance of voice recognition systems (Figure
A6).
Analysis of Hardware Controls for Secure Authentication
36
CS4235: Introduction to Information Security
8. Bibliography
Abdelhameed, Rania, Sabira Khatun, Borhanuddin Mohd Ali, and Abdul Rahman Ramli.
“Authentication model based Bluetooth-enabled mobile phone.” Journal of Computer
Sciences 1.2 (2005): 200-203.
Biryukov, Alex , Joseph Lano and Bart Preneel. “Cryptanalysis of the Alleged SecurID Hash
Function.” Lecture Notes in Computer Science 3006 (2004): 130-144.
Cohn, Jeff, Gross, Ralph, and Shi, Jianbo. “Quo vadis Face Recognition?” Third Workshop
on Empirical Evaluation Methods in Computer Vision (December, 2001): 1-9.
Cole, Ron. Mariani, H. Uszkoreit, A. Zaenen, and V. Zue. Survey of the state of the art in
human language technology. Cambridge: Cambridge University Press, 1997.
Corcoran, David, David Sims, and Bob Hillhouse. “Smart Cards and Biometrics: You’re Key
to PKI.” Linux Journal 1999:59 1999. ACM Digital Library. Georgia Tech Lib.,
Atlanta, GA. 16 July 2006.
CRYPTOCard Tokens. CRYPTOCard Secure Password Technologies. 14 July 2006.
<http://www.cryptocard.com/index.cfm?PID=377>.
Daugman, John G. “High Confidence Visual Recognition of Persons by a Test of Statistical
Independence.” IEEE Transactions on Pattern Analysis and Machine Intelligence
15.11 (November 1993): 1148.
Dhar, Sumit. “Introduction to smart cards” 1-9.
Elsom, S.M. "Protection of Computer Software By Technical Measures.” Software
Protection 4.6 (1985): 1-6.
“Delivery of national ID cards starts next week.” Gulf News 10 July 2006. 13 July 2006.
<http://archive.gulfnews.com/articles/06/07/10/10052713.html>.
Everett, C. “Smart cards face long wait.” Infosecurity Today May-June 2006: 22-23.
Analysis of Hardware Controls for Secure Authentication
37
CS4235: Introduction to Information Security
Face Recognition Homepage – Research Groups. Face Recognition Homepage. 10 July 2006.
<http://www.face-rec.org/research-groups/>.
Face Recognition Vendor Test 2006 – Introduction. Face Recognition Vendor Test. 10 July
2006. <http://www.frvt.org/FRVT2006/>.
FERET. Face Recognition Homepage. 10 July 2006.
<http://www.frvt.org/FERET/default.htm>.
Fontanella, A. “The Layered Look: The Latest Trend in ID Card Security.” Security Info
Watch. 21 June 2006. 10 July 2006.
<http://www.securityinfowatch.com/article/article.jsp?id=8523&siteSection=306>.
Greenemeier, Larry. “U.S. Pushes For Advances in Facial Recognition.” InformationWeek 14
Mar 2005: npa.
Hilley, Sarah. “Will Government ID schemes help infosecurity managers with their jobs?”
Computer Fraud and Security February 2006: 10-12.
History of Fingerprinting. Guardware Systems. Guardware Systems, 2000. 2-11. 16 July
2006 <http://biometrie.online.fr/dossiers/technique/empreintes/History_of_Finger
printing.pdf#search='history%20of%20fingerprint%20recognition'>.
Identix – Standards. Identix. 13 July 2006. <http://www.identix.com/trends/standards.html>.
Ji, Shen, Fan Kefeng, Mo Wei, Wang Meihua, Zhao Xinhua. “Human Identification
technique based on Iris Feature Watermarking.” Chinese Journal of Electronics 15.2
(2006): 251-256.
Khuwaja, Gulzar A. “A Multimodal Biometric Identification System Using Compressed
Finger Images” Cybernetics and Systems: An International Journal 37:1 2005: 23-46.
Inspec. Georgia Tech Lib., Atlanta, GA. 16 July 2006.
Li, Stan Z. “Face Recognition: Technical Challenges and Research Directions.” Lecture
Notes in Computer Science 3338 (2004). 3.
Analysis of Hardware Controls for Secure Authentication
38
CS4235: Introduction to Information Security
Liaw, Horng-Twu, Jiann-Fu Lin and Wei-Chen Wu. “An efficient and complete remote user
authentication scheme using smart cards.” Mathematical and Computer modeling.
44.1-2 (2006): 223-8.
Markowitz, Judith A. “Voice Biometrics.” Communications of the ACM 43:9 2000: 66-73.
ACM Digital Library. Georgia Tech Lib., Atlanta, GA. 16 July 2006.
Mathieson, Steven. “Biometrics: what are they good for?” Infosecurity Today 2:1 2005: 2428. Inspec. Georgia Tech Lib., Atlanta, GA. 16 July 2006.
National Science and Technology Council: Subcommittee on Biometrics. Face Recognition.
NSTC: Subcommittee on Biometrics. 27 March 2006.
Navarrete, Pablo, and Ruiz-del-Solar, Javier. “Eigenspace-based Face Recognition: A
comparative study of different approaches.” IEEE Trans. On Sys., Man. & Cyb C.
16.7 (2005). 817-830.
Noe, Jeffrey. “Contactless cards: The next big thing?” ABA Banking Journal 97.9 (2005): 4246.
O’Gorman, David. “Comparing Passwords, Tokens, and Biometrics for User
Authentication.” Proceedings of the IEEE 91:12 2003: 2021-2040. Inspec. Georgia
Tech Lib., Atlanta, GA. 16 July 2006.
O'Gorman, Lawrence. "Comparing Passwords, Tokens, and Biometrics for User
Authentication." Proceedings of the IEEE 91.12 (2003): 2021-2040.
Open Authentication Vision. Open Authentication (OATH). 15 July 2006.
<http://www.openauthentication.org/vision.asp>.
Pfleeger, Charles, and Shari Pfleeger. Security in Computing Third Edition. Upper Saddle
River, NJ: Prentice Hall, 2003.
Phillips, Jonathon P., Grother, Patrick, Michaels, Ross J., Blackburn, Duane M., Tabassi,
Elham, and Bone, Mike. Face Recognition Vendor Test 2002. DARPA, National
Analysis of Hardware Controls for Secure Authentication
39
CS4235: Introduction to Information Security
Institute of Standards and Technology, DoD Counterdrug Technology Development
Program Office, NAVSEA Crane Division [March 2003].
Rabiner, Lawrence R. "A Tutorial on Hidden Markov Models and Selected Applications in
Speech Recognition." Proceedings of the IEEE 77.2 (1989): 257-285. 17 July 2006
<http://www.ece.ucsb.edu/Faculty/Rabiner/ece259/Reprints/tutorial%20on %20hmm
%20and%20applications.pdf>.
RSA SecurID Authenticators. RSA Security. 14 July 2006.
<http://www.rsasecurity.com/products/securid/datasheets/SID_DS_0606-4pp.pdf>.
Scheentra, Alize, Ruifrok, Arnout, and Veltkamp, Remco C. “A Survey of 3D Face
Recognition Models.” Lecture Notes in Computer Science 3546 (2005): 891-899.
Schneider, Ivan. "Bank of America Describes One-Time Password Plans." Bank Systems +
Technology 42.4 (2005): 12.
“Security is in the Cards.” Security. 42.4 (2005): 36-8.
Shelfer, Katherine M. and J. Drew Procaccino. “Smart Card Evolution.” Communications of
the
ACM 45.7 (2002): 83-88.
Smart Card Alliance, The. “Identity Management Systems, Smart Cards and Privacy.”
<http://www.smartcardalliance.org/alliance_activities/publications.cfm>.
Smart Card Alliance, The. “Logical Access Security: The Role of Smart Cards in Strong
Authentication.”
<http://www.smartcardalliance.org/alliance_activities/publications.cfm>.
Smart Card Alliance, The. “Smart Cards and Biometrics Report.”
<http://www.smartcardalliance.org/alliance_activities/publications.cfm>.
Smart Card Forum. “What’s so smart about smart cards?” 1-12.
Swartz, John. "How One Little Fob Could Foil a Cyber Bank Robber." USA TODAY
Analysis of Hardware Controls for Secure Authentication
40
CS4235: Introduction to Information Security
2 Nov. 2005.
“The Smart Card Alliance.” The Smart Card Alliance. 17 July 2006.
<http://www.smartcardalliance.org>.
Unified Authentication. VeriSign. 15 July 2006. <http://www.verisign.com/productsservices/security-services/unified-authentication/usb-tokens/index.html>.
Weaver, Alfred C. “Biometric Authentication.” IEEE Computer Journal 39:2 2006: 96-97.
Inspec. Georgia Tech Lib., Atlanta, GA. 16 July 2006.
Weston, Tom. "Affordances of Voice Recognition." Dec. 2000. Stanford University. 17 July
2006 <http://florin.stanford.edu/~t361/Fall2000/TWeston/history.html>.
Woodware, John D., Horn, Christopher, Gatune, Julius, and Thomas, Aryn. Biometrics: A
Look at Facial Recognition. RAND Public Safety and Justice for the Virginia State
Crime Commission [2003].
Zhao, W.Y., Chellappa, R., Rosenfeld, A. and Phillips, P.J. “Face Recognition: A literature
Survey.” UMD CAR-TR-948 (2000). 1-17.
Zumalt, Joseph R. “Voice Recognition Technology: Has It Come of Age?” Information
Technology and Libraries 24:4 2005: 180-185. Inspec. Georgia Tech Lib., Atlanta,
GA. 16 July 2006.
Analysis of Hardware Controls for Secure Authentication
41
Download