Wednesday, 25 March 2015

BIOMETRIC





BIOMETRICS
Biometrics is the technique of the identification and authentication of the digital signature. This will assure the security in the accessing of information that uses physical and logical access control.
A bio metrical factor is a behavior or physiological characteristics of unique to a subject as a biometric factor is used instead of the username or account ID as an identifier requires a one-to-many search
There are many types of biometric factors
        Finger print
        Face Scans
        Iris Scans
        Retina Scans
        Palm Scans
        Heart/Pulse patterns
        Voice patterns
         Signature dyamics
         Keystroke Pattern
       

A biometric device must be able to read information that is very minute, such as the variations in then blood vessels in a person’s retina or the tones and timbres in their voice. This is mostly preferred such as most people are basically similar, the level of detail required to authenticate a subject often results in false negative and false positive authentications.
Biometric devices are rated for their performance against these two negative authentication conditions. Most biometric devices have a sensitivity adjustment so they can be tuned to be more or less sensitive. 

When a biometric device is too sensitive, a Type 1 error occurs. A Type 1 error occurs when a valid subject is not authenticated. The ratio of Type 1 errors to valid authentications is known as the False Rejection Rate (FRR).
When a biometric device is not sensitive enough, a Type 2 error occurs. A Type 2 error occurs when an invalid subject is authenticated. The ratio of Type 2 errors to valid authentications is known as the False Acceptance Rate (FAR).
The FRR and FAR are usually plotted on a graph that shows the level of sensitivity adjustment against the percentage of FRR and FAR errors.
 The point at which the FRR and FAR are equal is known as the Crossover Error Rate (CER).
The CER level is used as a standard assessment point from which to measure the performance of a biometric device. In some situations, having a device more sensitive than the CER rate is preferred, such as with a metal detector at an airport.



For a biometric device to function as identification or an authentication mechanism, the subject must be enrolled or registered. This means the subject’s biometric must be sampled and stored in the device’s database. The time required to scan and store a biometric varies greatly by what physical or performance characteristic is used. The longer it takes to enroll with a biometric mechanism, the less a user community accepts the inconvenience. In general, enrollment times longer than two minutes are unacceptable. If a biometric characteristic that changes with time is used, such as a person’s voice tones, facial hair, or signature pattern, enrollment must be repeated at regular intervals.

ACCOUNTABILITY AND ACCESS CONTROL
Once subjects are enrolled, the amount of time the system requires scanning and process a subject is the throughput rate. The more complex or detailed the biometric characteristic, the longer the processing time will take. Subjects typically accept a throughput rate of about six seconds or faster.
A subject’s acceptance of a security mechanism is dependent upon many subjective perceptions, including privacy and psychological and physical discomfort.
Subjects may be concerned about transfer of body fluids or revelations of health issues via the biometric scanning devices.

TOKENS
Tokens are password-generating devices that subjects must carry with them. Token devices are a form of “something you have.” A token can be a static password device, such as an ATM card. To use an ATM card, you must supply the token (the ATM card itself) and you’re PIN. Tokens can also be one-time or dynamic password devices that look a bit like small calculators.
The device displays a string of characters (a password) for you to enter into the system.

There are four types of token devices:
_ Static tokens
_ Synchronous dynamic password tokens
_ Asynchronous dynamic password tokens
_ Challenge-response tokens

STATIC TOKENS
A static token can be a swipe card, a smart card, a floppy disk, a USB RAM dongle, or even something as simple as a key to operate a physical lock. Static tokens offer a physical means to provide identity. Static tokens still require an additional factor to provide authentication, such as a password or biometric. Most device static tokens host a cryptographic key, such as a private key, digital signature, or encrypted logon credentials. The cryptographic key can be used as an identifier or as an authentication mechanism.


The cryptographic key is much stronger than a password because it is pre-encrypted using a strong encryption protocol, it is significantly longer, and it resides only in the token. Static tokens are most often used as identification devices rather than as authentication factors.


SYNCHRONOUS DYNAMIC PASSWORD TOKEN
A synchronous dynamic password token generates passwords at fixed time intervals. Time interval tokens require that the clock on the authentication server and the clock on the token device be synchronized.
The generated password is entered into the system by the subject along with a PIN, pass phrase, or password.
The generated password provides the identification, and the PIN/password provides the authentication.



ASYNCHRONOUS DYNAMIC PASSWORD TOKEN
An asynchronous dynamic password token generates passwords based on the occurrence of an event. An event token requires that the subject press a key on the token and on the authentication server.
This action advances to the next password value. The generated password and the subject’s PIN, pass phrase, or password are entered into the system for authentication.


CHALLENGE RESPONSE TOKENS
Challenge-response tokens generate passwords or responses based on instructions from the authentication system. The authentication system displays a challenge, usually in the form of a code or pass phrase. This challenge is entered into the token device. The token generates a response based on the challenge, and then the response is entered into the system for authentication.

Token authentication systems are much stronger security measures than password authentication alone. Token systems use two or more factors to establish identity and provide authentication. In addition to knowing the username, password, PIN, code, and so on, the subject must be in physical possession of the token device.
If the battery dies or the device is broken, the subject is unable to gain access. Token devices can be lost or stolen. Tokens should be stored and managed intelligently because once a token system is compromised, it can be difficult and expensive to replace.


TICKETS
Ticket authentication is a mechanism that employs a third-party entity to prove identification and provide authentication. The most common and well-known ticket system is Kerberos.
The Kerberos authentication mechanism centers on a trusted server (or servers) that host the functions of the Key Distribution Center (KDC), the Ticket Granting Service (TGS), and the Authentication Service (AS). Kerberos uses symmetric key cryptography to authenticate clients to servers.
All clients and servers are registered with the KDC, so it maintains the secret keys of all network members.


SINGLE SIGN ON
Single Sign On (SSO) is a mechanism that allows a subject to be authenticated only once on a system. With SSO, once a subject is authenticated, they can roam the network freely and access resources and services without being challenged for authentication.
SSO typically allows for stronger passwords because the subject must memorize only a single password.

SSO offers easier administration by reducing the number of locations on which an account must be defined for the subject. SSO can be enabled through authentication systems or through scripts that provide logon credentials automatically when prompted.
Scripts, Kerberos, SESAME, and KryptoKnight are examples of SSO mechanisms.


No comments:

Post a Comment