Private Key
(Card)
S
C
Public Key
(Card)
P
C
Private Key
(Issuer)
S
I
Public Key
(Issuer)
P
I
Card reader
P
C
certified
with S
I
S
C
&
fingerpint template
communication
card
Figure 6: Diagram of Dynamic Data Authentication.
2. Session key generation
A session key can be used as a secure key for the
encrypted communication between the card and the
reader (e.g. DES encryption). The session key
derivation function in both the card and the reader,
generate a unique session key Ks for each ICC
application transaction as per the following method.
The system first generates unique Master Keys K
M
from the user primary account number and Issuer
Master key, then Ks can be derived from K
M
, ATC
(Application Transaction Counter) using
diversification data R. The detailed generation
method can refer to EMV definition (EMV 2004).
K
M
:= F (Primary Account Number, Issuer Master
key
)
Ks : = F (K
M,
ATC) [R]
3. Fingerprint capture and extraction
The fingerprint sensor reads the finger image and
adds random data to the fingerprint data. The
random data can prevent replay attack. The mixed
data are sent to FIFO, after DES-encryption using
the session Ks, they are sent out to the memory of
the card reader. After fingerprint reading is
complete, the stored image can be decrypted and the
minutiae extracted. The minutiae are encrypted
again and sent back to the card for authentication.
4. The card decrypts the received minutiae.
5. Match the acquired minutiae with the hidden
fingerprint template in the smart card and generate a
similarity score. The final decision comes from an
adaptive algorithm (refer to section 3.3). The
decision is encrypted and sent both to the card reader
and the smart card LED. This is a special measure
because the conventional way is just to send it either
to the card or the card reader. In this way, even the
attacker faked a result in card reader and the card
reader display shows the operation is right, but the
LED on the smart card will start to flash and give a
warning.
3.3 An Adaptive Decision Algorithm
Two authentication methods, PIN and biometric,
have their own features. The PIN authentication is
stable but prone to be disclosed and forgotten; the
biometric authentication is convenient but cannot
reach a perfect recognition rate and be updated. Thus
they cannot really replace each other completely.
Actually, a high security system can be based on a
combination of three factors: ‘something-you-have’
which is the smart card factor, ‘something-you-
know’ which is the PIN factor and ‘something-you-
are” which is the biometrics factor (Stephen et al.,
2000). Nowadays the smart card becomes a platform
for multi-applications. More and more payment and
non-payment applications (lottery, access control)
have been integrated into a single card. Actually
different applications need different level
authentications. Even the same application, e.g.
payment application, the risk for low amount and
high amount transaction are different.
In order to better balance the security
requirements and user convenience, we propose an
adaptive algorithm and apply it in the authentication
decision. Principally, we first classify different
applications into several predefined levels according
to various security requirements and transaction
value. Then the algorithm selects different methods,
varies the threshold value of biometric similarity
degree, even vary the similarity degree of PIN.
Adaptive decision algorithms are illustrated in
Figure 7.
A new concept of PIN match with a tolerance
(fuzzy PIN) is proposed. For example, for some
applications, when the user can offer a standard
fingerprint, then even he/she makes some small
mistakes in PIN, (e.g. should be 63456 but entered
63455), which the system will also accept (but issue
a warning, so the legitimate user can check it later at
home). To protect the card against exhaustive
search, the card will be locked after 10 successive
unsuccessful fingerprint verifications.
These measures have practical significances and
can cut the management cost. Many calls to the help
desk concern the PIN because it is forgettable.
A lot
of legitimate users’ cards are mis-locked or
applications have to be cancelled on site. A recent
IDC study put annual password management costs at
between US$230-460 per user (BioT2, 2004), which
would add up to a significant amount when a bank
has a large number of customers. The fuzzy PIN
matching combined with biometric measures can
help to avoid such nuisances without lowering the
security.
BIOMETRIC BASED SMART CARD FOR SECURITY
245