IEEE Technology and Society Magazine - September 2016 - 65

Authentication by Device
Our initial discussion suggests that biometrics are not a
practical solution that can solve tomorrow's authentication problems in a sustainable way. But could biometrics
provide part of such a solution? Is there a way to utilize
and apply biometric technology that will not risk kick
starting a huge new segment of the cybercrime industry?
Consider that our smartphones are always with us, and
they are becoming increasingly integrated with our environment. Recently I noticed that my laptop is responding
to phone calls before my phone (they are paired) so I
found myself taking calls on my laptop as it was easier and
faster than pulling the phone out of my pocket! The same
linking occurs in my car and soon throughout my home.
So could we take advantage of this to use our smartphones as engines to support personal authentication?

En-Phone Me Baby
The problem of biometric theft becomes significant
when you store a biometric pattern in a central repository or database, or if you encode it in a repeated email
signature or any regular data store. The sheer number
of biometric signatures that can be obtained by having
such resources makes these very attractive targets for
cyber criminals. If the rewards are large enough, criminals can find the seed financing and resources needed.
However, what if the biometric is used to generate an
enrollment key and that is what is stored, rather than
the biometric itself? This eliminates a key risk. If the key
is stolen, it is a straightforward process to generate and
register a substitute enrollment key. But you need
"something" to generate this key and this "something"
must also be available later to decode the key and close
the authentication loop. That "something" has to be
quite generic and widely available.
Is there some "device" that practically every adult
carries around with them every day that could perform
that function?
It doesn't take a rocket scientist to realize that your
smartphone could provide such a function. They are
always with us. And they are "observing" and "listening
to" us on a daily basis. So capturing recognizable physical
characteristics is relatively straightforward via our daily
use of these devices. They can be repurposed to acquire
a range of our biometrics through our daily use patterns
and thus build a profile of the device user that can be
used to continuously authenticate and (where needed),
authorize access to services and confirm transactions.
Brave new world here we come ...

The Zen of Zero-Knowledge-Proof
You may still be uncomfortable that someone can break
into or steal your device and access your biometric
data. In fact this concern is moot, because your device
september 2016

∕

will never store your biometric data directly. Instead it
will store a code derived from your data and the way it
derives that code can, if necessary, be changed.
So all that your device really does is to verify that it
has scanned your data recently and was able to generate
valid authentication code(s). There can also be an additional layer of security here, because your device could
store your authentication code in a secure memory and
never export it. Instead it can use a well-known cryptographic technique - zero-knowledge-proof (ZKP) - to
authenticate you to a network-based service where you
are enrolled [11]-[13]. This serves two purposes - the private key generated by your device, from your biometric,
never leaves your device. In fact it will be secured in a
special area of memory that cannot be accessed by the
main device CPU.
The second reason to use ZKP is that the bulk of the
cryptographic processing does not occur at the server -
in fact your device must do all the heavy computational
work. The server creates challenges that only the associated client can solve using a private key generated from
the user biometric. To increase the security level, the
server simply generates more sophisticated challenges
for the client.
Although initially counter-intuitive, it quickly
becomes clear that there are some key advantages to
this approach. Among these, the main cryptographic
processes are not implemented on the network server
and thus the attraction of obtaining millions of compromised access codes by breaking a single server-centric
cryptography process is removed. Instead it becomes
necessary to break a unique process for each device
with the reward of a single access code. This does not
justify the required scale and cost of resources, depending of course, on who's device is being attacked.
A second benefit is in terms of scalability. As the main
computational load is distributed across many individual
devices, the service can scale to many users without adding large amounts of computing power. And individual
smartphones are now more than powerful enough to run
the cryptographic solver algorithms in reasonable timeframes (i.e. maximum of several seconds). ZKP is an
ideal match for this problem as it keeps the most important functional elements of the cryptography distributed
across millions of devices. And the reward for breaking
the code on a particular device is limited to that single
device. This acts as a strong disincentive for cybercriminals who can find easier pickings elsewhere.

My Phone, My Biometrics ... All Mine!
And so we close the circle.
While today it is pretty difficult to lose your phone, if
you do so (or it is stolen), it has become very easy to
wipe all sensitive data. Phone manufacturers understand

IEEE Technology and Society Magazine

65



Table of Contents for the Digital Edition of IEEE Technology and Society Magazine - September 2016

IEEE Technology and Society Magazine - September 2016 - Cover1
IEEE Technology and Society Magazine - September 2016 - Cover2
IEEE Technology and Society Magazine - September 2016 - 1
IEEE Technology and Society Magazine - September 2016 - 2
IEEE Technology and Society Magazine - September 2016 - 3
IEEE Technology and Society Magazine - September 2016 - 4
IEEE Technology and Society Magazine - September 2016 - 5
IEEE Technology and Society Magazine - September 2016 - 6
IEEE Technology and Society Magazine - September 2016 - 7
IEEE Technology and Society Magazine - September 2016 - 8
IEEE Technology and Society Magazine - September 2016 - 9
IEEE Technology and Society Magazine - September 2016 - 10
IEEE Technology and Society Magazine - September 2016 - 11
IEEE Technology and Society Magazine - September 2016 - 12
IEEE Technology and Society Magazine - September 2016 - 13
IEEE Technology and Society Magazine - September 2016 - 14
IEEE Technology and Society Magazine - September 2016 - 15
IEEE Technology and Society Magazine - September 2016 - 16
IEEE Technology and Society Magazine - September 2016 - 17
IEEE Technology and Society Magazine - September 2016 - 18
IEEE Technology and Society Magazine - September 2016 - 19
IEEE Technology and Society Magazine - September 2016 - 20
IEEE Technology and Society Magazine - September 2016 - 21
IEEE Technology and Society Magazine - September 2016 - 22
IEEE Technology and Society Magazine - September 2016 - 23
IEEE Technology and Society Magazine - September 2016 - 24
IEEE Technology and Society Magazine - September 2016 - 25
IEEE Technology and Society Magazine - September 2016 - 26
IEEE Technology and Society Magazine - September 2016 - 27
IEEE Technology and Society Magazine - September 2016 - 28
IEEE Technology and Society Magazine - September 2016 - 29
IEEE Technology and Society Magazine - September 2016 - 30
IEEE Technology and Society Magazine - September 2016 - 31
IEEE Technology and Society Magazine - September 2016 - 32
IEEE Technology and Society Magazine - September 2016 - 33
IEEE Technology and Society Magazine - September 2016 - 34
IEEE Technology and Society Magazine - September 2016 - 35
IEEE Technology and Society Magazine - September 2016 - 36
IEEE Technology and Society Magazine - September 2016 - 37
IEEE Technology and Society Magazine - September 2016 - 38
IEEE Technology and Society Magazine - September 2016 - 39
IEEE Technology and Society Magazine - September 2016 - 40
IEEE Technology and Society Magazine - September 2016 - 41
IEEE Technology and Society Magazine - September 2016 - 42
IEEE Technology and Society Magazine - September 2016 - 43
IEEE Technology and Society Magazine - September 2016 - 44
IEEE Technology and Society Magazine - September 2016 - 45
IEEE Technology and Society Magazine - September 2016 - 46
IEEE Technology and Society Magazine - September 2016 - 47
IEEE Technology and Society Magazine - September 2016 - 48
IEEE Technology and Society Magazine - September 2016 - 49
IEEE Technology and Society Magazine - September 2016 - 50
IEEE Technology and Society Magazine - September 2016 - 51
IEEE Technology and Society Magazine - September 2016 - 52
IEEE Technology and Society Magazine - September 2016 - 53
IEEE Technology and Society Magazine - September 2016 - 54
IEEE Technology and Society Magazine - September 2016 - 55
IEEE Technology and Society Magazine - September 2016 - 56
IEEE Technology and Society Magazine - September 2016 - 57
IEEE Technology and Society Magazine - September 2016 - 58
IEEE Technology and Society Magazine - September 2016 - 59
IEEE Technology and Society Magazine - September 2016 - 60
IEEE Technology and Society Magazine - September 2016 - 61
IEEE Technology and Society Magazine - September 2016 - 62
IEEE Technology and Society Magazine - September 2016 - 63
IEEE Technology and Society Magazine - September 2016 - 64
IEEE Technology and Society Magazine - September 2016 - 65
IEEE Technology and Society Magazine - September 2016 - 66
IEEE Technology and Society Magazine - September 2016 - 67
IEEE Technology and Society Magazine - September 2016 - 68
IEEE Technology and Society Magazine - September 2016 - 69
IEEE Technology and Society Magazine - September 2016 - 70
IEEE Technology and Society Magazine - September 2016 - 71
IEEE Technology and Society Magazine - September 2016 - 72
IEEE Technology and Society Magazine - September 2016 - 73
IEEE Technology and Society Magazine - September 2016 - 74
IEEE Technology and Society Magazine - September 2016 - 75
IEEE Technology and Society Magazine - September 2016 - 76
IEEE Technology and Society Magazine - September 2016 - 77
IEEE Technology and Society Magazine - September 2016 - 78
IEEE Technology and Society Magazine - September 2016 - 79
IEEE Technology and Society Magazine - September 2016 - 80
IEEE Technology and Society Magazine - September 2016 - 81
IEEE Technology and Society Magazine - September 2016 - 82
IEEE Technology and Society Magazine - September 2016 - 83
IEEE Technology and Society Magazine - September 2016 - 84
IEEE Technology and Society Magazine - September 2016 - 85
IEEE Technology and Society Magazine - September 2016 - 86
IEEE Technology and Society Magazine - September 2016 - 87
IEEE Technology and Society Magazine - September 2016 - 88
IEEE Technology and Society Magazine - September 2016 - Cover3
IEEE Technology and Society Magazine - September 2016 - Cover4
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_september2023
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_june2023
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_march2023
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_december2022
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_september2022
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_june2022
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_march2022
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_december2021
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_september2021
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_june2021
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_march2021
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_december2020
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_september2020
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_june2020
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_march2020
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_december2019
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_september2019
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_june2019
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_march2019
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_december2018
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_september2018
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_june2018
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_march2018
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_winter2017
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_fall2017
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_summer2017
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_spring2017
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_winter2016
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_fall2016
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_summer2016
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_spring2016
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_winter2015
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_fall2015
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_summer2015
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_spring2015
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_winter2014
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_fall2014
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_summer2014
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_spring2014
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_winter2013
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_fall2013
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_summer2013
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_spring2013
https://www.nxtbookmedia.com