Show how to modify the scheme to make it more secure

Assignment Help Computer Engineering
Reference no: EM132177342

A variation of the following biometric authentication protocol was experimentally tested several years ago at immigration checkpoints in major U.S. airports.

A user registers in person by showing his credentials (e.g., passport and visa) to the registration authority and giving his fingerprint (a "palmprint" was actually used).

The registration authority then issues to the user a tamper-resistant smartcard that stores the reference fingerprint vector and can execute the matching algorithm. The checkpoint is equipped with a tamper-resistant admission device that contains a fingerprint reader and a smartcard reader.

The user inserts his smartcard and provides his fingerprint to the device, which forwards it to the smartcard. The smartcard executes the comparison algorithms and outputs the result ("match" or "not match") to the device, which admits or rejects the user accordingly.

Clearly, an attacker can defeat this scheme by programming a smartcard that always outputs "match." Show how to modify the scheme to make it more secure. The admission device needs to make sure that it is interacting with a valid smartcard issued by the registration authority.

You can assume that the smartcard can perform cryptographic computations. The attacker can program smartcards and is allowed to have an input-output interaction with a valid smartcard but cannot obtain the data stored inside it.

Reference no: EM132177342

Questions Cloud

What will happen to the premium on this cap : The current rate for three-month LIBOR is 2.28 percent. What will happen to the premium (value) on this cap if LIBOR rises to 3.16 percent? Explain
What we need to do in order to earn our ride is increase : Now that we've managed to weave our way through the North Woods safely and are one step closer to Thanto, our destination.
What will be the amount of capital gains tax on investment : Samuel Jenkins made two investments, the first was 13 months ago, If Samuel is in the 28 percent tax bracket, what will be the amount of capital gains tax
Characteristics of the four basic market models : What are the main characteristics of the four basic market models?
Show how to modify the scheme to make it more secure : A variation of the following biometric authentication protocol was experimentally tested several years ago at immigration checkpoints in major U.S. airports.
Write an assignment statement that assigns the value : Write an assignment statement that assigns the value in the txtBirthday control to the strBirthday member contained in the last array element.
What is the name of the combined position : Buy a 500-strike put with expiration date in 1 year, r = 1% annual effective, and put premium P = $41.95. What is the name of the combined position
Design and implement an application reads in a set : Design and implement an application reads in a set of 200 grades into a two-dimensional array from a .txt file called studentanswers that represent.
Horizontal equity is achieved in taxation : If horizontal equity is achieved in taxation:

Reviews

Write a Review

Computer Engineering Questions & Answers

  Mathematics in computing

Binary search tree, and postorder and preorder traversal Determine the shortest path in Graph

  Ict governance

ICT is defined as the term of Information and communication technologies, it is diverse set of technical tools and resources used by the government agencies to communicate and produce, circulate, store, and manage all information.

  Implementation of memory management

Assignment covers the following eight topics and explore the implementation of memory management, processes and threads.

  Realize business and organizational data storage

Realize business and organizational data storage and fast access times are much more important than they have ever been. Compare and contrast magnetic tapes, magnetic disks, optical discs

  What is the protocol overhead

What are the advantages of using a compiled language over an interpreted one? Under what circumstances would you select to use an interpreted language?

  Implementation of memory management

Paper describes about memory management. How memory is used in executing programs and its critical support for applications.

  Define open and closed loop control systems

Define open and closed loop cotrol systems.Explain difference between time varying and time invariant control system wth suitable example.

  Prepare a proposal to deploy windows server

Prepare a proposal to deploy Windows Server onto an existing network based on the provided scenario.

  Security policy document project

Analyze security requirements and develop a security policy

  Write a procedure that produces independent stack objects

Write a procedure (make-stack) that produces independent stack objects, using a message-passing style, e.g.

  Define a suitable functional unit

Define a suitable functional unit for a comparative study between two different types of paint.

  Calculate yield to maturity and bond prices

Calculate yield to maturity (YTM) and bond prices

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd