Uploaded on Jan 24, 2023
The Anonybit creates a secure framework that enhances compliance, safeguards identity, and safeguards individual assets. It offers cloud-based biometrics, biometric MFA, zero-trust security, cryptography, private key storage, etc.https://www.anonybit.io/blog/securingbiometrics
Securing biometrics
SECURING
TB h e uI s Oeo f bM i o m Ee t r Ti c s tR o ICs e cS u r e u s e r s ’ a c c e s s t o
l o c a t i o n s , d e v i c e s , a n d a p p l i c a t i o n s i s
e x p l o d i n g b y a n y m e a s u r e . B i o m e t r i c s
a r e t h e i r r e f u t a b l e l i n k t o “ w h o y o u a r
e ” , a s o p p o s e d t o “ w h a ty o u h a v e ” a
n d
“ w h a t y o u k n o w ” w h i c h a r e e a s
i l y s t o l e na n d u s e d b y a t t a c k e r s . T h e r e a
r e o t h e r b e n e f i t s t o
b i o m e t r i c s , i n c l u d i n g , t h e y c a n n o t
b e f o r g o t t e n , t h e r e i sn o t h i n g f o r a
p e r s o n t o b r i n g w i t h t h e m , t h e y p r o v i
d e ag o o d u s e r e x p e r i e n c e ,a n d s o o n .
S t r o n g i d e n t i t y s y s t e m sb a s e d o nb
i o m e t r i c s p r o v i d e a n u n d e r l y i n g f
a b r i c f o r s o c i a l a n d
e c o n o m i c d e v e l o p m e n t ,
p r o v i s i o n o f p r i v a t e
a n d
p u b l i c s e r v i c e s , a s t h e b a s i
s f o r d e t e r m i n i n g a c c e s s t o o n l i n
e s e r v i c e s a n d e n a b l i n g d i g i t
a l
i n t e r a c t i o n s .
BIOMETRIC DATA
SECURITY CONCERNS
SHOULD NOT BE
Has IthGe coNlleOctinRg eEntiDty received consent from the user to collect and use their
B I OMETRIC DATA biometrics? BIPA (Illinois’ Biometric Information Privacy Act) is bringing this issue front
and center in the United States, with the pace of lawsuits picking up dramatically in 2021.
COLLECTION In fact, as of August 2021,
Is the entity securing the biometric data efficiently and discarding it promptly when it is not
B I OMETRIC DATA needed? This is a key question for system design and accessibility. As stated before, biometric
data breaches can have enormous consequences as the data can later be used for attacks by
SECURITY both nation-states and fraudsters.
The privacy element of biometrics is similar to other types of personal data and overlaps
B I OMETRIC DATA with the other two areas of concern already discussed. Consent is the first aspect; usage is
the second. Is the data used for the purpose for which it was collected? A derivative of this
PRIVACY is secondary information derived from the biometric characteristics that were initially
collected for a different primary purpose.
As we have seen through the legislative and regulatory landscape, while not perfect, a lot of progress has been made with
respect to many of the consent and privacy aspects as relates to biometrics. The security aspects, however, are still being
fleshed out.
MITIGATING BIOMETRICS AND
SECURITY RISKS
Encryption
Encryption is used to protect biometric data at all of its stages: at rest, in transit, and recently
even encryption during processing. Encryption at rest relates to encryption of databases that
holds the biometric data. Encryption in transit relates to the transport protocols, like TLS,
between the system components. Both of these are key practices used by most systems
today. Encryption during transport and at-rest leaves an exploitable gap of the data being
exposed while it is being used by the applications. An attacker who compromises the
organization’s environment, may encroach on a server and collect all the biometric data while
it is unencrypted (in use). To prevent that, it is now possible to add encryption during
processing leveraging homomorphic encryption, which became operational only in recent
years. Homomorphic encryption increases overall system security as it eliminates the need to
decrypt biometric data while it is being used for identification or verification functions.
On top of that, quantum computing which is now becoming fairly accessible is forecasted to be
able to crack encryption keys much faster than previously conceived. Researchers at the
University of Sussex estimated in February 2022 that a quantum computer with 1.9 billion qubits
could essentially crack the encryption safeguarding Bitcoin within a mere 10 minutes. Just 13
million qubits could do the job in about a day. We are still not close to this speed, as the
strongest quantum computer by IBM currently delivers 433 qbits, which means it will still take It
4.7 years to crack a such key, but they are doubling to tripling their qbits every year (127 qbits
in 2021, 433 qbits in 2022, 1000 qbits expected by end of 2023). However, the 4.7 years is
lightyears faster than regular computing, that even with hundreds of powerful computers
working on a single private key, would still take millions of years to crack. More recently, in
December 2022 researchers published a paper describing a methodology to break RSA
algorithm using a quantum machine with only 372 qubits which is available today.
TOKENIZATIO
Biometric data tokenizatioNn implements a one-way hash or one-way encryption to make the data non-usable to
an attacker. Tokenized data can be used to support both identification and verification use cases.
ENCRYPTION TOKENIZATIO
Mathematically transforms plain information into
cipher representation using an encryption algorithm
and key N
Scales to large data volumes with just the use of a Difficult to scale securely and maintain
small encryption key to decrypt data performance as database increases in
Randomly generates a token value for plain
size
text and stores the mapping in a database
Can be used for structured fields, as well Used for structured data fields such as
as unstructured data such as entire files payment card or Social Security numbers
Ideal for exchanging sensitive data with third Difficult to exchange data since it requires
parties who have the encryption key direct access to a token vault mapping token
values
DECENTRALI
Device-based biometric Network-Based
decentralization ZATION Decentralization
Device-based biometric decentralization Securing the
keys
means the biometric data remains on the
Securing the
devices in a holistic template form. This is the matching
approach used for FaceID and TouchID, and Eliminating the identity
gap
with FIDO authenticator USB devices. Biometric
Supporting multiple use-
credit cards and other physical cards like the cases
Arculus card one introduced by Composecure Biometric algorithms
agility
are using this approach as well. With this
Simplifies regulation
method, the biometric data is stored in a compliance
secured enclave on the device and is well
protected.
Get in
touch
1 (917) 655= 2045
[email protected]
https://anonybit.io/
Comments