Passwords and Biometrics




CS166

Chris Pollett

Oct 15, 2012

Outline

Attacks on Passwords

Password Retry

Password File?

Dictionary Attack

Salt

Password Cracking: Do the Math

Assumptions:

Password Cracking: Case I

Password Cracking: Case II

Password Cracking: Case III

Password Cracking: Case IV

Other Password Issues

Passwords

Password Cracking Tools

Quiz

Which of the following is true?

  1. Steganography and watermarks are the same thing.
  2. Exhaustive search is a possible attack against the visual crypto scheme given in class.
  3. The spam reduction protocol we gave in class works better against a computationally weaker attacker.

Biometrics -- Something You Are

Some example biometrics include:

Why Biometrics?

Ideal Biometric

Biometric Modes

Enrollment vs Recognition

Cooperative Subjects?

Biometric Errors

Fingerprint History

Fingerprint Comparison

Fingerprint Minutia

Fingerprint: Enrollment

Fingerprint Enrollment

Fingerprint: Recognition

Fingerprint Matching

Hand Geometry

Hand Geometry Device

Pros/Cons Hand Geometry

Iris Patterns

Example Irises

Iris Recognition: History

Iris Scan

Iris Scan Process 1 Iris Scan Process 2

Measuring Iris Similarity

Iris Scan Error Rate

Iris Scan Error Data

Attack on Iris Scan

Equal Error Rate Comparison

Biometrics: The Bottom Line