<?xml version="1.0"?>
<?xml-stylesheet type="text/css" href="http://wiki.cas.mcmaster.ca/skins/common/feed.css?207"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
		<id>http://wiki.cas.mcmaster.ca/index.php?feed=atom&amp;target=Mad+Doktor&amp;title=Special%3AContributions</id>
		<title>Computing and Software Wiki - User contributions [en]</title>
		<link rel="self" type="application/atom+xml" href="http://wiki.cas.mcmaster.ca/index.php?feed=atom&amp;target=Mad+Doktor&amp;title=Special%3AContributions"/>
		<link rel="alternate" type="text/html" href="http://wiki.cas.mcmaster.ca/index.php/Special:Contributions/Mad+Doktor"/>
		<updated>2026-05-02T11:09:31Z</updated>
		<subtitle>From Computing and Software Wiki</subtitle>
		<generator>MediaWiki 1.15.1</generator>

	<entry>
		<id>http://wiki.cas.mcmaster.ca/index.php/Biometric_Systems_and_Security_Design_Principles</id>
		<title>Biometric Systems and Security Design Principles</title>
		<link rel="alternate" type="text/html" href="http://wiki.cas.mcmaster.ca/index.php/Biometric_Systems_and_Security_Design_Principles"/>
				<updated>2007-12-10T19:16:52Z</updated>
		
		<summary type="html">&lt;p&gt;Mad Doktor:&amp;#32;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;'''Analysis of Biometric Systems using Security Design Principles'''&lt;br /&gt;
&lt;br /&gt;
Biometric security systems&amp;lt;sup&amp;gt;[http://www.cafesoft.com/support/security-glossary.html R1]&amp;lt;/sup&amp;gt; are authentication mechanisms that bind an entity to a subject based on what the entity is, as opposed to what they know, what they have, or where they are.&lt;br /&gt;
&lt;br /&gt;
Within the past several years, biometric security systems have gained a lot of ground in terms of advancements in technology and widespread use however, there is still a lot of reluctance to adopt the technology worldwide&amp;lt;sup&amp;gt;[http://en.wikipedia.org/wiki/Biometrics#Issues_and_concerns R2]&amp;lt;/sup&amp;gt;. A look at biometric security systems through security design principles should provide a clearer understanding of its strengths and weaknesses in the implementation and design of biometric security systems.&lt;br /&gt;
[[Image:3dface.jpg|thumb|3D Face Recognition Software]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=='''Biometrics'''==&lt;br /&gt;
Biometrics is the identification of a person through automated measurements using biological or behavioural features&amp;lt;sup&amp;gt;[[Biometrics in Information Security#Types of Measurements|R3]]&amp;lt;/sup&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=='''Security Design Principles'''==&lt;br /&gt;
The following eight design principles were created by Salzter&amp;lt;sup&amp;gt;[http://en.wikipedia.org/wiki/Jerome_H._Saltzer E1]&amp;lt;/sup&amp;gt; and Schroeder&amp;lt;sup&amp;gt;[http://en.wikipedia.org/wiki/Michael_Schroeder E2]&amp;lt;/sup&amp;gt; for the design and implementation of security mechanisms&amp;lt;sup&amp;gt;R4&amp;lt;/sup&amp;gt;. These design principles encompass technical details and human interaction that make designs and mechanisms easy to understand. They are also simple and easy to understand, which is why they will be used as a guide to analyze biometric security systems. The list of design principles are as follows:&lt;br /&gt;
&lt;br /&gt;
'''Principle of Least Privilege:'''&lt;br /&gt;
A subject should be given only those privileges that it needs in order to complete its task.&lt;br /&gt;
&lt;br /&gt;
'''Principle of Fails-Safe Defaults:'''&lt;br /&gt;
A subject should be denied access to an object unless the subject was given access.&lt;br /&gt;
&lt;br /&gt;
'''Principle of Economy of Mechanism:'''&lt;br /&gt;
Security mechanisms should be as simple as possible.&lt;br /&gt;
&lt;br /&gt;
'''Principle of Complete Mediation:'''&lt;br /&gt;
All accesses to objects are checked to ensure that they are allowed.&lt;br /&gt;
&lt;br /&gt;
'''Principle of Open Design:'''&lt;br /&gt;
Security of a mechanism should not depend on the secrecy of its design or implementation.&lt;br /&gt;
&lt;br /&gt;
'''Principle of Separation of Privilege:'''&lt;br /&gt;
A system should not grant permission based on a single condition.&lt;br /&gt;
&lt;br /&gt;
'''Principle of Least Common Mechanism:'''&lt;br /&gt;
Mechanisms used to access resources should not be shared.&lt;br /&gt;
&lt;br /&gt;
'''Principle of Psychological Acceptability:'''&lt;br /&gt;
Security mechanisms should not make the resource more difficult to access than if the security mechanisms were not present.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=='''Breaking a Biometrics Security System'''==&lt;br /&gt;
In addition to looking at biometric security systems from a design and implementation perspective, understanding a biometrics security system from an attacker’s perspective is also important. In general, there are seven different types of attacks&amp;lt;sup&amp;gt;R5&amp;lt;/sup&amp;gt;. These types of attacks are categorized by their attacks on a specific part of the design. They can be divided into the following:&lt;br /&gt;
&lt;br /&gt;
'''Type 1:''' Fake biometric sensor&lt;br /&gt;
&lt;br /&gt;
'''Type 2:''' Replay attacks&lt;br /&gt;
&lt;br /&gt;
'''Type 3:''' Trojan horse program at feature extractor&lt;br /&gt;
&lt;br /&gt;
'''Type 4:''' Real features replaced by synthetic features.&lt;br /&gt;
&lt;br /&gt;
'''Type 5:''' Trojan horse program at matcher.&lt;br /&gt;
&lt;br /&gt;
'''Type 6:''' Attacks modifying database of templates.&lt;br /&gt;
&lt;br /&gt;
'''Type 7:''' Results overridden.&lt;br /&gt;
&lt;br /&gt;
[[Image:biometric_attacks.jpg|Types of attacks available on a biometric security system]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=='''Analysis'''==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===''Principle of Least Privilege''===&lt;br /&gt;
The design of the biometric security system itself is very linear hence, only the channels themselves need to be protected. This means that overall, processes cannot be accessed past the sensor if the sensor themselves have not been used. From this perspective, the design is secure. However, the system is still vulnerable from all attacks that attack each process directly (type 3, 5, and 6 attacks).&lt;br /&gt;
&lt;br /&gt;
===''Principle of Fail-Safe Default''===&lt;br /&gt;
The principle of fail-safe default is an excellent principle to follow for security mechanisms, but it falls short due to an implicit assumption within the principle itself. The principle assumes that security mechanisms will always work perfectly if all the requirements are passed. However, with biometric security systems, that is not the case. Biometric security systems are not perfect so they don’t always pass legitimate users and at the same time, they also pass the invalid users as well.&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot; align=center&lt;br /&gt;
|+ '''Chart of Biometric Systems Error Rates'''&amp;lt;sup&amp;gt;[http://en.wikipedia.org/wiki/Biometric#Performance E3]&amp;lt;/sup&amp;gt;&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
! Biometrics &lt;br /&gt;
&lt;br /&gt;
! EER&lt;br /&gt;
&lt;br /&gt;
! FAR&lt;br /&gt;
&lt;br /&gt;
! FRR&lt;br /&gt;
&lt;br /&gt;
! Subjects&lt;br /&gt;
&lt;br /&gt;
! Comment&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
| Face&lt;br /&gt;
&lt;br /&gt;
| n/a&lt;br /&gt;
&lt;br /&gt;
| 1 %&lt;br /&gt;
&lt;br /&gt;
| 10 %&lt;br /&gt;
&lt;br /&gt;
| 37437&lt;br /&gt;
&lt;br /&gt;
| Varied lighting, indoor/outdoor&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
| Fingerprints&lt;br /&gt;
&lt;br /&gt;
| 2 %&lt;br /&gt;
&lt;br /&gt;
| 2 %&lt;br /&gt;
&lt;br /&gt;
| 2 %&lt;br /&gt;
&lt;br /&gt;
| 100&lt;br /&gt;
&lt;br /&gt;
| Rotation and exaggerated skin distortion&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
| Hand geometry&lt;br /&gt;
&lt;br /&gt;
| 1 %&lt;br /&gt;
&lt;br /&gt;
| 2 %&lt;br /&gt;
&lt;br /&gt;
| 0.1 %&lt;br /&gt;
&lt;br /&gt;
| 129&lt;br /&gt;
&lt;br /&gt;
| With rings and improper placement&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
| Iris&lt;br /&gt;
&lt;br /&gt;
| &amp;lt; 1 %&lt;br /&gt;
&lt;br /&gt;
| 0.94 %&lt;br /&gt;
&lt;br /&gt;
| 0.99 %&lt;br /&gt;
&lt;br /&gt;
| 1224&lt;br /&gt;
&lt;br /&gt;
| Indoor Environment&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
| Iris&lt;br /&gt;
&lt;br /&gt;
| 0.01 %&lt;br /&gt;
&lt;br /&gt;
| 0.0001 %&lt;br /&gt;
&lt;br /&gt;
| 0.2 %&lt;br /&gt;
&lt;br /&gt;
| 132&lt;br /&gt;
&lt;br /&gt;
| Best conditions&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
| Keystrokes&lt;br /&gt;
&lt;br /&gt;
| 1.8 %&lt;br /&gt;
&lt;br /&gt;
| 7 %&lt;br /&gt;
&lt;br /&gt;
| 0.1 %&lt;br /&gt;
&lt;br /&gt;
| 15&lt;br /&gt;
&lt;br /&gt;
| During 6 months period&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
| Voice&lt;br /&gt;
&lt;br /&gt;
| 6 %&lt;br /&gt;
&lt;br /&gt;
| 2 %&lt;br /&gt;
&lt;br /&gt;
| 10 %&lt;br /&gt;
&lt;br /&gt;
| 310&lt;br /&gt;
&lt;br /&gt;
| Text independent, multilingual&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
===''Principle of Economy of Mechanism''===&lt;br /&gt;
In the design of the biometric security systems, each channel must be encrypted and each state must be protected. This means that overall, the design must contain at least four encryption mechanisms must be used for each channel, and at least five security mechanisms for the five states.&lt;br /&gt;
&lt;br /&gt;
The quantity of states and channels involved means that there are a high number of security mechanisms involved which means that security of the overall design is quite complex. This violates the principle of economy of mechanism, but the security of each channel and state may not be as complex as the design, depending on the implementation.&lt;br /&gt;
&lt;br /&gt;
===''Principle of Complete Mediation''===&lt;br /&gt;
Depending on the implementation, as long as each channel is encrypted with several layers of protection, it does not violate the principle. However, the problem comes from the human side and the issue arises when people try to replace current authentication mechanism such as password systems with biometric security systems. &amp;lt;sup&amp;gt;[http://en.wikipedia.org/wiki/Biometric#Marketing_of_biometric_products R6]&amp;lt;/sup&amp;gt;&lt;br /&gt;
&lt;br /&gt;
For example, new laptops with the Windows operating system have been released with biometric security systems. On the Windows login page, there are two logins available, the password system or the biometric system, and the user only has to use one of them to login, a clear violation of the principle of complete mediation.&lt;br /&gt;
&lt;br /&gt;
===''Principle of Open Design''===&lt;br /&gt;
The design of the biometric security is acceptable but the weakness is easily identified. The weakness of the design lies in the storage of the templates, which to this day, remains a difficult issue. Two options are available, a centralized data bank or decentralized servers to store all the templates.&lt;br /&gt;
&lt;br /&gt;
The design violates the principle not because the design is shrouded in secrecy but because the design itself is weak. This issue can be solved in the future by having a stronger design.&lt;br /&gt;
&lt;br /&gt;
===''Principle of Separation of Privilege''===&lt;br /&gt;
&lt;br /&gt;
It is common knowledge that a system is not secure if only one security mechanism is used, so an obvious solution is to have multiple security mechanisms. The issue arises when multiple biometric security systems are used. For example, fingerprints and retinas are used together. However, the problem is similar to those of the principle of fail-safe defaults. It assume that security mechanism work when they are supposed to work, but by increasing the types of biometrics required, the number of FARs (false acceptance rates) and FRRs (false rejection rates) increase as well.&lt;br /&gt;
	Cite examples.&lt;br /&gt;
&lt;br /&gt;
===''Principle of Least Common Mechanism''===&lt;br /&gt;
[[Image:biometric_attacks2.jpg|thumb|Biometric security system design that includes enrollment]]&lt;br /&gt;
Again, the design is simple due to its rather linear structure. However, in order for the security system to work, there must be a step in which users are enrolled, so that features can be stored. To cut costs, that enrolment system is typically a part of the authentication mechanism. This means that the biometric security system is more opened to attacks because another channel (between feature extractor and the template bank) must be encrypted, making the design more complicated, and the attacker has another option to attack the template bank.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===''Principle of Psychological Acceptability''===&lt;br /&gt;
&lt;br /&gt;
The big reason why biometric security systems are so popular is that from an end-user perspective, they are the simplest security mechanisms to use. The user does not require any sort of knowledge of passwords to use, since it depends on either physiological or behavioural traits. However, if it fails, due to the FARs and FRRs, such a problem can be extremely annoying since it is not easy to remedy unless there is an alternative login method, which of course, defeats the purpose of having a biometric authentication method.&amp;lt;sup&amp;gt;[http://en.wikipedia.org/wiki/Biometric#Performance_measurement R7]&amp;lt;/sup&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=='''Conclusion'''==&lt;br /&gt;
&lt;br /&gt;
A lot of the faults of a biometric security system are due to current biometric technology. It is simply not advanced enough because the errors in identifying valid and invalid users are still too big, even though it may be as small as 0.01%&amp;lt;sup&amp;gt;[http://en.wikipedia.org/wiki/Biometric#Performance R8]&amp;lt;/sup&amp;gt;.&lt;br /&gt;
&lt;br /&gt;
Another issue involves the weak design. As a concept, it is simple, but to implement the design, it requires a lot of encryption and security mechanisms due to the many transactions of the system. Also, the design highlights a weakness in storage of the templates. Just like storage of passwords, storage of the templates carries even more risks, because stolen templates could potentially mean a stolen identity.&lt;br /&gt;
&lt;br /&gt;
Also, the current thought regarding biometric security systems is that they are the way of the future, meaning they are to replace current security mechanisms, but as shown above, that is terrible because there are still too many weaknesses, including the fact that not everyone can use such a system either. However, it is so popular because it is so simple to use and requires almost no effort. Also, even if we can reduce the number of errors to zero, we should never rely solely on one type of security system. Hence, biometric security systems should only be used as a supplement to current security systems, not a replacement. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=='''See Also'''==&lt;br /&gt;
&lt;br /&gt;
[http://www.cas.mcmaster.ca/wiki/index.php/Biometrics_in_Information_Security Biometrics in Information Security]&lt;br /&gt;
&lt;br /&gt;
[http://www.cas.mcmaster.ca/wiki/index.php/Identity_Theft Identity Theft]&lt;br /&gt;
&lt;br /&gt;
[http://www.cas.mcmaster.ca/wiki/index.php/Operating_Systems_Security Operating Systems Security]&lt;br /&gt;
&lt;br /&gt;
[http://www.cas.mcmaster.ca/wiki/index.php/The_Mitnick_attack The Mitnick Attack]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=='''External Links'''==&lt;br /&gt;
&lt;br /&gt;
[E1] http://en.wikipedia.org/wiki/Jerome_H._Saltzer&lt;br /&gt;
&lt;br /&gt;
[E2] http://en.wikipedia.org/wiki/Michael_Schroeder&lt;br /&gt;
&lt;br /&gt;
[E3] http://en.wikipedia.org/wiki/Biometric#Performance&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=='''References'''==&lt;br /&gt;
&lt;br /&gt;
[R1] http://www.cafesoft.com/support/security-glossary.html&lt;br /&gt;
&lt;br /&gt;
[R2] http://en.wikipedia.org/wiki/Biometrics#Issues_and_concerns&lt;br /&gt;
&lt;br /&gt;
[R3] [[Biometrics in Information Security#Types of Measurements]]&lt;br /&gt;
&lt;br /&gt;
[R4] Bishop, Matt. Introduction to Computer Security. Boston: Addison-Wesley, 2006.&lt;br /&gt;
&lt;br /&gt;
[R5] Jain, Anil K. Biometric Security System. Michigan, 2006.&lt;br /&gt;
&lt;br /&gt;
[R6] http://en.wikipedia.org/wiki/Biometric#Marketing_of_biometric_products&lt;br /&gt;
&lt;br /&gt;
[R7] http://en.wikipedia.org/wiki/Biometric#Performance_measurement&lt;br /&gt;
&lt;br /&gt;
[R8] http://en.wikipedia.org/wiki/Biometric#Performance&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[Ra] John Woodward Jr, Katharine Webb, Elaine Newton, Melissa Bradley, David Rubenson. Army Biometric Applications: Identifying and Addressing Sociocultural Concerns. Santa Monica, CA: RAND, 2001.&lt;br /&gt;
&lt;br /&gt;
[Rb] D. J. Hurley, B. Arbab-Zavar, M.S. Nixon. The Ear as a Biometric. University of Southampton: Eurosip, 2007.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
--[[User:Mad Doktor|Mad Doktor]] 14:16, 10 December 2007 (EST)&lt;/div&gt;</summary>
		<author><name>Mad Doktor</name></author>	</entry>

	<entry>
		<id>http://wiki.cas.mcmaster.ca/index.php/Biometric_Systems_and_Security_Design_Principles</id>
		<title>Biometric Systems and Security Design Principles</title>
		<link rel="alternate" type="text/html" href="http://wiki.cas.mcmaster.ca/index.php/Biometric_Systems_and_Security_Design_Principles"/>
				<updated>2007-12-10T04:21:28Z</updated>
		
		<summary type="html">&lt;p&gt;Mad Doktor:&amp;#32;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;'''Analysis of Biometric Systems using Security Design Principles'''&lt;br /&gt;
&lt;br /&gt;
Biometric security systems&amp;lt;sup&amp;gt;[http://www.cafesoft.com/support/security-glossary.html R1]&amp;lt;/sup&amp;gt; are authentication mechanisms that bind an entity to a subject based on what the entity is, as opposed to what they know, what they have, or where they are.&lt;br /&gt;
&lt;br /&gt;
Within the past several years, biometric security systems have gained a lot of ground in terms of advancements in technology and widespread use however, there is still a lot of reluctance to adopt the technology worldwide&amp;lt;sup&amp;gt;[http://en.wikipedia.org/wiki/Biometrics#Issues_and_concerns R2]&amp;lt;/sup&amp;gt;. A look at biometric security systems through security design principles should provide a clearer understanding of its strengths and weaknesses in the implementation and design of biometric security systems.&lt;br /&gt;
[[Image:3dface.jpg|thumb|3D Face Recognition Software]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=='''Biometrics'''==&lt;br /&gt;
Biometrics is the identification of a person through automated measurements using biological or behavioural features&amp;lt;sup&amp;gt;[[Biometrics in Information Security#Types of Measurements|R3]]&amp;lt;/sup&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=='''Security Design Principles'''==&lt;br /&gt;
The following eight design principles were created by Salzter&amp;lt;sup&amp;gt;[http://en.wikipedia.org/wiki/Jerome_H._Saltzer E1]&amp;lt;/sup&amp;gt; and Schroeder&amp;lt;sup&amp;gt;[http://en.wikipedia.org/wiki/Michael_Schroeder E2]&amp;lt;/sup&amp;gt; for the design and implementation of security mechanisms&amp;lt;sup&amp;gt;R4&amp;lt;/sup&amp;gt;. These design principles encompass technical details and human interaction that make designs and mechanisms easy to understand. They are also simple and easy to understand, which is why they will be used as a guide to analyze biometric security systems. The list of design principles are as follows:&lt;br /&gt;
&lt;br /&gt;
'''Principle of Least Privilege:'''&lt;br /&gt;
A subject should be given only those privileges that it needs in order to complete its task.&lt;br /&gt;
&lt;br /&gt;
'''Principle of Fails-Safe Defaults:'''&lt;br /&gt;
A subject should be denied access to an object unless the subject was given access.&lt;br /&gt;
&lt;br /&gt;
'''Principle of Economy of Mechanism:'''&lt;br /&gt;
Security mechanisms should be as simple as possible.&lt;br /&gt;
&lt;br /&gt;
'''Principle of Complete Mediation:'''&lt;br /&gt;
All accesses to objects are checked to ensure that they are allowed.&lt;br /&gt;
&lt;br /&gt;
'''Principle of Open Design:'''&lt;br /&gt;
Security of a mechanism should not depend on the secrecy of its design or implementation.&lt;br /&gt;
&lt;br /&gt;
'''Principle of Separation of Privilege:'''&lt;br /&gt;
A system should not grant permission based on a single condition.&lt;br /&gt;
&lt;br /&gt;
'''Principle of Least Common Mechanism:'''&lt;br /&gt;
Mechanisms used to access resources should not be shared.&lt;br /&gt;
&lt;br /&gt;
'''Principle of Psychological Acceptability:'''&lt;br /&gt;
Security mechanisms should not make the resource more difficult to access than if the security mechanisms were not present.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=='''Breaking a Biometrics Security System'''==&lt;br /&gt;
In addition to looking at biometric security systems from a design and implementation perspective, understanding a biometrics security system from an attacker’s perspective is also important. In general, there are seven different types of attacks&amp;lt;sup&amp;gt;R5&amp;lt;/sup&amp;gt;. These types of attacks are categorized by their attacks on a specific part of the design. They can be divided into the following:&lt;br /&gt;
&lt;br /&gt;
'''Type 1:''' Fake biometric sensor&lt;br /&gt;
&lt;br /&gt;
'''Type 2:''' Replay attacks&lt;br /&gt;
&lt;br /&gt;
'''Type 3:''' Trojan horse program at feature extractor&lt;br /&gt;
&lt;br /&gt;
'''Type 4:''' Real features replaced by synthetic features.&lt;br /&gt;
&lt;br /&gt;
'''Type 5:''' Trojan horse program at matcher.&lt;br /&gt;
&lt;br /&gt;
'''Type 6:''' Attacks modifying database of templates.&lt;br /&gt;
&lt;br /&gt;
'''Type 7:''' Results overridden.&lt;br /&gt;
&lt;br /&gt;
[[Image:biometric_attacks.jpg|Types of attacks available on a biometric security system]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=='''Analysis'''==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===''Principle of Least Privilege''===&lt;br /&gt;
The design of the biometric security system itself is very linear hence, only the channels themselves need to be protected. This means that overall, processes cannot be accessed past the sensor if the sensor themselves have not been used. From this perspective, the design is secure. However, the system is still vulnerable from all attacks that attack each process directly (type 3, 5, and 6 attacks).&lt;br /&gt;
&lt;br /&gt;
===''Principle of Fail-Safe Default''===&lt;br /&gt;
The principle of fail-safe default is an excellent principle to follow for security mechanisms, but it falls short due to an implicit assumption within the principle itself. The principle assumes that security mechanisms will always work perfectly if all the requirements are passed. However, with biometric security systems, that is not the case. Biometric security systems are not perfect so they don’t always pass legitimate users and at the same time, they also pass the invalid users as well.&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot; align=center&lt;br /&gt;
|+ '''Chart of Biometric Systems Error Rates'''&amp;lt;sup&amp;gt;[http://en.wikipedia.org/wiki/Biometric#Performance E3]&amp;lt;/sup&amp;gt;&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
! Biometrics &lt;br /&gt;
&lt;br /&gt;
! EER&lt;br /&gt;
&lt;br /&gt;
! FAR&lt;br /&gt;
&lt;br /&gt;
! FRR&lt;br /&gt;
&lt;br /&gt;
! Subjects&lt;br /&gt;
&lt;br /&gt;
! Comment&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
| Face&lt;br /&gt;
&lt;br /&gt;
| n/a&lt;br /&gt;
&lt;br /&gt;
| 1 %&lt;br /&gt;
&lt;br /&gt;
| 10 %&lt;br /&gt;
&lt;br /&gt;
| 37437&lt;br /&gt;
&lt;br /&gt;
| Varied lighting, indoor/outdoor&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
| Fingerprints&lt;br /&gt;
&lt;br /&gt;
| 2 %&lt;br /&gt;
&lt;br /&gt;
| 2 %&lt;br /&gt;
&lt;br /&gt;
| 2 %&lt;br /&gt;
&lt;br /&gt;
| 100&lt;br /&gt;
&lt;br /&gt;
| Rotation and exaggerated skin distortion&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
| Hand geometry&lt;br /&gt;
&lt;br /&gt;
| 1 %&lt;br /&gt;
&lt;br /&gt;
| 2 %&lt;br /&gt;
&lt;br /&gt;
| 0.1 %&lt;br /&gt;
&lt;br /&gt;
| 129&lt;br /&gt;
&lt;br /&gt;
| With rings and improper placement&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
| Iris&lt;br /&gt;
&lt;br /&gt;
| &amp;lt; 1 %&lt;br /&gt;
&lt;br /&gt;
| 0.94 %&lt;br /&gt;
&lt;br /&gt;
| 0.99 %&lt;br /&gt;
&lt;br /&gt;
| 1224&lt;br /&gt;
&lt;br /&gt;
| Indoor Environment&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
| Iris&lt;br /&gt;
&lt;br /&gt;
| 0.01 %&lt;br /&gt;
&lt;br /&gt;
| 0.0001 %&lt;br /&gt;
&lt;br /&gt;
| 0.2 %&lt;br /&gt;
&lt;br /&gt;
| 132&lt;br /&gt;
&lt;br /&gt;
| Best conditions&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
| Keystrokes&lt;br /&gt;
&lt;br /&gt;
| 1.8 %&lt;br /&gt;
&lt;br /&gt;
| 7 %&lt;br /&gt;
&lt;br /&gt;
| 0.1 %&lt;br /&gt;
&lt;br /&gt;
| 15&lt;br /&gt;
&lt;br /&gt;
| During 6 months period&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
| Voice&lt;br /&gt;
&lt;br /&gt;
| 6 %&lt;br /&gt;
&lt;br /&gt;
| 2 %&lt;br /&gt;
&lt;br /&gt;
| 10 %&lt;br /&gt;
&lt;br /&gt;
| 310&lt;br /&gt;
&lt;br /&gt;
| Text independent, multilingual&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
===''Principle of Economy of Mechanism''===&lt;br /&gt;
In the design of the biometric security systems, each channel must be encrypted and each state must be protected. This means that overall, the design must contain at least four encryption mechanisms must be used for each channel, and at least five security mechanisms for the five states.&lt;br /&gt;
&lt;br /&gt;
The quantity of states and channels involved means that there are a high number of security mechanisms involved which means that security of the overall design is quite complex. This violates the principle of economy of mechanism, but the security of each channel and state may not be as complex as the design, depending on the implementation.&lt;br /&gt;
&lt;br /&gt;
===''Principle of Complete Mediation''===&lt;br /&gt;
Depending on the implementation, as long as each channel is encrypted with several layers of protection, it does not violate the principle. However, the problem comes from the human side and the issue arises when people try to replace current authentication mechanism such as password systems with biometric security systems. &amp;lt;sup&amp;gt;[http://en.wikipedia.org/wiki/Biometric#Marketing_of_biometric_products R6]&amp;lt;/sup&amp;gt;&lt;br /&gt;
&lt;br /&gt;
For example, new laptops with the Windows operating system have been released with biometric security systems. On the Windows login page, there are two logins available, the password system or the biometric system, and the user only has to use one of them to login, a clear violation of the principle of complete mediation.&lt;br /&gt;
&lt;br /&gt;
===''Principle of Open Design''===&lt;br /&gt;
The design of the biometric security is acceptable but the weakness is easily identified. The weakness of the design lies in the storage of the templates, which to this day, remains a difficult issue. Two options are available, a centralized data bank or decentralized servers to store all the templates.&lt;br /&gt;
&lt;br /&gt;
The design violates the principle not because the design is shrouded in secrecy but because the design itself is weak. This issue can be solved in the future by having a stronger design.&lt;br /&gt;
&lt;br /&gt;
===''Principle of Separation of Privilege''===&lt;br /&gt;
&lt;br /&gt;
It is common knowledge that a system is not secure if only one security mechanism is used, so an obvious solution is to have multiple security mechanisms. The issue arises when multiple biometric security systems are used. For example, fingerprints and retinas are used together. However, the problem is similar to those of the principle of fail-safe defaults. It assume that security mechanism work when they are supposed to work, but by increasing the types of biometrics required, the number of FARs (false acceptance rates) and FRRs (false rejection rates) increase as well.&lt;br /&gt;
	Cite examples.&lt;br /&gt;
&lt;br /&gt;
===''Principle of Least Common Mechanism''===&lt;br /&gt;
[[Image:biometric_attacks2.jpg|thumb|Biometric security system design that includes enrollment]]&lt;br /&gt;
Again, the design is simple due to its rather linear structure. However, in order for the security system to work, there must be a step in which users are enrolled, so that features can be stored. To cut costs, that enrolment system is typically a part of the authentication mechanism. This means that the biometric security system is more opened to attacks because another channel (between feature extractor and the template bank) must be encrypted, making the design more complicated, and the attacker has another option to attack the template bank.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===''Principle of Psychological Acceptability''===&lt;br /&gt;
&lt;br /&gt;
The big reason why biometric security systems are so popular is that from an end-user perspective, they are the simplest security mechanisms to use. The user does not require any sort of knowledge of passwords to use, since it depends on either physiological or behavioural traits. However, if it fails, due to the FARs and FRRs, such a problem can be extremely annoying since it is not easy to remedy unless there is an alternative login method, which of course, defeats the purpose of having a biometric authentication method.&amp;lt;sup&amp;gt;[http://en.wikipedia.org/wiki/Biometric#Performance_measurement R7]&amp;lt;/sup&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=='''Conclusion'''==&lt;br /&gt;
&lt;br /&gt;
A lot of the faults of a biometric security system are due to current biometric technology. It is simply not advanced enough because the errors in identifying valid and invalid users are still too big, even though it may be as small as 0.01%&amp;lt;sup&amp;gt;[http://en.wikipedia.org/wiki/Biometric#Performance R8]&amp;lt;/sup&amp;gt;.&lt;br /&gt;
&lt;br /&gt;
Another issue involves the weak design. As a concept, it is simple, but to implement the design, it requires a lot of encryption and security mechanisms due to the many transactions of the system. Also, the design highlights a weakness in storage of the templates. Just like storage of passwords, storage of the templates carries even more risks, because stolen templates could potentially mean a stolen identity.&lt;br /&gt;
&lt;br /&gt;
Also, the current thought regarding biometric security systems is that they are the way of the future, meaning they are to replace current security mechanisms, but as shown above, that is terrible because there are still too many weaknesses, including the fact that not everyone can use such a system either. However, it is so popular because it is so simple to use and requires almost no effort. Also, even if we can reduce the number of errors to zero, we should never rely solely on one type of security system. Hence, biometric security systems should only be used as a supplement to current security systems, not a replacement. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=='''See Also'''==&lt;br /&gt;
&lt;br /&gt;
[http://www.cas.mcmaster.ca/wiki/index.php/Biometrics_in_Information_Security Biometrics in Information Security]&lt;br /&gt;
&lt;br /&gt;
[http://www.cas.mcmaster.ca/wiki/index.php/Identity_Theft Identity Theft]&lt;br /&gt;
&lt;br /&gt;
[http://www.cas.mcmaster.ca/wiki/index.php/Operating_Systems_Security Operating Systems Security]&lt;br /&gt;
&lt;br /&gt;
[http://www.cas.mcmaster.ca/wiki/index.php/The_Mitnick_attack The Mitnick Attack]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=='''External Links'''==&lt;br /&gt;
&lt;br /&gt;
[E1] http://en.wikipedia.org/wiki/Jerome_H._Saltzer&lt;br /&gt;
&lt;br /&gt;
[E2] http://en.wikipedia.org/wiki/Michael_Schroeder&lt;br /&gt;
&lt;br /&gt;
[E3] http://en.wikipedia.org/wiki/Biometric#Performance&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=='''References'''==&lt;br /&gt;
&lt;br /&gt;
[R1] http://www.cafesoft.com/support/security-glossary.html&lt;br /&gt;
&lt;br /&gt;
[R2] http://en.wikipedia.org/wiki/Biometrics#Issues_and_concerns&lt;br /&gt;
&lt;br /&gt;
[R3] [[Biometrics in Information Security#Types of Measurements]]&lt;br /&gt;
&lt;br /&gt;
[R4] Bishop, Matt. Introduction to Computer Security. Boston: Addison-Wesley, 2006.&lt;br /&gt;
&lt;br /&gt;
[R5] Jain, Anil K. Biometric Security System. Michigan, 2006.&lt;br /&gt;
&lt;br /&gt;
[R6] http://en.wikipedia.org/wiki/Biometric#Marketing_of_biometric_products&lt;br /&gt;
&lt;br /&gt;
[R7] http://en.wikipedia.org/wiki/Biometric#Performance_measurement&lt;br /&gt;
&lt;br /&gt;
[R8] http://en.wikipedia.org/wiki/Biometric#Performance&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[Ra] John Woodward Jr, Katharine Webb, Elaine Newton, Melissa Bradley, David Rubenson. Army Biometric Applications: Identifying and Addressing Sociocultural Concerns. Santa Monica, CA: RAND, 2001.&lt;br /&gt;
&lt;br /&gt;
[Rb] D. J. Hurley, B. Arbab-Zavar, M.S. Nixon. The Ear as a Biometric. University of Southampton: Eurosip, 2007.&lt;/div&gt;</summary>
		<author><name>Mad Doktor</name></author>	</entry>

	<entry>
		<id>http://wiki.cas.mcmaster.ca/index.php/Biometric_Systems_and_Security_Design_Principles</id>
		<title>Biometric Systems and Security Design Principles</title>
		<link rel="alternate" type="text/html" href="http://wiki.cas.mcmaster.ca/index.php/Biometric_Systems_and_Security_Design_Principles"/>
				<updated>2007-12-10T04:19:09Z</updated>
		
		<summary type="html">&lt;p&gt;Mad Doktor:&amp;#32;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;'''Analysis of Biometric Systems using Security Design Principles'''&lt;br /&gt;
&lt;br /&gt;
Biometric security systems&amp;lt;sup&amp;gt;[http://www.cafesoft.com/support/security-glossary.html R1]&amp;lt;/sup&amp;gt; are authentication mechanisms that bind an entity to a subject based on what the entity is, as opposed to what they know, what they have, or where they are.&lt;br /&gt;
&lt;br /&gt;
Within the past several years, biometric security systems have gained a lot of ground in terms of advancements in technology and widespread use however, there is still a lot of reluctance to adopt the technology worldwide&amp;lt;sup&amp;gt;[http://en.wikipedia.org/wiki/Biometrics#Issues_and_concerns R2]&amp;lt;/sup&amp;gt;. A look at biometric security systems through security design principles should provide a clearer understanding of its strengths and weaknesses in the implementation and design of biometric security systems.&lt;br /&gt;
[[Image:3dface.jpg|thumb|3D Face Recognition Software]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=='''Biometrics'''==&lt;br /&gt;
Biometrics is the identification of a person through automated measurements using biological or behavioural features&amp;lt;sup&amp;gt;[[Biometrics in Information Security#Types of Measurements|R3]]&amp;lt;/sup&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=='''Security Design Principles'''==&lt;br /&gt;
The following eight design principles were created by Salzter&amp;lt;sup&amp;gt;[http://en.wikipedia.org/wiki/Jerome_H._Saltzer E1]&amp;lt;/sup&amp;gt; and Schroeder&amp;lt;sup&amp;gt;[http://en.wikipedia.org/wiki/Michael_Schroeder E2]&amp;lt;/sup&amp;gt; for the design and implementation of security mechanisms&amp;lt;sup&amp;gt;R4&amp;lt;/sup&amp;gt;. These design principles encompass technical details and human interaction that make designs and mechanisms easy to understand. They are also simple and easy to understand, which is why they will be used as a guide to analyze biometric security systems. The list of design principles are as follows:&lt;br /&gt;
&lt;br /&gt;
'''Principle of Least Privilege:'''&lt;br /&gt;
A subject should be given only those privileges that it needs in order to complete its task.&lt;br /&gt;
&lt;br /&gt;
'''Principle of Fails-Safe Defaults:'''&lt;br /&gt;
A subject should be denied access to an object unless the subject was given access.&lt;br /&gt;
&lt;br /&gt;
'''Principle of Economy of Mechanism:'''&lt;br /&gt;
Security mechanisms should be as simple as possible.&lt;br /&gt;
&lt;br /&gt;
'''Principle of Complete Mediation:'''&lt;br /&gt;
All accesses to objects are checked to ensure that they are allowed.&lt;br /&gt;
&lt;br /&gt;
'''Principle of Open Design:'''&lt;br /&gt;
Security of a mechanism should not depend on the secrecy of its design or implementation.&lt;br /&gt;
&lt;br /&gt;
'''Principle of Separation of Privilege:'''&lt;br /&gt;
A system should not grant permission based on a single condition.&lt;br /&gt;
&lt;br /&gt;
'''Principle of Least Common Mechanism:'''&lt;br /&gt;
Mechanisms used to access resources should not be shared.&lt;br /&gt;
&lt;br /&gt;
'''Principle of Psychological Acceptability:'''&lt;br /&gt;
Security mechanisms should not make the resource more difficult to access than if the security mechanisms were not present.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=='''Breaking a Biometrics Security System'''==&lt;br /&gt;
In addition to looking at biometric security systems from a design and implementation perspective, understanding a biometrics security system from an attacker’s perspective is also important. In general, there are seven different types of attacks&amp;lt;sup&amp;gt;R5&amp;lt;/sup&amp;gt;. These types of attacks are categorized by their attacks on a specific part of the design. They can be divided into the following:&lt;br /&gt;
&lt;br /&gt;
'''Type 1:''' Fake biometric sensor&lt;br /&gt;
&lt;br /&gt;
'''Type 2:''' Replay attacks&lt;br /&gt;
&lt;br /&gt;
'''Type 3:''' Trojan horse program at feature extractor&lt;br /&gt;
&lt;br /&gt;
'''Type 4:''' Real features replaced by synthetic features.&lt;br /&gt;
&lt;br /&gt;
'''Type 5:''' Trojan horse program at matcher.&lt;br /&gt;
&lt;br /&gt;
'''Type 6:''' Attacks modifying database of templates.&lt;br /&gt;
&lt;br /&gt;
'''Type 7:''' Results overridden.&lt;br /&gt;
&lt;br /&gt;
[[Image:biometric_attacks.jpg|Types of attacks available on a biometric security system]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=='''Analysis'''==&lt;br /&gt;
&lt;br /&gt;
===Principle of Least Privilege===&lt;br /&gt;
The design of the biometric security system itself is very linear hence, only the channels themselves need to be protected. This means that overall, processes cannot be accessed past the sensor if the sensor themselves have not been used. From this perspective, the design is secure. However, the system is still vulnerable from all attacks that attack each process directly (type 3, 5, and 6 attacks).&lt;br /&gt;
&lt;br /&gt;
===Principle of Fail-Safe Default===&lt;br /&gt;
The principle of fail-safe default is an excellent principle to follow for security mechanisms, but it falls short due to an implicit assumption within the principle itself. The principle assumes that security mechanisms will always work perfectly if all the requirements are passed. However, with biometric security systems, that is not the case. Biometric security systems are not perfect so they don’t always pass legitimate users and at the same time, they also pass the invalid users as well.&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot; align=center&lt;br /&gt;
|+ '''Chart of Biometric Systems Error Rates'''&amp;lt;sup&amp;gt;[http://en.wikipedia.org/wiki/Biometric#Performance E3]&amp;lt;/sup&amp;gt;&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
! Biometrics &lt;br /&gt;
&lt;br /&gt;
! EER&lt;br /&gt;
&lt;br /&gt;
! FAR&lt;br /&gt;
&lt;br /&gt;
! FRR&lt;br /&gt;
&lt;br /&gt;
! Subjects&lt;br /&gt;
&lt;br /&gt;
! Comment&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
| Face&lt;br /&gt;
&lt;br /&gt;
| n/a&lt;br /&gt;
&lt;br /&gt;
| 1 %&lt;br /&gt;
&lt;br /&gt;
| 10 %&lt;br /&gt;
&lt;br /&gt;
| 37437&lt;br /&gt;
&lt;br /&gt;
| Varied lighting, indoor/outdoor&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
| Fingerprints&lt;br /&gt;
&lt;br /&gt;
| 2 %&lt;br /&gt;
&lt;br /&gt;
| 2 %&lt;br /&gt;
&lt;br /&gt;
| 2 %&lt;br /&gt;
&lt;br /&gt;
| 100&lt;br /&gt;
&lt;br /&gt;
| Rotation and exaggerated skin distortion&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
| Hand geometry&lt;br /&gt;
&lt;br /&gt;
| 1 %&lt;br /&gt;
&lt;br /&gt;
| 2 %&lt;br /&gt;
&lt;br /&gt;
| 0.1 %&lt;br /&gt;
&lt;br /&gt;
| 129&lt;br /&gt;
&lt;br /&gt;
| With rings and improper placement&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
| Iris&lt;br /&gt;
&lt;br /&gt;
| &amp;lt; 1 %&lt;br /&gt;
&lt;br /&gt;
| 0.94 %&lt;br /&gt;
&lt;br /&gt;
| 0.99 %&lt;br /&gt;
&lt;br /&gt;
| 1224&lt;br /&gt;
&lt;br /&gt;
| Indoor Environment&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
| Iris&lt;br /&gt;
&lt;br /&gt;
| 0.01 %&lt;br /&gt;
&lt;br /&gt;
| 0.0001 %&lt;br /&gt;
&lt;br /&gt;
| 0.2 %&lt;br /&gt;
&lt;br /&gt;
| 132&lt;br /&gt;
&lt;br /&gt;
| Best conditions&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
| Keystrokes&lt;br /&gt;
&lt;br /&gt;
| 1.8 %&lt;br /&gt;
&lt;br /&gt;
| 7 %&lt;br /&gt;
&lt;br /&gt;
| 0.1 %&lt;br /&gt;
&lt;br /&gt;
| 15&lt;br /&gt;
&lt;br /&gt;
| During 6 months period&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
| Voice&lt;br /&gt;
&lt;br /&gt;
| 6 %&lt;br /&gt;
&lt;br /&gt;
| 2 %&lt;br /&gt;
&lt;br /&gt;
| 10 %&lt;br /&gt;
&lt;br /&gt;
| 310&lt;br /&gt;
&lt;br /&gt;
| Text independent, multilingual&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
===Principle of Economy of Mechanism===&lt;br /&gt;
In the design of the biometric security systems, each channel must be encrypted and each state must be protected. This means that overall, the design must contain at least four encryption mechanisms must be used for each channel, and at least five security mechanisms for the five states.&lt;br /&gt;
&lt;br /&gt;
The quantity of states and channels involved means that there are a high number of security mechanisms involved which means that security of the overall design is quite complex. This violates the principle of economy of mechanism, but the security of each channel and state may not be as complex as the design, depending on the implementation.&lt;br /&gt;
&lt;br /&gt;
===Principle of Complete Mediation===&lt;br /&gt;
Depending on the implementation, as long as each channel is encrypted with several layers of protection, it does not violate the principle. However, the problem comes from the human side and the issue arises when people try to replace current authentication mechanism such as password systems with biometric security systems. &amp;lt;sup&amp;gt;[http://en.wikipedia.org/wiki/Biometric#Marketing_of_biometric_products R6]&amp;lt;/sup&amp;gt;&lt;br /&gt;
&lt;br /&gt;
For example, new laptops with the Windows operating system have been released with biometric security systems. On the Windows login page, there are two logins available, the password system or the biometric system, and the user only has to use one of them to login, a clear violation of the principle of complete mediation.&lt;br /&gt;
&lt;br /&gt;
===Principle of Open Design===&lt;br /&gt;
The design of the biometric security is acceptable but the weakness is easily identified. The weakness of the design lies in the storage of the templates, which to this day, remains a difficult issue. Two options are available, a centralized data bank or decentralized servers to store all the templates.&lt;br /&gt;
&lt;br /&gt;
The design violates the principle not because the design is shrouded in secrecy but because the design itself is weak. This issue can be solved in the future by having a stronger design.&lt;br /&gt;
&lt;br /&gt;
===Principle of Separation of Privilege===&lt;br /&gt;
&lt;br /&gt;
It is common knowledge that a system is not secure if only one security mechanism is used, so an obvious solution is to have multiple security mechanisms. The issue arises when multiple biometric security systems are used. For example, fingerprints and retinas are used together. However, the problem is similar to those of the principle of fail-safe defaults. It assume that security mechanism work when they are supposed to work, but by increasing the types of biometrics required, the number of FARs (false acceptance rates) and FRRs (false rejection rates) increase as well.&lt;br /&gt;
	Cite examples.&lt;br /&gt;
&lt;br /&gt;
===Principle of Least Common Mechanism===&lt;br /&gt;
[[Image:biometric_attacks2.jpg|thumb|Biometric security system design that includes enrollment]]&lt;br /&gt;
Again, the design is simple due to its rather linear structure. However, in order for the security system to work, there must be a step in which users are enrolled, so that features can be stored. To cut costs, that enrolment system is typically a part of the authentication mechanism. This means that the biometric security system is more opened to attacks because another channel (between feature extractor and the template bank) must be encrypted, making the design more complicated, and the attacker has another option to attack the template bank.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Principle of Psychological Acceptability===&lt;br /&gt;
&lt;br /&gt;
The big reason why biometric security systems are so popular is that from an end-user perspective, they are the simplest security mechanisms to use. The user does not require any sort of knowledge of passwords to use, since it depends on either physiological or behavioural traits. However, if it fails, due to the FARs and FRRs, such a problem can be extremely annoying since it is not easy to remedy unless there is an alternative login method, which of course, defeats the purpose of having a biometric authentication method.&amp;lt;sup&amp;gt;[http://en.wikipedia.org/wiki/Biometric#Performance_measurement R7]&amp;lt;/sup&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=='''Conclusion'''==&lt;br /&gt;
&lt;br /&gt;
A lot of the faults of a biometric security system are due to current biometric technology. It is simply not advanced enough because the errors in identifying valid and invalid users are still too big, even though it may be as small as 0.01%&amp;lt;sup&amp;gt;[http://en.wikipedia.org/wiki/Biometric#Performance R8]&amp;lt;/sup&amp;gt;.&lt;br /&gt;
&lt;br /&gt;
Another issue involves the weak design. As a concept, it is simple, but to implement the design, it requires a lot of encryption and security mechanisms due to the many transactions of the system. Also, the design highlights a weakness in storage of the templates. Just like storage of passwords, storage of the templates carries even more risks, because stolen templates could potentially mean a stolen identity.&lt;br /&gt;
&lt;br /&gt;
Also, the current thought regarding biometric security systems is that they are the way of the future, meaning they are to replace current security mechanisms, but as shown above, that is terrible because there are still too many weaknesses, including the fact that not everyone can use such a system either. However, it is so popular because it is so simple to use and requires almost no effort. Also, even if we can reduce the number of errors to zero, we should never rely solely on one type of security system. Hence, biometric security systems should only be used as a supplement to current security systems, not a replacement. &lt;br /&gt;
&lt;br /&gt;
=='''See Also'''==&lt;br /&gt;
&lt;br /&gt;
[http://www.cas.mcmaster.ca/wiki/index.php/Biometrics_in_Information_Security Biometrics in Information Security]&lt;br /&gt;
&lt;br /&gt;
[http://www.cas.mcmaster.ca/wiki/index.php/Identity_Theft Identity Theft]&lt;br /&gt;
&lt;br /&gt;
[http://www.cas.mcmaster.ca/wiki/index.php/Operating_Systems_Security Operating Systems Security]&lt;br /&gt;
&lt;br /&gt;
[http://www.cas.mcmaster.ca/wiki/index.php/The_Mitnick_attack The Mitnick Attack]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=='''External Links'''==&lt;br /&gt;
&lt;br /&gt;
[E1] http://en.wikipedia.org/wiki/Jerome_H._Saltzer&lt;br /&gt;
&lt;br /&gt;
[E2] http://en.wikipedia.org/wiki/Michael_Schroeder&lt;br /&gt;
&lt;br /&gt;
[E3] http://en.wikipedia.org/wiki/Biometric#Performance&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=='''References'''==&lt;br /&gt;
&lt;br /&gt;
[R1] http://www.cafesoft.com/support/security-glossary.html&lt;br /&gt;
&lt;br /&gt;
[R2] http://en.wikipedia.org/wiki/Biometrics#Issues_and_concerns&lt;br /&gt;
&lt;br /&gt;
[R3] [[Biometrics in Information Security#Types of Measurements]]&lt;br /&gt;
&lt;br /&gt;
[R4] Bishop, Matt. Introduction to Computer Security. Boston: Addison-Wesley, 2006.&lt;br /&gt;
&lt;br /&gt;
[R5] Jain, Anil K. Biometric Security System. Michigan, 2006.&lt;br /&gt;
&lt;br /&gt;
[R6] http://en.wikipedia.org/wiki/Biometric#Marketing_of_biometric_products&lt;br /&gt;
&lt;br /&gt;
[R7] http://en.wikipedia.org/wiki/Biometric#Performance_measurement&lt;br /&gt;
&lt;br /&gt;
[R8] http://en.wikipedia.org/wiki/Biometric#Performance&lt;br /&gt;
&lt;br /&gt;
John Woodward Jr, Katharine Webb, Elaine Newton, Melissa Bradley, David Rubenson. Army Biometric Applications: Identifying and Addressing Sociocultural Concerns. Santa Monica, CA: RAND, 2001.&lt;br /&gt;
&lt;br /&gt;
D. J. Hurley, B. Arbab-Zavar, M.S. Nixon. The Ear as a Biometric. University of Southampton: Eurosip, 2007.&lt;/div&gt;</summary>
		<author><name>Mad Doktor</name></author>	</entry>

	<entry>
		<id>http://wiki.cas.mcmaster.ca/index.php/File:Biometric_attacks2.jpg</id>
		<title>File:Biometric attacks2.jpg</title>
		<link rel="alternate" type="text/html" href="http://wiki.cas.mcmaster.ca/index.php/File:Biometric_attacks2.jpg"/>
				<updated>2007-12-10T04:05:07Z</updated>
		
		<summary type="html">&lt;p&gt;Mad Doktor:&amp;#32;A biometric security system design that shows the weakness of sharing both the enrollment and authentication mechanism together as one system.&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;A biometric security system design that shows the weakness of sharing both the enrollment and authentication mechanism together as one system.&lt;/div&gt;</summary>
		<author><name>Mad Doktor</name></author>	</entry>

	<entry>
		<id>http://wiki.cas.mcmaster.ca/index.php/Biometric_Systems_and_Security_Design_Principles</id>
		<title>Biometric Systems and Security Design Principles</title>
		<link rel="alternate" type="text/html" href="http://wiki.cas.mcmaster.ca/index.php/Biometric_Systems_and_Security_Design_Principles"/>
				<updated>2007-12-10T04:02:28Z</updated>
		
		<summary type="html">&lt;p&gt;Mad Doktor:&amp;#32;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;'''Analysis of Biometric Systems using Security Design Principles'''&lt;br /&gt;
&lt;br /&gt;
Biometric security systems&amp;lt;sup&amp;gt;[http://www.cafesoft.com/support/security-glossary.html R1]&amp;lt;/sup&amp;gt; are authentication mechanisms that bind an entity to a subject based on what the entity is, as opposed to what they know, what they have, or where they are.&lt;br /&gt;
&lt;br /&gt;
Within the past several years, biometric security systems have gained a lot of ground in terms of advancements in technology and widespread use however, there is still a lot of reluctance to adopt the technology worldwide&amp;lt;sup&amp;gt;[http://en.wikipedia.org/wiki/Biometrics#Issues_and_concerns R2]&amp;lt;/sup&amp;gt;. A look at biometric security systems through security design principles should provide a clearer understanding of its strengths and weaknesses in the implementation and design of biometric security systems.&lt;br /&gt;
[[Image:3dface.jpg|thumb|3D Face Recognition Software]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=='''Biometrics'''==&lt;br /&gt;
Biometrics is the identification of a person through automated measurements using biological or behavioural features&amp;lt;sup&amp;gt;[[Biometrics in Information Security#Types of Measurements|R3]]&amp;lt;/sup&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=='''Security Design Principles'''==&lt;br /&gt;
The following eight design principles were created by Salzter&amp;lt;sup&amp;gt;[http://en.wikipedia.org/wiki/Jerome_H._Saltzer E1]&amp;lt;/sup&amp;gt; and Schroeder&amp;lt;sup&amp;gt;[http://en.wikipedia.org/wiki/Michael_Schroeder E2]&amp;lt;/sup&amp;gt; for the design and implementation of security mechanisms&amp;lt;sup&amp;gt;R4&amp;lt;/sup&amp;gt;. These design principles encompass technical details and human interaction that make designs and mechanisms easy to understand. They are also simple and easy to understand, which is why they will be used as a guide to analyze biometric security systems. The list of design principles are as follows:&lt;br /&gt;
&lt;br /&gt;
'''Principle of Least Privilege:'''&lt;br /&gt;
A subject should be given only those privileges that it needs in order to complete its task.&lt;br /&gt;
&lt;br /&gt;
'''Principle of Fails-Safe Defaults:'''&lt;br /&gt;
A subject should be denied access to an object unless the subject was given access.&lt;br /&gt;
&lt;br /&gt;
'''Principle of Economy of Mechanism:'''&lt;br /&gt;
Security mechanisms should be as simple as possible.&lt;br /&gt;
&lt;br /&gt;
'''Principle of Complete Mediation:'''&lt;br /&gt;
All accesses to objects are checked to ensure that they are allowed.&lt;br /&gt;
&lt;br /&gt;
'''Principle of Open Design:'''&lt;br /&gt;
Security of a mechanism should not depend on the secrecy of its design or implementation.&lt;br /&gt;
&lt;br /&gt;
'''Principle of Separation of Privilege:'''&lt;br /&gt;
A system should not grant permission based on a single condition.&lt;br /&gt;
&lt;br /&gt;
'''Principle of Least Common Mechanism:'''&lt;br /&gt;
Mechanisms used to access resources should not be shared.&lt;br /&gt;
&lt;br /&gt;
'''Principle of Psychological Acceptability:'''&lt;br /&gt;
Security mechanisms should not make the resource more difficult to access than if the security mechanisms were not present.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=='''Breaking a Biometrics Security System'''==&lt;br /&gt;
In addition to looking at biometric security systems from a design and implementation perspective, understanding a biometrics security system from an attacker’s perspective is also important. In general, there are seven different types of attacks&amp;lt;sup&amp;gt;R5&amp;lt;/sup&amp;gt;. These types of attacks are categorized by their attacks on a specific part of the design. They can be divided into the following:&lt;br /&gt;
&lt;br /&gt;
'''Type 1:''' Fake biometric sensor&lt;br /&gt;
&lt;br /&gt;
'''Type 2:''' Replay attacks&lt;br /&gt;
&lt;br /&gt;
'''Type 3:''' Trojan horse program at feature extractor&lt;br /&gt;
&lt;br /&gt;
'''Type 4:''' Real features replaced by synthetic features.&lt;br /&gt;
&lt;br /&gt;
'''Type 5:''' Trojan horse program at matcher.&lt;br /&gt;
&lt;br /&gt;
'''Type 6:''' Attacks modifying database of templates.&lt;br /&gt;
&lt;br /&gt;
'''Type 7:''' Results overridden.&lt;br /&gt;
&lt;br /&gt;
[[Image:biometric_attacks.jpg|Types of attacks available on a biometric security system]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=='''Analysis'''==&lt;br /&gt;
&lt;br /&gt;
===Principle of Least Privilege===&lt;br /&gt;
The design of the biometric security system itself is very linear hence, only the channels themselves need to be protected. This means that overall, processes cannot be accessed past the sensor if the sensor themselves have not been used. From this perspective, the design is secure. However, the system is still vulnerable from all attacks that attack each process directly (type 3, 5, and 6 attacks).&lt;br /&gt;
&lt;br /&gt;
===Principle of Fail-Safe Default===&lt;br /&gt;
The principle of fail-safe default is an excellent principle to follow for security mechanisms, but it falls short due to an implicit assumption within the principle itself. The principle assumes that security mechanisms will always work perfectly if all the requirements are passed. However, with biometric security systems, that is not the case. Biometric security systems are not perfect so they don’t always pass legitimate users and at the same time, they also pass the invalid users as well.&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot; align=center&lt;br /&gt;
|+ '''Chart of Biometric Systems Error Rates'''&amp;lt;sup&amp;gt;[http://en.wikipedia.org/wiki/Biometric#Performance E3]&amp;lt;/sup&amp;gt;&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
! Biometrics &lt;br /&gt;
&lt;br /&gt;
! EER&lt;br /&gt;
&lt;br /&gt;
! FAR&lt;br /&gt;
&lt;br /&gt;
! FRR&lt;br /&gt;
&lt;br /&gt;
! Subjects&lt;br /&gt;
&lt;br /&gt;
! Comment&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
| Face&lt;br /&gt;
&lt;br /&gt;
| n/a&lt;br /&gt;
&lt;br /&gt;
| 1 %&lt;br /&gt;
&lt;br /&gt;
| 10 %&lt;br /&gt;
&lt;br /&gt;
| 37437&lt;br /&gt;
&lt;br /&gt;
| Varied lighting, indoor/outdoor&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
| Fingerprints&lt;br /&gt;
&lt;br /&gt;
| 2 %&lt;br /&gt;
&lt;br /&gt;
| 2 %&lt;br /&gt;
&lt;br /&gt;
| 2 %&lt;br /&gt;
&lt;br /&gt;
| 100&lt;br /&gt;
&lt;br /&gt;
| Rotation and exaggerated skin distortion&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
| Hand geometry&lt;br /&gt;
&lt;br /&gt;
| 1 %&lt;br /&gt;
&lt;br /&gt;
| 2 %&lt;br /&gt;
&lt;br /&gt;
| 0.1 %&lt;br /&gt;
&lt;br /&gt;
| 129&lt;br /&gt;
&lt;br /&gt;
| With rings and improper placement&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
| Iris&lt;br /&gt;
&lt;br /&gt;
| &amp;lt; 1 %&lt;br /&gt;
&lt;br /&gt;
| 0.94 %&lt;br /&gt;
&lt;br /&gt;
| 0.99 %&lt;br /&gt;
&lt;br /&gt;
| 1224&lt;br /&gt;
&lt;br /&gt;
| Indoor Environment&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
| Iris&lt;br /&gt;
&lt;br /&gt;
| 0.01 %&lt;br /&gt;
&lt;br /&gt;
| 0.0001 %&lt;br /&gt;
&lt;br /&gt;
| 0.2 %&lt;br /&gt;
&lt;br /&gt;
| 132&lt;br /&gt;
&lt;br /&gt;
| Best conditions&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
| Keystrokes&lt;br /&gt;
&lt;br /&gt;
| 1.8 %&lt;br /&gt;
&lt;br /&gt;
| 7 %&lt;br /&gt;
&lt;br /&gt;
| 0.1 %&lt;br /&gt;
&lt;br /&gt;
| 15&lt;br /&gt;
&lt;br /&gt;
| During 6 months period&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
| Voice&lt;br /&gt;
&lt;br /&gt;
| 6 %&lt;br /&gt;
&lt;br /&gt;
| 2 %&lt;br /&gt;
&lt;br /&gt;
| 10 %&lt;br /&gt;
&lt;br /&gt;
| 310&lt;br /&gt;
&lt;br /&gt;
| Text independent, multilingual&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
===Principle of Economy of Mechanism===&lt;br /&gt;
In the design of the biometric security systems, each channel must be encrypted and each state must be protected. This means that overall, the design must contain at least four encryption mechanisms must be used for each channel, and at least five security mechanisms for the five states.&lt;br /&gt;
&lt;br /&gt;
The quantity of states and channels involved means that there are a high number of security mechanisms involved which means that security of the overall design is quite complex. This violates the principle of economy of mechanism, but the security of each channel and state may not be as complex as the design, depending on the implementation.&lt;br /&gt;
&lt;br /&gt;
===Principle of Complete Mediation===&lt;br /&gt;
Depending on the implementation, as long as each channel is encrypted with several layers of protection, it does not violate the principle. However, the problem comes from the human side and the issue arises when people try to replace current authentication mechanism such as password systems with biometric security systems. &amp;lt;sup&amp;gt;[http://en.wikipedia.org/wiki/Biometric#Marketing_of_biometric_products R6]&amp;lt;/sup&amp;gt;&lt;br /&gt;
&lt;br /&gt;
For example, new laptops with the Windows operating system have been released with biometric security systems. On the Windows login page, there are two logins available, the password system or the biometric system, and the user only has to use one of them to login, a clear violation of the principle of complete mediation.&lt;br /&gt;
&lt;br /&gt;
===Principle of Open Design===&lt;br /&gt;
The design of the biometric security is acceptable but the weakness is easily identified. The weakness of the design lies in the storage of the templates, which to this day, remains a difficult issue. Two options are available, a centralized data bank or decentralized servers to store all the templates.&lt;br /&gt;
&lt;br /&gt;
The design violates the principle not because the design is shrouded in secrecy but because the design itself is weak. This issue can be solved in the future by having a stronger design.&lt;br /&gt;
&lt;br /&gt;
===Principle of Separation of Privilege===&lt;br /&gt;
&lt;br /&gt;
It is common knowledge that a system is not secure if only one security mechanism is used, so an obvious solution is to have multiple security mechanisms. The issue arises when multiple biometric security systems are used. For example, fingerprints and retinas are used together. However, the problem is similar to those of the principle of fail-safe defaults. It assume that security mechanism work when they are supposed to work, but by increasing the types of biometrics required, the number of FARs (false acceptance rates) and FRRs (false rejection rates) increase as well.&lt;br /&gt;
	Cite examples.&lt;br /&gt;
&lt;br /&gt;
===Principle of Least Common Mechanism===&lt;br /&gt;
&lt;br /&gt;
Again, the design is simple due to its rather linear structure. However, in order for the security system to work, there must be a step in which users are enrolled, so that features can be stored. To cut costs, that enrolment system is typically a part of the authentication mechanism. This means that the biometric security system is more opened to attacks because another channel (between feature extractor and the template bank) must be encrypted, making the design more complicated, and the attacker has another option to attack the template bank.&lt;br /&gt;
&lt;br /&gt;
===Principle of Psychological Acceptability===&lt;br /&gt;
&lt;br /&gt;
The big reason why biometric security systems are so popular is that from an end-user perspective, they are the simplest security mechanisms to use. The user does not require any sort of knowledge of passwords to use, since it depends on either physiological or behavioural traits. However, if it fails, due to the FARs and FRRs, such a problem can be extremely annoying since it is not easy to remedy unless there is an alternative login method, which of course, defeats the purpose of having a biometric authentication method.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=='''Conclusion'''==&lt;br /&gt;
&lt;br /&gt;
A lot of the faults of a biometric security system are due to current biometric technology. It is simply not advanced enough because the errors in identifying valid and invalid users are still too big, even though it may be as small as 0.01%.&lt;br /&gt;
&lt;br /&gt;
Another issue involves the weak design. As a concept, it is simple, but to implement the design, it requires a lot of encryption and security mechanisms. Also, the design highlights a weakness in storage of the templates. Just like storage of passwords, storage of the templates carries even more risks, because stolen templates could potentially mean a stolen identity.&lt;br /&gt;
&lt;br /&gt;
Also, the current thought regarding biometric security systems is that they are the way of the future, meaning they are to replace current security mechanisms, but as shown above, that is terrible because there are still too many weaknesses, including the fact that not everyone can use such a system either.&lt;br /&gt;
&lt;br /&gt;
However, it is so popular because it is so simple to use and requires almost no effort. Hence, biometric security systems should only be used as a supplement to current security systems, not a replacement.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=='''See Also'''==&lt;br /&gt;
&lt;br /&gt;
[http://www.cas.mcmaster.ca/wiki/index.php/Biometrics_in_Information_Security Biometrics in Information Security]&lt;br /&gt;
&lt;br /&gt;
[http://www.cas.mcmaster.ca/wiki/index.php/Identity_Theft Identity Theft]&lt;br /&gt;
&lt;br /&gt;
[http://www.cas.mcmaster.ca/wiki/index.php/Operating_Systems_Security Operating Systems Security]&lt;br /&gt;
&lt;br /&gt;
[http://www.cas.mcmaster.ca/wiki/index.php/The_Mitnick_attack The Mitnick Attack]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=='''External Links'''==&lt;br /&gt;
&lt;br /&gt;
[E1] http://en.wikipedia.org/wiki/Jerome_H._Saltzer&lt;br /&gt;
&lt;br /&gt;
[E2] http://en.wikipedia.org/wiki/Michael_Schroeder&lt;br /&gt;
&lt;br /&gt;
[E3] http://en.wikipedia.org/wiki/Biometric#Performance&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=='''References'''==&lt;br /&gt;
&lt;br /&gt;
[R1] http://www.cafesoft.com/support/security-glossary.html&lt;br /&gt;
&lt;br /&gt;
[R2] http://en.wikipedia.org/wiki/Biometrics&lt;br /&gt;
&lt;br /&gt;
[R3] [[Biometrics in Information Security]]&lt;br /&gt;
&lt;br /&gt;
[R4] Bishop, Matt. Introduction to Computer Security. Boston: Addison-Wesley, 2006.&lt;br /&gt;
&lt;br /&gt;
[R5] Jain, Anil K. Biometric Security System. Michigan, 2006.&lt;br /&gt;
&lt;br /&gt;
[R6] http://en.wikipedia.org/wiki/Biometric#Marketing_of_biometric_products&lt;/div&gt;</summary>
		<author><name>Mad Doktor</name></author>	</entry>

	<entry>
		<id>http://wiki.cas.mcmaster.ca/index.php/Biometric_Systems_and_Security_Design_Principles</id>
		<title>Biometric Systems and Security Design Principles</title>
		<link rel="alternate" type="text/html" href="http://wiki.cas.mcmaster.ca/index.php/Biometric_Systems_and_Security_Design_Principles"/>
				<updated>2007-12-10T03:53:15Z</updated>
		
		<summary type="html">&lt;p&gt;Mad Doktor:&amp;#32;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;'''Analysis of Biometric Systems using Security Design Principles'''&lt;br /&gt;
&lt;br /&gt;
Biometric security systems&amp;lt;sup&amp;gt;[http://www.cafesoft.com/support/security-glossary.html R1]&amp;lt;/sup&amp;gt; are authentication mechanisms that bind an entity to a subject based on what the entity is, as opposed to what they know, what they have, or where they are.&lt;br /&gt;
&lt;br /&gt;
Within the past several years, biometric security systems have gained a lot of ground in terms of advancements in technology and widespread use however, there is still a lot of reluctance to adopt the technology worldwide&amp;lt;sup&amp;gt;[http://en.wikipedia.org/wiki/Biometrics#Issues_and_concerns R2]&amp;lt;/sup&amp;gt;. A look at biometric security systems through security design principles should provide a clearer understanding of its strengths and weaknesses in the implementation and design of biometric security systems.&lt;br /&gt;
[[Image:3dface.jpg|thumb|3D Face Recognition Software]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=='''Biometrics'''==&lt;br /&gt;
Biometrics is the identification of a person through automated measurements using biological or behavioural features&amp;lt;sup&amp;gt;[[Biometrics in Information Security#Types of Measurements|R3]]&amp;lt;/sup&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=='''Security Design Principles'''==&lt;br /&gt;
The following eight design principles were created by Salzter&amp;lt;sup&amp;gt;[http://en.wikipedia.org/wiki/Jerome_H._Saltzer E1]&amp;lt;/sup&amp;gt; and Schroeder&amp;lt;sup&amp;gt;[http://en.wikipedia.org/wiki/Michael_Schroeder E2]&amp;lt;/sup&amp;gt; for the design and implementation of security mechanisms&amp;lt;sup&amp;gt;R4&amp;lt;/sup&amp;gt;. These design principles encompass technical details and human interaction that make designs and mechanisms easy to understand. They are also simple and easy to understand, which is why they will be used as a guide to analyze biometric security systems. The list of design principles are as follows:&lt;br /&gt;
&lt;br /&gt;
'''Principle of Least Privilege:'''&lt;br /&gt;
A subject should be given only those privileges that it needs in order to complete its task.&lt;br /&gt;
&lt;br /&gt;
'''Principle of Fails-Safe Defaults:'''&lt;br /&gt;
A subject should be denied access to an object unless the subject was given access.&lt;br /&gt;
&lt;br /&gt;
'''Principle of Economy of Mechanism:'''&lt;br /&gt;
Security mechanisms should be as simple as possible.&lt;br /&gt;
&lt;br /&gt;
'''Principle of Complete Mediation:'''&lt;br /&gt;
All accesses to objects are checked to ensure that they are allowed.&lt;br /&gt;
&lt;br /&gt;
'''Principle of Open Design:'''&lt;br /&gt;
Security of a mechanism should not depend on the secrecy of its design or implementation.&lt;br /&gt;
&lt;br /&gt;
'''Principle of Separation of Privilege:'''&lt;br /&gt;
A system should not grant permission based on a single condition.&lt;br /&gt;
&lt;br /&gt;
'''Principle of Least Common Mechanism:'''&lt;br /&gt;
Mechanisms used to access resources should not be shared.&lt;br /&gt;
&lt;br /&gt;
'''Principle of Psychological Acceptability:'''&lt;br /&gt;
Security mechanisms should not make the resource more difficult to access than if the security mechanisms were not present.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=='''Breaking a Biometrics Security System'''==&lt;br /&gt;
In addition to looking at biometric security systems from a design and implementation perspective, understanding a biometrics security system from an attacker’s perspective is also important. In general, there are seven different types of attacks&amp;lt;sup&amp;gt;R5&amp;lt;/sup&amp;gt;. These types of attacks are categorized by their attacks on a specific part of the design. They can be divided into the following:&lt;br /&gt;
&lt;br /&gt;
'''Type 1:''' Fake biometric sensor&lt;br /&gt;
&lt;br /&gt;
'''Type 2:''' Replay attacks&lt;br /&gt;
&lt;br /&gt;
'''Type 3:''' Trojan horse program at feature extractor&lt;br /&gt;
&lt;br /&gt;
'''Type 4:''' Real features replaced by synthetic features.&lt;br /&gt;
&lt;br /&gt;
'''Type 5:''' Trojan horse program at matcher.&lt;br /&gt;
&lt;br /&gt;
'''Type 6:''' Attacks modifying database of templates.&lt;br /&gt;
&lt;br /&gt;
'''Type 7:''' Results overridden.&lt;br /&gt;
&lt;br /&gt;
[[Image:biometric_attacks.jpg|Types of attacks available on a biometric security system]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=='''Analysis'''==&lt;br /&gt;
&lt;br /&gt;
===Principle of Least Privilege===&lt;br /&gt;
The design of the biometric security system itself is very linear hence, only the channels themselves need to be protected. This means that overall, processes cannot be accessed past the sensor if the sensor themselves have not been used. From this perspective, the design is secure. However, the system is still vulnerable from all attacks that attack each process directly (type 3, 5, and 6 attacks).&lt;br /&gt;
&lt;br /&gt;
===Principle of Fail-Safe Default===&lt;br /&gt;
The principle of fail-safe default is an excellent principle to follow for security mechanisms, but it falls short due to an implicit assumption within the principle itself. The principle assumes that security mechanisms will always work perfectly if all the requirements are passed. However, with biometric security systems, that is not the case. Biometric security systems are not perfect so they don’t always pass legitimate users and at the same time, they also pass the invalid users as well.&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot; align=center&lt;br /&gt;
|+ '''Chart of Biometric Systems Error Rates'''&amp;lt;sup&amp;gt;[http://en.wikipedia.org/wiki/Biometric#Performance E3]&amp;lt;/sup&amp;gt;&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
! Biometrics &lt;br /&gt;
&lt;br /&gt;
! EER&lt;br /&gt;
&lt;br /&gt;
! FAR&lt;br /&gt;
&lt;br /&gt;
! FRR&lt;br /&gt;
&lt;br /&gt;
! Subjects&lt;br /&gt;
&lt;br /&gt;
! Comment&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
| Face&lt;br /&gt;
&lt;br /&gt;
| n/a&lt;br /&gt;
&lt;br /&gt;
| 1 %&lt;br /&gt;
&lt;br /&gt;
| 10 %&lt;br /&gt;
&lt;br /&gt;
| 37437&lt;br /&gt;
&lt;br /&gt;
| Varied lighting, indoor/outdoor&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
| Fingerprints&lt;br /&gt;
&lt;br /&gt;
| 2 %&lt;br /&gt;
&lt;br /&gt;
| 2 %&lt;br /&gt;
&lt;br /&gt;
| 2 %&lt;br /&gt;
&lt;br /&gt;
| 100&lt;br /&gt;
&lt;br /&gt;
| Rotation and exaggerated skin distortion&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
| Hand geometry&lt;br /&gt;
&lt;br /&gt;
| 1 %&lt;br /&gt;
&lt;br /&gt;
| 2 %&lt;br /&gt;
&lt;br /&gt;
| 0.1 %&lt;br /&gt;
&lt;br /&gt;
| 129&lt;br /&gt;
&lt;br /&gt;
| With rings and improper placement&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
| Iris&lt;br /&gt;
&lt;br /&gt;
| &amp;lt; 1 %&lt;br /&gt;
&lt;br /&gt;
| 0.94 %&lt;br /&gt;
&lt;br /&gt;
| 0.99 %&lt;br /&gt;
&lt;br /&gt;
| 1224&lt;br /&gt;
&lt;br /&gt;
| Indoor Environment&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
| Iris&lt;br /&gt;
&lt;br /&gt;
| 0.01 %&lt;br /&gt;
&lt;br /&gt;
| 0.0001 %&lt;br /&gt;
&lt;br /&gt;
| 0.2 %&lt;br /&gt;
&lt;br /&gt;
| 132&lt;br /&gt;
&lt;br /&gt;
| Best conditions&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
| Keystrokes&lt;br /&gt;
&lt;br /&gt;
| 1.8 %&lt;br /&gt;
&lt;br /&gt;
| 7 %&lt;br /&gt;
&lt;br /&gt;
| 0.1 %&lt;br /&gt;
&lt;br /&gt;
| 15&lt;br /&gt;
&lt;br /&gt;
| During 6 months period&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
| Voice&lt;br /&gt;
&lt;br /&gt;
| 6 %&lt;br /&gt;
&lt;br /&gt;
| 2 %&lt;br /&gt;
&lt;br /&gt;
| 10 %&lt;br /&gt;
&lt;br /&gt;
| 310&lt;br /&gt;
&lt;br /&gt;
| Text independent, multilingual&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
===Principle of Economy of Mechanism===&lt;br /&gt;
In the design of the biometric security systems, each channel must be encrypted and each state must be protected. This means that overall, the design must contain at least four encryption mechanisms must be used for each channel, and at least five security mechanisms for the five states.&lt;br /&gt;
&lt;br /&gt;
The quantity of states and channels involved means that there are a high number of security mechanisms involved which means that security of the overall design is quite complex. This violates the principle of economy of mechanism, but the security of each channel and state may not be as complex as the design, depending on the implementation.&lt;br /&gt;
&lt;br /&gt;
===Principle of Complete Mediation===&lt;br /&gt;
Depending on the implementation, as long as each channel is encrypted with several layers of protection, it does not violate the principle. However, the problem comes from the human side and the issue arises when people try to replace current authentication mechanism such as password systems with biometric security systems.&lt;br /&gt;
&lt;br /&gt;
For example, new laptops with the Windows operating system have been released with biometric security systems. On the Windows login page, there are two logins available, the password system or the biometric system, and the user only has to use one of them to login, a clear violation of the principle of complete mediation.&lt;br /&gt;
&lt;br /&gt;
===Principle of Open Design===&lt;br /&gt;
The design of the biometric security is acceptable but the weakness is easily identified. The weakness of the design lies in the storage of the templates, which to this day, remains a difficult issue. Two options are available, a centralized data bank or decentralized servers to store all the templates.&lt;br /&gt;
&lt;br /&gt;
The design violates the principle not because the design is shrouded in secrecy but because the design itself is weak. This issue can be solved in the future by having a stronger design.&lt;br /&gt;
&lt;br /&gt;
===Principle of Separation of Privilege===&lt;br /&gt;
&lt;br /&gt;
It is common knowledge that a system is not secure if only one security mechanism is used, so an obvious solution is to have multiple security mechanisms. The issue arises when multiple biometric security systems are used. For example, fingerprints and retinas are used together. However, the problem is similar to those of the principle of fail-safe defaults. It assume that security mechanism work when they are supposed to work, but by increasing the types of biometrics required, the number of FARs (false acceptance rates) and FRRs (false rejection rates) increase as well.&lt;br /&gt;
	Cite examples.&lt;br /&gt;
&lt;br /&gt;
===Principle of Least Common Mechanism===&lt;br /&gt;
&lt;br /&gt;
Again, the design is simple due to its rather linear structure. However, in order for the security system to work, there must be a step in which users are enrolled, so that features can be stored. To cut costs, that enrolment system is typically a part of the authentication mechanism. This means that the biometric security system is more opened to attacks because another channel (between feature extractor and the template bank) must be encrypted, making the design more complicated, and the attacker has another option to attack the template bank.&lt;br /&gt;
&lt;br /&gt;
===Principle of Psychological Acceptability===&lt;br /&gt;
&lt;br /&gt;
The big reason why biometric security systems are so popular is that from an end-user perspective, they are the simplest security mechanisms to use. The user does not require any sort of knowledge of passwords to use, since it depends on either physiological or behavioural traits. However, if it fails, due to the FARs and FRRs, such a problem can be extremely annoying since it is not easy to remedy unless there is an alternative login method, which of course, defeats the purpose of having a biometric authentication method.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=='''Conclusion'''==&lt;br /&gt;
&lt;br /&gt;
A lot of the faults of a biometric security system are due to current biometric technology. It is simply not advanced enough because the errors in identifying valid and invalid users are still too big, even though it may be as small as 0.01%.&lt;br /&gt;
&lt;br /&gt;
Another issue involves the weak design. As a concept, it is simple, but to implement the design, it requires a lot of encryption and security mechanisms. Also, the design highlights a weakness in storage of the templates. Just like storage of passwords, storage of the templates carries even more risks, because stolen templates could potentially mean a stolen identity.&lt;br /&gt;
&lt;br /&gt;
Also, the current thought regarding biometric security systems is that they are the way of the future, meaning they are to replace current security mechanisms, but as shown above, that is terrible because there are still too many weaknesses, including the fact that not everyone can use such a system either.&lt;br /&gt;
&lt;br /&gt;
However, it is so popular because it is so simple to use and requires almost no effort. Hence, biometric security systems should only be used as a supplement to current security systems, not a replacement.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=='''See Also'''==&lt;br /&gt;
[http://www.cas.mcmaster.ca/wiki/index.php/Biometrics_in_Information_Security Biometrics in Information Security]&lt;br /&gt;
&lt;br /&gt;
[http://www.cas.mcmaster.ca/wiki/index.php/Identity_Theft Identity Theft]&lt;br /&gt;
&lt;br /&gt;
[http://www.cas.mcmaster.ca/wiki/index.php/Operating_Systems_Security Operating Systems Security]&lt;br /&gt;
&lt;br /&gt;
[http://www.cas.mcmaster.ca/wiki/index.php/The_Mitnick_attack The Mitnick Attack]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=='''External Links'''==&lt;br /&gt;
&lt;br /&gt;
[E1] http://en.wikipedia.org/wiki/Jerome_H._Saltzer&lt;br /&gt;
&lt;br /&gt;
[E2] http://en.wikipedia.org/wiki/Michael_Schroeder&lt;br /&gt;
&lt;br /&gt;
[E3] http://en.wikipedia.org/wiki/Biometric#Performance&lt;br /&gt;
&lt;br /&gt;
=='''References'''==&lt;br /&gt;
&lt;br /&gt;
[R1] http://www.cafesoft.com/support/security-glossary.html&lt;br /&gt;
&lt;br /&gt;
[R2] http://en.wikipedia.org/wiki/Biometrics&lt;br /&gt;
&lt;br /&gt;
[R3] [[Biometrics in Information Security]]&lt;br /&gt;
&lt;br /&gt;
[R4] Bishop, Matt. Introduction to Computer Security. Boston: Addison-Wesley, 2006.&lt;br /&gt;
&lt;br /&gt;
[R5] Jain, Anil K. Biometric Security System. Michigan, 2006.&lt;/div&gt;</summary>
		<author><name>Mad Doktor</name></author>	</entry>

	<entry>
		<id>http://wiki.cas.mcmaster.ca/index.php/Biometric_Systems_and_Security_Design_Principles</id>
		<title>Biometric Systems and Security Design Principles</title>
		<link rel="alternate" type="text/html" href="http://wiki.cas.mcmaster.ca/index.php/Biometric_Systems_and_Security_Design_Principles"/>
				<updated>2007-12-10T03:43:25Z</updated>
		
		<summary type="html">&lt;p&gt;Mad Doktor:&amp;#32;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;'''Analysis of Biometric Systems using Security Design Principles'''&lt;br /&gt;
&lt;br /&gt;
Biometric security systems&amp;lt;sup&amp;gt;[http://www.cafesoft.com/support/security-glossary.html R1]&amp;lt;/sup&amp;gt; are authentication mechanisms that bind an entity to a subject based on what the entity is, as opposed to what they know, what they have, or where they are.&lt;br /&gt;
&lt;br /&gt;
Within the past several years, biometric security systems have gained a lot of ground in terms of advancements in technology and widespread use however, there is still a lot of reluctance to adopt the technology worldwide&amp;lt;sup&amp;gt;[http://en.wikipedia.org/wiki/Biometrics#Issues_and_concerns R2]&amp;lt;/sup&amp;gt;. A look at biometric security systems through security design principles should provide a clearer understanding of its strengths and weaknesses in the implementation and design of biometric security systems.&lt;br /&gt;
[[Image:3dface.jpg|thumb|3D Face Recognition Software]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=='''Biometrics'''==&lt;br /&gt;
Biometrics is the identification of a person through automated measurements using biological or behavioural features&amp;lt;sup&amp;gt;[[Biometrics in Information Security#Types of Measurements|R3]]&amp;lt;/sup&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=='''Security Design Principles'''==&lt;br /&gt;
The following eight design principles were created by Salzter&amp;lt;sup&amp;gt;[http://en.wikipedia.org/wiki/Jerome_H._Saltzer E1]&amp;lt;/sup&amp;gt; and Schroeder&amp;lt;sup&amp;gt;[http://en.wikipedia.org/wiki/Michael_Schroeder E2]&amp;lt;/sup&amp;gt; for the design and implementation of security mechanisms. These design principles encompass technical details and human interaction that make designs and mechanisms easy to understand. They are also simple and easy to understand, which is why they will be used as a guide to analyze biometric security systems. The list of design principles are as follows:&lt;br /&gt;
&lt;br /&gt;
'''Principle of Least Privilege:'''&lt;br /&gt;
A subject should be given only those privileges that it needs in order to complete its task.&lt;br /&gt;
&lt;br /&gt;
'''Principle of Fails-Safe Defaults:'''&lt;br /&gt;
A subject should be denied access to an object unless the subject was given access.&lt;br /&gt;
&lt;br /&gt;
'''Principle of Economy of Mechanism:'''&lt;br /&gt;
Security mechanisms should be as simple as possible.&lt;br /&gt;
&lt;br /&gt;
'''Principle of Complete Mediation:'''&lt;br /&gt;
All accesses to objects are checked to ensure that they are allowed.&lt;br /&gt;
&lt;br /&gt;
'''Principle of Open Design:'''&lt;br /&gt;
Security of a mechanism should not depend on the secrecy of its design or implementation.&lt;br /&gt;
&lt;br /&gt;
'''Principle of Separation of Privilege:'''&lt;br /&gt;
A system should not grant permission based on a single condition.&lt;br /&gt;
&lt;br /&gt;
'''Principle of Least Common Mechanism:'''&lt;br /&gt;
Mechanisms used to access resources should not be shared.&lt;br /&gt;
&lt;br /&gt;
'''Principle of Psychological Acceptability:'''&lt;br /&gt;
Security mechanisms should not make the resource more difficult to access than if the security mechanisms were not present.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=='''Breaking a Biometrics Security System'''==&lt;br /&gt;
In addition to looking at biometric security systems from a design and implementation perspective, understanding a biometrics security system from an attacker’s perspective is also important. In general, there are seven different types of attacks. These types of attacks are categorized by their attacks on a specific part of the design. They can be divided into the following:&lt;br /&gt;
&lt;br /&gt;
'''Type 1:''' Fake biometric sensor&lt;br /&gt;
&lt;br /&gt;
'''Type 2:''' Replay attacks&lt;br /&gt;
&lt;br /&gt;
'''Type 3:''' Trojan horse program at feature extractor&lt;br /&gt;
&lt;br /&gt;
'''Type 4:''' Real features replaced by synthetic features.&lt;br /&gt;
&lt;br /&gt;
'''Type 5:''' Trojan horse program at matcher.&lt;br /&gt;
&lt;br /&gt;
'''Type 6:''' Attacks modifying database of templates.&lt;br /&gt;
&lt;br /&gt;
'''Type 7:''' Results overridden.&lt;br /&gt;
&lt;br /&gt;
[[Image:biometric_attacks.jpg|Types of attacks available on a biometric security system]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=='''Analysis'''==&lt;br /&gt;
&lt;br /&gt;
===Principle of Least Privilege===&lt;br /&gt;
The design of the biometric security system itself is very linear hence, only the channels themselves need to be protected. This means that overall, processes cannot be accessed past the sensor if the sensor themselves have not been used. From this perspective, the design is secure. However, the system is still vulnerable from all attacks that attack each process directly (type 3, 5, and 6 attacks).&lt;br /&gt;
&lt;br /&gt;
===Principle of Fail-Safe Default===&lt;br /&gt;
The principle of fail-safe default is an excellent principle to follow for security mechanisms, but it falls short due to an implicit assumption within the principle itself. The principle assumes that security mechanisms will always work perfectly if all the requirements are passed. However, with biometric security systems, that is not the case. Biometric security systems are not perfect so they don’t always pass legitimate users and at the same time, they also pass the invalid users as well.&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot; align=center&lt;br /&gt;
|+ '''Chart of Biometric Systems Error Rates&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
! Biometrics &lt;br /&gt;
&lt;br /&gt;
! EER&lt;br /&gt;
&lt;br /&gt;
! FAR&lt;br /&gt;
&lt;br /&gt;
! FRR&lt;br /&gt;
&lt;br /&gt;
! Subjects&lt;br /&gt;
&lt;br /&gt;
! Comment&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
| Face&lt;br /&gt;
&lt;br /&gt;
| n/a&lt;br /&gt;
&lt;br /&gt;
| 1 %&lt;br /&gt;
&lt;br /&gt;
| 10 %&lt;br /&gt;
&lt;br /&gt;
| 37437&lt;br /&gt;
&lt;br /&gt;
| Varied lighting, indoor/outdoor&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
| Fingerprints&lt;br /&gt;
&lt;br /&gt;
| 2 %&lt;br /&gt;
&lt;br /&gt;
| 2 %&lt;br /&gt;
&lt;br /&gt;
| 2 %&lt;br /&gt;
&lt;br /&gt;
| 100&lt;br /&gt;
&lt;br /&gt;
| Rotation and exaggerated skin distortion&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
| Hand geometry&lt;br /&gt;
&lt;br /&gt;
| 1 %&lt;br /&gt;
&lt;br /&gt;
| 2 %&lt;br /&gt;
&lt;br /&gt;
| 0.1 %&lt;br /&gt;
&lt;br /&gt;
| 129&lt;br /&gt;
&lt;br /&gt;
| With rings and improper placement&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
| Iris&lt;br /&gt;
&lt;br /&gt;
| &amp;lt; 1 %&lt;br /&gt;
&lt;br /&gt;
| 0.94 %&lt;br /&gt;
&lt;br /&gt;
| 0.99 %&lt;br /&gt;
&lt;br /&gt;
| 1224&lt;br /&gt;
&lt;br /&gt;
| Indoor Environment&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
| Iris&lt;br /&gt;
&lt;br /&gt;
| 0.01 %&lt;br /&gt;
&lt;br /&gt;
| 0.0001 %&lt;br /&gt;
&lt;br /&gt;
| 0.2 %&lt;br /&gt;
&lt;br /&gt;
| 132&lt;br /&gt;
&lt;br /&gt;
| Best conditions&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
| Keystrokes&lt;br /&gt;
&lt;br /&gt;
| 1.8 %&lt;br /&gt;
&lt;br /&gt;
| 7 %&lt;br /&gt;
&lt;br /&gt;
| 0.1 %&lt;br /&gt;
&lt;br /&gt;
| 15&lt;br /&gt;
&lt;br /&gt;
| During 6 months period&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
| Voice&lt;br /&gt;
&lt;br /&gt;
| 6 %&lt;br /&gt;
&lt;br /&gt;
| 2 %&lt;br /&gt;
&lt;br /&gt;
| 10 %&lt;br /&gt;
&lt;br /&gt;
| 310&lt;br /&gt;
&lt;br /&gt;
| Text independent, multilingual&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
===Principle of Economy of Mechanism===&lt;br /&gt;
In the design of the biometric security systems, each channel must be encrypted and each state must be protected. This means that overall, the design must contain at least four encryption mechanisms must be used for each channel, and at least five security mechanisms for the five states.&lt;br /&gt;
&lt;br /&gt;
The quantity of states and channels involved means that there are a high number of security mechanisms involved which means that security of the overall design is quite complex. This violates the principle of economy of mechanism, but the security of each channel and state may not be as complex as the design, depending on the implementation.&lt;br /&gt;
&lt;br /&gt;
===Principle of Complete Mediation===&lt;br /&gt;
Depending on the implementation, as long as each channel is encrypted with several layers of protection, it does not violate the principle. However, the problem comes from the human side and the issue arises when people try to replace current authentication mechanism such as password systems with biometric security systems.&lt;br /&gt;
&lt;br /&gt;
For example, new laptops with the Windows operating system have been released with biometric security systems. On the Windows login page, there are two logins available, the password system or the biometric system, and the user only has to use one of them to login, a clear violation of the principle of complete mediation.&lt;br /&gt;
&lt;br /&gt;
===Principle of Open Design===&lt;br /&gt;
The design of the biometric security is acceptable but the weakness is easily identified. The weakness of the design lies in the storage of the templates, which to this day, remains a difficult issue. Two options are available, a centralized data bank or decentralized servers to store all the templates.&lt;br /&gt;
&lt;br /&gt;
The design violates the principle not because the design is shrouded in secrecy but because the design itself is weak. This issue can be solved in the future by having a stronger design.&lt;br /&gt;
&lt;br /&gt;
===Principle of Separation of Privilege===&lt;br /&gt;
&lt;br /&gt;
It is common knowledge that a system is not secure if only one security mechanism is used, so an obvious solution is to have multiple security mechanisms. The issue arises when multiple biometric security systems are used. For example, fingerprints and retinas are used together. However, the problem is similar to those of the principle of fail-safe defaults. It assume that security mechanism work when they are supposed to work, but by increasing the types of biometrics required, the number of FARs (false acceptance rates) and FRRs (false rejection rates) increase as well.&lt;br /&gt;
	Cite examples.&lt;br /&gt;
&lt;br /&gt;
===Principle of Least Common Mechanism===&lt;br /&gt;
&lt;br /&gt;
Again, the design is simple due to its rather linear structure. However, in order for the security system to work, there must be a step in which users are enrolled, so that features can be stored. To cut costs, that enrolment system is typically a part of the authentication mechanism. This means that the biometric security system is more opened to attacks because another channel (between feature extractor and the template bank) must be encrypted, making the design more complicated, and the attacker has another option to attack the template bank.&lt;br /&gt;
&lt;br /&gt;
===Principle of Psychological Acceptability===&lt;br /&gt;
&lt;br /&gt;
The big reason why biometric security systems are so popular is that from an end-user perspective, they are the simplest security mechanisms to use. The user does not require any sort of knowledge of passwords to use, since it depends on either physiological or behavioural traits. However, if it fails, due to the FARs and FRRs, such a problem can be extremely annoying since it is not easy to remedy unless there is an alternative login method, which of course, defeats the purpose of having a biometric authentication method.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=='''Conclusion'''==&lt;br /&gt;
&lt;br /&gt;
A lot of the faults of a biometric security system are due to current biometric technology. It is simply not advanced enough because the errors in identifying valid and invalid users are still too big, even though it may be as small as 0.01%.&lt;br /&gt;
&lt;br /&gt;
Another issue involves the weak design. As a concept, it is simple, but to implement the design, it requires a lot of encryption and security mechanisms. Also, the design highlights a weakness in storage of the templates. Just like storage of passwords, storage of the templates carries even more risks, because stolen templates could potentially mean a stolen identity.&lt;br /&gt;
&lt;br /&gt;
Also, the current thought regarding biometric security systems is that they are the way of the future, meaning they are to replace current security mechanisms, but as shown above, that is terrible because there are still too many weaknesses, including the fact that not everyone can use such a system either.&lt;br /&gt;
&lt;br /&gt;
However, it is so popular because it is so simple to use and requires almost no effort. Hence, biometric security systems should only be used as a supplement to current security systems, not a replacement.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=='''See Also'''==&lt;br /&gt;
[http://www.cas.mcmaster.ca/wiki/index.php/Biometrics_in_Information_Security Biometrics in Information Security]&lt;br /&gt;
&lt;br /&gt;
[http://www.cas.mcmaster.ca/wiki/index.php/Identity_Theft Identity Theft]&lt;br /&gt;
&lt;br /&gt;
[http://www.cas.mcmaster.ca/wiki/index.php/Operating_Systems_Security Operating Systems Security]&lt;br /&gt;
&lt;br /&gt;
[http://www.cas.mcmaster.ca/wiki/index.php/The_Mitnick_attack The Mitnick Attack]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=='''External Links'''==&lt;br /&gt;
&lt;br /&gt;
[E1] http://en.wikipedia.org/wiki/Jerome_H._Saltzer&lt;br /&gt;
&lt;br /&gt;
[E2] http://en.wikipedia.org/wiki/Michael_Schroeder&lt;br /&gt;
&lt;br /&gt;
=='''References'''==&lt;br /&gt;
&lt;br /&gt;
[R1] http://www.cafesoft.com/support/security-glossary.html&lt;br /&gt;
&lt;br /&gt;
[R2] http://en.wikipedia.org/wiki/Biometrics&lt;br /&gt;
&lt;br /&gt;
[R3] [[Biometrics in Information Security]]&lt;/div&gt;</summary>
		<author><name>Mad Doktor</name></author>	</entry>

	<entry>
		<id>http://wiki.cas.mcmaster.ca/index.php/Biometric_Systems_and_Security_Design_Principles</id>
		<title>Biometric Systems and Security Design Principles</title>
		<link rel="alternate" type="text/html" href="http://wiki.cas.mcmaster.ca/index.php/Biometric_Systems_and_Security_Design_Principles"/>
				<updated>2007-12-08T20:23:17Z</updated>
		
		<summary type="html">&lt;p&gt;Mad Doktor:&amp;#32;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;'''Analysis of Biometric Systems using Security Design Principles'''&lt;br /&gt;
&lt;br /&gt;
Biometric security systems are authentication mechanisms that bind an entity to a subject based on what the entity is, as opposed to what they know, what they have, or where they are.&lt;br /&gt;
Within the past several years, biometric security systems have gained a lot of ground in terms of advancements in technology and widespread use. However, there is still a lot of reluctance to adopt the technology worldwide. A look at biometric security systems through security design principles should provide a clearer understanding of its strengths and weaknesses in the implementation and design of biometric security systems.&lt;br /&gt;
[[Image:3dface.jpg|thumb|3D Face Recognition Software]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=='''Biometrics'''==&lt;br /&gt;
Biometrics is the identification of a person through automated measurements using biological or behavioural features.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=='''Security Design Principles'''==&lt;br /&gt;
The following eight design principles were created by Saltzer and Shroeder for the design and implementation of security mechanisms. These design principles encompass technical details and human interaction. They are also simple and easy to understand, which is why they will be used as a guide to analyze biometric security systems. The list of design principles are as follows:&lt;br /&gt;
&lt;br /&gt;
'''Principle of Least Privilege:'''&lt;br /&gt;
A subject should be given only those privileges that it needs in order to complete its task.&lt;br /&gt;
&lt;br /&gt;
'''Principle of Fails-Safe Defaults:'''&lt;br /&gt;
A subject should be denied access to an object unless the subject was given access.&lt;br /&gt;
&lt;br /&gt;
'''Principle of Economy of Mechanism:'''&lt;br /&gt;
Security mechanisms should be as simple as possible.&lt;br /&gt;
&lt;br /&gt;
'''Principle of Complete Mediation:'''&lt;br /&gt;
All accesses to objects are checked to ensure that they are allowed.&lt;br /&gt;
&lt;br /&gt;
'''Principle of Open Design:'''&lt;br /&gt;
Security of a mechanism should not depend on the secrecy of its design or implementation.&lt;br /&gt;
&lt;br /&gt;
'''Principle of Separation of Privilege:'''&lt;br /&gt;
A system should not grant permission based on a single condition.&lt;br /&gt;
&lt;br /&gt;
'''Principle of Least Common Mechanism:'''&lt;br /&gt;
Mechanisms used to access resources should not be shared.&lt;br /&gt;
&lt;br /&gt;
'''Principle of Psychological Acceptability:'''&lt;br /&gt;
Security mechanisms should not make the resource more difficult to access than if the security mechanisms were not present.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=='''Breaking a Biometrics Security System'''==&lt;br /&gt;
In addition to looking at biometric security systems from a design and implementation perspective, understanding a biometrics security system from an attacker’s perspective is also important. In general, there are seven different types of attacks. These types of attacks are categorized by their attacks on a specific part of the design. They can be divided into the following:&lt;br /&gt;
&lt;br /&gt;
'''Type 1:''' Fake biometric sensor&lt;br /&gt;
&lt;br /&gt;
'''Type 2:''' Replay attacks&lt;br /&gt;
&lt;br /&gt;
'''Type 3:''' Trojan horse program at feature extractor&lt;br /&gt;
&lt;br /&gt;
'''Type 4:''' Real features replaced by synthetic features.&lt;br /&gt;
&lt;br /&gt;
'''Type 5:''' Trojan horse program at matcher.&lt;br /&gt;
&lt;br /&gt;
'''Type 6:''' Attacks modifying database of templates.&lt;br /&gt;
&lt;br /&gt;
'''Type 7:''' Results overridden.&lt;br /&gt;
&lt;br /&gt;
[[Image:biometric_attacks.jpg|Types of attacks available on a biometric security system]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=='''Analysis'''==&lt;br /&gt;
&lt;br /&gt;
===Principle of Least Privilege===&lt;br /&gt;
The design of the biometric security system itself is very linear hence, only the channels themselves need to be protected. This means that overall, processes cannot be accessed past the sensor if the sensor themselves have not been used. From this perspective, the design is secure. However, the system is still vulnerable from all attacks that attack each process directly (type 3, 5, and 6 attacks).&lt;br /&gt;
&lt;br /&gt;
===Principle of Fail-Safe Default===&lt;br /&gt;
The principle of fail-safe default is an excellent principle to follow for security mechanisms, but it falls short due to an implicit assumption within the principle itself. The principle assumes that security mechanisms will always work perfectly if all the requirements are passed. However, with biometric security systems, that is not the case. Biometric security systems are not perfect so they don’t always pass legitimate users and at the same time, they also pass the invalid users as well.&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot; align=center&lt;br /&gt;
|+ '''Chart of Biometric Systems Error Rates&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
! Biometrics &lt;br /&gt;
&lt;br /&gt;
! EER&lt;br /&gt;
&lt;br /&gt;
! FAR&lt;br /&gt;
&lt;br /&gt;
! FRR&lt;br /&gt;
&lt;br /&gt;
! Subjects&lt;br /&gt;
&lt;br /&gt;
! Comment&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
| Face&lt;br /&gt;
&lt;br /&gt;
| n/a&lt;br /&gt;
&lt;br /&gt;
| 1 %&lt;br /&gt;
&lt;br /&gt;
| 10 %&lt;br /&gt;
&lt;br /&gt;
| 37437&lt;br /&gt;
&lt;br /&gt;
| Varied lighting, indoor/outdoor&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
| Fingerprints&lt;br /&gt;
&lt;br /&gt;
| 2 %&lt;br /&gt;
&lt;br /&gt;
| 2 %&lt;br /&gt;
&lt;br /&gt;
| 2 %&lt;br /&gt;
&lt;br /&gt;
| 100&lt;br /&gt;
&lt;br /&gt;
| Rotation and exaggerated skin distortion&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
| Hand geometry&lt;br /&gt;
&lt;br /&gt;
| 1 %&lt;br /&gt;
&lt;br /&gt;
| 2 %&lt;br /&gt;
&lt;br /&gt;
| 0.1 %&lt;br /&gt;
&lt;br /&gt;
| 129&lt;br /&gt;
&lt;br /&gt;
| With rings and improper placement&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
| Iris&lt;br /&gt;
&lt;br /&gt;
| &amp;lt; 1 %&lt;br /&gt;
&lt;br /&gt;
| 0.94 %&lt;br /&gt;
&lt;br /&gt;
| 0.99 %&lt;br /&gt;
&lt;br /&gt;
| 1224&lt;br /&gt;
&lt;br /&gt;
| Indoor Environment&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
| Iris&lt;br /&gt;
&lt;br /&gt;
| 0.01 %&lt;br /&gt;
&lt;br /&gt;
| 0.0001 %&lt;br /&gt;
&lt;br /&gt;
| 0.2 %&lt;br /&gt;
&lt;br /&gt;
| 132&lt;br /&gt;
&lt;br /&gt;
| Best conditions&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
| Keystrokes&lt;br /&gt;
&lt;br /&gt;
| 1.8 %&lt;br /&gt;
&lt;br /&gt;
| 7 %&lt;br /&gt;
&lt;br /&gt;
| 0.1 %&lt;br /&gt;
&lt;br /&gt;
| 15&lt;br /&gt;
&lt;br /&gt;
| During 6 months period&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
| Voice&lt;br /&gt;
&lt;br /&gt;
| 6 %&lt;br /&gt;
&lt;br /&gt;
| 2 %&lt;br /&gt;
&lt;br /&gt;
| 10 %&lt;br /&gt;
&lt;br /&gt;
| 310&lt;br /&gt;
&lt;br /&gt;
| Text independent, multilingual&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
===Principle of Economy of Mechanism===&lt;br /&gt;
In the design of the biometric security systems, each channel must be encrypted and each state must be protected. This means that overall, the design must contain at least four encryption mechanisms must be used for each channel, and at least five security mechanisms for the five states.&lt;br /&gt;
&lt;br /&gt;
The quantity of states and channels involved means that there are a high number of security mechanisms involved which means that security of the overall design is quite complex. This violates the principle of economy of mechanism, but the security of each channel and state may not be as complex as the design, depending on the implementation.&lt;br /&gt;
&lt;br /&gt;
===Principle of Complete Mediation===&lt;br /&gt;
Depending on the implementation, as long as each channel is encrypted with several layers of protection, it does not violate the principle. However, the problem comes from the human side and the issue arises when people try to replace current authentication mechanism such as password systems with biometric security systems.&lt;br /&gt;
&lt;br /&gt;
For example, new laptops with the Windows operating system have been released with biometric security systems. On the Windows login page, there are two logins available, the password system or the biometric system, and the user only has to use one of them to login, a clear violation of the principle of complete mediation.&lt;br /&gt;
&lt;br /&gt;
===Principle of Open Design===&lt;br /&gt;
The design of the biometric security is acceptable but the weakness is easily identified. The weakness of the design lies in the storage of the templates, which to this day, remains a difficult issue. Two options are available, a centralized data bank or decentralized servers to store all the templates.&lt;br /&gt;
&lt;br /&gt;
The design violates the principle not because the design is shrouded in secrecy but because the design itself is weak. This issue can be solved in the future by having a stronger design.&lt;br /&gt;
&lt;br /&gt;
===Principle of Separation of Privilege===&lt;br /&gt;
&lt;br /&gt;
It is common knowledge that a system is not secure if only one security mechanism is used, so an obvious solution is to have multiple security mechanisms. The issue arises when multiple biometric security systems are used. For example, fingerprints and retinas are used together. However, the problem is similar to those of the principle of fail-safe defaults. It assume that security mechanism work when they are supposed to work, but by increasing the types of biometrics required, the number of FARs (false acceptance rates) and FRRs (false rejection rates) increase as well.&lt;br /&gt;
	Cite examples.&lt;br /&gt;
&lt;br /&gt;
===Principle of Least Common Mechanism===&lt;br /&gt;
&lt;br /&gt;
Again, the design is simple due to its rather linear structure. However, in order for the security system to work, there must be a step in which users are enrolled, so that features can be stored. To cut costs, that enrolment system is typically a part of the authentication mechanism. This means that the biometric security system is more opened to attacks because another channel (between feature extractor and the template bank) must be encrypted, making the design more complicated, and the attacker has another option to attack the template bank.&lt;br /&gt;
&lt;br /&gt;
===Principle of Psychological Acceptability===&lt;br /&gt;
&lt;br /&gt;
The big reason why biometric security systems are so popular is that from an end-user perspective, they are the simplest security mechanisms to use. The user does not require any sort of knowledge of passwords to use, since it depends on either physiological or behavioural traits. However, if it fails, due to the FARs and FRRs, such a problem can be extremely annoying since it is not easy to remedy unless there is an alternative login method, which of course, defeats the purpose of having a biometric authentication method.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=='''Conclusion'''==&lt;br /&gt;
&lt;br /&gt;
A lot of the faults of a biometric security system are due to current biometric technology. It is simply not advanced enough because the errors in identifying valid and invalid users are still too big, even though it may be as small as 0.01%.&lt;br /&gt;
&lt;br /&gt;
Another issue involves the weak design. As a concept, it is simple, but to implement the design, it requires a lot of encryption and security mechanisms. Also, the design highlights a weakness in storage of the templates. Just like storage of passwords, storage of the templates carries even more risks, because stolen templates could potentially mean a stolen identity.&lt;br /&gt;
&lt;br /&gt;
Also, the current thought regarding biometric security systems is that they are the way of the future, meaning they are to replace current security mechanisms, but as shown above, that is terrible because there are still too many weaknesses, including the fact that not everyone can use such a system either.&lt;br /&gt;
&lt;br /&gt;
However, it is so popular because it is so simple to use and requires almost no effort. Hence, biometric security systems should only be used as a supplement to current security systems, not a replacement.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=='''See Also'''==&lt;br /&gt;
[1] [http://www.cas.mcmaster.ca/wiki/index.php/Biometrics_in_Information_Security Biometrics in Information Security]&lt;br /&gt;
&lt;br /&gt;
[2] [http://www.cas.mcmaster.ca/wiki/index.php/Identity_Theft Identity Theft]&lt;br /&gt;
&lt;br /&gt;
[3] [http://www.cas.mcmaster.ca/wiki/index.php/Operating_Systems_Security Operating Systems Security]&lt;br /&gt;
&lt;br /&gt;
[4] [http://www.cas.mcmaster.ca/wiki/index.php/The_Mitnick_attack The Mitnick Attack]&lt;br /&gt;
&lt;br /&gt;
=='''References'''==&lt;/div&gt;</summary>
		<author><name>Mad Doktor</name></author>	</entry>

	<entry>
		<id>http://wiki.cas.mcmaster.ca/index.php/Biometric_Systems_and_Security_Design_Principles</id>
		<title>Biometric Systems and Security Design Principles</title>
		<link rel="alternate" type="text/html" href="http://wiki.cas.mcmaster.ca/index.php/Biometric_Systems_and_Security_Design_Principles"/>
				<updated>2007-12-08T20:15:04Z</updated>
		
		<summary type="html">&lt;p&gt;Mad Doktor:&amp;#32;/* See Also */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;'''Analysis of Biometric Systems using Security Design Principles'''&lt;br /&gt;
&lt;br /&gt;
Biometric security systems are authentication mechanisms that bind an entity to a subject based on what the entity is, as opposed to what they know, what they have, or where they are.&lt;br /&gt;
Within the past several years, biometric security systems have gained a lot of ground in terms of advancements in technology and widespread use. However, there is still a lot of reluctance to adopt the technology worldwide. A look at biometric security systems through security design principles should provide a clearer understanding of its strengths and weaknesses in the implementation and design of biometric security systems.&lt;br /&gt;
[[Image:3dface.jpg|thumb|3D Face Recognition Software]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Biometrics==&lt;br /&gt;
Biometrics is the identification of a person through automated measurements using biological or behavioural features.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Security Design Principles==&lt;br /&gt;
The following eight design principles were created by Saltzer and Shroeder for the design and implementation of security mechanisms. These design principles encompass technical details and human interaction. They are also simple and easy to understand, which is why they will be used as a guide to analyze biometric security systems. The list of design principles are as follows:&lt;br /&gt;
&lt;br /&gt;
'''Principle of Least Privilege:'''&lt;br /&gt;
A subject should be given only those privileges that it needs in order to complete its task.&lt;br /&gt;
&lt;br /&gt;
'''Principle of Fails-Safe Defaults:'''&lt;br /&gt;
A subject should be denied access to an object unless the subject was given access.&lt;br /&gt;
&lt;br /&gt;
'''Principle of Economy of Mechanism:'''&lt;br /&gt;
Security mechanisms should be as simple as possible.&lt;br /&gt;
&lt;br /&gt;
'''Principle of Complete Mediation:'''&lt;br /&gt;
All accesses to objects are checked to ensure that they are allowed.&lt;br /&gt;
&lt;br /&gt;
'''Principle of Open Design:'''&lt;br /&gt;
Security of a mechanism should not depend on the secrecy of its design or implementation.&lt;br /&gt;
&lt;br /&gt;
'''Principle of Separation of Privilege:'''&lt;br /&gt;
A system should not grant permission based on a single condition.&lt;br /&gt;
&lt;br /&gt;
'''Principle of Least Common Mechanism:'''&lt;br /&gt;
Mechanisms used to access resources should not be shared.&lt;br /&gt;
&lt;br /&gt;
'''Principle of Psychological Acceptability:'''&lt;br /&gt;
Security mechanisms should not make the resource more difficult to access than if the security mechanisms were not present.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Breaking a Biometrics Security System==&lt;br /&gt;
In addition to looking at biometric security systems from a design and implementation perspective, understanding a biometrics security system from an attacker’s perspective is also important. In general, there are seven different types of attacks. These types of attacks are categorized by their attacks on a specific part of the design. They can be divided into the following:&lt;br /&gt;
&lt;br /&gt;
'''Type 1:''' Fake biometric sensor&lt;br /&gt;
&lt;br /&gt;
'''Type 2:''' Replay attacks&lt;br /&gt;
&lt;br /&gt;
'''Type 3:''' Trojan horse program at feature extractor&lt;br /&gt;
&lt;br /&gt;
'''Type 4:''' Real features replaced by synthetic features.&lt;br /&gt;
&lt;br /&gt;
'''Type 5:''' Trojan horse program at matcher.&lt;br /&gt;
&lt;br /&gt;
'''Type 6:''' Attacks modifying database of templates.&lt;br /&gt;
&lt;br /&gt;
'''Type 7:''' Results overridden.&lt;br /&gt;
&lt;br /&gt;
[[Image:biometric_attacks.jpg|Types of attacks available on a biometric security system]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Analysis==&lt;br /&gt;
&lt;br /&gt;
===Principle of Least Privilege===&lt;br /&gt;
The design of the biometric security system itself is very linear hence, only the channels themselves need to be protected. This means that overall, processes cannot be accessed past the sensor if the sensor themselves have not been used. From this perspective, the design is secure. However, the system is still vulnerable from all attacks that attack each process directly (type 3, 5, and 6 attacks).&lt;br /&gt;
&lt;br /&gt;
===Principle of Fail-Safe Default===&lt;br /&gt;
The principle of fail-safe default is an excellent principle to follow for security mechanisms, but it falls short due to an implicit assumption within the principle itself. The principle assumes that security mechanisms will always work perfectly if all the requirements are passed. However, with biometric security systems, that is not the case. Biometric security systems are not perfect so they don’t always pass legitimate users and at the same time, they also pass the invalid users as well.&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot; align=center&lt;br /&gt;
|+ '''Chart of Biometric Systems Error Rates&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
! Biometrics &lt;br /&gt;
&lt;br /&gt;
! EER&lt;br /&gt;
&lt;br /&gt;
! FAR&lt;br /&gt;
&lt;br /&gt;
! FRR&lt;br /&gt;
&lt;br /&gt;
! Subjects&lt;br /&gt;
&lt;br /&gt;
! Comment&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
| Face&lt;br /&gt;
&lt;br /&gt;
| n/a&lt;br /&gt;
&lt;br /&gt;
| 1 %&lt;br /&gt;
&lt;br /&gt;
| 10 %&lt;br /&gt;
&lt;br /&gt;
| 37437&lt;br /&gt;
&lt;br /&gt;
| Varied lighting, indoor/outdoor&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
| Fingerprints&lt;br /&gt;
&lt;br /&gt;
| 2 %&lt;br /&gt;
&lt;br /&gt;
| 2 %&lt;br /&gt;
&lt;br /&gt;
| 2 %&lt;br /&gt;
&lt;br /&gt;
| 100&lt;br /&gt;
&lt;br /&gt;
| Rotation and exaggerated skin distortion&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
| Hand geometry&lt;br /&gt;
&lt;br /&gt;
| 1 %&lt;br /&gt;
&lt;br /&gt;
| 2 %&lt;br /&gt;
&lt;br /&gt;
| 0.1 %&lt;br /&gt;
&lt;br /&gt;
| 129&lt;br /&gt;
&lt;br /&gt;
| With rings and improper placement&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
| Iris&lt;br /&gt;
&lt;br /&gt;
| &amp;lt; 1 %&lt;br /&gt;
&lt;br /&gt;
| 0.94 %&lt;br /&gt;
&lt;br /&gt;
| 0.99 %&lt;br /&gt;
&lt;br /&gt;
| 1224&lt;br /&gt;
&lt;br /&gt;
| Indoor Environment&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
| Iris&lt;br /&gt;
&lt;br /&gt;
| 0.01 %&lt;br /&gt;
&lt;br /&gt;
| 0.0001 %&lt;br /&gt;
&lt;br /&gt;
| 0.2 %&lt;br /&gt;
&lt;br /&gt;
| 132&lt;br /&gt;
&lt;br /&gt;
| Best conditions&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
| Keystrokes&lt;br /&gt;
&lt;br /&gt;
| 1.8 %&lt;br /&gt;
&lt;br /&gt;
| 7 %&lt;br /&gt;
&lt;br /&gt;
| 0.1 %&lt;br /&gt;
&lt;br /&gt;
| 15&lt;br /&gt;
&lt;br /&gt;
| During 6 months period&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
| Voice&lt;br /&gt;
&lt;br /&gt;
| 6 %&lt;br /&gt;
&lt;br /&gt;
| 2 %&lt;br /&gt;
&lt;br /&gt;
| 10 %&lt;br /&gt;
&lt;br /&gt;
| 310&lt;br /&gt;
&lt;br /&gt;
| Text independent, multilingual&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
===Principle of Economy of Mechanism===&lt;br /&gt;
In the design of the biometric security systems, each channel must be encrypted and each state must be protected. This means that overall, the design must contain at least four encryption mechanisms must be used for each channel, and at least five security mechanisms for the five states.&lt;br /&gt;
&lt;br /&gt;
The quantity of states and channels involved means that there are a high number of security mechanisms involved which means that security of the overall design is quite complex. This violates the principle of economy of mechanism, but the security of each channel and state may not be as complex as the design, depending on the implementation.&lt;br /&gt;
&lt;br /&gt;
===Principle of Complete Mediation===&lt;br /&gt;
Depending on the implementation, as long as each channel is encrypted with several layers of protection, it does not violate the principle. However, the problem comes from the human side and the issue arises when people try to replace current authentication mechanism such as password systems with biometric security systems.&lt;br /&gt;
&lt;br /&gt;
For example, new laptops with the Windows operating system have been released with biometric security systems. On the Windows login page, there are two logins available, the password system or the biometric system, and the user only has to use one of them to login, a clear violation of the principle of complete mediation.&lt;br /&gt;
&lt;br /&gt;
===Principle of Open Design===&lt;br /&gt;
The design of the biometric security is acceptable but the weakness is easily identified. The weakness of the design lies in the storage of the templates, which to this day, remains a difficult issue. Two options are available, a centralized data bank or decentralized servers to store all the templates.&lt;br /&gt;
&lt;br /&gt;
The design violates the principle not because the design is shrouded in secrecy but because the design itself is weak. This issue can be solved in the future by having a stronger design.&lt;br /&gt;
&lt;br /&gt;
===Principle of Separation of Privilege===&lt;br /&gt;
&lt;br /&gt;
It is common knowledge that a system is not secure if only one security mechanism is used, so an obvious solution is to have multiple security mechanisms. The issue arises when multiple biometric security systems are used. For example, fingerprints and retinas are used together. However, the problem is similar to those of the principle of fail-safe defaults. It assume that security mechanism work when they are supposed to work, but by increasing the types of biometrics required, the number of FARs (false acceptance rates) and FRRs (false rejection rates) increase as well.&lt;br /&gt;
	Cite examples.&lt;br /&gt;
&lt;br /&gt;
===Principle of Least Common Mechanism===&lt;br /&gt;
&lt;br /&gt;
Again, the design is simple due to its rather linear structure. However, in order for the security system to work, there must be a step in which users are enrolled, so that features can be stored. To cut costs, that enrolment system is typically a part of the authentication mechanism. This means that the biometric security system is more opened to attacks because another channel (between feature extractor and the template bank) must be encrypted, making the design more complicated, and the attacker has another option to attack the template bank.&lt;br /&gt;
&lt;br /&gt;
===Principle of Psychological Acceptability===&lt;br /&gt;
&lt;br /&gt;
The big reason why biometric security systems are so popular is that from an end-user perspective, they are the simplest security mechanisms to use. The user does not require any sort of knowledge of passwords to use, since it depends on either physiological or behavioural traits. However, if it fails, due to the FARs and FRRs, such a problem can be extremely annoying since it is not easy to remedy unless there is an alternative login method, which of course, defeats the purpose of having a biometric authentication method.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Conclusion==&lt;br /&gt;
&lt;br /&gt;
A lot of the faults of a biometric security system are due to current biometric technology. It is simply not advanced enough because the errors in identifying valid and invalid users are still too big, even though it may be as small as 0.01%.&lt;br /&gt;
&lt;br /&gt;
Another issue involves the weak design. As a concept, it is simple, but to implement the design, it requires a lot of encryption and security mechanisms. Also, the design highlights a weakness in storage of the templates. Just like storage of passwords, storage of the templates carries even more risks, because stolen templates could potentially mean a stolen identity.&lt;br /&gt;
&lt;br /&gt;
Also, the current thought regarding biometric security systems is that they are the way of the future, meaning they are to replace current security mechanisms, but as shown above, that is terrible because there are still too many weaknesses, including the fact that not everyone can use such a system either.&lt;br /&gt;
&lt;br /&gt;
However, it is so popular because it is so simple to use and requires almost no effort. Hence, biometric security systems should only be used as a supplement to current security systems, not a replacement.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==See Also==&lt;br /&gt;
[1] [http://www.cas.mcmaster.ca/wiki/index.php/Biometrics_in_Information_Security Biometrics in Information Security]&lt;br /&gt;
&lt;br /&gt;
[2] [http://www.cas.mcmaster.ca/wiki/index.php/Identity_Theft Identity Theft]&lt;br /&gt;
&lt;br /&gt;
[3] [http://www.cas.mcmaster.ca/wiki/index.php/Operating_Systems_Security Operating Systems Security]&lt;br /&gt;
&lt;br /&gt;
[4] [http://www.cas.mcmaster.ca/wiki/index.php/The_Mitnick_attack The Mitnick Attack]&lt;br /&gt;
&lt;br /&gt;
==References==&lt;/div&gt;</summary>
		<author><name>Mad Doktor</name></author>	</entry>

	<entry>
		<id>http://wiki.cas.mcmaster.ca/index.php/Biometric_systems_regarding_security_design_principle</id>
		<title>Biometric systems regarding security design principle</title>
		<link rel="alternate" type="text/html" href="http://wiki.cas.mcmaster.ca/index.php/Biometric_systems_regarding_security_design_principle"/>
				<updated>2007-12-08T20:11:56Z</updated>
		
		<summary type="html">&lt;p&gt;Mad Doktor:&amp;#32;Biometric systems regarding security design principle moved to Biometric Systems and Security Design Principles: Incorrect title due to grammatical errors.&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;#REDIRECT [[Biometric Systems and Security Design Principles]]&lt;/div&gt;</summary>
		<author><name>Mad Doktor</name></author>	</entry>

	<entry>
		<id>http://wiki.cas.mcmaster.ca/index.php/Biometric_Systems_and_Security_Design_Principles</id>
		<title>Biometric Systems and Security Design Principles</title>
		<link rel="alternate" type="text/html" href="http://wiki.cas.mcmaster.ca/index.php/Biometric_Systems_and_Security_Design_Principles"/>
				<updated>2007-12-08T20:11:56Z</updated>
		
		<summary type="html">&lt;p&gt;Mad Doktor:&amp;#32;Biometric systems regarding security design principle moved to Biometric Systems and Security Design Principles: Incorrect title due to grammatical errors.&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;'''Analysis of Biometric Systems using Security Design Principles'''&lt;br /&gt;
&lt;br /&gt;
Biometric security systems are authentication mechanisms that bind an entity to a subject based on what the entity is, as opposed to what they know, what they have, or where they are.&lt;br /&gt;
Within the past several years, biometric security systems have gained a lot of ground in terms of advancements in technology and widespread use. However, there is still a lot of reluctance to adopt the technology worldwide. A look at biometric security systems through security design principles should provide a clearer understanding of its strengths and weaknesses in the implementation and design of biometric security systems.&lt;br /&gt;
[[Image:3dface.jpg|thumb|3D Face Recognition Software]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Biometrics==&lt;br /&gt;
Biometrics is the identification of a person through automated measurements using biological or behavioural features.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Security Design Principles==&lt;br /&gt;
The following eight design principles were created by Saltzer and Shroeder for the design and implementation of security mechanisms. These design principles encompass technical details and human interaction. They are also simple and easy to understand, which is why they will be used as a guide to analyze biometric security systems. The list of design principles are as follows:&lt;br /&gt;
&lt;br /&gt;
'''Principle of Least Privilege:'''&lt;br /&gt;
A subject should be given only those privileges that it needs in order to complete its task.&lt;br /&gt;
&lt;br /&gt;
'''Principle of Fails-Safe Defaults:'''&lt;br /&gt;
A subject should be denied access to an object unless the subject was given access.&lt;br /&gt;
&lt;br /&gt;
'''Principle of Economy of Mechanism:'''&lt;br /&gt;
Security mechanisms should be as simple as possible.&lt;br /&gt;
&lt;br /&gt;
'''Principle of Complete Mediation:'''&lt;br /&gt;
All accesses to objects are checked to ensure that they are allowed.&lt;br /&gt;
&lt;br /&gt;
'''Principle of Open Design:'''&lt;br /&gt;
Security of a mechanism should not depend on the secrecy of its design or implementation.&lt;br /&gt;
&lt;br /&gt;
'''Principle of Separation of Privilege:'''&lt;br /&gt;
A system should not grant permission based on a single condition.&lt;br /&gt;
&lt;br /&gt;
'''Principle of Least Common Mechanism:'''&lt;br /&gt;
Mechanisms used to access resources should not be shared.&lt;br /&gt;
&lt;br /&gt;
'''Principle of Psychological Acceptability:'''&lt;br /&gt;
Security mechanisms should not make the resource more difficult to access than if the security mechanisms were not present.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Breaking a Biometrics Security System==&lt;br /&gt;
In addition to looking at biometric security systems from a design and implementation perspective, understanding a biometrics security system from an attacker’s perspective is also important. In general, there are seven different types of attacks. These types of attacks are categorized by their attacks on a specific part of the design. They can be divided into the following:&lt;br /&gt;
&lt;br /&gt;
'''Type 1:''' Fake biometric sensor&lt;br /&gt;
&lt;br /&gt;
'''Type 2:''' Replay attacks&lt;br /&gt;
&lt;br /&gt;
'''Type 3:''' Trojan horse program at feature extractor&lt;br /&gt;
&lt;br /&gt;
'''Type 4:''' Real features replaced by synthetic features.&lt;br /&gt;
&lt;br /&gt;
'''Type 5:''' Trojan horse program at matcher.&lt;br /&gt;
&lt;br /&gt;
'''Type 6:''' Attacks modifying database of templates.&lt;br /&gt;
&lt;br /&gt;
'''Type 7:''' Results overridden.&lt;br /&gt;
&lt;br /&gt;
[[Image:biometric_attacks.jpg|Types of attacks available on a biometric security system]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Analysis==&lt;br /&gt;
&lt;br /&gt;
===Principle of Least Privilege===&lt;br /&gt;
The design of the biometric security system itself is very linear hence, only the channels themselves need to be protected. This means that overall, processes cannot be accessed past the sensor if the sensor themselves have not been used. From this perspective, the design is secure. However, the system is still vulnerable from all attacks that attack each process directly (type 3, 5, and 6 attacks).&lt;br /&gt;
&lt;br /&gt;
===Principle of Fail-Safe Default===&lt;br /&gt;
The principle of fail-safe default is an excellent principle to follow for security mechanisms, but it falls short due to an implicit assumption within the principle itself. The principle assumes that security mechanisms will always work perfectly if all the requirements are passed. However, with biometric security systems, that is not the case. Biometric security systems are not perfect so they don’t always pass legitimate users and at the same time, they also pass the invalid users as well.&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot; align=center&lt;br /&gt;
|+ '''Chart of Biometric Systems Error Rates&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
! Biometrics &lt;br /&gt;
&lt;br /&gt;
! EER&lt;br /&gt;
&lt;br /&gt;
! FAR&lt;br /&gt;
&lt;br /&gt;
! FRR&lt;br /&gt;
&lt;br /&gt;
! Subjects&lt;br /&gt;
&lt;br /&gt;
! Comment&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
| Face&lt;br /&gt;
&lt;br /&gt;
| n/a&lt;br /&gt;
&lt;br /&gt;
| 1 %&lt;br /&gt;
&lt;br /&gt;
| 10 %&lt;br /&gt;
&lt;br /&gt;
| 37437&lt;br /&gt;
&lt;br /&gt;
| Varied lighting, indoor/outdoor&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
| Fingerprints&lt;br /&gt;
&lt;br /&gt;
| 2 %&lt;br /&gt;
&lt;br /&gt;
| 2 %&lt;br /&gt;
&lt;br /&gt;
| 2 %&lt;br /&gt;
&lt;br /&gt;
| 100&lt;br /&gt;
&lt;br /&gt;
| Rotation and exaggerated skin distortion&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
| Hand geometry&lt;br /&gt;
&lt;br /&gt;
| 1 %&lt;br /&gt;
&lt;br /&gt;
| 2 %&lt;br /&gt;
&lt;br /&gt;
| 0.1 %&lt;br /&gt;
&lt;br /&gt;
| 129&lt;br /&gt;
&lt;br /&gt;
| With rings and improper placement&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
| Iris&lt;br /&gt;
&lt;br /&gt;
| &amp;lt; 1 %&lt;br /&gt;
&lt;br /&gt;
| 0.94 %&lt;br /&gt;
&lt;br /&gt;
| 0.99 %&lt;br /&gt;
&lt;br /&gt;
| 1224&lt;br /&gt;
&lt;br /&gt;
| Indoor Environment&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
| Iris&lt;br /&gt;
&lt;br /&gt;
| 0.01 %&lt;br /&gt;
&lt;br /&gt;
| 0.0001 %&lt;br /&gt;
&lt;br /&gt;
| 0.2 %&lt;br /&gt;
&lt;br /&gt;
| 132&lt;br /&gt;
&lt;br /&gt;
| Best conditions&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
| Keystrokes&lt;br /&gt;
&lt;br /&gt;
| 1.8 %&lt;br /&gt;
&lt;br /&gt;
| 7 %&lt;br /&gt;
&lt;br /&gt;
| 0.1 %&lt;br /&gt;
&lt;br /&gt;
| 15&lt;br /&gt;
&lt;br /&gt;
| During 6 months period&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
| Voice&lt;br /&gt;
&lt;br /&gt;
| 6 %&lt;br /&gt;
&lt;br /&gt;
| 2 %&lt;br /&gt;
&lt;br /&gt;
| 10 %&lt;br /&gt;
&lt;br /&gt;
| 310&lt;br /&gt;
&lt;br /&gt;
| Text independent, multilingual&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
===Principle of Economy of Mechanism===&lt;br /&gt;
In the design of the biometric security systems, each channel must be encrypted and each state must be protected. This means that overall, the design must contain at least four encryption mechanisms must be used for each channel, and at least five security mechanisms for the five states.&lt;br /&gt;
&lt;br /&gt;
The quantity of states and channels involved means that there are a high number of security mechanisms involved which means that security of the overall design is quite complex. This violates the principle of economy of mechanism, but the security of each channel and state may not be as complex as the design, depending on the implementation.&lt;br /&gt;
&lt;br /&gt;
===Principle of Complete Mediation===&lt;br /&gt;
Depending on the implementation, as long as each channel is encrypted with several layers of protection, it does not violate the principle. However, the problem comes from the human side and the issue arises when people try to replace current authentication mechanism such as password systems with biometric security systems.&lt;br /&gt;
&lt;br /&gt;
For example, new laptops with the Windows operating system have been released with biometric security systems. On the Windows login page, there are two logins available, the password system or the biometric system, and the user only has to use one of them to login, a clear violation of the principle of complete mediation.&lt;br /&gt;
&lt;br /&gt;
===Principle of Open Design===&lt;br /&gt;
The design of the biometric security is acceptable but the weakness is easily identified. The weakness of the design lies in the storage of the templates, which to this day, remains a difficult issue. Two options are available, a centralized data bank or decentralized servers to store all the templates.&lt;br /&gt;
&lt;br /&gt;
The design violates the principle not because the design is shrouded in secrecy but because the design itself is weak. This issue can be solved in the future by having a stronger design.&lt;br /&gt;
&lt;br /&gt;
===Principle of Separation of Privilege===&lt;br /&gt;
&lt;br /&gt;
It is common knowledge that a system is not secure if only one security mechanism is used, so an obvious solution is to have multiple security mechanisms. The issue arises when multiple biometric security systems are used. For example, fingerprints and retinas are used together. However, the problem is similar to those of the principle of fail-safe defaults. It assume that security mechanism work when they are supposed to work, but by increasing the types of biometrics required, the number of FARs (false acceptance rates) and FRRs (false rejection rates) increase as well.&lt;br /&gt;
	Cite examples.&lt;br /&gt;
&lt;br /&gt;
===Principle of Least Common Mechanism===&lt;br /&gt;
&lt;br /&gt;
Again, the design is simple due to its rather linear structure. However, in order for the security system to work, there must be a step in which users are enrolled, so that features can be stored. To cut costs, that enrolment system is typically a part of the authentication mechanism. This means that the biometric security system is more opened to attacks because another channel (between feature extractor and the template bank) must be encrypted, making the design more complicated, and the attacker has another option to attack the template bank.&lt;br /&gt;
&lt;br /&gt;
===Principle of Psychological Acceptability===&lt;br /&gt;
&lt;br /&gt;
The big reason why biometric security systems are so popular is that from an end-user perspective, they are the simplest security mechanisms to use. The user does not require any sort of knowledge of passwords to use, since it depends on either physiological or behavioural traits. However, if it fails, due to the FARs and FRRs, such a problem can be extremely annoying since it is not easy to remedy unless there is an alternative login method, which of course, defeats the purpose of having a biometric authentication method.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Conclusion==&lt;br /&gt;
&lt;br /&gt;
A lot of the faults of a biometric security system are due to current biometric technology. It is simply not advanced enough because the errors in identifying valid and invalid users are still too big, even though it may be as small as 0.01%.&lt;br /&gt;
&lt;br /&gt;
Another issue involves the weak design. As a concept, it is simple, but to implement the design, it requires a lot of encryption and security mechanisms. Also, the design highlights a weakness in storage of the templates. Just like storage of passwords, storage of the templates carries even more risks, because stolen templates could potentially mean a stolen identity.&lt;br /&gt;
&lt;br /&gt;
Also, the current thought regarding biometric security systems is that they are the way of the future, meaning they are to replace current security mechanisms, but as shown above, that is terrible because there are still too many weaknesses, including the fact that not everyone can use such a system either.&lt;br /&gt;
&lt;br /&gt;
However, it is so popular because it is so simple to use and requires almost no effort. Hence, biometric security systems should only be used as a supplement to current security systems, not a replacement.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==See Also==&lt;br /&gt;
[1] [http://www.cas.mcmaster.ca/wiki/index.php/Biometrics_in_Information_Security Biometrics in Information Security]&lt;br /&gt;
&lt;br /&gt;
[2] [http://www.cas.mcmaster.ca/wiki/index.php/Identity_Theft Identity Theft]&lt;br /&gt;
&lt;br /&gt;
[3] [http://www.cas.mcmaster.ca/wiki/index.php/Operating_Systems_SecurityOperating Systems Security]&lt;br /&gt;
&lt;br /&gt;
[4] [http://www.cas.mcmaster.ca/wiki/index.php/The_Mitnick_attack The Mitnick Attack]&lt;br /&gt;
&lt;br /&gt;
==References==&lt;/div&gt;</summary>
		<author><name>Mad Doktor</name></author>	</entry>

	<entry>
		<id>http://wiki.cas.mcmaster.ca/index.php/Biometric_Systems_and_Security_Design_Principles</id>
		<title>Biometric Systems and Security Design Principles</title>
		<link rel="alternate" type="text/html" href="http://wiki.cas.mcmaster.ca/index.php/Biometric_Systems_and_Security_Design_Principles"/>
				<updated>2007-12-08T20:09:17Z</updated>
		
		<summary type="html">&lt;p&gt;Mad Doktor:&amp;#32;/* See Also */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;'''Analysis of Biometric Systems using Security Design Principles'''&lt;br /&gt;
&lt;br /&gt;
Biometric security systems are authentication mechanisms that bind an entity to a subject based on what the entity is, as opposed to what they know, what they have, or where they are.&lt;br /&gt;
Within the past several years, biometric security systems have gained a lot of ground in terms of advancements in technology and widespread use. However, there is still a lot of reluctance to adopt the technology worldwide. A look at biometric security systems through security design principles should provide a clearer understanding of its strengths and weaknesses in the implementation and design of biometric security systems.&lt;br /&gt;
[[Image:3dface.jpg|thumb|3D Face Recognition Software]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Biometrics==&lt;br /&gt;
Biometrics is the identification of a person through automated measurements using biological or behavioural features.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Security Design Principles==&lt;br /&gt;
The following eight design principles were created by Saltzer and Shroeder for the design and implementation of security mechanisms. These design principles encompass technical details and human interaction. They are also simple and easy to understand, which is why they will be used as a guide to analyze biometric security systems. The list of design principles are as follows:&lt;br /&gt;
&lt;br /&gt;
'''Principle of Least Privilege:'''&lt;br /&gt;
A subject should be given only those privileges that it needs in order to complete its task.&lt;br /&gt;
&lt;br /&gt;
'''Principle of Fails-Safe Defaults:'''&lt;br /&gt;
A subject should be denied access to an object unless the subject was given access.&lt;br /&gt;
&lt;br /&gt;
'''Principle of Economy of Mechanism:'''&lt;br /&gt;
Security mechanisms should be as simple as possible.&lt;br /&gt;
&lt;br /&gt;
'''Principle of Complete Mediation:'''&lt;br /&gt;
All accesses to objects are checked to ensure that they are allowed.&lt;br /&gt;
&lt;br /&gt;
'''Principle of Open Design:'''&lt;br /&gt;
Security of a mechanism should not depend on the secrecy of its design or implementation.&lt;br /&gt;
&lt;br /&gt;
'''Principle of Separation of Privilege:'''&lt;br /&gt;
A system should not grant permission based on a single condition.&lt;br /&gt;
&lt;br /&gt;
'''Principle of Least Common Mechanism:'''&lt;br /&gt;
Mechanisms used to access resources should not be shared.&lt;br /&gt;
&lt;br /&gt;
'''Principle of Psychological Acceptability:'''&lt;br /&gt;
Security mechanisms should not make the resource more difficult to access than if the security mechanisms were not present.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Breaking a Biometrics Security System==&lt;br /&gt;
In addition to looking at biometric security systems from a design and implementation perspective, understanding a biometrics security system from an attacker’s perspective is also important. In general, there are seven different types of attacks. These types of attacks are categorized by their attacks on a specific part of the design. They can be divided into the following:&lt;br /&gt;
&lt;br /&gt;
'''Type 1:''' Fake biometric sensor&lt;br /&gt;
&lt;br /&gt;
'''Type 2:''' Replay attacks&lt;br /&gt;
&lt;br /&gt;
'''Type 3:''' Trojan horse program at feature extractor&lt;br /&gt;
&lt;br /&gt;
'''Type 4:''' Real features replaced by synthetic features.&lt;br /&gt;
&lt;br /&gt;
'''Type 5:''' Trojan horse program at matcher.&lt;br /&gt;
&lt;br /&gt;
'''Type 6:''' Attacks modifying database of templates.&lt;br /&gt;
&lt;br /&gt;
'''Type 7:''' Results overridden.&lt;br /&gt;
&lt;br /&gt;
[[Image:biometric_attacks.jpg|Types of attacks available on a biometric security system]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Analysis==&lt;br /&gt;
&lt;br /&gt;
===Principle of Least Privilege===&lt;br /&gt;
The design of the biometric security system itself is very linear hence, only the channels themselves need to be protected. This means that overall, processes cannot be accessed past the sensor if the sensor themselves have not been used. From this perspective, the design is secure. However, the system is still vulnerable from all attacks that attack each process directly (type 3, 5, and 6 attacks).&lt;br /&gt;
&lt;br /&gt;
===Principle of Fail-Safe Default===&lt;br /&gt;
The principle of fail-safe default is an excellent principle to follow for security mechanisms, but it falls short due to an implicit assumption within the principle itself. The principle assumes that security mechanisms will always work perfectly if all the requirements are passed. However, with biometric security systems, that is not the case. Biometric security systems are not perfect so they don’t always pass legitimate users and at the same time, they also pass the invalid users as well.&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot; align=center&lt;br /&gt;
|+ '''Chart of Biometric Systems Error Rates&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
! Biometrics &lt;br /&gt;
&lt;br /&gt;
! EER&lt;br /&gt;
&lt;br /&gt;
! FAR&lt;br /&gt;
&lt;br /&gt;
! FRR&lt;br /&gt;
&lt;br /&gt;
! Subjects&lt;br /&gt;
&lt;br /&gt;
! Comment&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
| Face&lt;br /&gt;
&lt;br /&gt;
| n/a&lt;br /&gt;
&lt;br /&gt;
| 1 %&lt;br /&gt;
&lt;br /&gt;
| 10 %&lt;br /&gt;
&lt;br /&gt;
| 37437&lt;br /&gt;
&lt;br /&gt;
| Varied lighting, indoor/outdoor&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
| Fingerprints&lt;br /&gt;
&lt;br /&gt;
| 2 %&lt;br /&gt;
&lt;br /&gt;
| 2 %&lt;br /&gt;
&lt;br /&gt;
| 2 %&lt;br /&gt;
&lt;br /&gt;
| 100&lt;br /&gt;
&lt;br /&gt;
| Rotation and exaggerated skin distortion&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
| Hand geometry&lt;br /&gt;
&lt;br /&gt;
| 1 %&lt;br /&gt;
&lt;br /&gt;
| 2 %&lt;br /&gt;
&lt;br /&gt;
| 0.1 %&lt;br /&gt;
&lt;br /&gt;
| 129&lt;br /&gt;
&lt;br /&gt;
| With rings and improper placement&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
| Iris&lt;br /&gt;
&lt;br /&gt;
| &amp;lt; 1 %&lt;br /&gt;
&lt;br /&gt;
| 0.94 %&lt;br /&gt;
&lt;br /&gt;
| 0.99 %&lt;br /&gt;
&lt;br /&gt;
| 1224&lt;br /&gt;
&lt;br /&gt;
| Indoor Environment&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
| Iris&lt;br /&gt;
&lt;br /&gt;
| 0.01 %&lt;br /&gt;
&lt;br /&gt;
| 0.0001 %&lt;br /&gt;
&lt;br /&gt;
| 0.2 %&lt;br /&gt;
&lt;br /&gt;
| 132&lt;br /&gt;
&lt;br /&gt;
| Best conditions&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
| Keystrokes&lt;br /&gt;
&lt;br /&gt;
| 1.8 %&lt;br /&gt;
&lt;br /&gt;
| 7 %&lt;br /&gt;
&lt;br /&gt;
| 0.1 %&lt;br /&gt;
&lt;br /&gt;
| 15&lt;br /&gt;
&lt;br /&gt;
| During 6 months period&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
| Voice&lt;br /&gt;
&lt;br /&gt;
| 6 %&lt;br /&gt;
&lt;br /&gt;
| 2 %&lt;br /&gt;
&lt;br /&gt;
| 10 %&lt;br /&gt;
&lt;br /&gt;
| 310&lt;br /&gt;
&lt;br /&gt;
| Text independent, multilingual&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
===Principle of Economy of Mechanism===&lt;br /&gt;
In the design of the biometric security systems, each channel must be encrypted and each state must be protected. This means that overall, the design must contain at least four encryption mechanisms must be used for each channel, and at least five security mechanisms for the five states.&lt;br /&gt;
&lt;br /&gt;
The quantity of states and channels involved means that there are a high number of security mechanisms involved which means that security of the overall design is quite complex. This violates the principle of economy of mechanism, but the security of each channel and state may not be as complex as the design, depending on the implementation.&lt;br /&gt;
&lt;br /&gt;
===Principle of Complete Mediation===&lt;br /&gt;
Depending on the implementation, as long as each channel is encrypted with several layers of protection, it does not violate the principle. However, the problem comes from the human side and the issue arises when people try to replace current authentication mechanism such as password systems with biometric security systems.&lt;br /&gt;
&lt;br /&gt;
For example, new laptops with the Windows operating system have been released with biometric security systems. On the Windows login page, there are two logins available, the password system or the biometric system, and the user only has to use one of them to login, a clear violation of the principle of complete mediation.&lt;br /&gt;
&lt;br /&gt;
===Principle of Open Design===&lt;br /&gt;
The design of the biometric security is acceptable but the weakness is easily identified. The weakness of the design lies in the storage of the templates, which to this day, remains a difficult issue. Two options are available, a centralized data bank or decentralized servers to store all the templates.&lt;br /&gt;
&lt;br /&gt;
The design violates the principle not because the design is shrouded in secrecy but because the design itself is weak. This issue can be solved in the future by having a stronger design.&lt;br /&gt;
&lt;br /&gt;
===Principle of Separation of Privilege===&lt;br /&gt;
&lt;br /&gt;
It is common knowledge that a system is not secure if only one security mechanism is used, so an obvious solution is to have multiple security mechanisms. The issue arises when multiple biometric security systems are used. For example, fingerprints and retinas are used together. However, the problem is similar to those of the principle of fail-safe defaults. It assume that security mechanism work when they are supposed to work, but by increasing the types of biometrics required, the number of FARs (false acceptance rates) and FRRs (false rejection rates) increase as well.&lt;br /&gt;
	Cite examples.&lt;br /&gt;
&lt;br /&gt;
===Principle of Least Common Mechanism===&lt;br /&gt;
&lt;br /&gt;
Again, the design is simple due to its rather linear structure. However, in order for the security system to work, there must be a step in which users are enrolled, so that features can be stored. To cut costs, that enrolment system is typically a part of the authentication mechanism. This means that the biometric security system is more opened to attacks because another channel (between feature extractor and the template bank) must be encrypted, making the design more complicated, and the attacker has another option to attack the template bank.&lt;br /&gt;
&lt;br /&gt;
===Principle of Psychological Acceptability===&lt;br /&gt;
&lt;br /&gt;
The big reason why biometric security systems are so popular is that from an end-user perspective, they are the simplest security mechanisms to use. The user does not require any sort of knowledge of passwords to use, since it depends on either physiological or behavioural traits. However, if it fails, due to the FARs and FRRs, such a problem can be extremely annoying since it is not easy to remedy unless there is an alternative login method, which of course, defeats the purpose of having a biometric authentication method.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Conclusion==&lt;br /&gt;
&lt;br /&gt;
A lot of the faults of a biometric security system are due to current biometric technology. It is simply not advanced enough because the errors in identifying valid and invalid users are still too big, even though it may be as small as 0.01%.&lt;br /&gt;
&lt;br /&gt;
Another issue involves the weak design. As a concept, it is simple, but to implement the design, it requires a lot of encryption and security mechanisms. Also, the design highlights a weakness in storage of the templates. Just like storage of passwords, storage of the templates carries even more risks, because stolen templates could potentially mean a stolen identity.&lt;br /&gt;
&lt;br /&gt;
Also, the current thought regarding biometric security systems is that they are the way of the future, meaning they are to replace current security mechanisms, but as shown above, that is terrible because there are still too many weaknesses, including the fact that not everyone can use such a system either.&lt;br /&gt;
&lt;br /&gt;
However, it is so popular because it is so simple to use and requires almost no effort. Hence, biometric security systems should only be used as a supplement to current security systems, not a replacement.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==See Also==&lt;br /&gt;
[1] [http://www.cas.mcmaster.ca/wiki/index.php/Biometrics_in_Information_Security Biometrics in Information Security]&lt;br /&gt;
&lt;br /&gt;
[2] [http://www.cas.mcmaster.ca/wiki/index.php/Identity_Theft Identity Theft]&lt;br /&gt;
&lt;br /&gt;
[3] [http://www.cas.mcmaster.ca/wiki/index.php/Operating_Systems_SecurityOperating Systems Security]&lt;br /&gt;
&lt;br /&gt;
[4] [http://www.cas.mcmaster.ca/wiki/index.php/The_Mitnick_attack The Mitnick Attack]&lt;br /&gt;
&lt;br /&gt;
==References==&lt;/div&gt;</summary>
		<author><name>Mad Doktor</name></author>	</entry>

	<entry>
		<id>http://wiki.cas.mcmaster.ca/index.php/Biometric_Systems_and_Security_Design_Principles</id>
		<title>Biometric Systems and Security Design Principles</title>
		<link rel="alternate" type="text/html" href="http://wiki.cas.mcmaster.ca/index.php/Biometric_Systems_and_Security_Design_Principles"/>
				<updated>2007-12-08T20:03:05Z</updated>
		
		<summary type="html">&lt;p&gt;Mad Doktor:&amp;#32;/* See Also */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;'''Analysis of Biometric Systems using Security Design Principles'''&lt;br /&gt;
&lt;br /&gt;
Biometric security systems are authentication mechanisms that bind an entity to a subject based on what the entity is, as opposed to what they know, what they have, or where they are.&lt;br /&gt;
Within the past several years, biometric security systems have gained a lot of ground in terms of advancements in technology and widespread use. However, there is still a lot of reluctance to adopt the technology worldwide. A look at biometric security systems through security design principles should provide a clearer understanding of its strengths and weaknesses in the implementation and design of biometric security systems.&lt;br /&gt;
[[Image:3dface.jpg|thumb|3D Face Recognition Software]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Biometrics==&lt;br /&gt;
Biometrics is the identification of a person through automated measurements using biological or behavioural features.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Security Design Principles==&lt;br /&gt;
The following eight design principles were created by Saltzer and Shroeder for the design and implementation of security mechanisms. These design principles encompass technical details and human interaction. They are also simple and easy to understand, which is why they will be used as a guide to analyze biometric security systems. The list of design principles are as follows:&lt;br /&gt;
&lt;br /&gt;
'''Principle of Least Privilege:'''&lt;br /&gt;
A subject should be given only those privileges that it needs in order to complete its task.&lt;br /&gt;
&lt;br /&gt;
'''Principle of Fails-Safe Defaults:'''&lt;br /&gt;
A subject should be denied access to an object unless the subject was given access.&lt;br /&gt;
&lt;br /&gt;
'''Principle of Economy of Mechanism:'''&lt;br /&gt;
Security mechanisms should be as simple as possible.&lt;br /&gt;
&lt;br /&gt;
'''Principle of Complete Mediation:'''&lt;br /&gt;
All accesses to objects are checked to ensure that they are allowed.&lt;br /&gt;
&lt;br /&gt;
'''Principle of Open Design:'''&lt;br /&gt;
Security of a mechanism should not depend on the secrecy of its design or implementation.&lt;br /&gt;
&lt;br /&gt;
'''Principle of Separation of Privilege:'''&lt;br /&gt;
A system should not grant permission based on a single condition.&lt;br /&gt;
&lt;br /&gt;
'''Principle of Least Common Mechanism:'''&lt;br /&gt;
Mechanisms used to access resources should not be shared.&lt;br /&gt;
&lt;br /&gt;
'''Principle of Psychological Acceptability:'''&lt;br /&gt;
Security mechanisms should not make the resource more difficult to access than if the security mechanisms were not present.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Breaking a Biometrics Security System==&lt;br /&gt;
In addition to looking at biometric security systems from a design and implementation perspective, understanding a biometrics security system from an attacker’s perspective is also important. In general, there are seven different types of attacks. These types of attacks are categorized by their attacks on a specific part of the design. They can be divided into the following:&lt;br /&gt;
&lt;br /&gt;
'''Type 1:''' Fake biometric sensor&lt;br /&gt;
&lt;br /&gt;
'''Type 2:''' Replay attacks&lt;br /&gt;
&lt;br /&gt;
'''Type 3:''' Trojan horse program at feature extractor&lt;br /&gt;
&lt;br /&gt;
'''Type 4:''' Real features replaced by synthetic features.&lt;br /&gt;
&lt;br /&gt;
'''Type 5:''' Trojan horse program at matcher.&lt;br /&gt;
&lt;br /&gt;
'''Type 6:''' Attacks modifying database of templates.&lt;br /&gt;
&lt;br /&gt;
'''Type 7:''' Results overridden.&lt;br /&gt;
&lt;br /&gt;
[[Image:biometric_attacks.jpg|Types of attacks available on a biometric security system]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Analysis==&lt;br /&gt;
&lt;br /&gt;
===Principle of Least Privilege===&lt;br /&gt;
The design of the biometric security system itself is very linear hence, only the channels themselves need to be protected. This means that overall, processes cannot be accessed past the sensor if the sensor themselves have not been used. From this perspective, the design is secure. However, the system is still vulnerable from all attacks that attack each process directly (type 3, 5, and 6 attacks).&lt;br /&gt;
&lt;br /&gt;
===Principle of Fail-Safe Default===&lt;br /&gt;
The principle of fail-safe default is an excellent principle to follow for security mechanisms, but it falls short due to an implicit assumption within the principle itself. The principle assumes that security mechanisms will always work perfectly if all the requirements are passed. However, with biometric security systems, that is not the case. Biometric security systems are not perfect so they don’t always pass legitimate users and at the same time, they also pass the invalid users as well.&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot; align=center&lt;br /&gt;
|+ '''Chart of Biometric Systems Error Rates&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
! Biometrics &lt;br /&gt;
&lt;br /&gt;
! EER&lt;br /&gt;
&lt;br /&gt;
! FAR&lt;br /&gt;
&lt;br /&gt;
! FRR&lt;br /&gt;
&lt;br /&gt;
! Subjects&lt;br /&gt;
&lt;br /&gt;
! Comment&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
| Face&lt;br /&gt;
&lt;br /&gt;
| n/a&lt;br /&gt;
&lt;br /&gt;
| 1 %&lt;br /&gt;
&lt;br /&gt;
| 10 %&lt;br /&gt;
&lt;br /&gt;
| 37437&lt;br /&gt;
&lt;br /&gt;
| Varied lighting, indoor/outdoor&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
| Fingerprints&lt;br /&gt;
&lt;br /&gt;
| 2 %&lt;br /&gt;
&lt;br /&gt;
| 2 %&lt;br /&gt;
&lt;br /&gt;
| 2 %&lt;br /&gt;
&lt;br /&gt;
| 100&lt;br /&gt;
&lt;br /&gt;
| Rotation and exaggerated skin distortion&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
| Hand geometry&lt;br /&gt;
&lt;br /&gt;
| 1 %&lt;br /&gt;
&lt;br /&gt;
| 2 %&lt;br /&gt;
&lt;br /&gt;
| 0.1 %&lt;br /&gt;
&lt;br /&gt;
| 129&lt;br /&gt;
&lt;br /&gt;
| With rings and improper placement&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
| Iris&lt;br /&gt;
&lt;br /&gt;
| &amp;lt; 1 %&lt;br /&gt;
&lt;br /&gt;
| 0.94 %&lt;br /&gt;
&lt;br /&gt;
| 0.99 %&lt;br /&gt;
&lt;br /&gt;
| 1224&lt;br /&gt;
&lt;br /&gt;
| Indoor Environment&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
| Iris&lt;br /&gt;
&lt;br /&gt;
| 0.01 %&lt;br /&gt;
&lt;br /&gt;
| 0.0001 %&lt;br /&gt;
&lt;br /&gt;
| 0.2 %&lt;br /&gt;
&lt;br /&gt;
| 132&lt;br /&gt;
&lt;br /&gt;
| Best conditions&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
| Keystrokes&lt;br /&gt;
&lt;br /&gt;
| 1.8 %&lt;br /&gt;
&lt;br /&gt;
| 7 %&lt;br /&gt;
&lt;br /&gt;
| 0.1 %&lt;br /&gt;
&lt;br /&gt;
| 15&lt;br /&gt;
&lt;br /&gt;
| During 6 months period&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
| Voice&lt;br /&gt;
&lt;br /&gt;
| 6 %&lt;br /&gt;
&lt;br /&gt;
| 2 %&lt;br /&gt;
&lt;br /&gt;
| 10 %&lt;br /&gt;
&lt;br /&gt;
| 310&lt;br /&gt;
&lt;br /&gt;
| Text independent, multilingual&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
===Principle of Economy of Mechanism===&lt;br /&gt;
In the design of the biometric security systems, each channel must be encrypted and each state must be protected. This means that overall, the design must contain at least four encryption mechanisms must be used for each channel, and at least five security mechanisms for the five states.&lt;br /&gt;
&lt;br /&gt;
The quantity of states and channels involved means that there are a high number of security mechanisms involved which means that security of the overall design is quite complex. This violates the principle of economy of mechanism, but the security of each channel and state may not be as complex as the design, depending on the implementation.&lt;br /&gt;
&lt;br /&gt;
===Principle of Complete Mediation===&lt;br /&gt;
Depending on the implementation, as long as each channel is encrypted with several layers of protection, it does not violate the principle. However, the problem comes from the human side and the issue arises when people try to replace current authentication mechanism such as password systems with biometric security systems.&lt;br /&gt;
&lt;br /&gt;
For example, new laptops with the Windows operating system have been released with biometric security systems. On the Windows login page, there are two logins available, the password system or the biometric system, and the user only has to use one of them to login, a clear violation of the principle of complete mediation.&lt;br /&gt;
&lt;br /&gt;
===Principle of Open Design===&lt;br /&gt;
The design of the biometric security is acceptable but the weakness is easily identified. The weakness of the design lies in the storage of the templates, which to this day, remains a difficult issue. Two options are available, a centralized data bank or decentralized servers to store all the templates.&lt;br /&gt;
&lt;br /&gt;
The design violates the principle not because the design is shrouded in secrecy but because the design itself is weak. This issue can be solved in the future by having a stronger design.&lt;br /&gt;
&lt;br /&gt;
===Principle of Separation of Privilege===&lt;br /&gt;
&lt;br /&gt;
It is common knowledge that a system is not secure if only one security mechanism is used, so an obvious solution is to have multiple security mechanisms. The issue arises when multiple biometric security systems are used. For example, fingerprints and retinas are used together. However, the problem is similar to those of the principle of fail-safe defaults. It assume that security mechanism work when they are supposed to work, but by increasing the types of biometrics required, the number of FARs (false acceptance rates) and FRRs (false rejection rates) increase as well.&lt;br /&gt;
	Cite examples.&lt;br /&gt;
&lt;br /&gt;
===Principle of Least Common Mechanism===&lt;br /&gt;
&lt;br /&gt;
Again, the design is simple due to its rather linear structure. However, in order for the security system to work, there must be a step in which users are enrolled, so that features can be stored. To cut costs, that enrolment system is typically a part of the authentication mechanism. This means that the biometric security system is more opened to attacks because another channel (between feature extractor and the template bank) must be encrypted, making the design more complicated, and the attacker has another option to attack the template bank.&lt;br /&gt;
&lt;br /&gt;
===Principle of Psychological Acceptability===&lt;br /&gt;
&lt;br /&gt;
The big reason why biometric security systems are so popular is that from an end-user perspective, they are the simplest security mechanisms to use. The user does not require any sort of knowledge of passwords to use, since it depends on either physiological or behavioural traits. However, if it fails, due to the FARs and FRRs, such a problem can be extremely annoying since it is not easy to remedy unless there is an alternative login method, which of course, defeats the purpose of having a biometric authentication method.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Conclusion==&lt;br /&gt;
&lt;br /&gt;
A lot of the faults of a biometric security system are due to current biometric technology. It is simply not advanced enough because the errors in identifying valid and invalid users are still too big, even though it may be as small as 0.01%.&lt;br /&gt;
&lt;br /&gt;
Another issue involves the weak design. As a concept, it is simple, but to implement the design, it requires a lot of encryption and security mechanisms. Also, the design highlights a weakness in storage of the templates. Just like storage of passwords, storage of the templates carries even more risks, because stolen templates could potentially mean a stolen identity.&lt;br /&gt;
&lt;br /&gt;
Also, the current thought regarding biometric security systems is that they are the way of the future, meaning they are to replace current security mechanisms, but as shown above, that is terrible because there are still too many weaknesses, including the fact that not everyone can use such a system either.&lt;br /&gt;
&lt;br /&gt;
However, it is so popular because it is so simple to use and requires almost no effort. Hence, biometric security systems should only be used as a supplement to current security systems, not a replacement.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==See Also==&lt;br /&gt;
'''[1]'''[http://www.cas.mcmaster.ca/wiki/index.php/Biometrics_in_Information_Security Biometrics in Information Security]&lt;br /&gt;
&lt;br /&gt;
==References==&lt;/div&gt;</summary>
		<author><name>Mad Doktor</name></author>	</entry>

	<entry>
		<id>http://wiki.cas.mcmaster.ca/index.php/Biometric_Systems_and_Security_Design_Principles</id>
		<title>Biometric Systems and Security Design Principles</title>
		<link rel="alternate" type="text/html" href="http://wiki.cas.mcmaster.ca/index.php/Biometric_Systems_and_Security_Design_Principles"/>
				<updated>2007-12-08T19:56:16Z</updated>
		
		<summary type="html">&lt;p&gt;Mad Doktor:&amp;#32;/* Principle of Fail-Safe Default */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;'''Analysis of Biometric Systems using Security Design Principles'''&lt;br /&gt;
&lt;br /&gt;
Biometric security systems are authentication mechanisms that bind an entity to a subject based on what the entity is, as opposed to what they know, what they have, or where they are.&lt;br /&gt;
Within the past several years, biometric security systems have gained a lot of ground in terms of advancements in technology and widespread use. However, there is still a lot of reluctance to adopt the technology worldwide. A look at biometric security systems through security design principles should provide a clearer understanding of its strengths and weaknesses in the implementation and design of biometric security systems.&lt;br /&gt;
[[Image:3dface.jpg|thumb|3D Face Recognition Software]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Biometrics==&lt;br /&gt;
Biometrics is the identification of a person through automated measurements using biological or behavioural features.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Security Design Principles==&lt;br /&gt;
The following eight design principles were created by Saltzer and Shroeder for the design and implementation of security mechanisms. These design principles encompass technical details and human interaction. They are also simple and easy to understand, which is why they will be used as a guide to analyze biometric security systems. The list of design principles are as follows:&lt;br /&gt;
&lt;br /&gt;
'''Principle of Least Privilege:'''&lt;br /&gt;
A subject should be given only those privileges that it needs in order to complete its task.&lt;br /&gt;
&lt;br /&gt;
'''Principle of Fails-Safe Defaults:'''&lt;br /&gt;
A subject should be denied access to an object unless the subject was given access.&lt;br /&gt;
&lt;br /&gt;
'''Principle of Economy of Mechanism:'''&lt;br /&gt;
Security mechanisms should be as simple as possible.&lt;br /&gt;
&lt;br /&gt;
'''Principle of Complete Mediation:'''&lt;br /&gt;
All accesses to objects are checked to ensure that they are allowed.&lt;br /&gt;
&lt;br /&gt;
'''Principle of Open Design:'''&lt;br /&gt;
Security of a mechanism should not depend on the secrecy of its design or implementation.&lt;br /&gt;
&lt;br /&gt;
'''Principle of Separation of Privilege:'''&lt;br /&gt;
A system should not grant permission based on a single condition.&lt;br /&gt;
&lt;br /&gt;
'''Principle of Least Common Mechanism:'''&lt;br /&gt;
Mechanisms used to access resources should not be shared.&lt;br /&gt;
&lt;br /&gt;
'''Principle of Psychological Acceptability:'''&lt;br /&gt;
Security mechanisms should not make the resource more difficult to access than if the security mechanisms were not present.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Breaking a Biometrics Security System==&lt;br /&gt;
In addition to looking at biometric security systems from a design and implementation perspective, understanding a biometrics security system from an attacker’s perspective is also important. In general, there are seven different types of attacks. These types of attacks are categorized by their attacks on a specific part of the design. They can be divided into the following:&lt;br /&gt;
&lt;br /&gt;
'''Type 1:''' Fake biometric sensor&lt;br /&gt;
&lt;br /&gt;
'''Type 2:''' Replay attacks&lt;br /&gt;
&lt;br /&gt;
'''Type 3:''' Trojan horse program at feature extractor&lt;br /&gt;
&lt;br /&gt;
'''Type 4:''' Real features replaced by synthetic features.&lt;br /&gt;
&lt;br /&gt;
'''Type 5:''' Trojan horse program at matcher.&lt;br /&gt;
&lt;br /&gt;
'''Type 6:''' Attacks modifying database of templates.&lt;br /&gt;
&lt;br /&gt;
'''Type 7:''' Results overridden.&lt;br /&gt;
&lt;br /&gt;
[[Image:biometric_attacks.jpg|Types of attacks available on a biometric security system]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Analysis==&lt;br /&gt;
&lt;br /&gt;
===Principle of Least Privilege===&lt;br /&gt;
The design of the biometric security system itself is very linear hence, only the channels themselves need to be protected. This means that overall, processes cannot be accessed past the sensor if the sensor themselves have not been used. From this perspective, the design is secure. However, the system is still vulnerable from all attacks that attack each process directly (type 3, 5, and 6 attacks).&lt;br /&gt;
&lt;br /&gt;
===Principle of Fail-Safe Default===&lt;br /&gt;
The principle of fail-safe default is an excellent principle to follow for security mechanisms, but it falls short due to an implicit assumption within the principle itself. The principle assumes that security mechanisms will always work perfectly if all the requirements are passed. However, with biometric security systems, that is not the case. Biometric security systems are not perfect so they don’t always pass legitimate users and at the same time, they also pass the invalid users as well.&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot; align=center&lt;br /&gt;
|+ '''Chart of Biometric Systems Error Rates&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
! Biometrics &lt;br /&gt;
&lt;br /&gt;
! EER&lt;br /&gt;
&lt;br /&gt;
! FAR&lt;br /&gt;
&lt;br /&gt;
! FRR&lt;br /&gt;
&lt;br /&gt;
! Subjects&lt;br /&gt;
&lt;br /&gt;
! Comment&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
| Face&lt;br /&gt;
&lt;br /&gt;
| n/a&lt;br /&gt;
&lt;br /&gt;
| 1 %&lt;br /&gt;
&lt;br /&gt;
| 10 %&lt;br /&gt;
&lt;br /&gt;
| 37437&lt;br /&gt;
&lt;br /&gt;
| Varied lighting, indoor/outdoor&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
| Fingerprints&lt;br /&gt;
&lt;br /&gt;
| 2 %&lt;br /&gt;
&lt;br /&gt;
| 2 %&lt;br /&gt;
&lt;br /&gt;
| 2 %&lt;br /&gt;
&lt;br /&gt;
| 100&lt;br /&gt;
&lt;br /&gt;
| Rotation and exaggerated skin distortion&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
| Hand geometry&lt;br /&gt;
&lt;br /&gt;
| 1 %&lt;br /&gt;
&lt;br /&gt;
| 2 %&lt;br /&gt;
&lt;br /&gt;
| 0.1 %&lt;br /&gt;
&lt;br /&gt;
| 129&lt;br /&gt;
&lt;br /&gt;
| With rings and improper placement&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
| Iris&lt;br /&gt;
&lt;br /&gt;
| &amp;lt; 1 %&lt;br /&gt;
&lt;br /&gt;
| 0.94 %&lt;br /&gt;
&lt;br /&gt;
| 0.99 %&lt;br /&gt;
&lt;br /&gt;
| 1224&lt;br /&gt;
&lt;br /&gt;
| Indoor Environment&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
| Iris&lt;br /&gt;
&lt;br /&gt;
| 0.01 %&lt;br /&gt;
&lt;br /&gt;
| 0.0001 %&lt;br /&gt;
&lt;br /&gt;
| 0.2 %&lt;br /&gt;
&lt;br /&gt;
| 132&lt;br /&gt;
&lt;br /&gt;
| Best conditions&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
| Keystrokes&lt;br /&gt;
&lt;br /&gt;
| 1.8 %&lt;br /&gt;
&lt;br /&gt;
| 7 %&lt;br /&gt;
&lt;br /&gt;
| 0.1 %&lt;br /&gt;
&lt;br /&gt;
| 15&lt;br /&gt;
&lt;br /&gt;
| During 6 months period&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
| Voice&lt;br /&gt;
&lt;br /&gt;
| 6 %&lt;br /&gt;
&lt;br /&gt;
| 2 %&lt;br /&gt;
&lt;br /&gt;
| 10 %&lt;br /&gt;
&lt;br /&gt;
| 310&lt;br /&gt;
&lt;br /&gt;
| Text independent, multilingual&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
===Principle of Economy of Mechanism===&lt;br /&gt;
In the design of the biometric security systems, each channel must be encrypted and each state must be protected. This means that overall, the design must contain at least four encryption mechanisms must be used for each channel, and at least five security mechanisms for the five states.&lt;br /&gt;
&lt;br /&gt;
The quantity of states and channels involved means that there are a high number of security mechanisms involved which means that security of the overall design is quite complex. This violates the principle of economy of mechanism, but the security of each channel and state may not be as complex as the design, depending on the implementation.&lt;br /&gt;
&lt;br /&gt;
===Principle of Complete Mediation===&lt;br /&gt;
Depending on the implementation, as long as each channel is encrypted with several layers of protection, it does not violate the principle. However, the problem comes from the human side and the issue arises when people try to replace current authentication mechanism such as password systems with biometric security systems.&lt;br /&gt;
&lt;br /&gt;
For example, new laptops with the Windows operating system have been released with biometric security systems. On the Windows login page, there are two logins available, the password system or the biometric system, and the user only has to use one of them to login, a clear violation of the principle of complete mediation.&lt;br /&gt;
&lt;br /&gt;
===Principle of Open Design===&lt;br /&gt;
The design of the biometric security is acceptable but the weakness is easily identified. The weakness of the design lies in the storage of the templates, which to this day, remains a difficult issue. Two options are available, a centralized data bank or decentralized servers to store all the templates.&lt;br /&gt;
&lt;br /&gt;
The design violates the principle not because the design is shrouded in secrecy but because the design itself is weak. This issue can be solved in the future by having a stronger design.&lt;br /&gt;
&lt;br /&gt;
===Principle of Separation of Privilege===&lt;br /&gt;
&lt;br /&gt;
It is common knowledge that a system is not secure if only one security mechanism is used, so an obvious solution is to have multiple security mechanisms. The issue arises when multiple biometric security systems are used. For example, fingerprints and retinas are used together. However, the problem is similar to those of the principle of fail-safe defaults. It assume that security mechanism work when they are supposed to work, but by increasing the types of biometrics required, the number of FARs (false acceptance rates) and FRRs (false rejection rates) increase as well.&lt;br /&gt;
	Cite examples.&lt;br /&gt;
&lt;br /&gt;
===Principle of Least Common Mechanism===&lt;br /&gt;
&lt;br /&gt;
Again, the design is simple due to its rather linear structure. However, in order for the security system to work, there must be a step in which users are enrolled, so that features can be stored. To cut costs, that enrolment system is typically a part of the authentication mechanism. This means that the biometric security system is more opened to attacks because another channel (between feature extractor and the template bank) must be encrypted, making the design more complicated, and the attacker has another option to attack the template bank.&lt;br /&gt;
&lt;br /&gt;
===Principle of Psychological Acceptability===&lt;br /&gt;
&lt;br /&gt;
The big reason why biometric security systems are so popular is that from an end-user perspective, they are the simplest security mechanisms to use. The user does not require any sort of knowledge of passwords to use, since it depends on either physiological or behavioural traits. However, if it fails, due to the FARs and FRRs, such a problem can be extremely annoying since it is not easy to remedy unless there is an alternative login method, which of course, defeats the purpose of having a biometric authentication method.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Conclusion==&lt;br /&gt;
&lt;br /&gt;
A lot of the faults of a biometric security system are due to current biometric technology. It is simply not advanced enough because the errors in identifying valid and invalid users are still too big, even though it may be as small as 0.01%.&lt;br /&gt;
&lt;br /&gt;
Another issue involves the weak design. As a concept, it is simple, but to implement the design, it requires a lot of encryption and security mechanisms. Also, the design highlights a weakness in storage of the templates. Just like storage of passwords, storage of the templates carries even more risks, because stolen templates could potentially mean a stolen identity.&lt;br /&gt;
&lt;br /&gt;
Also, the current thought regarding biometric security systems is that they are the way of the future, meaning they are to replace current security mechanisms, but as shown above, that is terrible because there are still too many weaknesses, including the fact that not everyone can use such a system either.&lt;br /&gt;
&lt;br /&gt;
However, it is so popular because it is so simple to use and requires almost no effort. Hence, biometric security systems should only be used as a supplement to current security systems, not a replacement.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==See Also==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==References==&lt;/div&gt;</summary>
		<author><name>Mad Doktor</name></author>	</entry>

	<entry>
		<id>http://wiki.cas.mcmaster.ca/index.php/Biometric_Systems_and_Security_Design_Principles</id>
		<title>Biometric Systems and Security Design Principles</title>
		<link rel="alternate" type="text/html" href="http://wiki.cas.mcmaster.ca/index.php/Biometric_Systems_and_Security_Design_Principles"/>
				<updated>2007-12-08T19:34:04Z</updated>
		
		<summary type="html">&lt;p&gt;Mad Doktor:&amp;#32;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;'''Analysis of Biometric Systems using Security Design Principles'''&lt;br /&gt;
&lt;br /&gt;
Biometric security systems are authentication mechanisms that bind an entity to a subject based on what the entity is, as opposed to what they know, what they have, or where they are.&lt;br /&gt;
Within the past several years, biometric security systems have gained a lot of ground in terms of advancements in technology and widespread use. However, there is still a lot of reluctance to adopt the technology worldwide. A look at biometric security systems through security design principles should provide a clearer understanding of its strengths and weaknesses in the implementation and design of biometric security systems.&lt;br /&gt;
[[Image:3dface.jpg|thumb|3D Face Recognition Software]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Biometrics==&lt;br /&gt;
Biometrics is the identification of a person through automated measurements using biological or behavioural features.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Security Design Principles==&lt;br /&gt;
The following eight design principles were created by Saltzer and Shroeder for the design and implementation of security mechanisms. These design principles encompass technical details and human interaction. They are also simple and easy to understand, which is why they will be used as a guide to analyze biometric security systems. The list of design principles are as follows:&lt;br /&gt;
&lt;br /&gt;
'''Principle of Least Privilege:'''&lt;br /&gt;
A subject should be given only those privileges that it needs in order to complete its task.&lt;br /&gt;
&lt;br /&gt;
'''Principle of Fails-Safe Defaults:'''&lt;br /&gt;
A subject should be denied access to an object unless the subject was given access.&lt;br /&gt;
&lt;br /&gt;
'''Principle of Economy of Mechanism:'''&lt;br /&gt;
Security mechanisms should be as simple as possible.&lt;br /&gt;
&lt;br /&gt;
'''Principle of Complete Mediation:'''&lt;br /&gt;
All accesses to objects are checked to ensure that they are allowed.&lt;br /&gt;
&lt;br /&gt;
'''Principle of Open Design:'''&lt;br /&gt;
Security of a mechanism should not depend on the secrecy of its design or implementation.&lt;br /&gt;
&lt;br /&gt;
'''Principle of Separation of Privilege:'''&lt;br /&gt;
A system should not grant permission based on a single condition.&lt;br /&gt;
&lt;br /&gt;
'''Principle of Least Common Mechanism:'''&lt;br /&gt;
Mechanisms used to access resources should not be shared.&lt;br /&gt;
&lt;br /&gt;
'''Principle of Psychological Acceptability:'''&lt;br /&gt;
Security mechanisms should not make the resource more difficult to access than if the security mechanisms were not present.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Breaking a Biometrics Security System==&lt;br /&gt;
In addition to looking at biometric security systems from a design and implementation perspective, understanding a biometrics security system from an attacker’s perspective is also important. In general, there are seven different types of attacks. These types of attacks are categorized by their attacks on a specific part of the design. They can be divided into the following:&lt;br /&gt;
&lt;br /&gt;
'''Type 1:''' Fake biometric sensor&lt;br /&gt;
&lt;br /&gt;
'''Type 2:''' Replay attacks&lt;br /&gt;
&lt;br /&gt;
'''Type 3:''' Trojan horse program at feature extractor&lt;br /&gt;
&lt;br /&gt;
'''Type 4:''' Real features replaced by synthetic features.&lt;br /&gt;
&lt;br /&gt;
'''Type 5:''' Trojan horse program at matcher.&lt;br /&gt;
&lt;br /&gt;
'''Type 6:''' Attacks modifying database of templates.&lt;br /&gt;
&lt;br /&gt;
'''Type 7:''' Results overridden.&lt;br /&gt;
&lt;br /&gt;
[[Image:biometric_attacks.jpg|Types of attacks available on a biometric security system]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Analysis==&lt;br /&gt;
&lt;br /&gt;
===Principle of Least Privilege===&lt;br /&gt;
The design of the biometric security system itself is very linear hence, only the channels themselves need to be protected. This means that overall, processes cannot be accessed past the sensor if the sensor themselves have not been used. From this perspective, the design is secure. However, the system is still vulnerable from all attacks that attack each process directly (type 3, 5, and 6 attacks).&lt;br /&gt;
&lt;br /&gt;
===Principle of Fail-Safe Default===&lt;br /&gt;
The principle of fail-safe default is an excellent principle to follow for security mechanisms, but it falls short due to an implicit assumption within the principle itself. The principle assumes that security mechanisms will always work perfectly if all the requirements are passed. However, with biometric security systems, that is not the case. Biometric security systems are not perfect so they don’t always pass legitimate users and at the same time, they also pass the invalid users as well.&lt;br /&gt;
	Show chart of failure rate.&lt;br /&gt;
&lt;br /&gt;
===Principle of Economy of Mechanism===&lt;br /&gt;
In the design of the biometric security systems, each channel must be encrypted and each state must be protected. This means that overall, the design must contain at least four encryption mechanisms must be used for each channel, and at least five security mechanisms for the five states.&lt;br /&gt;
&lt;br /&gt;
The quantity of states and channels involved means that there are a high number of security mechanisms involved which means that security of the overall design is quite complex. This violates the principle of economy of mechanism, but the security of each channel and state may not be as complex as the design, depending on the implementation.&lt;br /&gt;
&lt;br /&gt;
===Principle of Complete Mediation===&lt;br /&gt;
Depending on the implementation, as long as each channel is encrypted with several layers of protection, it does not violate the principle. However, the problem comes from the human side and the issue arises when people try to replace current authentication mechanism such as password systems with biometric security systems.&lt;br /&gt;
&lt;br /&gt;
For example, new laptops with the Windows operating system have been released with biometric security systems. On the Windows login page, there are two logins available, the password system or the biometric system, and the user only has to use one of them to login, a clear violation of the principle of complete mediation.&lt;br /&gt;
&lt;br /&gt;
===Principle of Open Design===&lt;br /&gt;
The design of the biometric security is acceptable but the weakness is easily identified. The weakness of the design lies in the storage of the templates, which to this day, remains a difficult issue. Two options are available, a centralized data bank or decentralized servers to store all the templates.&lt;br /&gt;
&lt;br /&gt;
The design violates the principle not because the design is shrouded in secrecy but because the design itself is weak. This issue can be solved in the future by having a stronger design.&lt;br /&gt;
&lt;br /&gt;
===Principle of Separation of Privilege===&lt;br /&gt;
&lt;br /&gt;
It is common knowledge that a system is not secure if only one security mechanism is used, so an obvious solution is to have multiple security mechanisms. The issue arises when multiple biometric security systems are used. For example, fingerprints and retinas are used together. However, the problem is similar to those of the principle of fail-safe defaults. It assume that security mechanism work when they are supposed to work, but by increasing the types of biometrics required, the number of FARs (false acceptance rates) and FRRs (false rejection rates) increase as well.&lt;br /&gt;
	Cite examples.&lt;br /&gt;
&lt;br /&gt;
===Principle of Least Common Mechanism===&lt;br /&gt;
&lt;br /&gt;
Again, the design is simple due to its rather linear structure. However, in order for the security system to work, there must be a step in which users are enrolled, so that features can be stored. To cut costs, that enrolment system is typically a part of the authentication mechanism. This means that the biometric security system is more opened to attacks because another channel (between feature extractor and the template bank) must be encrypted, making the design more complicated, and the attacker has another option to attack the template bank.&lt;br /&gt;
&lt;br /&gt;
===Principle of Psychological Acceptability===&lt;br /&gt;
&lt;br /&gt;
The big reason why biometric security systems are so popular is that from an end-user perspective, they are the simplest security mechanisms to use. The user does not require any sort of knowledge of passwords to use, since it depends on either physiological or behavioural traits. However, if it fails, due to the FARs and FRRs, such a problem can be extremely annoying since it is not easy to remedy unless there is an alternative login method, which of course, defeats the purpose of having a biometric authentication method.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Conclusion==&lt;br /&gt;
&lt;br /&gt;
A lot of the faults of a biometric security system are due to current biometric technology. It is simply not advanced enough because the errors in identifying valid and invalid users are still too big, even though it may be as small as 0.01%.&lt;br /&gt;
&lt;br /&gt;
Another issue involves the weak design. As a concept, it is simple, but to implement the design, it requires a lot of encryption and security mechanisms. Also, the design highlights a weakness in storage of the templates. Just like storage of passwords, storage of the templates carries even more risks, because stolen templates could potentially mean a stolen identity.&lt;br /&gt;
&lt;br /&gt;
Also, the current thought regarding biometric security systems is that they are the way of the future, meaning they are to replace current security mechanisms, but as shown above, that is terrible because there are still too many weaknesses, including the fact that not everyone can use such a system either.&lt;br /&gt;
&lt;br /&gt;
However, it is so popular because it is so simple to use and requires almost no effort. Hence, biometric security systems should only be used as a supplement to current security systems, not a replacement.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==See Also==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==References==&lt;/div&gt;</summary>
		<author><name>Mad Doktor</name></author>	</entry>

	<entry>
		<id>http://wiki.cas.mcmaster.ca/index.php/Biometric_Systems_and_Security_Design_Principles</id>
		<title>Biometric Systems and Security Design Principles</title>
		<link rel="alternate" type="text/html" href="http://wiki.cas.mcmaster.ca/index.php/Biometric_Systems_and_Security_Design_Principles"/>
				<updated>2007-12-08T19:30:51Z</updated>
		
		<summary type="html">&lt;p&gt;Mad Doktor:&amp;#32;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;'''Analysis of Biometric Systems using Security Design Principles'''&lt;br /&gt;
&lt;br /&gt;
Biometric security systems are authentication mechanisms that bind an entity to a subject based on what the entity is, as opposed to what they know, what they have, or where they are.&lt;br /&gt;
Within the past several years, biometric security systems have gained a lot of ground in terms of advancements in technology and widespread use. However, there is still a lot of reluctance to adopt the technology worldwide. A look at biometric security systems through security design principles should provide a clearer understanding of its strengths and weaknesses in the implementation and design of biometric security systems.&lt;br /&gt;
[[Image:3dface.jpg|thumb|3D Face Recognition Software]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Biometrics==&lt;br /&gt;
Biometrics is the identification of a person through automated measurements using biological or behavioural features.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Security Design Principles==&lt;br /&gt;
The following eight design principles were created by Saltzer and Shroeder for the design and implementation of security mechanisms. These design principles encompass technical details and human interaction. They are also simple and easy to understand, which is why they will be used as a guide to analyze biometric security systems. The list of design principles are as follows:&lt;br /&gt;
&lt;br /&gt;
'''Principle of Least Privilege:'''&lt;br /&gt;
A subject should be given only those privileges that it needs in order to complete its task.&lt;br /&gt;
&lt;br /&gt;
'''Principle of Fails-Safe Defaults:'''&lt;br /&gt;
A subject should be denied access to an object unless the subject was given access.&lt;br /&gt;
&lt;br /&gt;
'''Principle of Economy of Mechanism:'''&lt;br /&gt;
Security mechanisms should be as simple as possible.&lt;br /&gt;
&lt;br /&gt;
'''Principle of Complete Mediation:'''&lt;br /&gt;
All accesses to objects are checked to ensure that they are allowed.&lt;br /&gt;
&lt;br /&gt;
'''Principle of Open Design:'''&lt;br /&gt;
Security of a mechanism should not depend on the secrecy of its design or implementation.&lt;br /&gt;
&lt;br /&gt;
'''Principle of Separation of Privilege:'''&lt;br /&gt;
A system should not grant permission based on a single condition.&lt;br /&gt;
&lt;br /&gt;
'''Principle of Least Common Mechanism:'''&lt;br /&gt;
Mechanisms used to access resources should not be shared.&lt;br /&gt;
&lt;br /&gt;
'''Principle of Psychological Acceptability:'''&lt;br /&gt;
Security mechanisms should not make the resource more difficult to access than if the security mechanisms were not present.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Breaking a Biometrics Security System==&lt;br /&gt;
In addition to looking at biometric security systems from a design and implementation perspective, understanding a biometrics security system from an attacker’s perspective is also important. In general, there are seven different types of attacks. These types of attacks are categorized by their attacks on a specific part of the design. They can be divided into the following:&lt;br /&gt;
&lt;br /&gt;
'''Type 1:''' Fake biometric sensor&lt;br /&gt;
&lt;br /&gt;
'''Type 2:''' Replay attacks&lt;br /&gt;
&lt;br /&gt;
'''Type 3:''' Trojan horse program at feature extractor&lt;br /&gt;
&lt;br /&gt;
'''Type 4:''' Real features replaced by synthetic features.&lt;br /&gt;
&lt;br /&gt;
'''Type 5:''' Trojan horse program at matcher.&lt;br /&gt;
&lt;br /&gt;
'''Type 6:''' Attacks modifying database of templates.&lt;br /&gt;
&lt;br /&gt;
'''Type 7:''' Results overridden.&lt;br /&gt;
&lt;br /&gt;
[[Image:biometric_attacks.jpg|Types of attacks available on a biometric security system]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Analysis==&lt;br /&gt;
&lt;br /&gt;
===Principle of Least Privilege===&lt;br /&gt;
The design of the biometric security system itself is very linear hence, only the channels themselves need to be protected. This means that overall, processes cannot be accessed past the sensor if the sensor themselves have not been used. From this perspective, the design is secure. However, the system is still vulnerable from all attacks that attack each process directly (type 3, 5, and 6 attacks).&lt;br /&gt;
&lt;br /&gt;
===Principle of Fail-Safe Default===&lt;br /&gt;
The principle of fail-safe default is an excellent principle to follow for security mechanisms, but it falls short due to an implicit assumption within the principle itself. The principle assumes that security mechanisms will always work perfectly if all the requirements are passed. However, with biometric security systems, that is not the case. Biometric security systems are not perfect so they don’t always pass legitimate users and at the same time, they also pass the invalid users as well.&lt;br /&gt;
	Show chart of failure rate.&lt;br /&gt;
&lt;br /&gt;
===Principle of Economy of Mechanism===&lt;br /&gt;
In the design of the biometric security systems, each channel must be encrypted and each state must be protected. This means that overall, the design must contain at least four encryption mechanisms must be used for each channel, and at least five security mechanisms for the five states.&lt;br /&gt;
&lt;br /&gt;
The quantity of states and channels involved means that there are a high number of security mechanisms involved which means that security of the overall design is quite complex. This violates the principle of economy of mechanism, but the security of each channel and state may not be as complex as the design, depending on the implementation.&lt;br /&gt;
&lt;br /&gt;
===Principle of Complete Mediation===&lt;br /&gt;
Depending on the implementation, as long as each channel is encrypted with several layers of protection, it does not violate the principle. However, the problem comes from the human side and the issue arises when people try to replace current authentication mechanism such as password systems with biometric security systems.&lt;br /&gt;
&lt;br /&gt;
For example, new laptops with the Windows operating system have been released with biometric security systems. On the Windows login page, there are two logins available, the password system or the biometric system, and the user only has to use one of them to login, a clear violation of the principle of complete mediation.&lt;br /&gt;
&lt;br /&gt;
===Principle of Open Design===&lt;br /&gt;
The design of the biometric security is acceptable but the weakness is easily identified. The weakness of the design lies in the storage of the templates, which to this day, remains a difficult issue. Two options are available, a centralized data bank or decentralized servers to store all the templates.&lt;br /&gt;
&lt;br /&gt;
The design violates the principle not because the design is shrouded in secrecy but because the design itself is weak. This issue can be solved in the future by having a stronger design.&lt;br /&gt;
&lt;br /&gt;
===Principle of Separation of Privilege===&lt;br /&gt;
&lt;br /&gt;
It is common knowledge that a system is not secure if only one security mechanism is used, so an obvious solution is to have multiple security mechanisms. The issue arises when multiple biometric security systems are used. For example, fingerprints and retinas are used together. However, the problem is similar to those of the principle of fail-safe defaults. It assume that security mechanism work when they are supposed to work, but by increasing the types of biometrics required, the number of FARs (false acceptance rates) and FRRs (false rejection rates) increase as well.&lt;br /&gt;
	Cite examples.&lt;br /&gt;
&lt;br /&gt;
===Principle of Least Common Mechanism===&lt;br /&gt;
&lt;br /&gt;
Again, the design is simple due to its rather linear structure. However, in order for the security system to work, there must be a step in which users are enrolled, so that features can be stored. To cut costs, that enrolment system is typically a part of the authentication mechanism. This means that the biometric security system is more opened to attacks because another channel (between feature extractor and the template bank) must be encrypted, making the design more complicated, and the attacker has another option to attack the template bank.&lt;br /&gt;
&lt;br /&gt;
===Principle of Psychological Acceptability===&lt;br /&gt;
&lt;br /&gt;
The big reason why biometric security systems are so popular is that from an end-user perspective, they are the simplest security mechanisms to use. The user does not require any sort of knowledge of passwords to use, since it depends on either physiological or behavioural traits. However, if it fails, due to the FARs and FRRs, such a problem can be extremely annoying since it is not easy to remedy unless there is an alternative login method, which of course, defeats the purpose of having a biometric authentication method.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Conclusion==&lt;br /&gt;
&lt;br /&gt;
A lot of the faults of a biometric security system are due to current biometric technology. It is simply not advanced enough because the errors in identifying valid and invalid users are still too big, even though it may be as small as 0.01%.&lt;br /&gt;
&lt;br /&gt;
Another issue involves the weak design. As a concept, it is simple, but to implement the design, it requires a lot of encryption and security mechanisms. Also, the design highlights a weakness in storage of the templates. Just like storage of passwords, storage of the templates carries even more risks, because stolen templates could potentially mean a stolen identity.&lt;br /&gt;
&lt;br /&gt;
Also, the current thought regarding biometric security systems is that they are the way of the future, meaning they are to replace current security mechanisms, but as shown above, that is terrible because there are still too many weaknesses, including the fact that not everyone can use such a system either.&lt;br /&gt;
&lt;br /&gt;
However, it is so popular because it is so simple to use and requires almost no effort. Hence, biometric security systems should only be used as a supplement to current security systems, not a replacement.&lt;/div&gt;</summary>
		<author><name>Mad Doktor</name></author>	</entry>

	<entry>
		<id>http://wiki.cas.mcmaster.ca/index.php/Biometric_Systems_and_Security_Design_Principles</id>
		<title>Biometric Systems and Security Design Principles</title>
		<link rel="alternate" type="text/html" href="http://wiki.cas.mcmaster.ca/index.php/Biometric_Systems_and_Security_Design_Principles"/>
				<updated>2007-12-08T19:11:22Z</updated>
		
		<summary type="html">&lt;p&gt;Mad Doktor:&amp;#32;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;'''Analysis of Biometric Systems using Security Design Principles'''&lt;br /&gt;
&lt;br /&gt;
Biometric security systems are authentication mechanisms that bind an entity to a subject based on what the entity is, as opposed to what they know, what they have, or where they are.&lt;br /&gt;
Within the past several years, biometric security systems have gained a lot of ground in terms of advancements in technology and widespread use. However, there is still a lot of reluctance to adopt the technology worldwide. A look at biometric security systems through security design principles should provide a clearer understanding of its strengths and weaknesses in the implementation and design of biometric security systems.&lt;br /&gt;
[[Image:3dface.jpg|thumb|3D Face Recognition Software]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Biometrics==&lt;br /&gt;
Biometrics is the identification of a person through automated measurements using biological or behavioural features.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Security Design Principles==&lt;br /&gt;
The following eight design principles were created by Saltzer and Shroeder for the design and implementation of security mechanisms. These design principles encompass technical details and human interaction. They are also simple and easy to understand, which is why they will be used as a guide to analyze biometric security systems. The list of design principles are as follows:&lt;br /&gt;
&lt;br /&gt;
'''Principle of Least Privilege:'''&lt;br /&gt;
A subject should be given only those privileges that it needs in order to complete its task.&lt;br /&gt;
&lt;br /&gt;
'''Principle of Fails-Safe Defaults:'''&lt;br /&gt;
A subject should be denied access to an object unless the subject was given access.&lt;br /&gt;
&lt;br /&gt;
'''Principle of Economy of Mechanism:'''&lt;br /&gt;
Security mechanisms should be as simple as possible.&lt;br /&gt;
&lt;br /&gt;
'''Principle of Complete Mediation:'''&lt;br /&gt;
All accesses to objects are checked to ensure that they are allowed.&lt;br /&gt;
&lt;br /&gt;
'''Principle of Open Design:'''&lt;br /&gt;
Security of a mechanism should not depend on the secrecy of its design or implementation.&lt;br /&gt;
&lt;br /&gt;
'''Principle of Separation of Privilege:'''&lt;br /&gt;
A system should not grant permission based on a single condition.&lt;br /&gt;
&lt;br /&gt;
'''Principle of Least Common Mechanism:'''&lt;br /&gt;
Mechanisms used to access resources should not be shared.&lt;br /&gt;
&lt;br /&gt;
'''Principle of Psychological Acceptability:'''&lt;br /&gt;
Security mechanisms should not make the resource more difficult to access than if the security mechanisms were not present.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Breaking a Biometrics Security System==&lt;br /&gt;
In addition to looking at biometric security systems from a design and implementation perspective, understanding a biometrics security system from an attacker’s perspective is also important. In general, there are seven different types of attacks, they are the following:&lt;br /&gt;
&lt;br /&gt;
'''Type 1:''' Fake biometric sensor&lt;br /&gt;
&lt;br /&gt;
'''Type 2:''' Replay attacks&lt;br /&gt;
&lt;br /&gt;
'''Type 3:''' Trojan horse program at feature extractor&lt;br /&gt;
&lt;br /&gt;
'''Type 4:''' Real features replaced by synthetic features.&lt;br /&gt;
&lt;br /&gt;
'''Type 5:''' Trojan horse program at matcher.&lt;br /&gt;
&lt;br /&gt;
'''Type 6:''' Attacks modifying database of templates.&lt;br /&gt;
&lt;br /&gt;
'''Type 7:''' Results overridden.&lt;br /&gt;
&lt;br /&gt;
[[Image:biometric_attacks.jpg|Types of attacks available on a biometric security system]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Analysis==&lt;br /&gt;
&lt;br /&gt;
===Principle of Least Privilege===&lt;br /&gt;
The design of the biometric security system itself is very linear hence, only the channels themselves need to be protected. This means that overall, processes cannot be accessed past the sensor if the sensor themselves have not been used. From this perspective, the design is secure. However, the system is still vulnerable from all attacks that attack each process directly (type 3, 5, and 6 attacks).&lt;br /&gt;
&lt;br /&gt;
===Principle of Fail-Safe Default===&lt;br /&gt;
The principle of fail-safe default is an excellent principle to follow for security mechanisms, but it falls short due to an implicit assumption within the principle itself. The principle assumes that security mechanisms will always work perfectly if all the requirements are passed. However, with biometric security systems, that is not the case. Biometric security systems are not perfect so they don’t always pass legitimate users and at the same time, they also pass the invalid users as well.&lt;br /&gt;
	Show chart of failure rate.&lt;br /&gt;
&lt;br /&gt;
===Principle of Economy of Mechanism===&lt;br /&gt;
In the design of the biometric security systems, each channel must be encrypted and each state must be protected. This means that overall, the design must contain at least four encryption mechanisms must be used for each channel, and at least five security mechanisms for the five states.&lt;br /&gt;
&lt;br /&gt;
The quantity of states and channels involved means that there are a high number of security mechanisms involved which means that security of the overall design is quite complex. This violates the principle of economy of mechanism, but the security of each channel and state may not be as complex as the design, depending on the implementation.&lt;br /&gt;
&lt;br /&gt;
===Principle of Complete Mediation===&lt;br /&gt;
Depending on the implementation, as long as each channel is encrypted with several layers of protection, it does not violate the principle. However, the problem comes from the human side and the issue arises when people try to replace current authentication mechanism such as password systems with biometric security systems.&lt;br /&gt;
&lt;br /&gt;
For example, new laptops with the Windows operating system have been released with biometric security systems. On the Windows login page, there are two logins available, the password system or the biometric system, and the user only has to use one of them to login, a clear violation of the principle of complete mediation.&lt;br /&gt;
&lt;br /&gt;
===Principle of Open Design===&lt;br /&gt;
The design of the biometric security is acceptable but the weakness is easily identified. The weakness of the design lies in the storage of the templates, which to this day, remains a difficult issue. Two options are available, a centralized data bank or decentralized servers to store all the templates.&lt;br /&gt;
&lt;br /&gt;
The design violates the principle not because the design is shrouded in secrecy but because the design itself is weak. This issue can be solved in the future by having a stronger design.&lt;br /&gt;
&lt;br /&gt;
===Principle of Separation of Privilege===&lt;br /&gt;
&lt;br /&gt;
It is common knowledge that a system is not secure if only one security mechanism is used, so an obvious solution is to have multiple security mechanisms. The issue arises when multiple biometric security systems are used. For example, fingerprints and retinas are used together. However, the problem is similar to those of the principle of fail-safe defaults. It assume that security mechanism work when they are supposed to work, but by increasing the types of biometrics required, the number of FARs (false acceptance rates) and FRRs (false rejection rates) increase as well.&lt;br /&gt;
	Cite examples.&lt;br /&gt;
&lt;br /&gt;
===Principle of Least Common Mechanism===&lt;br /&gt;
&lt;br /&gt;
Again, the design is simple due to its rather linear structure. However, in order for the security system to work, there must be a step in which users are enrolled, so that features can be stored. To cut costs, that enrolment system is typically a part of the authentication mechanism. This means that the biometric security system is more opened to attacks because another channel (between feature extractor and the template bank) must be encrypted, making the design more complicated, and the attacker has another option to attack the template bank.&lt;br /&gt;
&lt;br /&gt;
===Principle of Psychological Acceptability===&lt;br /&gt;
&lt;br /&gt;
The big reason why biometric security systems are so popular is that from an end-user perspective, they are the simplest security mechanisms to use. The user does not require any sort of knowledge of passwords to use, since it depends on either physiological or behavioural traits. However, if it fails, due to the FARs and FRRs, such a problem can be extremely annoying since it is not easy to remedy unless there is an alternative login method, which of course, defeats the purpose of having a biometric authentication method.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Conclusion==&lt;br /&gt;
&lt;br /&gt;
A lot of the faults of a biometric security system are due to current biometric technology. It is simply not advanced enough because the errors in identifying valid and invalid users are still too big, even though it may be as small as 0.01%.&lt;br /&gt;
&lt;br /&gt;
Another issue involves the weak design. As a concept, it is simple, but to implement the design, it requires a lot of encryption and security mechanisms. Also, the design highlights a weakness in storage of the templates. Just like storage of passwords, storage of the templates carries even more risks, because stolen templates could potentially mean a stolen identity.&lt;br /&gt;
&lt;br /&gt;
Also, the current thought regarding biometric security systems is that they are the way of the future, meaning they are to replace current security mechanisms, but as shown above, that is terrible because there are still too many weaknesses, including the fact that not everyone can use such a system either.&lt;br /&gt;
&lt;br /&gt;
However, it is so popular because it is so simple to use and requires almost no effort. Hence, biometric security systems should only be used as a supplement to current security systems, not a replacement.&lt;/div&gt;</summary>
		<author><name>Mad Doktor</name></author>	</entry>

	<entry>
		<id>http://wiki.cas.mcmaster.ca/index.php/File:Biometric_attacks.jpg</id>
		<title>File:Biometric attacks.jpg</title>
		<link rel="alternate" type="text/html" href="http://wiki.cas.mcmaster.ca/index.php/File:Biometric_attacks.jpg"/>
				<updated>2007-12-08T19:05:28Z</updated>
		
		<summary type="html">&lt;p&gt;Mad Doktor:&amp;#32;Types of attacks on the design of a biometric security system.&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Types of attacks on the design of a biometric security system.&lt;/div&gt;</summary>
		<author><name>Mad Doktor</name></author>	</entry>

	<entry>
		<id>http://wiki.cas.mcmaster.ca/index.php/Biometric_Systems_and_Security_Design_Principles</id>
		<title>Biometric Systems and Security Design Principles</title>
		<link rel="alternate" type="text/html" href="http://wiki.cas.mcmaster.ca/index.php/Biometric_Systems_and_Security_Design_Principles"/>
				<updated>2007-12-08T18:41:05Z</updated>
		
		<summary type="html">&lt;p&gt;Mad Doktor:&amp;#32;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;'''Analysis of Biometric Systems using Security Design Principles'''&lt;br /&gt;
&lt;br /&gt;
Biometric security systems are authentication mechanisms that bind an entity to a subject based on what the entity is, as opposed to what they know, what they have, or where they are.&lt;br /&gt;
Within the past several years, biometric security systems have gained a lot of ground in terms of advancements in technology and widespread use. However, there is still a lot of reluctance to adopt the technology worldwide. A look at biometric security systems through security design principles should provide a clearer understanding of its strengths and weaknesses in the implementation and design of biometric security systems.&lt;br /&gt;
[[Image:3dface.jpg|thumb|3D Face Recognition Software]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Biometrics==&lt;br /&gt;
Biometrics is the identification of a person through automated measurements using biological or behavioural features.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Security Design Principles==&lt;br /&gt;
The following eight design principles were created by Saltzer and Shroeder for the design and implementation of security mechanisms. These design principles encompass technical details and human interaction. They are also simple and easy to understand, which is why they will be used as a guide to analyze biometric security systems. The list of design principles are as follows:&lt;br /&gt;
&lt;br /&gt;
'''Principle of Least Privilege:'''&lt;br /&gt;
A subject should be given only those privileges that it needs in order to complete its task.&lt;br /&gt;
&lt;br /&gt;
'''Principle of Fails-Safe Defaults:'''&lt;br /&gt;
A subject should be denied access to an object unless the subject was given access.&lt;br /&gt;
&lt;br /&gt;
'''Principle of Economy of Mechanism:'''&lt;br /&gt;
Security mechanisms should be as simple as possible.&lt;br /&gt;
&lt;br /&gt;
'''Principle of Complete Mediation:'''&lt;br /&gt;
All accesses to objects are checked to ensure that they are allowed.&lt;br /&gt;
&lt;br /&gt;
'''Principle of Open Design:'''&lt;br /&gt;
Security of a mechanism should not depend on the secrecy of its design or implementation.&lt;br /&gt;
&lt;br /&gt;
'''Principle of Separation of Privilege:'''&lt;br /&gt;
A system should not grant permission based on a single condition.&lt;br /&gt;
&lt;br /&gt;
'''Principle of Least Common Mechanism:'''&lt;br /&gt;
Mechanisms used to access resources should not be shared.&lt;br /&gt;
&lt;br /&gt;
'''Principle of Psychological Acceptability:'''&lt;br /&gt;
Security mechanisms should not make the resource more difficult to access than if the security mechanisms were not present.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Breaking a Biometrics Security System==&lt;br /&gt;
In addition to looking at biometric security systems from a design and implementation perspective, understanding a biometrics security system from an attacker’s perspective is also important. In general, there are seven different types of attacks, they are the following:&lt;br /&gt;
&lt;br /&gt;
'''Type 1:''' Fake biometric sensor&lt;br /&gt;
&lt;br /&gt;
'''Type 2:''' Replay attacks&lt;br /&gt;
&lt;br /&gt;
'''Type 3:''' Trojan horse program at feature extractor&lt;br /&gt;
&lt;br /&gt;
'''Type 4:''' Real features replaced by synthetic features.&lt;br /&gt;
&lt;br /&gt;
'''Type 5:''' Trojan horse program at matcher.&lt;br /&gt;
&lt;br /&gt;
'''Type 6:''' Attacks modifying database of templates.&lt;br /&gt;
&lt;br /&gt;
'''Type 7:''' Results overridden.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Analysis==&lt;br /&gt;
&lt;br /&gt;
===Principle of Least Privilege===&lt;br /&gt;
The design of the biometric security system itself is very linear hence, only the channels themselves need to be protected. This means that overall, processes cannot be accessed past the sensor if the sensor themselves have not been used. From this perspective, the design is secure. However, the system is still vulnerable from all attacks that attack each process directly (type 3, 5, and 6 attacks).&lt;br /&gt;
&lt;br /&gt;
===Principle of Fail-Safe Default===&lt;br /&gt;
The principle of fail-safe default is an excellent principle to follow for security mechanisms, but it falls short due to an implicit assumption within the principle itself. The principle assumes that security mechanisms will always work perfectly if all the requirements are passed. However, with biometric security systems, that is not the case. Biometric security systems are not perfect so they don’t always pass legitimate users and at the same time, they also pass the invalid users as well.&lt;br /&gt;
	Show chart of failure rate.&lt;br /&gt;
&lt;br /&gt;
===Principle of Economy of Mechanism===&lt;br /&gt;
In the design of the biometric security systems, each channel must be encrypted and each state must be protected. This means that overall, the design must contain at least four encryption mechanisms must be used for each channel, and at least five security mechanisms for the five states.&lt;br /&gt;
&lt;br /&gt;
The quantity of states and channels involved means that there are a high number of security mechanisms involved which means that security of the overall design is quite complex. This violates the principle of economy of mechanism, but the security of each channel and state may not be as complex as the design, depending on the implementation.&lt;br /&gt;
&lt;br /&gt;
===Principle of Complete Mediation===&lt;br /&gt;
Depending on the implementation, as long as each channel is encrypted with several layers of protection, it does not violate the principle. However, the problem comes from the human side and the issue arises when people try to replace current authentication mechanism such as password systems with biometric security systems.&lt;br /&gt;
&lt;br /&gt;
For example, new laptops with the Windows operating system have been released with biometric security systems. On the Windows login page, there are two logins available, the password system or the biometric system, and the user only has to use one of them to login, a clear violation of the principle of complete mediation.&lt;br /&gt;
&lt;br /&gt;
===Principle of Open Design===&lt;br /&gt;
The design of the biometric security is acceptable but the weakness is easily identified. The weakness of the design lies in the storage of the templates, which to this day, remains a difficult issue. Two options are available, a centralized data bank or decentralized servers to store all the templates.&lt;br /&gt;
&lt;br /&gt;
The design violates the principle not because the design is shrouded in secrecy but because the design itself is weak. This issue can be solved in the future by having a stronger design.&lt;br /&gt;
&lt;br /&gt;
===Principle of Separation of Privilege===&lt;br /&gt;
&lt;br /&gt;
It is common knowledge that a system is not secure if only one security mechanism is used, so an obvious solution is to have multiple security mechanisms. The issue arises when multiple biometric security systems are used. For example, fingerprints and retinas are used together. However, the problem is similar to those of the principle of fail-safe defaults. It assume that security mechanism work when they are supposed to work, but by increasing the types of biometrics required, the number of FARs (false acceptance rates) and FRRs (false rejection rates) increase as well.&lt;br /&gt;
	Cite examples.&lt;br /&gt;
&lt;br /&gt;
===Principle of Least Common Mechanism===&lt;br /&gt;
&lt;br /&gt;
Again, the design is simple due to its rather linear structure. However, in order for the security system to work, there must be a step in which users are enrolled, so that features can be stored. To cut costs, that enrolment system is typically a part of the authentication mechanism. This means that the biometric security system is more opened to attacks because another channel (between feature extractor and the template bank) must be encrypted, making the design more complicated, and the attacker has another option to attack the template bank.&lt;br /&gt;
&lt;br /&gt;
===Principle of Psychological Acceptability===&lt;br /&gt;
&lt;br /&gt;
The big reason why biometric security systems are so popular is that from an end-user perspective, they are the simplest security mechanisms to use. The user does not require any sort of knowledge of passwords to use, since it depends on either physiological or behavioural traits. However, if it fails, due to the FARs and FRRs, such a problem can be extremely annoying since it is not easy to remedy unless there is an alternative login method, which of course, defeats the purpose of having a biometric authentication method.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Conclusion==&lt;br /&gt;
&lt;br /&gt;
A lot of the faults of a biometric security system are due to current biometric technology. It is simply not advanced enough because the errors in identifying valid and invalid users are still too big, even though it may be as small as 0.01%.&lt;br /&gt;
&lt;br /&gt;
Another issue involves the weak design. As a concept, it is simple, but to implement the design, it requires a lot of encryption and security mechanisms. Also, the design highlights a weakness in storage of the templates. Just like storage of passwords, storage of the templates carries even more risks, because stolen templates could potentially mean a stolen identity.&lt;br /&gt;
&lt;br /&gt;
Also, the current thought regarding biometric security systems is that they are the way of the future, meaning they are to replace current security mechanisms, but as shown above, that is terrible because there are still too many weaknesses, including the fact that not everyone can use such a system either.&lt;br /&gt;
&lt;br /&gt;
However, it is so popular because it is so simple to use and requires almost no effort. Hence, biometric security systems should only be used as a supplement to current security systems, not a replacement.&lt;/div&gt;</summary>
		<author><name>Mad Doktor</name></author>	</entry>

	<entry>
		<id>http://wiki.cas.mcmaster.ca/index.php/Biometric_Systems_and_Security_Design_Principles</id>
		<title>Biometric Systems and Security Design Principles</title>
		<link rel="alternate" type="text/html" href="http://wiki.cas.mcmaster.ca/index.php/Biometric_Systems_and_Security_Design_Principles"/>
				<updated>2007-12-08T18:32:39Z</updated>
		
		<summary type="html">&lt;p&gt;Mad Doktor:&amp;#32;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;'''Analysis of Biometric Systems using Security Design Principles'''&lt;br /&gt;
&lt;br /&gt;
Biometric security systems are authentication mechanisms that bind an entity to a subject based on what the entity is, as opposed to what they know, what they have, or where they are.&lt;br /&gt;
Within the past several years, biometric security systems have gained a lot of ground in terms of advancements in technology and widespread use. However, there is still a lot of reluctance to adopt the technology worldwide. A look at biometric security systems through security design principles should provide a clearer understanding of its strengths and weaknesses in the implementation and design of biometric security systems.&lt;br /&gt;
[[Image:3dface.jpg]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Biometrics==&lt;br /&gt;
Biometrics is the identification of a person through automated measurements using biological or behavioural features.&lt;br /&gt;
&lt;br /&gt;
==Security Design Principles==&lt;br /&gt;
The following eight design principles were created by Saltzer and Shroeder for the design and implementation of security mechanisms. These design principles encompass technical details and human interaction. They are also simple and easy to understand, which is why they will be used as a guide to analyze biometric security systems. The list of design principles are as follows:&lt;br /&gt;
&lt;br /&gt;
'''Principle of Least Privilege:'''&lt;br /&gt;
A subject should be given only those privileges that it needs in order to complete its task.&lt;br /&gt;
&lt;br /&gt;
'''Principle of Fails-Safe Defaults:'''&lt;br /&gt;
A subject should be denied access to an object unless the subject was given access.&lt;br /&gt;
&lt;br /&gt;
'''Principle of Economy of Mechanism:'''&lt;br /&gt;
Security mechanisms should be as simple as possible.&lt;br /&gt;
&lt;br /&gt;
'''Principle of Complete Mediation:'''&lt;br /&gt;
All accesses to objects are checked to ensure that they are allowed.&lt;br /&gt;
&lt;br /&gt;
'''Principle of Open Design:'''&lt;br /&gt;
Security of a mechanism should not depend on the secrecy of its design or implementation.&lt;br /&gt;
&lt;br /&gt;
'''Principle of Separation of Privilege:'''&lt;br /&gt;
A system should not grant permission based on a single condition.&lt;br /&gt;
&lt;br /&gt;
'''Principle of Least Common Mechanism:'''&lt;br /&gt;
Mechanisms used to access resources should not be shared.&lt;br /&gt;
&lt;br /&gt;
'''Principle of Psychological Acceptability:'''&lt;br /&gt;
Security mechanisms should not make the resource more difficult to access than if the security mechanisms were not present.&lt;br /&gt;
&lt;br /&gt;
==Breaking a Biometrics Security System==&lt;br /&gt;
In addition to looking at biometric security systems from a design and implementation perspective, understanding a biometrics security system from an attacker’s perspective is also important. In general, there are seven different types of attacks, they are the following:&lt;br /&gt;
&lt;br /&gt;
-	Type 1: Fake biometric sensor&lt;br /&gt;
-	Type 2: Replay attacks&lt;br /&gt;
-	Type 3: Trojan horse program at feature extractor&lt;br /&gt;
-	Type 4: Real features replaced by synthetic features.&lt;br /&gt;
-	Type 5: Trojan horse program at matcher.&lt;br /&gt;
-	Type 6: Attacks modifying database of templates.&lt;br /&gt;
-	Type 7: Results overridden.&lt;br /&gt;
&lt;br /&gt;
==Analysis==&lt;br /&gt;
&lt;br /&gt;
===Principle of Least Privilege===&lt;br /&gt;
The design of the biometric security system itself is very linear hence, only the channels themselves need to be protected. This means that overall, processes cannot be accessed past the sensor if the sensor themselves have not been used. From this perspective, the design is secure. However, the system is still vulnerable from all attacks that attack each process directly (type 3, 5, and 6 attacks).&lt;br /&gt;
&lt;br /&gt;
===Principle of Fail-Safe Default===&lt;br /&gt;
The principle of fail-safe default is an excellent principle to follow for security mechanisms, but it falls short due to an implicit assumption within the principle itself. The principle assumes that security mechanisms will always work perfectly if all the requirements are passed. However, with biometric security systems, that is not the case. Biometric security systems are not perfect so they don’t always pass legitimate users and at the same time, they also pass the invalid users as well.&lt;br /&gt;
	Show chart of failure rate.&lt;br /&gt;
&lt;br /&gt;
===Principle of Economy of Mechanism===&lt;br /&gt;
In the design of the biometric security systems, each channel must be encrypted and each state must be protected. This means that overall, the design must contain at least four encryption mechanisms must be used for each channel, and at least five security mechanisms for the five states.&lt;br /&gt;
&lt;br /&gt;
The quantity of states and channels involved means that there are a high number of security mechanisms involved which means that security of the overall design is quite complex. This violates the principle of economy of mechanism, but the security of each channel and state may not be as complex as the design, depending on the implementation.&lt;br /&gt;
&lt;br /&gt;
===Principle of Complete Mediation===&lt;br /&gt;
Depending on the implementation, as long as each channel is encrypted with several layers of protection, it does not violate the principle. However, the problem comes from the human side and the issue arises when people try to replace current authentication mechanism such as password systems with biometric security systems.&lt;br /&gt;
&lt;br /&gt;
For example, new laptops with the Windows operating system have been released with biometric security systems. On the Windows login page, there are two logins available, the password system or the biometric system, and the user only has to use one of them to login, a clear violation of the principle of complete mediation.&lt;br /&gt;
&lt;br /&gt;
===Principle of Open Design===&lt;br /&gt;
The design of the biometric security is acceptable but the weakness is easily identified. The weakness of the design lies in the storage of the templates, which to this day, remains a difficult issue. Two options are available, a centralized data bank or decentralized servers to store all the templates.&lt;br /&gt;
&lt;br /&gt;
The design violates the principle not because the design is shrouded in secrecy but because the design itself is weak. This issue can be solved in the future by having a stronger design.&lt;br /&gt;
&lt;br /&gt;
===Principle of Separation of Privilege===&lt;br /&gt;
&lt;br /&gt;
It is common knowledge that a system is not secure if only one security mechanism is used, so an obvious solution is to have multiple security mechanisms. The issue arises when multiple biometric security systems are used. For example, fingerprints and retinas are used together. However, the problem is similar to those of the principle of fail-safe defaults. It assume that security mechanism work when they are supposed to work, but by increasing the types of biometrics required, the number of FARs (false acceptance rates) and FRRs (false rejection rates) increase as well.&lt;br /&gt;
	Cite examples.&lt;br /&gt;
&lt;br /&gt;
===Principle of Least Common Mechanism===&lt;br /&gt;
&lt;br /&gt;
Again, the design is simple due to its rather linear structure. However, in order for the security system to work, there must be a step in which users are enrolled, so that features can be stored. To cut costs, that enrolment system is typically a part of the authentication mechanism. This means that the biometric security system is more opened to attacks because another channel (between feature extractor and the template bank) must be encrypted, making the design more complicated, and the attacker has another option to attack the template bank.&lt;br /&gt;
&lt;br /&gt;
===Principle of Psychological Acceptability===&lt;br /&gt;
&lt;br /&gt;
The big reason why biometric security systems are so popular is that from an end-user perspective, they are the simplest security mechanisms to use. The user does not require any sort of knowledge of passwords to use, since it depends on either physiological or behavioural traits. However, if it fails, due to the FARs and FRRs, such a problem can be extremely annoying since it is not easy to remedy unless there is an alternative login method, which of course, defeats the purpose of having a biometric authentication method.&lt;br /&gt;
&lt;br /&gt;
==Conclusion==&lt;br /&gt;
&lt;br /&gt;
A lot of the faults of a biometric security system are due to current biometric technology. It is simply not advanced enough because the errors in identifying valid and invalid users are still too big, even though it may be as small as 0.01%.&lt;br /&gt;
	Another issue involves the weak design. As a concept, it is simple, but to implement the design, it requires a lot of encryption and security mechanisms. Also, the design highlights a weakness in storage of the templates. Just like storage of passwords, storage of the templates carries even more risks, because stolen templates could potentially mean a stolen identity.&lt;br /&gt;
	Also, the current thought regarding biometric security systems is that they are the way of the future, meaning they are to replace current security mechanisms, but as shown above, that is terrible because there are still too many weaknesses, including the fact that not everyone can use such a system either.&lt;br /&gt;
	However, it is so popular because it is so simple to use and requires almost no effort. Hence, biometric security systems should only be used as a supplement to current security systems, not a replacement.&lt;/div&gt;</summary>
		<author><name>Mad Doktor</name></author>	</entry>

	<entry>
		<id>http://wiki.cas.mcmaster.ca/index.php/File:3dface.jpg</id>
		<title>File:3dface.jpg</title>
		<link rel="alternate" type="text/html" href="http://wiki.cas.mcmaster.ca/index.php/File:3dface.jpg"/>
				<updated>2007-12-08T18:32:07Z</updated>
		
		<summary type="html">&lt;p&gt;Mad Doktor:&amp;#32;An image of a human face using 3d face recognition/mapping software.&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;An image of a human face using 3d face recognition/mapping software.&lt;/div&gt;</summary>
		<author><name>Mad Doktor</name></author>	</entry>

	<entry>
		<id>http://wiki.cas.mcmaster.ca/index.php/Biometric_Systems_and_Security_Design_Principles</id>
		<title>Biometric Systems and Security Design Principles</title>
		<link rel="alternate" type="text/html" href="http://wiki.cas.mcmaster.ca/index.php/Biometric_Systems_and_Security_Design_Principles"/>
				<updated>2007-12-08T18:27:00Z</updated>
		
		<summary type="html">&lt;p&gt;Mad Doktor:&amp;#32;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;'''Analysis of Biometric Systems using Security Design Principles'''&lt;br /&gt;
&lt;br /&gt;
Biometric security systems are authentication mechanisms that bind an entity to a subject based on what the entity is, as opposed to what they know, what they have, or where they are.&lt;br /&gt;
Within the past several years, biometric security systems have gained a lot of ground in terms of advancements in technology and widespread use. However, there is still a lot of reluctance to adopt the technology worldwide. A look at biometric security systems through security design principles should provide a clearer understanding of its strengths and weaknesses in the implementation and design of biometric security systems.&lt;br /&gt;
[[Image:http://www.primidi.com/images/aurora_3d_recognition.jpg]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Biometrics==&lt;br /&gt;
Biometrics is the identification of a person through automated measurements using biological or behavioural features.&lt;br /&gt;
&lt;br /&gt;
==Security Design Principles==&lt;br /&gt;
The following eight design principles were created by Saltzer and Shroeder for the design and implementation of security mechanisms. These design principles encompass technical details and human interaction. They are also simple and easy to understand, which is why they will be used as a guide to analyze biometric security systems. The list of design principles are as follows:&lt;br /&gt;
&lt;br /&gt;
'''Principle of Least Privilege:'''&lt;br /&gt;
A subject should be given only those privileges that it needs in order to complete its task.&lt;br /&gt;
&lt;br /&gt;
'''Principle of Fails-Safe Defaults:'''&lt;br /&gt;
A subject should be denied access to an object unless the subject was given access.&lt;br /&gt;
&lt;br /&gt;
'''Principle of Economy of Mechanism:'''&lt;br /&gt;
Security mechanisms should be as simple as possible.&lt;br /&gt;
&lt;br /&gt;
'''Principle of Complete Mediation:'''&lt;br /&gt;
All accesses to objects are checked to ensure that they are allowed.&lt;br /&gt;
&lt;br /&gt;
'''Principle of Open Design:'''&lt;br /&gt;
Security of a mechanism should not depend on the secrecy of its design or implementation.&lt;br /&gt;
&lt;br /&gt;
'''Principle of Separation of Privilege:'''&lt;br /&gt;
A system should not grant permission based on a single condition.&lt;br /&gt;
&lt;br /&gt;
'''Principle of Least Common Mechanism:'''&lt;br /&gt;
Mechanisms used to access resources should not be shared.&lt;br /&gt;
&lt;br /&gt;
'''Principle of Psychological Acceptability:'''&lt;br /&gt;
Security mechanisms should not make the resource more difficult to access than if the security mechanisms were not present.&lt;br /&gt;
&lt;br /&gt;
==Breaking a Biometrics Security System==&lt;br /&gt;
In addition to looking at biometric security systems from a design and implementation perspective, understanding a biometrics security system from an attacker’s perspective is also important. In general, there are seven different types of attacks, they are the following:&lt;br /&gt;
&lt;br /&gt;
-	Type 1: Fake biometric sensor&lt;br /&gt;
-	Type 2: Replay attacks&lt;br /&gt;
-	Type 3: Trojan horse program at feature extractor&lt;br /&gt;
-	Type 4: Real features replaced by synthetic features.&lt;br /&gt;
-	Type 5: Trojan horse program at matcher.&lt;br /&gt;
-	Type 6: Attacks modifying database of templates.&lt;br /&gt;
-	Type 7: Results overridden.&lt;br /&gt;
&lt;br /&gt;
==Analysis==&lt;br /&gt;
&lt;br /&gt;
===Principle of Least Privilege===&lt;br /&gt;
The design of the biometric security system itself is very linear hence, only the channels themselves need to be protected. This means that overall, processes cannot be accessed past the sensor if the sensor themselves have not been used. From this perspective, the design is secure. However, the system is still vulnerable from all attacks that attack each process directly (type 3, 5, and 6 attacks).&lt;br /&gt;
&lt;br /&gt;
===Principle of Fail-Safe Default===&lt;br /&gt;
The principle of fail-safe default is an excellent principle to follow for security mechanisms, but it falls short due to an implicit assumption within the principle itself. The principle assumes that security mechanisms will always work perfectly if all the requirements are passed. However, with biometric security systems, that is not the case. Biometric security systems are not perfect so they don’t always pass legitimate users and at the same time, they also pass the invalid users as well.&lt;br /&gt;
	Show chart of failure rate.&lt;br /&gt;
&lt;br /&gt;
===Principle of Economy of Mechanism===&lt;br /&gt;
In the design of the biometric security systems, each channel must be encrypted and each state must be protected. This means that overall, the design must contain at least four encryption mechanisms must be used for each channel, and at least five security mechanisms for the five states.&lt;br /&gt;
&lt;br /&gt;
The quantity of states and channels involved means that there are a high number of security mechanisms involved which means that security of the overall design is quite complex. This violates the principle of economy of mechanism, but the security of each channel and state may not be as complex as the design, depending on the implementation.&lt;br /&gt;
&lt;br /&gt;
===Principle of Complete Mediation===&lt;br /&gt;
Depending on the implementation, as long as each channel is encrypted with several layers of protection, it does not violate the principle. However, the problem comes from the human side and the issue arises when people try to replace current authentication mechanism such as password systems with biometric security systems.&lt;br /&gt;
&lt;br /&gt;
For example, new laptops with the Windows operating system have been released with biometric security systems. On the Windows login page, there are two logins available, the password system or the biometric system, and the user only has to use one of them to login, a clear violation of the principle of complete mediation.&lt;br /&gt;
&lt;br /&gt;
===Principle of Open Design===&lt;br /&gt;
The design of the biometric security is acceptable but the weakness is easily identified. The weakness of the design lies in the storage of the templates, which to this day, remains a difficult issue. Two options are available, a centralized data bank or decentralized servers to store all the templates.&lt;br /&gt;
&lt;br /&gt;
The design violates the principle not because the design is shrouded in secrecy but because the design itself is weak. This issue can be solved in the future by having a stronger design.&lt;br /&gt;
&lt;br /&gt;
===Principle of Separation of Privilege===&lt;br /&gt;
&lt;br /&gt;
It is common knowledge that a system is not secure if only one security mechanism is used, so an obvious solution is to have multiple security mechanisms. The issue arises when multiple biometric security systems are used. For example, fingerprints and retinas are used together. However, the problem is similar to those of the principle of fail-safe defaults. It assume that security mechanism work when they are supposed to work, but by increasing the types of biometrics required, the number of FARs (false acceptance rates) and FRRs (false rejection rates) increase as well.&lt;br /&gt;
	Cite examples.&lt;br /&gt;
&lt;br /&gt;
===Principle of Least Common Mechanism===&lt;br /&gt;
&lt;br /&gt;
Again, the design is simple due to its rather linear structure. However, in order for the security system to work, there must be a step in which users are enrolled, so that features can be stored. To cut costs, that enrolment system is typically a part of the authentication mechanism. This means that the biometric security system is more opened to attacks because another channel (between feature extractor and the template bank) must be encrypted, making the design more complicated, and the attacker has another option to attack the template bank.&lt;br /&gt;
&lt;br /&gt;
===Principle of Psychological Acceptability===&lt;br /&gt;
&lt;br /&gt;
The big reason why biometric security systems are so popular is that from an end-user perspective, they are the simplest security mechanisms to use. The user does not require any sort of knowledge of passwords to use, since it depends on either physiological or behavioural traits. However, if it fails, due to the FARs and FRRs, such a problem can be extremely annoying since it is not easy to remedy unless there is an alternative login method, which of course, defeats the purpose of having a biometric authentication method.&lt;br /&gt;
&lt;br /&gt;
==Conclusion==&lt;br /&gt;
&lt;br /&gt;
A lot of the faults of a biometric security system are due to current biometric technology. It is simply not advanced enough because the errors in identifying valid and invalid users are still too big, even though it may be as small as 0.01%.&lt;br /&gt;
	Another issue involves the weak design. As a concept, it is simple, but to implement the design, it requires a lot of encryption and security mechanisms. Also, the design highlights a weakness in storage of the templates. Just like storage of passwords, storage of the templates carries even more risks, because stolen templates could potentially mean a stolen identity.&lt;br /&gt;
	Also, the current thought regarding biometric security systems is that they are the way of the future, meaning they are to replace current security mechanisms, but as shown above, that is terrible because there are still too many weaknesses, including the fact that not everyone can use such a system either.&lt;br /&gt;
	However, it is so popular because it is so simple to use and requires almost no effort. Hence, biometric security systems should only be used as a supplement to current security systems, not a replacement.&lt;/div&gt;</summary>
		<author><name>Mad Doktor</name></author>	</entry>

	<entry>
		<id>http://wiki.cas.mcmaster.ca/index.php/Biometric_Systems_and_Security_Design_Principles</id>
		<title>Biometric Systems and Security Design Principles</title>
		<link rel="alternate" type="text/html" href="http://wiki.cas.mcmaster.ca/index.php/Biometric_Systems_and_Security_Design_Principles"/>
				<updated>2007-12-08T18:21:31Z</updated>
		
		<summary type="html">&lt;p&gt;Mad Doktor:&amp;#32;/* Security Design Principles */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;'''Analysis of Biometric Systems using Security Design Principles'''&lt;br /&gt;
&lt;br /&gt;
Biometric security systems are authentication mechanisms that bind an entity to a subject based on what the entity is, as opposed to what they know, what they have, or where they are.&lt;br /&gt;
Within the past several years, biometric security systems have gained a lot of ground in terms of advancements in technology and widespread use. However, there is still a lot of reluctance to adopt the technology worldwide. A look at biometric security systems through security design principles should provide more answers.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Biometrics==&lt;br /&gt;
Biometrics is the identification of a person through automated measurements using biological or behavioural features.&lt;br /&gt;
&lt;br /&gt;
==Security Design Principles==&lt;br /&gt;
The following eight design principles were created by Saltzer and Shroeder for the design and implementation of security mechanisms. These design principles encompass technical details and human interaction. They are also simple and easy to understand, which is why they will be used as a guide to analyze biometric security systems. The list of design principles are as follows:&lt;br /&gt;
&lt;br /&gt;
'''Principle of Least Privilege:'''&lt;br /&gt;
A subject should be given only those privileges that it needs in order to complete its task.&lt;br /&gt;
&lt;br /&gt;
'''Principle of Fails-Safe Defaults:'''&lt;br /&gt;
A subject should be denied access to an object unless the subject was given access.&lt;br /&gt;
&lt;br /&gt;
'''Principle of Economy of Mechanism:'''&lt;br /&gt;
Security mechanisms should be as simple as possible.&lt;br /&gt;
&lt;br /&gt;
'''Principle of Complete Mediation:'''&lt;br /&gt;
All accesses to objects are checked to ensure that they are allowed.&lt;br /&gt;
&lt;br /&gt;
'''Principle of Open Design:'''&lt;br /&gt;
Security of a mechanism should not depend on the secrecy of its design or implementation.&lt;br /&gt;
&lt;br /&gt;
'''Principle of Separation of Privilege:'''&lt;br /&gt;
A system should not grant permission based on a single condition.&lt;br /&gt;
&lt;br /&gt;
'''Principle of Least Common Mechanism:'''&lt;br /&gt;
Mechanisms used to access resources should not be shared.&lt;br /&gt;
&lt;br /&gt;
'''Principle of Psychological Acceptability:'''&lt;br /&gt;
Security mechanisms should not make the resource more difficult to access than if the security mechanisms were not present.&lt;br /&gt;
&lt;br /&gt;
==Breaking a Biometrics Security System==&lt;br /&gt;
In addition to looking at biometric security systems from a design and implementation perspective, understanding a biometrics security system from an attacker’s perspective is also important. In general, there are seven different types of attacks, they are the following:&lt;br /&gt;
&lt;br /&gt;
-	Type 1: Fake biometric sensor&lt;br /&gt;
-	Type 2: Replay attacks&lt;br /&gt;
-	Type 3: Trojan horse program at feature extractor&lt;br /&gt;
-	Type 4: Real features replaced by synthetic features.&lt;br /&gt;
-	Type 5: Trojan horse program at matcher.&lt;br /&gt;
-	Type 6: Attacks modifying database of templates.&lt;br /&gt;
-	Type 7: Results overridden.&lt;br /&gt;
&lt;br /&gt;
==Analysis==&lt;br /&gt;
&lt;br /&gt;
===Principle of Least Privilege===&lt;br /&gt;
The design of the biometric security system itself is very linear hence, only the channels themselves need to be protected. This means that overall, processes cannot be accessed past the sensor if the sensor themselves have not been used. From this perspective, the design is secure. However, the system is still vulnerable from all attacks that attack each process directly (type 3, 5, and 6 attacks).&lt;br /&gt;
&lt;br /&gt;
===Principle of Fail-Safe Default===&lt;br /&gt;
The principle of fail-safe default is an excellent principle to follow for security mechanisms, but it falls short due to an implicit assumption within the principle itself. The principle assumes that security mechanisms will always work perfectly if all the requirements are passed. However, with biometric security systems, that is not the case. Biometric security systems are not perfect so they don’t always pass legitimate users and at the same time, they also pass the invalid users as well.&lt;br /&gt;
	Show chart of failure rate.&lt;br /&gt;
&lt;br /&gt;
===Principle of Economy of Mechanism===&lt;br /&gt;
In the design of the biometric security systems, each channel must be encrypted and each state must be protected. This means that overall, the design must contain at least four encryption mechanisms must be used for each channel, and at least five security mechanisms for the five states.&lt;br /&gt;
&lt;br /&gt;
The quantity of states and channels involved means that there are a high number of security mechanisms involved which means that security of the overall design is quite complex. This violates the principle of economy of mechanism, but the security of each channel and state may not be as complex as the design, depending on the implementation.&lt;br /&gt;
&lt;br /&gt;
===Principle of Complete Mediation===&lt;br /&gt;
Depending on the implementation, as long as each channel is encrypted with several layers of protection, it does not violate the principle. However, the problem comes from the human side and the issue arises when people try to replace current authentication mechanism such as password systems with biometric security systems.&lt;br /&gt;
&lt;br /&gt;
For example, new laptops with the Windows operating system have been released with biometric security systems. On the Windows login page, there are two logins available, the password system or the biometric system, and the user only has to use one of them to login, a clear violation of the principle of complete mediation.&lt;br /&gt;
&lt;br /&gt;
===Principle of Open Design===&lt;br /&gt;
The design of the biometric security is acceptable but the weakness is easily identified. The weakness of the design lies in the storage of the templates, which to this day, remains a difficult issue. Two options are available, a centralized data bank or decentralized servers to store all the templates.&lt;br /&gt;
&lt;br /&gt;
The design violates the principle not because the design is shrouded in secrecy but because the design itself is weak. This issue can be solved in the future by having a stronger design.&lt;br /&gt;
&lt;br /&gt;
===Principle of Separation of Privilege===&lt;br /&gt;
&lt;br /&gt;
It is common knowledge that a system is not secure if only one security mechanism is used, so an obvious solution is to have multiple security mechanisms. The issue arises when multiple biometric security systems are used. For example, fingerprints and retinas are used together. However, the problem is similar to those of the principle of fail-safe defaults. It assume that security mechanism work when they are supposed to work, but by increasing the types of biometrics required, the number of FARs (false acceptance rates) and FRRs (false rejection rates) increase as well.&lt;br /&gt;
	Cite examples.&lt;br /&gt;
&lt;br /&gt;
===Principle of Least Common Mechanism===&lt;br /&gt;
&lt;br /&gt;
Again, the design is simple due to its rather linear structure. However, in order for the security system to work, there must be a step in which users are enrolled, so that features can be stored. To cut costs, that enrolment system is typically a part of the authentication mechanism. This means that the biometric security system is more opened to attacks because another channel (between feature extractor and the template bank) must be encrypted, making the design more complicated, and the attacker has another option to attack the template bank.&lt;br /&gt;
&lt;br /&gt;
===Principle of Psychological Acceptability===&lt;br /&gt;
&lt;br /&gt;
The big reason why biometric security systems are so popular is that from an end-user perspective, they are the simplest security mechanisms to use. The user does not require any sort of knowledge of passwords to use, since it depends on either physiological or behavioural traits. However, if it fails, due to the FARs and FRRs, such a problem can be extremely annoying since it is not easy to remedy unless there is an alternative login method, which of course, defeats the purpose of having a biometric authentication method.&lt;br /&gt;
&lt;br /&gt;
==Conclusion==&lt;br /&gt;
&lt;br /&gt;
A lot of the faults of a biometric security system are due to current biometric technology. It is simply not advanced enough because the errors in identifying valid and invalid users are still too big, even though it may be as small as 0.01%.&lt;br /&gt;
	Another issue involves the weak design. As a concept, it is simple, but to implement the design, it requires a lot of encryption and security mechanisms. Also, the design highlights a weakness in storage of the templates. Just like storage of passwords, storage of the templates carries even more risks, because stolen templates could potentially mean a stolen identity.&lt;br /&gt;
	Also, the current thought regarding biometric security systems is that they are the way of the future, meaning they are to replace current security mechanisms, but as shown above, that is terrible because there are still too many weaknesses, including the fact that not everyone can use such a system either.&lt;br /&gt;
	However, it is so popular because it is so simple to use and requires almost no effort. Hence, biometric security systems should only be used as a supplement to current security systems, not a replacement.&lt;/div&gt;</summary>
		<author><name>Mad Doktor</name></author>	</entry>

	<entry>
		<id>http://wiki.cas.mcmaster.ca/index.php/Biometric_Systems_and_Security_Design_Principles</id>
		<title>Biometric Systems and Security Design Principles</title>
		<link rel="alternate" type="text/html" href="http://wiki.cas.mcmaster.ca/index.php/Biometric_Systems_and_Security_Design_Principles"/>
				<updated>2007-12-08T18:20:26Z</updated>
		
		<summary type="html">&lt;p&gt;Mad Doktor:&amp;#32;/* Security Design Principles */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;'''Analysis of Biometric Systems using Security Design Principles'''&lt;br /&gt;
&lt;br /&gt;
Biometric security systems are authentication mechanisms that bind an entity to a subject based on what the entity is, as opposed to what they know, what they have, or where they are.&lt;br /&gt;
Within the past several years, biometric security systems have gained a lot of ground in terms of advancements in technology and widespread use. However, there is still a lot of reluctance to adopt the technology worldwide. A look at biometric security systems through security design principles should provide more answers.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Biometrics==&lt;br /&gt;
Biometrics is the identification of a person through automated measurements using biological or behavioural features.&lt;br /&gt;
&lt;br /&gt;
==Security Design Principles==&lt;br /&gt;
The following eight design principles were created by Saltzer and Shroeder for the design and implementation of security mechanisms. These design principles encompass technical details and human interaction. They are also simple and easy to understand, which is why they will be used as a guide to analyze biometric security systems. The list of design principles are as follows:&lt;br /&gt;
&lt;br /&gt;
'''Principle of Least Privilege'''&lt;br /&gt;
A subject should be given only those privileges that it needs in order to complete its task.&lt;br /&gt;
'''Principle of Fails-Safe Defaults'''&lt;br /&gt;
A subject should be denied access to an object unless the subject was given access.&lt;br /&gt;
'''Principle of Economy of Mechanism'''&lt;br /&gt;
Security mechanisms should be as simple as possible.&lt;br /&gt;
'''Principle of Complete Mediation'''&lt;br /&gt;
All accesses to objects are checked to ensure that they are allowed.&lt;br /&gt;
'''Principle of Open Design'''&lt;br /&gt;
Security of a mechanism should not depend on the secrecy of its design or implementation.&lt;br /&gt;
'''Principle of Separation of Privilege'''&lt;br /&gt;
A system should not grant permission based on a single condition.&lt;br /&gt;
'''Principle of Least Common Mechanism'''&lt;br /&gt;
Mechanisms used to access resources should not be shared.&lt;br /&gt;
'''Principle of Psychological Acceptability'''&lt;br /&gt;
Security mechanisms should not make the resource more difficult to access than if the security mechanisms were not present.&lt;br /&gt;
&lt;br /&gt;
==Breaking a Biometrics Security System==&lt;br /&gt;
In addition to looking at biometric security systems from a design and implementation perspective, understanding a biometrics security system from an attacker’s perspective is also important. In general, there are seven different types of attacks, they are the following:&lt;br /&gt;
&lt;br /&gt;
-	Type 1: Fake biometric sensor&lt;br /&gt;
-	Type 2: Replay attacks&lt;br /&gt;
-	Type 3: Trojan horse program at feature extractor&lt;br /&gt;
-	Type 4: Real features replaced by synthetic features.&lt;br /&gt;
-	Type 5: Trojan horse program at matcher.&lt;br /&gt;
-	Type 6: Attacks modifying database of templates.&lt;br /&gt;
-	Type 7: Results overridden.&lt;br /&gt;
&lt;br /&gt;
==Analysis==&lt;br /&gt;
&lt;br /&gt;
===Principle of Least Privilege===&lt;br /&gt;
The design of the biometric security system itself is very linear hence, only the channels themselves need to be protected. This means that overall, processes cannot be accessed past the sensor if the sensor themselves have not been used. From this perspective, the design is secure. However, the system is still vulnerable from all attacks that attack each process directly (type 3, 5, and 6 attacks).&lt;br /&gt;
&lt;br /&gt;
===Principle of Fail-Safe Default===&lt;br /&gt;
The principle of fail-safe default is an excellent principle to follow for security mechanisms, but it falls short due to an implicit assumption within the principle itself. The principle assumes that security mechanisms will always work perfectly if all the requirements are passed. However, with biometric security systems, that is not the case. Biometric security systems are not perfect so they don’t always pass legitimate users and at the same time, they also pass the invalid users as well.&lt;br /&gt;
	Show chart of failure rate.&lt;br /&gt;
&lt;br /&gt;
===Principle of Economy of Mechanism===&lt;br /&gt;
In the design of the biometric security systems, each channel must be encrypted and each state must be protected. This means that overall, the design must contain at least four encryption mechanisms must be used for each channel, and at least five security mechanisms for the five states.&lt;br /&gt;
&lt;br /&gt;
The quantity of states and channels involved means that there are a high number of security mechanisms involved which means that security of the overall design is quite complex. This violates the principle of economy of mechanism, but the security of each channel and state may not be as complex as the design, depending on the implementation.&lt;br /&gt;
&lt;br /&gt;
===Principle of Complete Mediation===&lt;br /&gt;
Depending on the implementation, as long as each channel is encrypted with several layers of protection, it does not violate the principle. However, the problem comes from the human side and the issue arises when people try to replace current authentication mechanism such as password systems with biometric security systems.&lt;br /&gt;
&lt;br /&gt;
For example, new laptops with the Windows operating system have been released with biometric security systems. On the Windows login page, there are two logins available, the password system or the biometric system, and the user only has to use one of them to login, a clear violation of the principle of complete mediation.&lt;br /&gt;
&lt;br /&gt;
===Principle of Open Design===&lt;br /&gt;
The design of the biometric security is acceptable but the weakness is easily identified. The weakness of the design lies in the storage of the templates, which to this day, remains a difficult issue. Two options are available, a centralized data bank or decentralized servers to store all the templates.&lt;br /&gt;
&lt;br /&gt;
The design violates the principle not because the design is shrouded in secrecy but because the design itself is weak. This issue can be solved in the future by having a stronger design.&lt;br /&gt;
&lt;br /&gt;
===Principle of Separation of Privilege===&lt;br /&gt;
&lt;br /&gt;
It is common knowledge that a system is not secure if only one security mechanism is used, so an obvious solution is to have multiple security mechanisms. The issue arises when multiple biometric security systems are used. For example, fingerprints and retinas are used together. However, the problem is similar to those of the principle of fail-safe defaults. It assume that security mechanism work when they are supposed to work, but by increasing the types of biometrics required, the number of FARs (false acceptance rates) and FRRs (false rejection rates) increase as well.&lt;br /&gt;
	Cite examples.&lt;br /&gt;
&lt;br /&gt;
===Principle of Least Common Mechanism===&lt;br /&gt;
&lt;br /&gt;
Again, the design is simple due to its rather linear structure. However, in order for the security system to work, there must be a step in which users are enrolled, so that features can be stored. To cut costs, that enrolment system is typically a part of the authentication mechanism. This means that the biometric security system is more opened to attacks because another channel (between feature extractor and the template bank) must be encrypted, making the design more complicated, and the attacker has another option to attack the template bank.&lt;br /&gt;
&lt;br /&gt;
===Principle of Psychological Acceptability===&lt;br /&gt;
&lt;br /&gt;
The big reason why biometric security systems are so popular is that from an end-user perspective, they are the simplest security mechanisms to use. The user does not require any sort of knowledge of passwords to use, since it depends on either physiological or behavioural traits. However, if it fails, due to the FARs and FRRs, such a problem can be extremely annoying since it is not easy to remedy unless there is an alternative login method, which of course, defeats the purpose of having a biometric authentication method.&lt;br /&gt;
&lt;br /&gt;
==Conclusion==&lt;br /&gt;
&lt;br /&gt;
A lot of the faults of a biometric security system are due to current biometric technology. It is simply not advanced enough because the errors in identifying valid and invalid users are still too big, even though it may be as small as 0.01%.&lt;br /&gt;
	Another issue involves the weak design. As a concept, it is simple, but to implement the design, it requires a lot of encryption and security mechanisms. Also, the design highlights a weakness in storage of the templates. Just like storage of passwords, storage of the templates carries even more risks, because stolen templates could potentially mean a stolen identity.&lt;br /&gt;
	Also, the current thought regarding biometric security systems is that they are the way of the future, meaning they are to replace current security mechanisms, but as shown above, that is terrible because there are still too many weaknesses, including the fact that not everyone can use such a system either.&lt;br /&gt;
	However, it is so popular because it is so simple to use and requires almost no effort. Hence, biometric security systems should only be used as a supplement to current security systems, not a replacement.&lt;/div&gt;</summary>
		<author><name>Mad Doktor</name></author>	</entry>

	<entry>
		<id>http://wiki.cas.mcmaster.ca/index.php/Biometric_Systems_and_Security_Design_Principles</id>
		<title>Biometric Systems and Security Design Principles</title>
		<link rel="alternate" type="text/html" href="http://wiki.cas.mcmaster.ca/index.php/Biometric_Systems_and_Security_Design_Principles"/>
				<updated>2007-12-08T18:19:08Z</updated>
		
		<summary type="html">&lt;p&gt;Mad Doktor:&amp;#32;/* Analysis */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;'''Analysis of Biometric Systems using Security Design Principles'''&lt;br /&gt;
&lt;br /&gt;
Biometric security systems are authentication mechanisms that bind an entity to a subject based on what the entity is, as opposed to what they know, what they have, or where they are.&lt;br /&gt;
Within the past several years, biometric security systems have gained a lot of ground in terms of advancements in technology and widespread use. However, there is still a lot of reluctance to adopt the technology worldwide. A look at biometric security systems through security design principles should provide more answers.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Biometrics==&lt;br /&gt;
Biometrics is the identification of a person through automated measurements using biological or behavioural features.&lt;br /&gt;
&lt;br /&gt;
==Security Design Principles==&lt;br /&gt;
The following eight design principles were created by Saltzer and Shroeder for the design and implementation of security mechanisms. These design principles encompass technical details and human interaction. They are also simple and easy to understand, which is why they will be used as a guide to analyze biometric security systems. The list of design principles are as follows:&lt;br /&gt;
&lt;br /&gt;
===Principle of Least Privilege=== &lt;br /&gt;
A subject should be given only those privileges that it needs in order to complete its task.&lt;br /&gt;
&lt;br /&gt;
===Principle of Fails-Safe Defaults===&lt;br /&gt;
A subject should be denied access to an object unless the subject was given access.&lt;br /&gt;
&lt;br /&gt;
===Principle of Economy of Mechanism===&lt;br /&gt;
Security mechanisms should be as simple as possible.&lt;br /&gt;
===Principle of Complete Mediation===&lt;br /&gt;
All accesses to objects are checked to ensure that they are allowed.&lt;br /&gt;
===Principle of Open Design===&lt;br /&gt;
Security of a mechanism should not depend on the secrecy of its design or implementation.&lt;br /&gt;
===Principle of Separation of Privilege===&lt;br /&gt;
A system should not grant permission based on a single condition.&lt;br /&gt;
===Principle of Least Common Mechanism===&lt;br /&gt;
Mechanisms used to access resources should not be shared.&lt;br /&gt;
===Principle of Psychological Acceptability===&lt;br /&gt;
Security mechanisms should not make the resource more difficult to access than if the security mechanisms were not present.&lt;br /&gt;
&lt;br /&gt;
==Breaking a Biometrics Security System==&lt;br /&gt;
In addition to looking at biometric security systems from a design and implementation perspective, understanding a biometrics security system from an attacker’s perspective is also important. In general, there are seven different types of attacks, they are the following:&lt;br /&gt;
&lt;br /&gt;
-	Type 1: Fake biometric sensor&lt;br /&gt;
-	Type 2: Replay attacks&lt;br /&gt;
-	Type 3: Trojan horse program at feature extractor&lt;br /&gt;
-	Type 4: Real features replaced by synthetic features.&lt;br /&gt;
-	Type 5: Trojan horse program at matcher.&lt;br /&gt;
-	Type 6: Attacks modifying database of templates.&lt;br /&gt;
-	Type 7: Results overridden.&lt;br /&gt;
&lt;br /&gt;
==Analysis==&lt;br /&gt;
&lt;br /&gt;
===Principle of Least Privilege===&lt;br /&gt;
The design of the biometric security system itself is very linear hence, only the channels themselves need to be protected. This means that overall, processes cannot be accessed past the sensor if the sensor themselves have not been used. From this perspective, the design is secure. However, the system is still vulnerable from all attacks that attack each process directly (type 3, 5, and 6 attacks).&lt;br /&gt;
&lt;br /&gt;
===Principle of Fail-Safe Default===&lt;br /&gt;
The principle of fail-safe default is an excellent principle to follow for security mechanisms, but it falls short due to an implicit assumption within the principle itself. The principle assumes that security mechanisms will always work perfectly if all the requirements are passed. However, with biometric security systems, that is not the case. Biometric security systems are not perfect so they don’t always pass legitimate users and at the same time, they also pass the invalid users as well.&lt;br /&gt;
	Show chart of failure rate.&lt;br /&gt;
&lt;br /&gt;
===Principle of Economy of Mechanism===&lt;br /&gt;
In the design of the biometric security systems, each channel must be encrypted and each state must be protected. This means that overall, the design must contain at least four encryption mechanisms must be used for each channel, and at least five security mechanisms for the five states.&lt;br /&gt;
&lt;br /&gt;
The quantity of states and channels involved means that there are a high number of security mechanisms involved which means that security of the overall design is quite complex. This violates the principle of economy of mechanism, but the security of each channel and state may not be as complex as the design, depending on the implementation.&lt;br /&gt;
&lt;br /&gt;
===Principle of Complete Mediation===&lt;br /&gt;
Depending on the implementation, as long as each channel is encrypted with several layers of protection, it does not violate the principle. However, the problem comes from the human side and the issue arises when people try to replace current authentication mechanism such as password systems with biometric security systems.&lt;br /&gt;
&lt;br /&gt;
For example, new laptops with the Windows operating system have been released with biometric security systems. On the Windows login page, there are two logins available, the password system or the biometric system, and the user only has to use one of them to login, a clear violation of the principle of complete mediation.&lt;br /&gt;
&lt;br /&gt;
===Principle of Open Design===&lt;br /&gt;
The design of the biometric security is acceptable but the weakness is easily identified. The weakness of the design lies in the storage of the templates, which to this day, remains a difficult issue. Two options are available, a centralized data bank or decentralized servers to store all the templates.&lt;br /&gt;
&lt;br /&gt;
The design violates the principle not because the design is shrouded in secrecy but because the design itself is weak. This issue can be solved in the future by having a stronger design.&lt;br /&gt;
&lt;br /&gt;
===Principle of Separation of Privilege===&lt;br /&gt;
&lt;br /&gt;
It is common knowledge that a system is not secure if only one security mechanism is used, so an obvious solution is to have multiple security mechanisms. The issue arises when multiple biometric security systems are used. For example, fingerprints and retinas are used together. However, the problem is similar to those of the principle of fail-safe defaults. It assume that security mechanism work when they are supposed to work, but by increasing the types of biometrics required, the number of FARs (false acceptance rates) and FRRs (false rejection rates) increase as well.&lt;br /&gt;
	Cite examples.&lt;br /&gt;
&lt;br /&gt;
===Principle of Least Common Mechanism===&lt;br /&gt;
&lt;br /&gt;
Again, the design is simple due to its rather linear structure. However, in order for the security system to work, there must be a step in which users are enrolled, so that features can be stored. To cut costs, that enrolment system is typically a part of the authentication mechanism. This means that the biometric security system is more opened to attacks because another channel (between feature extractor and the template bank) must be encrypted, making the design more complicated, and the attacker has another option to attack the template bank.&lt;br /&gt;
&lt;br /&gt;
===Principle of Psychological Acceptability===&lt;br /&gt;
&lt;br /&gt;
The big reason why biometric security systems are so popular is that from an end-user perspective, they are the simplest security mechanisms to use. The user does not require any sort of knowledge of passwords to use, since it depends on either physiological or behavioural traits. However, if it fails, due to the FARs and FRRs, such a problem can be extremely annoying since it is not easy to remedy unless there is an alternative login method, which of course, defeats the purpose of having a biometric authentication method.&lt;br /&gt;
&lt;br /&gt;
==Conclusion==&lt;br /&gt;
&lt;br /&gt;
A lot of the faults of a biometric security system are due to current biometric technology. It is simply not advanced enough because the errors in identifying valid and invalid users are still too big, even though it may be as small as 0.01%.&lt;br /&gt;
	Another issue involves the weak design. As a concept, it is simple, but to implement the design, it requires a lot of encryption and security mechanisms. Also, the design highlights a weakness in storage of the templates. Just like storage of passwords, storage of the templates carries even more risks, because stolen templates could potentially mean a stolen identity.&lt;br /&gt;
	Also, the current thought regarding biometric security systems is that they are the way of the future, meaning they are to replace current security mechanisms, but as shown above, that is terrible because there are still too many weaknesses, including the fact that not everyone can use such a system either.&lt;br /&gt;
	However, it is so popular because it is so simple to use and requires almost no effort. Hence, biometric security systems should only be used as a supplement to current security systems, not a replacement.&lt;/div&gt;</summary>
		<author><name>Mad Doktor</name></author>	</entry>

	<entry>
		<id>http://wiki.cas.mcmaster.ca/index.php/Biometric_Systems_and_Security_Design_Principles</id>
		<title>Biometric Systems and Security Design Principles</title>
		<link rel="alternate" type="text/html" href="http://wiki.cas.mcmaster.ca/index.php/Biometric_Systems_and_Security_Design_Principles"/>
				<updated>2007-12-08T18:16:35Z</updated>
		
		<summary type="html">&lt;p&gt;Mad Doktor:&amp;#32;/* Security Design Principles */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;'''Analysis of Biometric Systems using Security Design Principles'''&lt;br /&gt;
&lt;br /&gt;
Biometric security systems are authentication mechanisms that bind an entity to a subject based on what the entity is, as opposed to what they know, what they have, or where they are.&lt;br /&gt;
Within the past several years, biometric security systems have gained a lot of ground in terms of advancements in technology and widespread use. However, there is still a lot of reluctance to adopt the technology worldwide. A look at biometric security systems through security design principles should provide more answers.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Biometrics==&lt;br /&gt;
Biometrics is the identification of a person through automated measurements using biological or behavioural features.&lt;br /&gt;
&lt;br /&gt;
==Security Design Principles==&lt;br /&gt;
The following eight design principles were created by Saltzer and Shroeder for the design and implementation of security mechanisms. These design principles encompass technical details and human interaction. They are also simple and easy to understand, which is why they will be used as a guide to analyze biometric security systems. The list of design principles are as follows:&lt;br /&gt;
&lt;br /&gt;
===Principle of Least Privilege=== &lt;br /&gt;
A subject should be given only those privileges that it needs in order to complete its task.&lt;br /&gt;
&lt;br /&gt;
===Principle of Fails-Safe Defaults===&lt;br /&gt;
A subject should be denied access to an object unless the subject was given access.&lt;br /&gt;
&lt;br /&gt;
===Principle of Economy of Mechanism===&lt;br /&gt;
Security mechanisms should be as simple as possible.&lt;br /&gt;
===Principle of Complete Mediation===&lt;br /&gt;
All accesses to objects are checked to ensure that they are allowed.&lt;br /&gt;
===Principle of Open Design===&lt;br /&gt;
Security of a mechanism should not depend on the secrecy of its design or implementation.&lt;br /&gt;
===Principle of Separation of Privilege===&lt;br /&gt;
A system should not grant permission based on a single condition.&lt;br /&gt;
===Principle of Least Common Mechanism===&lt;br /&gt;
Mechanisms used to access resources should not be shared.&lt;br /&gt;
===Principle of Psychological Acceptability===&lt;br /&gt;
Security mechanisms should not make the resource more difficult to access than if the security mechanisms were not present.&lt;br /&gt;
&lt;br /&gt;
==Breaking a Biometrics Security System==&lt;br /&gt;
In addition to looking at biometric security systems from a design and implementation perspective, understanding a biometrics security system from an attacker’s perspective is also important. In general, there are seven different types of attacks, they are the following:&lt;br /&gt;
&lt;br /&gt;
-	Type 1: Fake biometric sensor&lt;br /&gt;
-	Type 2: Replay attacks&lt;br /&gt;
-	Type 3: Trojan horse program at feature extractor&lt;br /&gt;
-	Type 4: Real features replaced by synthetic features.&lt;br /&gt;
-	Type 5: Trojan horse program at matcher.&lt;br /&gt;
-	Type 6: Attacks modifying database of templates.&lt;br /&gt;
-	Type 7: Results overridden.&lt;br /&gt;
&lt;br /&gt;
==Analysis==&lt;br /&gt;
Principle of Least Privilege&lt;br /&gt;
	The design of the biometric security system itself is very linear hence, only the channels themselves need to be protected. This means that overall, processes cannot be accessed past the sensor if the sensor themselves have not been used. From this perspective, the design is secure. However, the system is still vulnerable from all attacks that attack each process directly (type 3, 5, and 6 attacks).&lt;br /&gt;
&lt;br /&gt;
Principle of Fail-Safe Default&lt;br /&gt;
	The principle of fail-safe default is an excellent principle to follow for security mechanisms, but it falls short due to an implicit assumption within the principle itself. The principle assumes that security mechanisms will always work perfectly if all the requirements are passed. However, with biometric security systems, that is not the case. Biometric security systems are not perfect so they don’t always pass legitimate users and at the same time, they also pass the invalid users as well.&lt;br /&gt;
	Show chart of failure rate.&lt;br /&gt;
&lt;br /&gt;
Principle of Economy of Mechanism&lt;br /&gt;
	In the design of the biometric security systems, each channel must be encrypted and each state must be protected. This means that overall, the design must contain at least four encryption mechanisms must be used for each channel, and at least five security mechanisms for the five states.&lt;br /&gt;
	The quantity of states and channels involved means that there are a high number of security mechanisms involved which means that security of the overall design is quite complex. This violates the principle of economy of mechanism, but the security of each channel and state may not be as complex as the design, depending on the implementation.&lt;br /&gt;
&lt;br /&gt;
Principle of Complete Mediation&lt;br /&gt;
	Depending on the implementation, as long as each channel is encrypted with several layers of protection, it does not violate the principle. However, the problem comes from the human side and the issue arises when people try to replace current authentication mechanism such as password systems with biometric security systems.&lt;br /&gt;
	For example, new laptops with the Windows operating system have been released with biometric security systems. On the Windows login page, there are two logins available, the password system or the biometric system, and the user only has to use one of them to login, a clear violation of the principle of complete mediation.&lt;br /&gt;
&lt;br /&gt;
Principle of Open Design&lt;br /&gt;
	The design of the biometric security is acceptable but the weakness is easily identified. The weakness of the design lies in the storage of the templates, which to this day, remains a difficult issue. Two options are available, a centralized data bank or decentralized servers to store all the templates.&lt;br /&gt;
	The design violates the principle not because the design is shrouded in secrecy but because the design itself is weak. This issue can be solved in the future by having a stronger design.&lt;br /&gt;
&lt;br /&gt;
Principle of Separation of Privilege&lt;br /&gt;
	It is common knowledge that a system is not secure if only one security mechanism is used, so an obvious solution is to have multiple security mechanisms. The issue arises when multiple biometric security systems are used. For example, fingerprints and retinas are used together. However, the problem is similar to those of the principle of fail-safe defaults. It assume that security mechanism work when they are supposed to work, but by increasing the types of biometrics required, the number of FARs (false acceptance rates) and FRRs (false rejection rates) increase as well.&lt;br /&gt;
	Cite examples.&lt;br /&gt;
&lt;br /&gt;
Principle of Least Common Mechanism&lt;br /&gt;
	Again, the design is simple due to its rather linear structure. However, in order for the security system to work, there must be a step in which users are enrolled, so that features can be stored. To cut costs, that enrolment system is typically a part of the authentication mechanism. This means that the biometric security system is more opened to attacks because another channel (between feature extractor and the template bank) must be encrypted, making the design more complicated, and the attacker has another option to attack the template bank.&lt;br /&gt;
&lt;br /&gt;
Principle of Psychological Acceptability&lt;br /&gt;
	The big reason why biometric security systems are so popular is that from an end-user perspective, they are the simplest security mechanisms to use. The user does not require any sort of knowledge of passwords to use, since it depends on either physiological or behavioural traits. However, if it fails, due to the FARs and FRRs, such a problem can be extremely annoying since it is not easy to remedy unless there is an alternative login method, which of course, defeats the purpose of having a biometric authentication method.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Conclusion==&lt;br /&gt;
&lt;br /&gt;
A lot of the faults of a biometric security system are due to current biometric technology. It is simply not advanced enough because the errors in identifying valid and invalid users are still too big, even though it may be as small as 0.01%.&lt;br /&gt;
	Another issue involves the weak design. As a concept, it is simple, but to implement the design, it requires a lot of encryption and security mechanisms. Also, the design highlights a weakness in storage of the templates. Just like storage of passwords, storage of the templates carries even more risks, because stolen templates could potentially mean a stolen identity.&lt;br /&gt;
	Also, the current thought regarding biometric security systems is that they are the way of the future, meaning they are to replace current security mechanisms, but as shown above, that is terrible because there are still too many weaknesses, including the fact that not everyone can use such a system either.&lt;br /&gt;
	However, it is so popular because it is so simple to use and requires almost no effort. Hence, biometric security systems should only be used as a supplement to current security systems, not a replacement.&lt;/div&gt;</summary>
		<author><name>Mad Doktor</name></author>	</entry>

	<entry>
		<id>http://wiki.cas.mcmaster.ca/index.php/Biometric_Systems_and_Security_Design_Principles</id>
		<title>Biometric Systems and Security Design Principles</title>
		<link rel="alternate" type="text/html" href="http://wiki.cas.mcmaster.ca/index.php/Biometric_Systems_and_Security_Design_Principles"/>
				<updated>2007-12-08T18:14:34Z</updated>
		
		<summary type="html">&lt;p&gt;Mad Doktor:&amp;#32;/* Breaking a Biometrics Security System */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;'''Analysis of Biometric Systems using Security Design Principles'''&lt;br /&gt;
&lt;br /&gt;
Biometric security systems are authentication mechanisms that bind an entity to a subject based on what the entity is, as opposed to what they know, what they have, or where they are.&lt;br /&gt;
Within the past several years, biometric security systems have gained a lot of ground in terms of advancements in technology and widespread use. However, there is still a lot of reluctance to adopt the technology worldwide. A look at biometric security systems through security design principles should provide more answers.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Biometrics==&lt;br /&gt;
Biometrics is the identification of a person through automated measurements using biological or behavioural features.&lt;br /&gt;
&lt;br /&gt;
==Security Design Principles==&lt;br /&gt;
The following eight design principles were created by Saltzer and Shroeder for the design and implementation of security mechanisms. These design principles encompass technical details and human interaction. They are also simple and easy to understand, which is why they will be used as a guide to analyze biometric security systems. The list of design principles are as follows:&lt;br /&gt;
1.	Principle of Least Privilege: A subject should be given only those privileges that it needs in order to complete its task.&lt;br /&gt;
2.	Principle of Fails-Safe Defaults: A subject should be denied access to an object unless the subject was given access.&lt;br /&gt;
3.	Principle of Economy of Mechanism: Security mechanisms should be as simple as possible.&lt;br /&gt;
4.	Principle of Complete Mediation: All accesses to objects are checked to ensure that they are allowed.&lt;br /&gt;
5.	Principle of Open Design: Security of a mechanism should not depend on the secrecy of its design or implementation.&lt;br /&gt;
6.	Principle of Separation of Privilege: A system should not grant permission based on a single condition.&lt;br /&gt;
7.	Principle of Least Common Mechanism: Mechanisms used to access resources should not be shared.&lt;br /&gt;
8.	Principle of Psychological Acceptability: Security mechanisms should not make the resource more difficult to access than if the security mechanisms were not present.&lt;br /&gt;
&lt;br /&gt;
==Breaking a Biometrics Security System==&lt;br /&gt;
In addition to looking at biometric security systems from a design and implementation perspective, understanding a biometrics security system from an attacker’s perspective is also important. In general, there are seven different types of attacks, they are the following:&lt;br /&gt;
&lt;br /&gt;
-	Type 1: Fake biometric sensor&lt;br /&gt;
-	Type 2: Replay attacks&lt;br /&gt;
-	Type 3: Trojan horse program at feature extractor&lt;br /&gt;
-	Type 4: Real features replaced by synthetic features.&lt;br /&gt;
-	Type 5: Trojan horse program at matcher.&lt;br /&gt;
-	Type 6: Attacks modifying database of templates.&lt;br /&gt;
-	Type 7: Results overridden.&lt;br /&gt;
&lt;br /&gt;
==Analysis==&lt;br /&gt;
Principle of Least Privilege&lt;br /&gt;
	The design of the biometric security system itself is very linear hence, only the channels themselves need to be protected. This means that overall, processes cannot be accessed past the sensor if the sensor themselves have not been used. From this perspective, the design is secure. However, the system is still vulnerable from all attacks that attack each process directly (type 3, 5, and 6 attacks).&lt;br /&gt;
&lt;br /&gt;
Principle of Fail-Safe Default&lt;br /&gt;
	The principle of fail-safe default is an excellent principle to follow for security mechanisms, but it falls short due to an implicit assumption within the principle itself. The principle assumes that security mechanisms will always work perfectly if all the requirements are passed. However, with biometric security systems, that is not the case. Biometric security systems are not perfect so they don’t always pass legitimate users and at the same time, they also pass the invalid users as well.&lt;br /&gt;
	Show chart of failure rate.&lt;br /&gt;
&lt;br /&gt;
Principle of Economy of Mechanism&lt;br /&gt;
	In the design of the biometric security systems, each channel must be encrypted and each state must be protected. This means that overall, the design must contain at least four encryption mechanisms must be used for each channel, and at least five security mechanisms for the five states.&lt;br /&gt;
	The quantity of states and channels involved means that there are a high number of security mechanisms involved which means that security of the overall design is quite complex. This violates the principle of economy of mechanism, but the security of each channel and state may not be as complex as the design, depending on the implementation.&lt;br /&gt;
&lt;br /&gt;
Principle of Complete Mediation&lt;br /&gt;
	Depending on the implementation, as long as each channel is encrypted with several layers of protection, it does not violate the principle. However, the problem comes from the human side and the issue arises when people try to replace current authentication mechanism such as password systems with biometric security systems.&lt;br /&gt;
	For example, new laptops with the Windows operating system have been released with biometric security systems. On the Windows login page, there are two logins available, the password system or the biometric system, and the user only has to use one of them to login, a clear violation of the principle of complete mediation.&lt;br /&gt;
&lt;br /&gt;
Principle of Open Design&lt;br /&gt;
	The design of the biometric security is acceptable but the weakness is easily identified. The weakness of the design lies in the storage of the templates, which to this day, remains a difficult issue. Two options are available, a centralized data bank or decentralized servers to store all the templates.&lt;br /&gt;
	The design violates the principle not because the design is shrouded in secrecy but because the design itself is weak. This issue can be solved in the future by having a stronger design.&lt;br /&gt;
&lt;br /&gt;
Principle of Separation of Privilege&lt;br /&gt;
	It is common knowledge that a system is not secure if only one security mechanism is used, so an obvious solution is to have multiple security mechanisms. The issue arises when multiple biometric security systems are used. For example, fingerprints and retinas are used together. However, the problem is similar to those of the principle of fail-safe defaults. It assume that security mechanism work when they are supposed to work, but by increasing the types of biometrics required, the number of FARs (false acceptance rates) and FRRs (false rejection rates) increase as well.&lt;br /&gt;
	Cite examples.&lt;br /&gt;
&lt;br /&gt;
Principle of Least Common Mechanism&lt;br /&gt;
	Again, the design is simple due to its rather linear structure. However, in order for the security system to work, there must be a step in which users are enrolled, so that features can be stored. To cut costs, that enrolment system is typically a part of the authentication mechanism. This means that the biometric security system is more opened to attacks because another channel (between feature extractor and the template bank) must be encrypted, making the design more complicated, and the attacker has another option to attack the template bank.&lt;br /&gt;
&lt;br /&gt;
Principle of Psychological Acceptability&lt;br /&gt;
	The big reason why biometric security systems are so popular is that from an end-user perspective, they are the simplest security mechanisms to use. The user does not require any sort of knowledge of passwords to use, since it depends on either physiological or behavioural traits. However, if it fails, due to the FARs and FRRs, such a problem can be extremely annoying since it is not easy to remedy unless there is an alternative login method, which of course, defeats the purpose of having a biometric authentication method.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Conclusion==&lt;br /&gt;
&lt;br /&gt;
A lot of the faults of a biometric security system are due to current biometric technology. It is simply not advanced enough because the errors in identifying valid and invalid users are still too big, even though it may be as small as 0.01%.&lt;br /&gt;
	Another issue involves the weak design. As a concept, it is simple, but to implement the design, it requires a lot of encryption and security mechanisms. Also, the design highlights a weakness in storage of the templates. Just like storage of passwords, storage of the templates carries even more risks, because stolen templates could potentially mean a stolen identity.&lt;br /&gt;
	Also, the current thought regarding biometric security systems is that they are the way of the future, meaning they are to replace current security mechanisms, but as shown above, that is terrible because there are still too many weaknesses, including the fact that not everyone can use such a system either.&lt;br /&gt;
	However, it is so popular because it is so simple to use and requires almost no effort. Hence, biometric security systems should only be used as a supplement to current security systems, not a replacement.&lt;/div&gt;</summary>
		<author><name>Mad Doktor</name></author>	</entry>

	<entry>
		<id>http://wiki.cas.mcmaster.ca/index.php/Biometric_Systems_and_Security_Design_Principles</id>
		<title>Biometric Systems and Security Design Principles</title>
		<link rel="alternate" type="text/html" href="http://wiki.cas.mcmaster.ca/index.php/Biometric_Systems_and_Security_Design_Principles"/>
				<updated>2007-12-03T05:10:16Z</updated>
		
		<summary type="html">&lt;p&gt;Mad Doktor:&amp;#32;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;'''Analysis of Biometric Systems using Security Design Principles'''&lt;br /&gt;
&lt;br /&gt;
Biometric security systems are authentication mechanisms that bind an entity to a subject based on what the entity is, as opposed to what they know, what they have, or where they are.&lt;br /&gt;
Within the past several years, biometric security systems have gained a lot of ground in terms of advancements in technology and widespread use. However, there is still a lot of reluctance to adopt the technology worldwide. A look at biometric security systems through security design principles should provide more answers.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Biometrics==&lt;br /&gt;
Biometrics is the identification of a person through automated measurements using biological or behavioural features.&lt;br /&gt;
&lt;br /&gt;
==Security Design Principles==&lt;br /&gt;
The following eight design principles were created by Saltzer and Shroeder for the design and implementation of security mechanisms. These design principles encompass technical details and human interaction. They are also simple and easy to understand, which is why they will be used as a guide to analyze biometric security systems. The list of design principles are as follows:&lt;br /&gt;
1.	Principle of Least Privilege: A subject should be given only those privileges that it needs in order to complete its task.&lt;br /&gt;
2.	Principle of Fails-Safe Defaults: A subject should be denied access to an object unless the subject was given access.&lt;br /&gt;
3.	Principle of Economy of Mechanism: Security mechanisms should be as simple as possible.&lt;br /&gt;
4.	Principle of Complete Mediation: All accesses to objects are checked to ensure that they are allowed.&lt;br /&gt;
5.	Principle of Open Design: Security of a mechanism should not depend on the secrecy of its design or implementation.&lt;br /&gt;
6.	Principle of Separation of Privilege: A system should not grant permission based on a single condition.&lt;br /&gt;
7.	Principle of Least Common Mechanism: Mechanisms used to access resources should not be shared.&lt;br /&gt;
8.	Principle of Psychological Acceptability: Security mechanisms should not make the resource more difficult to access than if the security mechanisms were not present.&lt;br /&gt;
&lt;br /&gt;
==Breaking a Biometrics Security System==&lt;br /&gt;
In addition to looking at biometric security systems from a design and implementation perspective, understanding a biometrics security system from an attacker’s perspective is also important. In general, there are seven different types of attacks, they are the following:&lt;br /&gt;
-	Type 1: Fake biometric sensor&lt;br /&gt;
-	Type 2: Replay attacks&lt;br /&gt;
-	Type 3: Trojan horse program at feature extractor&lt;br /&gt;
-	Type 4: Real features replaced by synthetic features.&lt;br /&gt;
-	Type 5: Trojan horse program at matcher.&lt;br /&gt;
-	Type 6: Attacks modifying database of templates.&lt;br /&gt;
-	Type 7: Results overridden.&lt;br /&gt;
&lt;br /&gt;
==Analysis==&lt;br /&gt;
Principle of Least Privilege&lt;br /&gt;
	The design of the biometric security system itself is very linear hence, only the channels themselves need to be protected. This means that overall, processes cannot be accessed past the sensor if the sensor themselves have not been used. From this perspective, the design is secure. However, the system is still vulnerable from all attacks that attack each process directly (type 3, 5, and 6 attacks).&lt;br /&gt;
&lt;br /&gt;
Principle of Fail-Safe Default&lt;br /&gt;
	The principle of fail-safe default is an excellent principle to follow for security mechanisms, but it falls short due to an implicit assumption within the principle itself. The principle assumes that security mechanisms will always work perfectly if all the requirements are passed. However, with biometric security systems, that is not the case. Biometric security systems are not perfect so they don’t always pass legitimate users and at the same time, they also pass the invalid users as well.&lt;br /&gt;
	Show chart of failure rate.&lt;br /&gt;
&lt;br /&gt;
Principle of Economy of Mechanism&lt;br /&gt;
	In the design of the biometric security systems, each channel must be encrypted and each state must be protected. This means that overall, the design must contain at least four encryption mechanisms must be used for each channel, and at least five security mechanisms for the five states.&lt;br /&gt;
	The quantity of states and channels involved means that there are a high number of security mechanisms involved which means that security of the overall design is quite complex. This violates the principle of economy of mechanism, but the security of each channel and state may not be as complex as the design, depending on the implementation.&lt;br /&gt;
&lt;br /&gt;
Principle of Complete Mediation&lt;br /&gt;
	Depending on the implementation, as long as each channel is encrypted with several layers of protection, it does not violate the principle. However, the problem comes from the human side and the issue arises when people try to replace current authentication mechanism such as password systems with biometric security systems.&lt;br /&gt;
	For example, new laptops with the Windows operating system have been released with biometric security systems. On the Windows login page, there are two logins available, the password system or the biometric system, and the user only has to use one of them to login, a clear violation of the principle of complete mediation.&lt;br /&gt;
&lt;br /&gt;
Principle of Open Design&lt;br /&gt;
	The design of the biometric security is acceptable but the weakness is easily identified. The weakness of the design lies in the storage of the templates, which to this day, remains a difficult issue. Two options are available, a centralized data bank or decentralized servers to store all the templates.&lt;br /&gt;
	The design violates the principle not because the design is shrouded in secrecy but because the design itself is weak. This issue can be solved in the future by having a stronger design.&lt;br /&gt;
&lt;br /&gt;
Principle of Separation of Privilege&lt;br /&gt;
	It is common knowledge that a system is not secure if only one security mechanism is used, so an obvious solution is to have multiple security mechanisms. The issue arises when multiple biometric security systems are used. For example, fingerprints and retinas are used together. However, the problem is similar to those of the principle of fail-safe defaults. It assume that security mechanism work when they are supposed to work, but by increasing the types of biometrics required, the number of FARs (false acceptance rates) and FRRs (false rejection rates) increase as well.&lt;br /&gt;
	Cite examples.&lt;br /&gt;
&lt;br /&gt;
Principle of Least Common Mechanism&lt;br /&gt;
	Again, the design is simple due to its rather linear structure. However, in order for the security system to work, there must be a step in which users are enrolled, so that features can be stored. To cut costs, that enrolment system is typically a part of the authentication mechanism. This means that the biometric security system is more opened to attacks because another channel (between feature extractor and the template bank) must be encrypted, making the design more complicated, and the attacker has another option to attack the template bank.&lt;br /&gt;
&lt;br /&gt;
Principle of Psychological Acceptability&lt;br /&gt;
	The big reason why biometric security systems are so popular is that from an end-user perspective, they are the simplest security mechanisms to use. The user does not require any sort of knowledge of passwords to use, since it depends on either physiological or behavioural traits. However, if it fails, due to the FARs and FRRs, such a problem can be extremely annoying since it is not easy to remedy unless there is an alternative login method, which of course, defeats the purpose of having a biometric authentication method.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Conclusion==&lt;br /&gt;
&lt;br /&gt;
A lot of the faults of a biometric security system are due to current biometric technology. It is simply not advanced enough because the errors in identifying valid and invalid users are still too big, even though it may be as small as 0.01%.&lt;br /&gt;
	Another issue involves the weak design. As a concept, it is simple, but to implement the design, it requires a lot of encryption and security mechanisms. Also, the design highlights a weakness in storage of the templates. Just like storage of passwords, storage of the templates carries even more risks, because stolen templates could potentially mean a stolen identity.&lt;br /&gt;
	Also, the current thought regarding biometric security systems is that they are the way of the future, meaning they are to replace current security mechanisms, but as shown above, that is terrible because there are still too many weaknesses, including the fact that not everyone can use such a system either.&lt;br /&gt;
	However, it is so popular because it is so simple to use and requires almost no effort. Hence, biometric security systems should only be used as a supplement to current security systems, not a replacement.&lt;/div&gt;</summary>
		<author><name>Mad Doktor</name></author>	</entry>

	<entry>
		<id>http://wiki.cas.mcmaster.ca/index.php/Biometric_Systems_and_Security_Design_Principles</id>
		<title>Biometric Systems and Security Design Principles</title>
		<link rel="alternate" type="text/html" href="http://wiki.cas.mcmaster.ca/index.php/Biometric_Systems_and_Security_Design_Principles"/>
				<updated>2007-12-03T05:09:33Z</updated>
		
		<summary type="html">&lt;p&gt;Mad Doktor:&amp;#32;/* Biometrics */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;'''Analysis of Biometric Systems using Security Design Principles'''&lt;br /&gt;
Biometric security systems are authentication mechanisms that bind an entity to a subject based on what the entity is, as opposed to what they know, what they have, or where they are.&lt;br /&gt;
Within the past several years, biometric security systems have gained a lot of ground in terms of advancements in technology and widespread use. However, there is still a lot of reluctance to adopt the technology worldwide. A look at biometric security systems through security design principles should provide more answers.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Biometrics==&lt;br /&gt;
Biometrics is the identification of a person through automated measurements using biological or behavioural features.&lt;br /&gt;
&lt;br /&gt;
==Security Design Principles==&lt;br /&gt;
The following eight design principles were created by Saltzer and Shroeder for the design and implementation of security mechanisms. These design principles encompass technical details and human interaction. They are also simple and easy to understand, which is why they will be used as a guide to analyze biometric security systems. The list of design principles are as follows:&lt;br /&gt;
1.	Principle of Least Privilege: A subject should be given only those privileges that it needs in order to complete its task.&lt;br /&gt;
2.	Principle of Fails-Safe Defaults: A subject should be denied access to an object unless the subject was given access.&lt;br /&gt;
3.	Principle of Economy of Mechanism: Security mechanisms should be as simple as possible.&lt;br /&gt;
4.	Principle of Complete Mediation: All accesses to objects are checked to ensure that they are allowed.&lt;br /&gt;
5.	Principle of Open Design: Security of a mechanism should not depend on the secrecy of its design or implementation.&lt;br /&gt;
6.	Principle of Separation of Privilege: A system should not grant permission based on a single condition.&lt;br /&gt;
7.	Principle of Least Common Mechanism: Mechanisms used to access resources should not be shared.&lt;br /&gt;
8.	Principle of Psychological Acceptability: Security mechanisms should not make the resource more difficult to access than if the security mechanisms were not present.&lt;br /&gt;
&lt;br /&gt;
==Breaking a Biometrics Security System==&lt;br /&gt;
In addition to looking at biometric security systems from a design and implementation perspective, understanding a biometrics security system from an attacker’s perspective is also important. In general, there are seven different types of attacks, they are the following:&lt;br /&gt;
-	Type 1: Fake biometric sensor&lt;br /&gt;
-	Type 2: Replay attacks&lt;br /&gt;
-	Type 3: Trojan horse program at feature extractor&lt;br /&gt;
-	Type 4: Real features replaced by synthetic features.&lt;br /&gt;
-	Type 5: Trojan horse program at matcher.&lt;br /&gt;
-	Type 6: Attacks modifying database of templates.&lt;br /&gt;
-	Type 7: Results overridden.&lt;br /&gt;
&lt;br /&gt;
==Analysis==&lt;br /&gt;
Principle of Least Privilege&lt;br /&gt;
	The design of the biometric security system itself is very linear hence, only the channels themselves need to be protected. This means that overall, processes cannot be accessed past the sensor if the sensor themselves have not been used. From this perspective, the design is secure. However, the system is still vulnerable from all attacks that attack each process directly (type 3, 5, and 6 attacks).&lt;br /&gt;
&lt;br /&gt;
Principle of Fail-Safe Default&lt;br /&gt;
	The principle of fail-safe default is an excellent principle to follow for security mechanisms, but it falls short due to an implicit assumption within the principle itself. The principle assumes that security mechanisms will always work perfectly if all the requirements are passed. However, with biometric security systems, that is not the case. Biometric security systems are not perfect so they don’t always pass legitimate users and at the same time, they also pass the invalid users as well.&lt;br /&gt;
	Show chart of failure rate.&lt;br /&gt;
&lt;br /&gt;
Principle of Economy of Mechanism&lt;br /&gt;
	In the design of the biometric security systems, each channel must be encrypted and each state must be protected. This means that overall, the design must contain at least four encryption mechanisms must be used for each channel, and at least five security mechanisms for the five states.&lt;br /&gt;
	The quantity of states and channels involved means that there are a high number of security mechanisms involved which means that security of the overall design is quite complex. This violates the principle of economy of mechanism, but the security of each channel and state may not be as complex as the design, depending on the implementation.&lt;br /&gt;
&lt;br /&gt;
Principle of Complete Mediation&lt;br /&gt;
	Depending on the implementation, as long as each channel is encrypted with several layers of protection, it does not violate the principle. However, the problem comes from the human side and the issue arises when people try to replace current authentication mechanism such as password systems with biometric security systems.&lt;br /&gt;
	For example, new laptops with the Windows operating system have been released with biometric security systems. On the Windows login page, there are two logins available, the password system or the biometric system, and the user only has to use one of them to login, a clear violation of the principle of complete mediation.&lt;br /&gt;
&lt;br /&gt;
Principle of Open Design&lt;br /&gt;
	The design of the biometric security is acceptable but the weakness is easily identified. The weakness of the design lies in the storage of the templates, which to this day, remains a difficult issue. Two options are available, a centralized data bank or decentralized servers to store all the templates.&lt;br /&gt;
	The design violates the principle not because the design is shrouded in secrecy but because the design itself is weak. This issue can be solved in the future by having a stronger design.&lt;br /&gt;
&lt;br /&gt;
Principle of Separation of Privilege&lt;br /&gt;
	It is common knowledge that a system is not secure if only one security mechanism is used, so an obvious solution is to have multiple security mechanisms. The issue arises when multiple biometric security systems are used. For example, fingerprints and retinas are used together. However, the problem is similar to those of the principle of fail-safe defaults. It assume that security mechanism work when they are supposed to work, but by increasing the types of biometrics required, the number of FARs (false acceptance rates) and FRRs (false rejection rates) increase as well.&lt;br /&gt;
	Cite examples.&lt;br /&gt;
&lt;br /&gt;
Principle of Least Common Mechanism&lt;br /&gt;
	Again, the design is simple due to its rather linear structure. However, in order for the security system to work, there must be a step in which users are enrolled, so that features can be stored. To cut costs, that enrolment system is typically a part of the authentication mechanism. This means that the biometric security system is more opened to attacks because another channel (between feature extractor and the template bank) must be encrypted, making the design more complicated, and the attacker has another option to attack the template bank.&lt;br /&gt;
&lt;br /&gt;
Principle of Psychological Acceptability&lt;br /&gt;
	The big reason why biometric security systems are so popular is that from an end-user perspective, they are the simplest security mechanisms to use. The user does not require any sort of knowledge of passwords to use, since it depends on either physiological or behavioural traits. However, if it fails, due to the FARs and FRRs, such a problem can be extremely annoying since it is not easy to remedy unless there is an alternative login method, which of course, defeats the purpose of having a biometric authentication method.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Conclusion==&lt;br /&gt;
&lt;br /&gt;
A lot of the faults of a biometric security system are due to current biometric technology. It is simply not advanced enough because the errors in identifying valid and invalid users are still too big, even though it may be as small as 0.01%.&lt;br /&gt;
	Another issue involves the weak design. As a concept, it is simple, but to implement the design, it requires a lot of encryption and security mechanisms. Also, the design highlights a weakness in storage of the templates. Just like storage of passwords, storage of the templates carries even more risks, because stolen templates could potentially mean a stolen identity.&lt;br /&gt;
	Also, the current thought regarding biometric security systems is that they are the way of the future, meaning they are to replace current security mechanisms, but as shown above, that is terrible because there are still too many weaknesses, including the fact that not everyone can use such a system either.&lt;br /&gt;
	However, it is so popular because it is so simple to use and requires almost no effort. Hence, biometric security systems should only be used as a supplement to current security systems, not a replacement.&lt;/div&gt;</summary>
		<author><name>Mad Doktor</name></author>	</entry>

	<entry>
		<id>http://wiki.cas.mcmaster.ca/index.php/Biometric_Systems_and_Security_Design_Principles</id>
		<title>Biometric Systems and Security Design Principles</title>
		<link rel="alternate" type="text/html" href="http://wiki.cas.mcmaster.ca/index.php/Biometric_Systems_and_Security_Design_Principles"/>
				<updated>2007-12-03T05:07:56Z</updated>
		
		<summary type="html">&lt;p&gt;Mad Doktor:&amp;#32;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;'''Analysis of Biometric Systems using Security Design Principles'''&lt;br /&gt;
==Biometrics==&lt;br /&gt;
Biometrics is the identification of a person through automated measurements using biological or behavioural features.&lt;br /&gt;
&lt;br /&gt;
Biometric security systems are authentication mechanisms that bind an entity to a subject based on what the entity is, as opposed to what they know, what they have, or where they are.&lt;br /&gt;
Within the past several years, biometric security systems have gained a lot of ground in terms of advancements in technology and widespread use. However, there is still a lot of reluctance to adopt the technology worldwide. A look at biometric security systems through security design principles should provide more answers.&lt;br /&gt;
&lt;br /&gt;
==Security Design Principles==&lt;br /&gt;
The following eight design principles were created by Saltzer and Shroeder for the design and implementation of security mechanisms. These design principles encompass technical details and human interaction. They are also simple and easy to understand, which is why they will be used as a guide to analyze biometric security systems. The list of design principles are as follows:&lt;br /&gt;
1.	Principle of Least Privilege: A subject should be given only those privileges that it needs in order to complete its task.&lt;br /&gt;
2.	Principle of Fails-Safe Defaults: A subject should be denied access to an object unless the subject was given access.&lt;br /&gt;
3.	Principle of Economy of Mechanism: Security mechanisms should be as simple as possible.&lt;br /&gt;
4.	Principle of Complete Mediation: All accesses to objects are checked to ensure that they are allowed.&lt;br /&gt;
5.	Principle of Open Design: Security of a mechanism should not depend on the secrecy of its design or implementation.&lt;br /&gt;
6.	Principle of Separation of Privilege: A system should not grant permission based on a single condition.&lt;br /&gt;
7.	Principle of Least Common Mechanism: Mechanisms used to access resources should not be shared.&lt;br /&gt;
8.	Principle of Psychological Acceptability: Security mechanisms should not make the resource more difficult to access than if the security mechanisms were not present.&lt;br /&gt;
&lt;br /&gt;
==Breaking a Biometrics Security System==&lt;br /&gt;
In addition to looking at biometric security systems from a design and implementation perspective, understanding a biometrics security system from an attacker’s perspective is also important. In general, there are seven different types of attacks, they are the following:&lt;br /&gt;
-	Type 1: Fake biometric sensor&lt;br /&gt;
-	Type 2: Replay attacks&lt;br /&gt;
-	Type 3: Trojan horse program at feature extractor&lt;br /&gt;
-	Type 4: Real features replaced by synthetic features.&lt;br /&gt;
-	Type 5: Trojan horse program at matcher.&lt;br /&gt;
-	Type 6: Attacks modifying database of templates.&lt;br /&gt;
-	Type 7: Results overridden.&lt;br /&gt;
&lt;br /&gt;
==Analysis==&lt;br /&gt;
Principle of Least Privilege&lt;br /&gt;
	The design of the biometric security system itself is very linear hence, only the channels themselves need to be protected. This means that overall, processes cannot be accessed past the sensor if the sensor themselves have not been used. From this perspective, the design is secure. However, the system is still vulnerable from all attacks that attack each process directly (type 3, 5, and 6 attacks).&lt;br /&gt;
&lt;br /&gt;
Principle of Fail-Safe Default&lt;br /&gt;
	The principle of fail-safe default is an excellent principle to follow for security mechanisms, but it falls short due to an implicit assumption within the principle itself. The principle assumes that security mechanisms will always work perfectly if all the requirements are passed. However, with biometric security systems, that is not the case. Biometric security systems are not perfect so they don’t always pass legitimate users and at the same time, they also pass the invalid users as well.&lt;br /&gt;
	Show chart of failure rate.&lt;br /&gt;
&lt;br /&gt;
Principle of Economy of Mechanism&lt;br /&gt;
	In the design of the biometric security systems, each channel must be encrypted and each state must be protected. This means that overall, the design must contain at least four encryption mechanisms must be used for each channel, and at least five security mechanisms for the five states.&lt;br /&gt;
	The quantity of states and channels involved means that there are a high number of security mechanisms involved which means that security of the overall design is quite complex. This violates the principle of economy of mechanism, but the security of each channel and state may not be as complex as the design, depending on the implementation.&lt;br /&gt;
&lt;br /&gt;
Principle of Complete Mediation&lt;br /&gt;
	Depending on the implementation, as long as each channel is encrypted with several layers of protection, it does not violate the principle. However, the problem comes from the human side and the issue arises when people try to replace current authentication mechanism such as password systems with biometric security systems.&lt;br /&gt;
	For example, new laptops with the Windows operating system have been released with biometric security systems. On the Windows login page, there are two logins available, the password system or the biometric system, and the user only has to use one of them to login, a clear violation of the principle of complete mediation.&lt;br /&gt;
&lt;br /&gt;
Principle of Open Design&lt;br /&gt;
	The design of the biometric security is acceptable but the weakness is easily identified. The weakness of the design lies in the storage of the templates, which to this day, remains a difficult issue. Two options are available, a centralized data bank or decentralized servers to store all the templates.&lt;br /&gt;
	The design violates the principle not because the design is shrouded in secrecy but because the design itself is weak. This issue can be solved in the future by having a stronger design.&lt;br /&gt;
&lt;br /&gt;
Principle of Separation of Privilege&lt;br /&gt;
	It is common knowledge that a system is not secure if only one security mechanism is used, so an obvious solution is to have multiple security mechanisms. The issue arises when multiple biometric security systems are used. For example, fingerprints and retinas are used together. However, the problem is similar to those of the principle of fail-safe defaults. It assume that security mechanism work when they are supposed to work, but by increasing the types of biometrics required, the number of FARs (false acceptance rates) and FRRs (false rejection rates) increase as well.&lt;br /&gt;
	Cite examples.&lt;br /&gt;
&lt;br /&gt;
Principle of Least Common Mechanism&lt;br /&gt;
	Again, the design is simple due to its rather linear structure. However, in order for the security system to work, there must be a step in which users are enrolled, so that features can be stored. To cut costs, that enrolment system is typically a part of the authentication mechanism. This means that the biometric security system is more opened to attacks because another channel (between feature extractor and the template bank) must be encrypted, making the design more complicated, and the attacker has another option to attack the template bank.&lt;br /&gt;
&lt;br /&gt;
Principle of Psychological Acceptability&lt;br /&gt;
	The big reason why biometric security systems are so popular is that from an end-user perspective, they are the simplest security mechanisms to use. The user does not require any sort of knowledge of passwords to use, since it depends on either physiological or behavioural traits. However, if it fails, due to the FARs and FRRs, such a problem can be extremely annoying since it is not easy to remedy unless there is an alternative login method, which of course, defeats the purpose of having a biometric authentication method.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Conclusion==&lt;br /&gt;
&lt;br /&gt;
A lot of the faults of a biometric security system are due to current biometric technology. It is simply not advanced enough because the errors in identifying valid and invalid users are still too big, even though it may be as small as 0.01%.&lt;br /&gt;
	Another issue involves the weak design. As a concept, it is simple, but to implement the design, it requires a lot of encryption and security mechanisms. Also, the design highlights a weakness in storage of the templates. Just like storage of passwords, storage of the templates carries even more risks, because stolen templates could potentially mean a stolen identity.&lt;br /&gt;
	Also, the current thought regarding biometric security systems is that they are the way of the future, meaning they are to replace current security mechanisms, but as shown above, that is terrible because there are still too many weaknesses, including the fact that not everyone can use such a system either.&lt;br /&gt;
	However, it is so popular because it is so simple to use and requires almost no effort. Hence, biometric security systems should only be used as a supplement to current security systems, not a replacement.&lt;/div&gt;</summary>
		<author><name>Mad Doktor</name></author>	</entry>

	<entry>
		<id>http://wiki.cas.mcmaster.ca/index.php/Biometric_Systems_and_Security_Design_Principles</id>
		<title>Biometric Systems and Security Design Principles</title>
		<link rel="alternate" type="text/html" href="http://wiki.cas.mcmaster.ca/index.php/Biometric_Systems_and_Security_Design_Principles"/>
				<updated>2007-12-03T05:06:50Z</updated>
		
		<summary type="html">&lt;p&gt;Mad Doktor:&amp;#32;/* Conclusion */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;'''Analysis of Biometric Systems using Security Design Principles'''&lt;br /&gt;
==Biometrics==&lt;br /&gt;
Biometrics is the identification of a person through automated measurements using biological or behavioural features.&lt;br /&gt;
&lt;br /&gt;
Biometric security systems are authentication mechanisms that bind an entity to a subject based on what the entity is, as opposed to what they know, what they have, or where they are.&lt;br /&gt;
Within the past several years, biometric security systems have gained a lot of ground in terms of advancements in technology and widespread use. However, there is still a lot of reluctance to adopt the technology worldwide. A look at biometric security systems through security design principles should provide more answers.&lt;br /&gt;
&lt;br /&gt;
==Security Design Principles==&lt;br /&gt;
The following eight design principles were created by Saltzer and Shroeder for the design and implementation of security mechanisms. These design principles encompass technical details and human interaction. They are also simple and easy to understand, which is why they will be used as a guide to analyze biometric security systems. The list of design principles are as follows:&lt;br /&gt;
1.	Principle of Least Privilege: A subject should be given only those privileges that it needs in order to complete its task.&lt;br /&gt;
2.	Principle of Fails-Safe Defaults: A subject should be denied access to an object unless the subject was given access.&lt;br /&gt;
3.	Principle of Economy of Mechanism: Security mechanisms should be as simple as possible.&lt;br /&gt;
4.	Principle of Complete Mediation: All accesses to objects are checked to ensure that they are allowed.&lt;br /&gt;
5.	Principle of Open Design: Security of a mechanism should not depend on the secrecy of its design or implementation.&lt;br /&gt;
6.	Principle of Separation of Privilege: A system should not grant permission based on a single condition.&lt;br /&gt;
7.	Principle of Least Common Mechanism: Mechanisms used to access resources should not be shared.&lt;br /&gt;
8.	Principle of Psychological Acceptability: Security mechanisms should not make the resource more difficult to access than if the security mechanisms were not present.&lt;br /&gt;
&lt;br /&gt;
==Breaking a Biometrics Security System==&lt;br /&gt;
In addition to looking at biometric security systems from a design and implementation perspective, understanding a biometrics security system from an attacker’s perspective is also important. In general, there are seven different types of attacks, they are the following:&lt;br /&gt;
-	Type 1: Fake biometric sensor&lt;br /&gt;
-	Type 2: Replay attacks&lt;br /&gt;
-	Type 3: Trojan horse program at feature extractor&lt;br /&gt;
-	Type 4: Real features replaced by synthetic features.&lt;br /&gt;
-	Type 5: Trojan horse program at matcher.&lt;br /&gt;
-	Type 6: Attacks modifying database of templates.&lt;br /&gt;
-	Type 7: Results overridden.&lt;br /&gt;
&lt;br /&gt;
==Analysis==&lt;br /&gt;
Principle of Least Privilege&lt;br /&gt;
	The design of the biometric security system itself is very linear hence, only the channels themselves need to be protected. This means that overall, processes cannot be accessed past the sensor if the sensor themselves have not been used. From this perspective, the design is secure. However, the system is still vulnerable from all attacks that attack each process directly (type 3, 5, and 6 attacks).&lt;br /&gt;
&lt;br /&gt;
Principle of Fail-Safe Default&lt;br /&gt;
	The principle of fail-safe default is an excellent principle to follow for security mechanisms, but it falls short due to an implicit assumption within the principle itself. The principle assumes that security mechanisms will always work perfectly if all the requirements are passed. However, with biometric security systems, that is not the case. Biometric security systems are not perfect so they don’t always pass legitimate users and at the same time, they also pass the invalid users as well.&lt;br /&gt;
	Show chart of failure rate.&lt;br /&gt;
&lt;br /&gt;
Principle of Economy of Mechanism&lt;br /&gt;
	In the design of the biometric security systems, each channel must be protected and&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Principle of Least Privilege&lt;br /&gt;
	The design of the biometric security system itself is very linear hence, only the channels themselves need to be protected. This means that overall, processes cannot be accessed past the sensor if the sensor themselves have not been used. From this perspective, the design is secure. However, the system is still vulnerable from all attacks that attack each process directly (type 3, 5, and 6 attacks).&lt;br /&gt;
&lt;br /&gt;
Principle of Fail-Safe Default&lt;br /&gt;
	The principle of fail-safe default is an excellent principle to follow for security mechanisms, but it falls short due to an implicit assumption within the principle itself. The principle assumes that security mechanisms will always work perfectly if all the requirements are passed. However, with biometric security systems, that is not the case. Biometric security systems are not perfect so they don’t always pass legitimate users and at the same time, they also pass the invalid users as well.&lt;br /&gt;
	Show chart of failure rate.&lt;br /&gt;
&lt;br /&gt;
Principle of Economy of Mechanism&lt;br /&gt;
	In the design of the biometric security systems, each channel must be encrypted and each state must be protected. This means that overall, the design must contain at least four encryption mechanisms must be used for each channel, and at least five security mechanisms for the five states.&lt;br /&gt;
	The quantity of states and channels involved means that there are a high number of security mechanisms involved which means that security of the overall design is quite complex. This violates the principle of economy of mechanism, but the security of each channel and state may not be as complex as the design, depending on the implementation.&lt;br /&gt;
&lt;br /&gt;
Principle of Complete Mediation&lt;br /&gt;
	Depending on the implementation, as long as each channel is encrypted with several layers of protection, it does not violate the principle. However, the problem comes from the human side and the issue arises when people try to replace current authentication mechanism such as password systems with biometric security systems.&lt;br /&gt;
	For example, new laptops with the Windows operating system have been released with biometric security systems. On the Windows login page, there are two logins available, the password system or the biometric system, and the user only has to use one of them to login, a clear violation of the principle of complete mediation.&lt;br /&gt;
&lt;br /&gt;
Principle of Open Design&lt;br /&gt;
	The design of the biometric security is acceptable but the weakness is easily identified. The weakness of the design lies in the storage of the templates, which to this day, remains a difficult issue. Two options are available, a centralized data bank or decentralized servers to store all the templates.&lt;br /&gt;
	The design violates the principle not because the design is shrouded in secrecy but because the design itself is weak. This issue can be solved in the future by having a stronger design.&lt;br /&gt;
&lt;br /&gt;
Principle of Separation of Privilege&lt;br /&gt;
	It is common knowledge that a system is not secure if only one security mechanism is used, so an obvious solution is to have multiple security mechanisms. The issue arises when multiple biometric security systems are used. For example, fingerprints and retinas are used together. However, the problem is similar to those of the principle of fail-safe defaults. It assume that security mechanism work when they are supposed to work, but by increasing the types of biometrics required, the number of FARs (false acceptance rates) and FRRs (false rejection rates) increase as well.&lt;br /&gt;
	Cite examples.&lt;br /&gt;
&lt;br /&gt;
Principle of Least Common Mechanism&lt;br /&gt;
	Again, the design is simple due to its rather linear structure. However, in order for the security system to work, there must be a step in which users are enrolled, so that features can be stored. To cut costs, that enrolment system is typically a part of the authentication mechanism. This means that the biometric security system is more opened to attacks because another channel (between feature extractor and the template bank) must be encrypted, making the design more complicated, and the attacker has another option to attack the template bank.&lt;br /&gt;
&lt;br /&gt;
Principle of Psychological Acceptability&lt;br /&gt;
	The big reason why biometric security systems are so popular is that from an end-user perspective, they are the simplest security mechanisms to use. The user does not require any sort of knowledge of passwords to use, since it depends on either physiological or behavioural traits. However, if it fails, due to the FARs and FRRs, such a problem can be extremely annoying since it is not easy to remedy unless there is an alternative login method, which of course, defeats the purpose of having a biometric authentication method.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Conclusion==&lt;/div&gt;</summary>
		<author><name>Mad Doktor</name></author>	</entry>

	<entry>
		<id>http://wiki.cas.mcmaster.ca/index.php/Biometric_Systems_and_Security_Design_Principles</id>
		<title>Biometric Systems and Security Design Principles</title>
		<link rel="alternate" type="text/html" href="http://wiki.cas.mcmaster.ca/index.php/Biometric_Systems_and_Security_Design_Principles"/>
				<updated>2007-12-03T05:04:12Z</updated>
		
		<summary type="html">&lt;p&gt;Mad Doktor:&amp;#32;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;'''Analysis of Biometric Systems using Security Design Principles'''&lt;br /&gt;
==Biometrics==&lt;br /&gt;
Biometrics is the identification of a person through automated measurements using biological or behavioural features.&lt;br /&gt;
&lt;br /&gt;
Biometric security systems are authentication mechanisms that bind an entity to a subject based on what the entity is, as opposed to what they know, what they have, or where they are.&lt;br /&gt;
Within the past several years, biometric security systems have gained a lot of ground in terms of advancements in technology and widespread use. However, there is still a lot of reluctance to adopt the technology worldwide. A look at biometric security systems through security design principles should provide more answers.&lt;br /&gt;
&lt;br /&gt;
==Security Design Principles==&lt;br /&gt;
The following eight design principles were created by Saltzer and Shroeder for the design and implementation of security mechanisms. These design principles encompass technical details and human interaction. They are also simple and easy to understand, which is why they will be used as a guide to analyze biometric security systems. The list of design principles are as follows:&lt;br /&gt;
1.	Principle of Least Privilege: A subject should be given only those privileges that it needs in order to complete its task.&lt;br /&gt;
2.	Principle of Fails-Safe Defaults: A subject should be denied access to an object unless the subject was given access.&lt;br /&gt;
3.	Principle of Economy of Mechanism: Security mechanisms should be as simple as possible.&lt;br /&gt;
4.	Principle of Complete Mediation: All accesses to objects are checked to ensure that they are allowed.&lt;br /&gt;
5.	Principle of Open Design: Security of a mechanism should not depend on the secrecy of its design or implementation.&lt;br /&gt;
6.	Principle of Separation of Privilege: A system should not grant permission based on a single condition.&lt;br /&gt;
7.	Principle of Least Common Mechanism: Mechanisms used to access resources should not be shared.&lt;br /&gt;
8.	Principle of Psychological Acceptability: Security mechanisms should not make the resource more difficult to access than if the security mechanisms were not present.&lt;br /&gt;
&lt;br /&gt;
==Breaking a Biometrics Security System==&lt;br /&gt;
In addition to looking at biometric security systems from a design and implementation perspective, understanding a biometrics security system from an attacker’s perspective is also important. In general, there are seven different types of attacks, they are the following:&lt;br /&gt;
-	Type 1: Fake biometric sensor&lt;br /&gt;
-	Type 2: Replay attacks&lt;br /&gt;
-	Type 3: Trojan horse program at feature extractor&lt;br /&gt;
-	Type 4: Real features replaced by synthetic features.&lt;br /&gt;
-	Type 5: Trojan horse program at matcher.&lt;br /&gt;
-	Type 6: Attacks modifying database of templates.&lt;br /&gt;
-	Type 7: Results overridden.&lt;br /&gt;
&lt;br /&gt;
==Analysis==&lt;br /&gt;
Principle of Least Privilege&lt;br /&gt;
	The design of the biometric security system itself is very linear hence, only the channels themselves need to be protected. This means that overall, processes cannot be accessed past the sensor if the sensor themselves have not been used. From this perspective, the design is secure. However, the system is still vulnerable from all attacks that attack each process directly (type 3, 5, and 6 attacks).&lt;br /&gt;
&lt;br /&gt;
Principle of Fail-Safe Default&lt;br /&gt;
	The principle of fail-safe default is an excellent principle to follow for security mechanisms, but it falls short due to an implicit assumption within the principle itself. The principle assumes that security mechanisms will always work perfectly if all the requirements are passed. However, with biometric security systems, that is not the case. Biometric security systems are not perfect so they don’t always pass legitimate users and at the same time, they also pass the invalid users as well.&lt;br /&gt;
	Show chart of failure rate.&lt;br /&gt;
&lt;br /&gt;
Principle of Economy of Mechanism&lt;br /&gt;
	In the design of the biometric security systems, each channel must be protected and&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Conclusion==&lt;/div&gt;</summary>
		<author><name>Mad Doktor</name></author>	</entry>

	<entry>
		<id>http://wiki.cas.mcmaster.ca/index.php/Biometric_Systems_and_Security_Design_Principles</id>
		<title>Biometric Systems and Security Design Principles</title>
		<link rel="alternate" type="text/html" href="http://wiki.cas.mcmaster.ca/index.php/Biometric_Systems_and_Security_Design_Principles"/>
				<updated>2007-12-03T04:55:49Z</updated>
		
		<summary type="html">&lt;p&gt;Mad Doktor:&amp;#32;An analysis of biometric security systems using security design principles as a model.&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Analysis of Biometric Systems using Security Design Principles&lt;br /&gt;
&lt;br /&gt;
Biometrics&lt;br /&gt;
&lt;br /&gt;
Biometrics is the identification of a person through automated measurements using biological or behavioural features.&lt;br /&gt;
&lt;br /&gt;
Biometric security systems are authentication mechanisms that bind an entity to a subject based on what the entity is, as opposed to what they know, what they have, or where they are.&lt;br /&gt;
Within the past several years, biometric security systems have gained a lot of ground in terms of advancements in technology and widespread use. However, there is still a lot of reluctance to adopt the technology worldwide. A look at biometric security systems through security design principles should provide more answers.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Security Design Principles&lt;br /&gt;
&lt;br /&gt;
	The following eight design principles were created by Saltzer and Shroeder for the design and implementation of security mechanisms. These design principles encompass technical details and human interaction. They are also simple and easy to understand, which is why they will be used as a guide to analyze biometric security systems. The list of design principles are as follows:&lt;br /&gt;
1.	Principle of Least Privilege: A subject should be given only those privileges that it needs in order to complete its task.&lt;br /&gt;
2.	Principle of Fails-Safe Defaults: A subject should be denied access to an object unless the subject was given access.&lt;br /&gt;
3.	Principle of Economy of Mechanism: Security mechanisms should be as simple as possible.&lt;br /&gt;
4.	Principle of Complete Mediation: All accesses to objects are checked to ensure that they are allowed.&lt;br /&gt;
5.	Principle of Open Design: Security of a mechanism should not depend on the secrecy of its design or implementation.&lt;br /&gt;
6.	Principle of Separation of Privilege: A system should not grant permission based on a single condition.&lt;br /&gt;
7.	Principle of Least Common Mechanism: Mechanisms used to access resources should not be shared.&lt;br /&gt;
8.	Principle of Psychological Acceptability: Security mechanisms should not make the resource more difficult to access than if the security mechanisms were not present.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Breaking a Biometrics Security System&lt;br /&gt;
		In addition to looking at biometric security systems from a design and implementation perspective, understanding a biometrics security system from an attacker’s perspective is also important. In general, there are seven different types of attacks, they are the following:&lt;br /&gt;
-	Type 1: Fake biometric sensor&lt;br /&gt;
-	Type 2: Replay attacks&lt;br /&gt;
-	Type 3: Trojan horse program at feature extractor&lt;br /&gt;
-	Type 4: Real features replaced by synthetic features.&lt;br /&gt;
-	Type 5: Trojan horse program at matcher.&lt;br /&gt;
-	Type 6: Attacks modifying database of templates.&lt;br /&gt;
-	Type 7: Results overridden.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Analysis&lt;br /&gt;
&lt;br /&gt;
Principle of Least Privilege&lt;br /&gt;
	The design of the biometric security system itself is very linear hence, only the channels themselves need to be protected. This means that overall, processes cannot be accessed past the sensor if the sensor themselves have not been used. From this perspective, the design is secure. However, the system is still vulnerable from all attacks that attack each process directly (type 3, 5, and 6 attacks).&lt;br /&gt;
&lt;br /&gt;
Principle of Fail-Safe Default&lt;br /&gt;
	The principle of fail-safe default is an excellent principle to follow for security mechanisms, but it falls short due to an implicit assumption within the principle itself. The principle assumes that security mechanisms will always work perfectly if all the requirements are passed. However, with biometric security systems, that is not the case. Biometric security systems are not perfect so they don’t always pass legitimate users and at the same time, they also pass the invalid users as well.&lt;br /&gt;
	Show chart of failure rate.&lt;br /&gt;
&lt;br /&gt;
Principle of Economy of Mechanism&lt;br /&gt;
	In the design of the biometric security systems, each channel must be protected and&lt;/div&gt;</summary>
		<author><name>Mad Doktor</name></author>	</entry>

	</feed>