{"title":"A Protection Scheme for MOC-Enabled Smart Cards","authors":"C. Barral, S. Vaudenay","doi":"10.1109/BCC.2006.4341632","DOIUrl":null,"url":null,"abstract":"The concept of match-on-card (MoC) consists of a smart card which receives an applicant's candidate template T to be compared with the stored reference template Tref by processing the complete matching algorithm during a biometric authentication request. The smart card will then output whether this comparison is positive or not. The main argument against MoC-enabled smart cards is that it opens the way for YesCard (i.e. an attack path previously seen in banking, a card always returning \"yes\"). The threat regarding biometrics is not only YesCard, but also NoCard as we will see in this paper. We will propose a protocol to easily thwart these attacks by using simple cryptographic primitives such as symmetric encryption. This protocol will however only protect the system from malicious smart cards, but will not protect the smart card against malicious systems. Finally we will enhance this pro tocol to protect the smart card against its use as a so-called oracle to guess the stored reference biometric template.","PeriodicalId":226152,"journal":{"name":"2006 Biometrics Symposium: Special Session on Research at the Biometric Consortium Conference","volume":"201 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2006-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"6","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2006 Biometrics Symposium: Special Session on Research at the Biometric Consortium Conference","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/BCC.2006.4341632","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 6
Abstract
The concept of match-on-card (MoC) consists of a smart card which receives an applicant's candidate template T to be compared with the stored reference template Tref by processing the complete matching algorithm during a biometric authentication request. The smart card will then output whether this comparison is positive or not. The main argument against MoC-enabled smart cards is that it opens the way for YesCard (i.e. an attack path previously seen in banking, a card always returning "yes"). The threat regarding biometrics is not only YesCard, but also NoCard as we will see in this paper. We will propose a protocol to easily thwart these attacks by using simple cryptographic primitives such as symmetric encryption. This protocol will however only protect the system from malicious smart cards, but will not protect the smart card against malicious systems. Finally we will enhance this pro tocol to protect the smart card against its use as a so-called oracle to guess the stored reference biometric template.