Abstract
In this paper, we clarify and verify an established biometric authentication protocol. The selected protocol is intended to have three properties: effectiveness (integrity checks are carried out on all hardware before enabling transmission of biometric data), correctness (the user is satisfied that integrity checks have been executed correctly before transmission of biometric data occurs), and secrecy (unauthorized users cannot obtain biometric data by intercepting messages between the system’s hardware components). We analyse the clarified protocol using applied pi calculus and the ProVerif tool, and demonstrate that it satisfies the intended properties of the protocol. Moreover, this paper shows that the verification result between the naive interpretation and the clarified interpretation is different.
Original language | English |
---|---|
Pages (from-to) | 1-13 |
Number of pages | 13 |
Journal | Lecture Notes in Computer Science |
Volume | 4991 |
DOIs | |
Publication status | Published - 1 Jan 2008 |
Event | Information Security Practice and Experience: Proceedings of 4th International Conference, ISPEC 2008, Sydney, Australia, April 21-23 - Berlin, Heidelberg Duration: 1 Apr 2008 → … |