Re: biometrics

2002-02-07 Thread Ben Laurie
Dan Geer wrote: In the article they repeat the recommendation that you never use/register the same shared-secret in different domains ... for every environment you are involved with ... you have to choose a different shared-secret. One of the issues of biometrics as a

SSO (was Re: biometrics)

2002-02-07 Thread Marc Branchaud
Dan Geer wrote: In the article they repeat the recommendation that you never use/register the same shared-secret in different domains Compare and contrast, please, with the market's overwhelming desire for single-sign-on (SSO). Put differently, would the actual emergence of an

Re: biometrics

2002-02-06 Thread Dan Geer
|At 07:59 PM 1/26/2002 -0500, Scott Guthery wrote: |(A test GSM authentication algorithm, COMP128, was attacked |but it is not used in any large GSM networks. And it |was the algorithm not the SIM that was attacked.) | |and at Sun, 27 Jan 2002 13:56:13 EST. Greg Rose

Re: biometrics

2002-02-06 Thread Dan Geer
In the article they repeat the recommendation that you never use/register the same shared-secret in different domains ... for every environment you are involved with ... you have to choose a different shared-secret. One of the issues of biometrics as a shared-secret password

Re: biometrics

2002-02-05 Thread bear
On Tue, 29 Jan 2002, Bill Frantz wrote: What would be really nice is to be able to have the same PIN/password for everything. With frequent use, forgetting it would be less of a problem, as would the temptation to write it down. However, such a system would require that the PIN/password be

Re: biometrics

2002-02-01 Thread pasward
Bill Frantz writes: What would be really nice is to be able to have the same PIN/password for everything. Do you really mean that? Sure, if I only have to remember one thing it is easier for me. It is also a complete nightmare if it is ever compromised. --

Re: biometrics (addenda)

2002-02-01 Thread lynn . wheeler
note however, with regard to the 80 hardware tokens, or 3 hardware tokens, or 1 hardware token scenario a single or small number of hardware tokens (with each hardware token having an associated public key registered multiple places) then can become a personal choice. The current scenario

Re: biometrics

2002-02-01 Thread Bill Frantz
At 5:13 AM -0800 1/30/02, [EMAIL PROTECTED] wrote: Bill Frantz writes: What would be really nice is to be able to have the same PIN/password for everything. Do you really mean that? Sure, if I only have to remember one thing it is easier for me. It is also a complete nightmare if it is

Re: biometrics

2002-01-30 Thread Ben Laurie
Bill Frantz wrote: At 4:06 PM -0800 1/28/02, [EMAIL PROTECTED] wrote: at least part of the fingerprint as a PIN ... isn't the guessing issue /or false positives it is the forgetting issue (and the non-trivial number of people that write their PIN on the card). Or to state it another

Re: biometrics

2002-01-29 Thread Bill Frantz
At 4:06 PM -0800 1/28/02, [EMAIL PROTECTED] wrote: at least part of the fingerprint as a PIN ... isn't the guessing issue /or false positives it is the forgetting issue (and the non-trivial number of people that write their PIN on the card). Or to state it another way. These cards attempt

Re: biometrics

2002-01-29 Thread lynn . wheeler
in the most recent PC magazine (2/12/2002) on the stands ... there is an article Why Passords Don't Work (pg. 68 In the article they repeat the recommendation that you never use/register the same shared-secret in different domains ... for every environment you are involved with ... you have to

Re: biometrics

2002-01-28 Thread P.J. Ponder
On Sat, 26 Jan 2002, [EMAIL PROTECTED] wrote: At 05:46 PM 1/26/02 -0500, P.J. Ponder wrote: . . . . Without think about it some more, I don't know whether to place the entire notion of security controls based on biometric telemetry in with _pure_ bullshit like copy protection, watermarking,

Re: biometrics

2002-01-28 Thread Ben Laurie
P.J. Ponder wrote: Without think about it some more, I don't know whether to place the entire notion of security controls based on biometric telemetry in with _pure_ bullshit like copy protection, watermarking, non-repudiation, tamper proofing, or trusted third parties. Admittedly, there is

Re: biometrics

2002-01-28 Thread Jeffrey Altman
And what happens when I am unable to press my thumb against the reader because it is bandaged; or when my thumb ID fails because it was sliced with a knife. lets say you are replacing pin'ed magstripe card with a chip card needing biometric ... say fingerprint (in place of a PIN) along

Re: biometrics

2002-01-28 Thread Sidney Markowitz
On Sun, 2002-01-27 at 14:07, [EMAIL PROTECTED] wrote: The issue then is that biometric represents a particularly difficult shared-secret that doesn't have to be memorized Shared secret? People don't leave a copy of their PIN on every water glass they use. -- sidney

Re: biometrics

2002-01-28 Thread lynn . wheeler
X9.84 biometric standard some other work means that you could actually record all ten fingers in the card and any one would be acceptable. I believe just plain dirty fingers are much more of a problem than a cut. Simple cut can be read-around ... massive cut affecting the whole finger is

Fingerprints (was: Re: biometrics)

2002-01-28 Thread ji
Last week I had to go to my local INS office to get fingerprinted (part of the green card process is getting your fingerprints OK'ed by the FBI (and also presumably stored for future reference)). The process is computerised, with a low-res scan of all the fingers taken once, and then each finger

Re: biometrics

2002-01-28 Thread lynn . wheeler
] To: Cryptography Mailing List Sent by:[EMAIL PROTECTED] owner-cryptography@wasabis cc: ystems.com Subject: Re: biometrics

Re: Fingerprints (was: Re: biometrics)

2002-01-28 Thread lynn . wheeler
I believe NIST published something about FBI needing 40 minutia standard for registration in their database. On tv you see these things about lifting partial prints and then sending them off to FBI to try and find who the partial print matches with, aka the FBI better have rather detailed

Re: Fingerprints (was: Re: biometrics)

2002-01-28 Thread Derek Atkins
JI, Keep in mind that this is the _creation_ of the database entry. Yes, you want the data in the database to be as completely accurate as possible. Later, when they only have partial prints, they can perform a lookups of partial data using the complete database. I think the same would be

Re: biometrics

2002-01-28 Thread Rick Smith at Secure Computing
The essential problem I've always seen with biometrics (and one that Dorothy Denning acknowledged in her recent op ed piece without seriously examining) is the question of whether it's as efficient to deploy and manage biometrics safely as it is to deploy and manage some keyed alternative

Re: Fingerprints (was: Re: biometrics)

2002-01-28 Thread Rick Smith at Secure Computing
At 02:46 PM 1/28/2002, [EMAIL PROTECTED] wrote: The process took about 20-30 minutes; Have you been fingerprinted before? Did it take that long in that case? In my own experience, it only takes a few minutes to be fingerprinted on a standard card and, in theory, they should be able to build a

Re: Fingerprints (was: Re: biometrics)

2002-01-28 Thread Eric Murray
On Mon, Jan 28, 2002 at 02:54:57PM -0700, [EMAIL PROTECTED] wrote: I believe NIST published something about FBI needing 40 minutia standard for registration in their database. [reasons why the FBI wants so many minutae deleted] As an example of the real world, a couple years ago I put

Re: Fingerprints (was: Re: biometrics)

2002-01-28 Thread Arnold G. Reinhold
There is some interesting information at http://www.finger-scan.com/ They make the point that finger scanning differs from finger printing in that what is stored is a set of recognition parameters much smaller than a complete fingerprint image. So there is no need for a lengthily process to

Re: Limitations of limitations on RE/tampering (was: Re: biometrics)

2002-01-27 Thread lynn . wheeler
almost all security is cost/benefit trade-off. hardware token chips are somewhat analogous to bank vaults if the bank vault contains enuf value and somebody is motivated enuf ... they will attempt to find some way to extract the value. This can be either by attacking the vault directly ...

Re: biometrics

2002-01-26 Thread P.J. Ponder
On 26 Jan 2002, Perry E. Metzger wrote: [EMAIL PROTECTED] [EMAIL PROTECTED] writes: . . . . C'mon, depending on is-ness is exactly the same cat-and-mouse game as authentication technologies that depend on have-ness and know-ness attributes. I have no idea what the heck you're talking

Re: biometrics

2002-01-26 Thread Carl Ellison
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 At 03:55 PM 1/26/2002 -0500, Perry E. Metzger wrote: [EMAIL PROTECTED] [EMAIL PROTECTED] writes: Not wanting to have extended contest over this, I'm afraid I'm not letting it drop. but all these absolutes in the comments are just too

Re: biometrics

2002-01-25 Thread Jaap-Henk Hoepman
As much as i have my doubts about biometric systems i cannot let the below pass. On Wed, 23 Jan 2002 21:11:23 +0100 Perry E. Metzger [EMAIL PROTECTED] writes: However, as soon as you lose physical control over the device doing the measurements or their communications path biometrics become

Re: biometrics

2002-01-24 Thread Dan Geer
Folks, while we argue fine points we drift towards irrelevance [1] National ID in Development (USA Today) [2] Computer Security, Biometrics Dominate NIST Agenda (Washington Post) --dan [1] National ID in Development USA Today, 22 January 2002 Federal and state groups are moving to create

Re: biometrics and not so secure hardware

2002-01-24 Thread John R. Levine
I must admit that I worry about the ATMs in places like bars. These machines do not seem to have a lot of physical protection. I gather your concern is well placed. I've read reports of little doozits fitted to bar ATMs that make a copy of your stripe info and keypad input when you use the