Strong key derivation from noisy sources
A shared cryptographic key enables strong authentication. Candidate sources for creating such a shared key include biometrics and physically unclonable functions. However, these sources come with a substantial problem: noise in repeated readings. A fuzzy extractor produces a stable key from a n...
Main Author: | |
---|---|
Language: | en_US |
Published: |
2016
|
Subjects: | |
Online Access: | https://hdl.handle.net/2144/15636 |
id |
ndltd-bu.edu-oai-open.bu.edu-2144-15636 |
---|---|
record_format |
oai_dc |
spelling |
ndltd-bu.edu-oai-open.bu.edu-2144-156362020-07-16T17:00:42Z Strong key derivation from noisy sources Fuller, Benjamin Woodbury Computer science Biometric authentication Error correcting codes Fuzzy extractors Information theory Key derivation A shared cryptographic key enables strong authentication. Candidate sources for creating such a shared key include biometrics and physically unclonable functions. However, these sources come with a substantial problem: noise in repeated readings. A fuzzy extractor produces a stable key from a noisy source. It consists of two stages. At enrollment time, the generate algorithm produces a key from an initial reading of the source. At authentication time, the reproduce algorithm takes a repeated but noisy reading of the source, yielding the same key when the two readings are close. For many sources of practical importance, traditional fuzzy extractors provide no meaningful security guarantee. This dissertation improves key derivation from noisy sources. These improvements stem from three observations about traditional fuzzy extractors. First, the only property of a source that standard fuzzy extractors use is the entropy in the original reading. We observe that additional structural information about the source can facilitate key derivation. Second, most fuzzy extractors work by first recovering the initial reading from the noisy reading (known as a secure sketch). This approach imposes harsh limitations on the length of the derived key. We observe that it is possible to produce a consistent key without recovering the original reading of the source. Third, traditional fuzzy extractors provide information-theoretic security. However, security against computationally bounded adversaries is sufficient. We observe fuzzy extractors providing computational security can overcome limitations of traditional approaches. The above observations are supported by negative results and constructions. As an example, we combine all three observations to construct a fuzzy extractor achieving properties that have eluded prior approaches. The construction remains secure even when the initial enrollment phase is repeated multiple times with noisy readings. Furthermore, for many practical sources, reliability demands that the tolerated noise is larger than the entropy of the original reading. The construction provides security for sources of this type by utilizing additional source structure, producing a consistent key without recovering the original reading, and providing computational security. 2016-04-08T14:29:25Z 2016-04-08T14:29:25Z 2015 2016-03-12T07:13:52Z Thesis/Dissertation https://hdl.handle.net/2144/15636 en_US Attribution 4.0 International http://creativecommons.org/licenses/by/4.0/ |
collection |
NDLTD |
language |
en_US |
sources |
NDLTD |
topic |
Computer science Biometric authentication Error correcting codes Fuzzy extractors Information theory Key derivation |
spellingShingle |
Computer science Biometric authentication Error correcting codes Fuzzy extractors Information theory Key derivation Fuller, Benjamin Woodbury Strong key derivation from noisy sources |
description |
A shared cryptographic key enables strong authentication. Candidate sources for creating such a shared key include biometrics and physically unclonable functions. However, these sources come with a substantial problem: noise in repeated readings.
A fuzzy extractor produces a stable key from a noisy source. It consists of two stages. At enrollment time, the generate algorithm produces a key from an initial reading of the source. At authentication time, the reproduce algorithm takes a repeated but noisy reading of the source, yielding the same key when the two readings are close. For many sources of practical importance, traditional fuzzy extractors provide no meaningful security guarantee.
This dissertation improves key derivation from noisy sources. These improvements stem from three observations about traditional fuzzy extractors.
First, the only property of a source that standard fuzzy extractors use is the entropy in the original reading. We observe that additional structural information about the source can facilitate key derivation.
Second, most fuzzy extractors work by first recovering the initial reading from the noisy reading (known as a secure sketch). This approach imposes harsh limitations on the length of the derived key. We observe that it is possible to produce a consistent key without recovering the original reading of the source.
Third, traditional fuzzy extractors provide information-theoretic security. However, security against computationally bounded adversaries is sufficient. We observe fuzzy extractors providing computational security can overcome limitations of traditional approaches.
The above observations are supported by negative results and constructions. As an example, we combine all three observations to construct a fuzzy extractor achieving properties that have eluded prior approaches. The construction remains secure even when the initial enrollment phase is repeated multiple times with noisy readings. Furthermore, for many practical sources, reliability demands that the tolerated noise is larger than the entropy of the original reading. The construction provides security for sources of this type by utilizing additional source structure, producing a consistent key without recovering the original reading, and providing computational security. |
author |
Fuller, Benjamin Woodbury |
author_facet |
Fuller, Benjamin Woodbury |
author_sort |
Fuller, Benjamin Woodbury |
title |
Strong key derivation from noisy sources |
title_short |
Strong key derivation from noisy sources |
title_full |
Strong key derivation from noisy sources |
title_fullStr |
Strong key derivation from noisy sources |
title_full_unstemmed |
Strong key derivation from noisy sources |
title_sort |
strong key derivation from noisy sources |
publishDate |
2016 |
url |
https://hdl.handle.net/2144/15636 |
work_keys_str_mv |
AT fullerbenjaminwoodbury strongkeyderivationfromnoisysources |
_version_ |
1719329635051765760 |