0% found this document useful (0 votes)
18 views8 pages

A Generic Framework For Three-Factor Authentication Preserving Security and Privacy in Distributed Systems

Uploaded by

saisravanthi8333
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
18 views8 pages

A Generic Framework For Three-Factor Authentication Preserving Security and Privacy in Distributed Systems

Uploaded by

saisravanthi8333
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 8

1390 IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, VOL. 22, NO.

8, AUGUST 2011

A Generic Framework for Three-Factor


Authentication: Preserving Security
and Privacy in Distributed Systems
Xinyi Huang, Yang Xiang, Member, IEEE, Ashley Chonka,
Jianying Zhou, and Robert H. Deng, Senior Member, IEEE

Abstract—As part of the security within distributed systems, various services and resources need protection from unauthorized use.
Remote authentication is the most commonly used method to determine the identity of a remote client. This paper investigates a
systematic approach for authenticating clients by three factors, namely password, smart card, and biometrics. A generic and secure
framework is proposed to upgrade two-factor authentication to three-factor authentication. The conversion not only significantly
improves the information assurance at low cost but also protects client privacy in distributed systems. In addition, our framework
retains several practice-friendly properties of the underlying two-factor authentication, which we believe is of independent interest.

Index Terms—Authentication, distributed systems, security, privacy, password, smart card, biometrics.

1 INTRODUCTION

I a distributed system, various resources are distributed


N
in the form of network services provided and managed
by servers. Remote authentication is the most commonly
smart-card-based password authentication has become one
of the most common authentication mechanisms.
Smart-card-based password authentication provides two-
used method to determine the identity of a remote client. In factor authentication, namely a successful login requires the
general, there are three authentication factors: client to have a valid smart card and a correct password.
While it provides stronger security guarantees than pass-
1. Something the client knows: password. word authentication, it could also fail if both authentication
2. Something the client has: smart card. factors are compromised (e.g., an attacker has successfully
3. Something the client is: biometric characteristics obtained the password and the data in the smart card). In
(e.g., fingerprint, voiceprint, and iris scan). this case, a third authentication factor can alleviate the
Most early authentication mechanisms are solely based problem and further improve the system’s assurance.
on password. While such protocols are relatively easy to Another authentication mechanism is biometric authen-
implement, passwords (and human generated passwords in tication [2], [3], [4], where users are identified by their
particular) have many vulnerabilities. As an example, measurable human characteristics, such as fingerprint,
human generated and memorable passwords are usually voiceprint, and iris scan. Biometric characteristics are
short strings of characters and (sometimes) poorly selected. believed to be a reliable authentication factor since they
By exploiting these vulnerabilities, simple dictionary provide a potential source of high-entropy information and
attacks can crack passwords in a short time [1]. Due to cannot be easily lost or forgotten. Despite these merits,
these concerns, hardware authentication tokens are intro- biometric authentication has some imperfect features. Un-
duced to strengthen the security in user authentication, and like password, biometric characteristics cannot be easily
changed or revoked. Some biometric characteristics (e.g.,
fingerprint) can be easily obtained without the awareness of
. X. Huang and R.H. Deng are with the School of Information Systems, the owner.1 This motivates the three-factor authentication,
Singapore Management University, 80 Stamford Road, Singapore 178902. which incorporates the advantages of the authentication
E-mail: {xyhuang, robertdeng}@smu.edu.sg.
. Y. Xiang is with the School of Information Technology, Deakin University, based on password, smart card, and biometrics.
Melbourne Campus at Burwood, 221 Burwood Highway, Burwood,
Victoria 3125, Australia. E-mail: [email protected]. 1.1 Motivation
. A. Chonka is with the Faculty of Science and Technology, School of The motivation of this paper is to investigate a systematic
Information Technology, Pigdons Road, Waurn Ponds Campus, Deakin
University, Geelong, Victoria 3216, Australia.
approach for the design of secure three-factor authentica-
E-mail: [email protected]. tion with the protection of user privacy.
. J. Zhou is with the Institute for Infocomm Research (I 2 R), A*STAR, Three-factor authentication is introduced to incorporate
1 Fusionopolis Way, #21-01 Connexis, South Tower, Singapore 138632. the advantages of the authentication based on password,
E-mail: [email protected].
smart card, and biometrics. A well designed three-factor
Manuscript received 15 Mar. 2010; revised 18 July 2010; accepted 16 Sept.
2010; published online 9 Nov. 2010.
authentication protocol can greatly improve the information
Recommended for acceptance by D. Turgut. assurance in distributed systems. However, the previous
For information on obtaining reprints of this article, please send e-mail to:
[email protected], and reference IEEECS Log Number TPDS-2010-03-0160. 1. Section 3.2 presents three other subtle issues in biometric authentica-
Digital Object Identifier no. 10.1109/TPDS.2010.206. tion (especially in distributed systems).
Authorized licensed use limited to: Asia University. Downloaded on April 20,2024 at 02:35:31 UTC from IEEE Xplore. Restrictions apply.
1045-9219/11/$26.00 ß 2011 IEEE Published by the IEEE Computer Society
HUANG ET AL.: A GENERIC FRAMEWORK FOR THREE-FACTOR AUTHENTICATION: PRESERVING SECURITY AND PRIVACY IN... 1391

research on three-factor authentication is confusing and far 1.3 Related Work


from satisfactory. Several authentication protocols have been proposed to
integrate biometric authentication with password authenti-
1.1.1 Security Issues cation and/or smart-card authentication. Lee et al. [5]
As we will show shortly (in Section 1.3), most existing three- designed an authentication system which does not need a
factor authentication protocols are flawed and cannot meet password table to authenticate registered users. Instead,
security requirements in their applications. Even worse, smart card and fingerprint are required in the authentica-
some improvements of those flawed protocols are not tion. However, due to the analysis given in [6], Lee et al.’s
secure either. The research history of three-factor authenti- scheme is insecure under conspiring attack.
cation can be summarized in the following diagram. Lin and Lai [7] showed that Lee et al.’s scheme is
NEW PROTOCOLS ! BROKEN ! IMPROVED vulnerable to masquerade attack. Namely, a legitimate user
PROTOCOLS ! BROKEN AGAIN !    . (i.e., a user who has registered on the system) is able to
make a successful login on behalf of other users. An
1.1.2 Privacy Issues improved authentication protocol was given by Lin and Lai
to fix that flaw. The new protocol, however, has several
Along with the improved security features, three-factor
other security vulnerabilities. First, Lin-Lai’s scheme only
authentication also raises another subtle issue, namely how
provides client authentication rather than mutual authenti-
to protect the biometric data. Not only is this the privacy
information of the owner, it is also closely related to the cation, which makes it susceptible to the server spoofing
security in the authentication. As biometrics cannot be attack [8]. Second, the password changing phase in Lin-
easily changed, the breached biometric information (either Lai’s scheme is not secure as the smart card cannot check
on the server side or the client side) will make the the correctness of old passwords [9]. Third, Lin-Lai’s
biometric authentication totally meaningless. However, scheme is insecure under impersonation attacks due to
this issue has received less attention than it deserves from the analysis given by Yoon and Yoo [10], who also proposed
protocol designers. a new scheme. However, the new scheme is broken and
We believe it is worthwhile, both in theory and in improved by Lee and Kwon [11].
practice, to investigate a generic framework for three-factor In [12], Kim et al. proposed two ID-based password
authentication, which can preserve the security and the authentication schemes where users are authenticated by
privacy in distributed systems. smart cards, passwords, and fingerprints. However, Scott
[13] showed that a passive eavesdropper (without access to
1.2 Contributions any smart card, password or fingerprint) can successfully
The main contribution of this paper is a generic framework login to the server on behalf of any claiming identity after
for three-factor authentication in distributed systems. The passively eavesdropping only one legitimate login.
proposed framework has several merits as follows: Bhargav-Spantzel et al. proposed a privacy preserving
First, we demonstrate how to incorporate biometrics in multifactor authentication protocol with biometrics [14].
the existing authentication based on smart card and The authentication server in their protocol does not have
password. Our framework is generic rather than instan- the biometric information of registered clients. However,
tiated in the sense that it does not have any additional the biometric authentication is implemented using zero
requirements on the underlying smart-card-based pass- knowledge proofs [15], which requires the server to
word authentication. Not only will this simplify the design maintain a database to store all users’ commitments and
and analysis of three-factor authentication protocols, but uses costly modular exponentiations in the finite group.
also it will contribute a secure and generic upgrade from In [16], Uludag et al. presented various methods of
two-factor authentication to three-factor authentication binding a cryptographic key with the biometric template of a
possessing the practice-friendly properties of the under- user stored in the database. The cryptographic key cannot be
lying two-factor authentication system. revealed without a successful biometric authentication.
Second, authentication protocols in our framework can However, the biometric database could put client privacy
provide true three-factor authentication, namely a success- at risk. In order to protect client privacy, Fan and Lin [17]
ful authentication requires password, smart card, and proposed a three-factor authentication scheme with privacy
biometric characteristics. In addition, our framework can protection on biometrics. The essential approach of their
be easily adapted to allow the server to decide the scheme is as follows: 1) During the registration, the client
authentication factors in user authentication (instead of all chooses a random string and encrypts it using his/her
three authentication factors). biometric template; 2) The result (called sketch) is stored in
Last, in the proposed framework clients’ biometric the smart card; and 3) During the authentication, the client
characteristics are kept secret from servers. This not only must convince the server that he/she can decrypt the sketch,
protects user privacy but also prevents a single-point failure which needs correct biometrics (close to the biometric
(e.g., a breached server) from undermining the authentica- template in the registration). As we shall show shortly, our
tion level of other services. Furthermore, the verification of framework employs a different approach. The client in our
all authentication factors is performed by the server. In framework uses his/her biometrics to generate a random
particular, our framework does not rely on any trusted string. This leads to a generic three-factor authentication
devices to verify the authentication factors, which also protocol from smart-card-based password authentication.
meets the imperfect feature of distributed systems where Very recently, Li and Hwang [18] proposed another
devices cannot be fully trusted. biometric-based remote client authentication scheme using
Authorized licensed use limited to: Asia University. Downloaded on April 20,2024 at 02:35:31 UTC from IEEE Xplore. Restrictions apply.
1392 IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, VOL. 22, NO. 8, AUGUST 2011

smart card and password. Our analysis, which will be given As an interactive protocol, SCPAP may face passive
shortly, points out two limitations of Li-Hwang’s scheme in attackers and active attackers.
practical application. In addition, there are no satisfactory Passive attacker. A passive attacker can obtain messages
solutions for three-factor authentication with additional transmitted between the client and the server. However, it
properties (e.g., key agreement with forward security), cannot interact with the client or the server.
which have been studied intensively in smart-card-based Active attacker. An active attacker has the full control of
password authentication. the communication channel. In addition to message eaves-
Organization of this paper. The remainder of this paper dropping, the attacker can arbitrarily inject, modify, and
is organized as follows: Section 2 briefly reviews the delete messages in the communication between the client
preliminaries of our framework. After that, we describe the
and the server.
challenges of biometric authentication in distributed
On the other hand, SCPAP is a two-factor authentication
systems in Section 3. The generic framework for three-
protocol, namely a successful login requires a valid smart
factor authentication is given in Section 4. Section 5
provides the analysis of the proposed framework, and its card and a correct password. According to the compro-
formal security proofs are given in the supplementary file, mised secret, an attacker can be further classified into the
which can be found on the Computer Society Digital following two types.
Library at http://doi.ieeecomputersociety.org/10.1109/ Attacker with smart card. This type of attacker has the
TPDS.2010.206. Section 6 concludes this paper. smart card, and can read and modify the data in the smart
card. Notice that there are techniques to restrict access to
both reading and modifying data in the smart card.
2 PRELIMINARIES Nevertheless, from the security point of view, authentica-
This section reviews the definitions of smart-card-based tion protocols will be more robust if they are secure against
password authentication, three-factor authentication, and attackers with the ability to do that.
fuzzy extractor. Attacker with password. The attacker is assumed to have
the password of the client but is not given the smart card.
2.1 Smart-Card-Based Password Authentication
Definition 2 (Secure SCPAP). The basic security requirement
Definition 1. A smart-card-based password authentication
of SCPAP is that it should be secure against a passive attacker
protocol (hereinafter referred to as SCPAP) consists of four
with smart card and a passive attacker with password. It is
phases.
certainly more desirable that SCPAP is secure against an
active attacker with smart card and an active attacker with
2-Factor-Initialization: The server (denoted by S) gen-
erates two system parameters P K and SK. P K is password.
published in the system, and SK is kept secret by S. An 2.2 Three-Factor Authentication
execution of this algorithm is denoted by 2-Factor-
Three-factor authentication is very similar to smart-card-
InitializationðÞ ! ðP K; SKÞ. Here,  is system’s security
parameter which determines the size of P K and SK, and based password authentication, with the only difference
the security level of cryptographic algorithms. that it requires biometric characteristics as an additional
2-Factor-Reg: The client (denoted by C), with an initial authentication factor.
password P W , registers on the system by running this Definition 3 (Three-Factor Authentication). A three-factor
interactive protocol with S. The output of this protocol is a authentication protocol involves a client C and a server S, and
smart card SC. An execution of this protocol is denoted by consists of five phases.

3-Factor-Initialization: S generates two system para-


meters P K and SK. P K is published in the system, and
The information in square brackets indicates the secret
SK is kept secret by S. An execution of this algorithm is
value(s) known by the corresponding party. (The same
denoted by 3-Factor-InitializationðÞ ! ðP K; SKÞ, where 
notation will be used in the remainder of this paper.)
is system’s security parameter.
2-Factor-Login-Auth: This is another interactive protocol
3-Factor-Reg: A client C, with an initial password P W
between the client and the server, which enables the client
and biometric characteristics BioData, registers on the
to login successfully using P W and SC. An execution of
system by running this interactive protocol with the server
this protocol is denoted by
S. The output of this protocol is a smart card SC, which is
given to C. An execution of this protocol is denoted by

The output of this protocol is “1” (if the authentication is


successful) or “0” (otherwise). 3-Factor-Login-Auth: This is another interactive protocol
2-Factor-Password-Changing: This protocol enables a between the client C and the server S, which enables the
client to change his/her password after a successful client to login successfully using P W , SC, and BioData. An
authentication (i.e., 2-Factor-Login-Auth outputs “1”). The execution of this protocol is denoted by
data in the smart card will be updated accordingly.
Security requirements. The attacker on SCPAP can be
classified from two aspects: the behavior of the attacker and
the information compromised by the attacker.
Authorized licensed use limited to: Asia University. Downloaded on April 20,2024 at 02:35:31 UTC from IEEE Xplore. Restrictions apply.
HUANG ET AL.: A GENERIC FRAMEWORK FOR THREE-FACTOR AUTHENTICATION: PRESERVING SECURITY AND PRIVACY IN... 1393

The output of this protocol is “1” (if the authentication is 2.3.2 Statistic Distance
successful) or “0” (otherwise). The statistical distance between two probability distribu-
3-Factor-Password-Changing: This protocol enables a P
tions A and B is denoted by SDðA; BÞ ¼ 12 v j PrðA ¼ vÞ 
client to change his/her password after a successful PrðB ¼ vÞj.
authentication. The data in the smart card will be updated
accordingly. 2.3.3 Entropy
3-Factor-Biometrics-Changing2: An analogue of pass- The min-entropy H1 ðAÞ of a random variable A is
word-changing is biometrics-changing, namely the client  logðmaxa Pr½A ¼ aÞ.
can change his/her biometrics used in the authentication,
e.g., using a different finger or using iris instead of finger. 2.3.4 Fuzzy Extractor
While biometrics-changing is not supported by previous A fuzzy extractor extracts a nearly random string R from its
three-factor authentication protocols, we believe it provides biometric input w in an error-tolerant way. If the input
the client with more flexibility in the authentication. changes but remains close, the extracted R remains the
Cost effectiveness. In general, three-factor authentication same. To assist in recovering R from a biometric input w0 , a
is less computationally efficient than smart-card-based pass- fuzzy extractor outputs an auxiliary string P . However, R
word authentication, since the former requires additional remains uniformly random even given P . The fuzzy
computational resources for biometric authentication. To extractor is formally defined as below.
make three-factor authentication practical, biometric-related
Definition 5 (Fuzzy Extractor). An ðM; m; ‘; t; Þ fuzzy
operations must be performed fast and accurately. As
extractor is given by two procedures ðGen; RepÞ.
indicated in [16], the performance of extracting and
authenticating certain types of biometrics (e.g., face and
keystroke) is not satisfactory, but others (e.g., fingerprint and
iris) can satisfy practical requirements. (Examples include
fingerprint recognition in laptops and biometric visa.) Gen is a probabilistic generation procedure, which on
Security requirements. A three-factor authentication (biometric) input w 2 M outputs an “extracted” string R 2
protocol can also face passive attackers and active f0; 1g‘ and an auxiliary string P . For any distribution W on
attackers as defined in SCPAP (Section. 2.1). A passive M of min-entropy m, if <R; P > GenðW Þ, then we have
(an active) attacker can be further classified into the SDð<R; P >; <U‘ ; P >Þ  . Here, U‘ denotes the uniform
following three types. distribution on ‘-bit binary strings.
Type I attacker has the smart card and the biometric
characteristics of the client. It is not given the password of
that client. Rep is a deterministic reproduction procedure allowing to
Type II attacker has the password and the biometric recover R from the corresponding auxiliary string P and any
characteristics. It is not allowed to obtain the data in the vector w0 close to w: for all w; w0 2 M satisfying
smart card. disðw; w0 Þ  t, i f <R; P > GenðwÞ, t h e n w e h a v e
Type III attacker has the smart card and the password of Repðw0 ; P Þ ¼ R.
the client. It is not given the biometric characteristics of that
client. Notice that such an attacker is free to mount any
attacks on the (unknown) biometrics, including biometrics
3 CHALLENGES IN BIOMETRIC AUTHENTICATION
faking and attacks on the metadata (related to the This section is devoted to a brief description of three subtle
biometrics) stored in the smart card. issues in biometric authentication, namely privacy issues,
Definition 4 (Secure Three-Factor Authentication). For a error tolerance, and nontrusted devices.
three-factor authentication protocol, the basic security require- 3.1 Privacy Issues
ment is that it should be secure against passive type I, type II, A trivial way to include biometric authentication in smart-
and type III attackers. It is certainly more desirable that a card-based password authentication is to scan the biometric
three-factor authentication protocol is secure against active type characteristics and store the extracted biometric data as a
I, type II, and type III attackers. template in the server. During the authentication, a compar-
2.3 Fuzzy Extractor ison is made between the stored data and the input biometric
data. If there is a sufficient commonality, a biometric
This section briefly reviews the fuzzy extractor introduced
authentication is said to be successful. This method, how-
in [21].
ever, will raise several security risks, especially in a multi-
2.3.1 Metric Space server environment where user privacy is a concern (e.g., in a
A metric space is a set M with a distance function dis : distributed system). First, servers are not 100 percent secure.
M  M ! IRþ ¼ ½0; 1Þ which obeys various natural prop- Servers with weak security protections can be broken in by
erties. One example of metric space is Hamming metric: M ¼ attackers, who will obtain the biometric data on those servers.
F n is over some alphabet F (e.g., F ¼ f0; 1g) and disðw; w0 Þ Second, servers are not 100 percent trusted. Server-A
is the number of positions in which they differ. (equivalently, its curious administrator) could try to login
to Server-B on behalf of their common clients, or distribute
2. This is motivated by the reviewer’s comment. users’ biometric information in the system. In either case,
Authorized licensed use limited to: Asia University. Downloaded on April 20,2024 at 02:35:31 UTC from IEEE Xplore. Restrictions apply.
1394 IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, VOL. 22, NO. 8, AUGUST 2011

user privacy will be compromised, and a single-point failure secret parameter for three-factor authentication. Let 2-
on a server will downgrade the whole system’s security level Factor-Initialization be the initialization algorithm in the
from three-factor authentication to two-factor authentication underlying SCPAP. Given a security parameter , the
(since clients are likely to register the same biometric authentication server S in our framework runs 2-Factor-
characteristics on all servers in the system).
Initialization twice:
Notice that there is a potential solution to preserve user
privacy even the server has a copy of clients’ biometric data. 1. 2-Factor-InitializationðÞ ! ðP K1 ; SK1 Þ.
The method is called “cancellable biometrics” [22]: Biometric 2. 2-Factor-InitializationðÞ ! ðP K2 ; SK2 Þ.
data can be intentionally distorted in a repeatable manner. Notice that the two pairs ðP K1 ; SK1 Þ and ðP K2 ; SK2 Þ are
This allows the client to generate different biometrics for
generated in an independent manner.
different purposes and register different biometric data on
The public parameter in three-factor authentication is the
different servers. Furthermore, the client can cancel his/her
biometric data on the server and enroll a new one whenever pair ðP K1 ; P K2 Þ, and the corresponding secret parameter is
necessary (e.g., if the biometric data stored on the server is the pair ðSK1 ; SK2 Þ.
compromised). However, cancellable biometrics has certain
4.2 3-Factor-Reg
limitations [23]. To date, there are generally two methods to
implement cancellable biometrics: 1) Biometric Salting and The registration in our framework is made up of the
2) Noninvertible Transforms. The former method needs an following steps. In the following, let h be a cryptographic
auxiliary data which must be kept secret, and it remains as a hash function chosen by the client C.
challenging work to design a noninvertible transform
function satisfying both performance and noninvertibility 1. An initial password P W1 is chosen by the client C.
requirements. Due to these concerns, our framework does 2. GenðBioDataÞ ! ðR; P Þ. A pair ðR; P Þ is generated
using C’s biometric template BioData and the
not use cancellable biometrics.
algorithm Gen in the fuzzy extractor. We assume
3.2 Error Tolerance and Nontrusted Devices there is a device extracting the biometric template
One challenge in biometric authentication is that biometric and carrying out all calculations in the fuzzy
characteristics are prone to various noise during data extractor. Notice that this step does not involve
collecting, and this natural feature makes it impossible to any interaction with the authentication server.
reproduce precisely each time biometric characteristics are 3. Let P W2 ¼ hðRÞ. The second “password” P W2 is
measured. A practical biometric authentication protocol calculated from the random string R. R will be
cannot simply compare the hash or the encryption of deleted immediately once the calculation of P W2 is
biometric templates (which requires an exact match). complete.
Instead, biometric authentication must tolerate failures 4.
within a reasonable bound. Another issue in biometric
authentication is that the verification of biometrics should
be performed by the server instead of other devices, since C (using P W1 ) and S (using SK1 ) first execute the 2-
such devices are usually remotely located from the server Factor-Reg protocol of SCPAP. Let Data1 be the data
and cannot be fully trusted. The above two subtle issues generated by S at this step.
seem to be neglected in a recent three-factor authentication 5.
protocol proposed by Li and Hwang [18]. The detailed
analysis of their protocol is given in the supplementary file
(Section 1), which can be found on the Computer Society C and S have another run of 2-Factor-Reg protocol,
Digital Library at http://doi.ieeecomputersociety.org/ where C registers P W2 and S uses SK2 to generate the
10.1109/TPDS.2010.206. corresponding data Data2 . P W2 will be deleted
immediately once the registration is complete.
4 A GENERIC FRAMEWORK FOR THREE-FACTOR 6. S generates a smart card SC which contains Data1
AUTHENTICATION and Data2 . The client C is given SC.
7. C updates the data in the smart card SC by adding
This section describes a generic approach for three-factor
Data3 ¼ fthe auxiliary string P , the description of the
authentication from a smart-card-based password authen-
hash function h, the reproduction algorithm Rep}.
tication protocol (SCPAP, Definition 1) and a fuzzy
extractor (Definition 5). The design philosophy of our This completes the description of the 3-Factor-Reg protocol
approach can be found in the supplementary file (Section 2), in our framework. As in the existing authentication
which can be found on the Computer Society Digital protocols, we assume the registration phase is performed
Library at http://doi.ieeecomputersociety.org/10.1109/ in a secure and reliable environment, and particularly the
TPDS.2010.206, where a graphical representation (Fig. 1) is device at Step 2 is trusted for its purpose. After a successful
given to illustrate the three-factor authentication process. registration, the client C will have a smart card SC (contains
4.1 3-Factor-Initialization fData1 ; Data2 ; Data3 g). The initial password is P W1 . Notice
We first describe the initialization phase in the proposed that neither the server nor the smart card has a copy of
framework. This phase generates a public parameter and a client’s biometric characteristics.
Authorized licensed use limited to: Asia University. Downloaded on April 20,2024 at 02:35:31 UTC from IEEE Xplore. Restrictions apply.
HUANG ET AL.: A GENERIC FRAMEWORK FOR THREE-FACTOR AUTHENTICATION: PRESERVING SECURITY AND PRIVACY IN... 1395

4.3 3-Factor-Login-Auth client and the server can execute 2-Factor-Password-


The client C first inserts the smart card SC into a card Changing of SCPAP to change P W2 to P W20 and update
reader, which will extract the data fData1 ; Data2 ; Data3 g. the data in the smart card accordingly. As in the
(Recall that Data3 ¼ ðP ; h; RepÞ.) After that, C inputs the registration, P W20 will be deleted immediately once this
password P W1 and his/her biometric data.3 Let BioData0 phase is complete.
be the biometric template extracted at this phase. The login
is made up of the following three steps.
5 SCHEME ANALYSIS
1. Calculate R ¼ RepðBioData0 ; P Þ and P W2 ¼ hðRÞ. A This section is devoted to the analysis of the generic
random string R is calculated from the biometric framework.
template BioData0 and the auxiliary string P (which
is stored in the smart card) by running the algorithm 5.1 Security Analysis
Rep. The random string R will be the same as the In the supplementary file (Sections 3.1, 3.2, and 3.3),
one generated at the registration phase if BioData0 is which can be found on the Computer Society Digital
close to BioData. More precisely, one can obtain an Library at http://doi.ieeecomputersociety.org/10.1109/
identical R if disðBioData; BioData0 Þ < t in an TPDS.2010.206, we show that the generic construction
ðM; m; ‘; t; Þ fuzzy extractor (Definition 5). satisfies all security requirements of three-factor authenti-
2. cation, if the underlying SCPAP satisfies Definition 2 and
the fuzzy extractor satisfies Definition 5. Other security
properties of the proposed framework are also investi-
C (using P W1 and Data1 ) and S (using SK1 ) first gated in the supplementary file (Section 3.4), which can
execute the 2-Factor-Login-Auth protocol of SCPAP. be found on the Computer Society Digital Library at
3. http://doi.ieeecomputersociety.org/10.1109/TPDS.
2010.206.

5.2 Comparison with Previous Protocols


C and S have another run of 2-Factor-Login-Auth, The purpose of this paper is to investigate a systematic
where C uses P W2 and Data2 , and S uses SK2 . approach for the design of secure three-factor authentica-
This completes the description of the 3-Factor-Login- tion. Thus, like almost all generic constructions, our
Auth protocol in our framework. The protocol outputs “1” if framework does not have advantages from the computa-
and only if both executions of 2-Factor-Login-Auth protocol tional point of view. Nevertheless, it is still affordable for
output “1.” Otherwise, the protocol outputs “0.” smart-card applications, due to the efficient designs of
Remark. In order to make the protocol clear, we separate the SCPAP and fuzzy extractor: There are a number of efficient
authentication by two steps (Step 2 and Step 3). This also SCPAPs in the literature, and fuzzy extractors can be
shows the flexibility of our protocol: According to the constructed from error-correcting code and standard pair-
criticality of the requested service, the service provider wise-independent hashing [21], both of which require only
(i.e., the server S in our protocol) can determine the factors lightweight operations. In addition, the proposed frame-
work enjoys several desirable properties of SCPAP. This
used in the authentication. Namely, the service provider
saves the time and effort on the design of three-factor
can authenticate the client based on “smart card and
authentication with those properties, and more importantly
password” (Step 2), “smart card and biometrics” (Step 1
avoids the confusing “broken and improved” process in the
and Step 3), or “smart card, password, and biometrics”
existing research on three-factor authentication.
(Steps 1-3). In the case of all three factors are required,
client and server can carry out the authentication more
efficiently. Let fM1 ; R1 ; M2 ; R2 ; . . . ; Mn ; Rn g be a tran- 6 CONCLUSION
script of the authentication at Step 2, and let fM01 ; R01 ; Preserving security and privacy is a challenging issue in
M02 ; R02 ; . . . ; M0n ; R0n g be that at Step 3. distributed systems. This paper makes a step forward in
solving this issue by proposing a generic framework for
4.4 3-Factor-Password-Changing
three-factor authentication to protect services and resources
After a successful login (i.e., 3-Factor-Login-Auth outputs from unauthorized use. The authentication is based on
“1”), the client and the server can execute 2-Factor-Password- password, smart card, and biometrics. Our framework not
Changing of SCPAP to change the password P W1 to P W10 and only demonstrates how to obtain secure three-factor
update the data in the smart card accordingly. authentication from two-factor authentication, but also
addresses several prominent issues of biometric authentica-
4.5 3-Factor-Biometrics-Changing
tion in distributed systems (e.g., client privacy and error
Similarly, one can change the biometrics used in the tolerance). The analysis shows that the framework satisfies
authentication. To do that, the client can generate a new all security requirements on three-factor authentication and
“password” P W20 (determined by the new biometrics) by has several other practice-friendly properties (e.g., key
running Step 2-3 in the registration phase. After that, the agreement, forward security, and mutual authentication).
The future work is to fully identify the practical threats on
3. The biometric extractor is trusted to extract biometrics properly and
never divulges the biometric information. This is a weaker assumption than three-factor authentication and develop concrete three-
using a fully trusted device to verify biometrics. factor authentication protocols with better performances.
Authorized licensed use limited to: Asia University. Downloaded on April 20,2024 at 02:35:31 UTC from IEEE Xplore. Restrictions apply.
1396 IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, VOL. 22, NO. 8, AUGUST 2011

REFERENCES [24] H. Tian, X. Chen, and Y. Ding, “Analysis of Two Types Deniable
Authentication Protocols,” Int’l J. Network Security, vol. 9, no. 3,
[1] D.V. Klein, “Foiling the Cracker: A Survey of, and Improvements pp. 242-246, July 2009.
to, Password Security,” Proc. Second USENIX Workshop Security,
1990. Xinyi Huang received the PhD degree in
[2] Biometrics: Personal Identification in Networked Society, A.K. Jain, computer science (information security) in
R. Bolle, and S. Pankanti, eds. Kluwer, 1999. 2009, from the School of Computer Science
[3] D. Maltoni, D. Maio, A.K. Jain, and S. Prabhakar, Handbook of and Software Engineering, the University of
Fingerprint Recognition. Springer-Verlag, 2003. Wollongong, Australia. He is currently a post-
[4] Ed. Dawson, J. Lopez, J.A. Montenegro, and E. Okamoto, “BAAI: doctoral fellow in the School of Information
Biometric Authentication and Authorization Infrastructure,” Proc. Systems, Singapore Management University.
IEEE Int’l Conf. Information Technology: Research and Education His research interests focus on the cryptography
(ITRE ’03), pp. 274-278, 2004. and its applications in information systems. He
[5] J.K. Lee, S.R. Ryu, and K.Y. Yoo, “Fingerprint-Based Remote User has published more than 40 referred research
Authentication Scheme Using Smart Cards,” Electronics Letters, papers at international conferences and journals. His research results
vol. 38, no. 12, pp. 554-555, June 2002. have more than 350 citations.
[6] C.C. Chang and I.C. Lin, “Remarks on Fingerprint-Based
Remote User Authentication Scheme Using Smart Cards,”
ACM SIGOPS Operating Systems Rev., vol. 38, no. 4, pp. 91-96,
Yang Xiang received the PhD degree in
Oct. 2004.
computer science from Deakin University,
[7] C.H. Lin and Y.Y. Lai, “A Flexible Biometrics Remote User Melbourne, Australia, in April 2007. He is
Authentication Scheme,” Computer Standards Interfaces, vol. 27, currently with School of Information Technol-
no. 1, pp. 19-23, Nov. 2004. ogy, Deakin University. His research interests
[8] M.K. Khan and J. Zhang, “Improving the Security of ‘A Flexible include network and system security, distribu-
Biometrics Remote User Authentication Scheme’,” Computer ted systems, and wireless systems. In particu-
Standards Interfaces, vol. 29, no. 1, pp. 82-85, Jan. 2007. lar, he is currently leading in a research group
[9] C.J. Mitchell and Q. Tang, “Security of the Lin-Lai Smart Card developing active defense systems against
Based User Authentication Scheme,” Technical Report RHUL- large-scale network attacks and new Internet
MA20051, http://www.ma.rhul.ac.uk/static/techrep/2005/ security countermeasures. He has published more than 100 research
RHUL-MA-2005-1.pdf, Jan. 2005. papers in international journals and conferences. He has served as
[10] E.J. Yoon and K.Y. Yoo, “A New Efficient Fingerprint-Based program/general chair for many international conferences such as
Remote User Authentication Scheme for Multimedia Systems,” ICA3PP 11, IEEE HPCC 10/09, IEEE ICPADS 08, and NSS 10/09/08/
Proc. Ninth Int’l Conf. Knowledge-Based Intelligent Information and 07. He is on the editorial board of Journal of Network and Computer
Eng. Systems (KES), 2005. Applications. He is a member of the IEEE.
[11] Y. Lee and T. Kwon, “An improved Fingerprint-Based Remote
User Authentication Scheme Using Smart Cards,” Proc. Int’l Conf.
Computational Science and Its Applications (ICCSA), 2006.
[12] H.S. Kim, J.K. Lee, and K.Y. Yoo, “ID-Based Password Ashley Chonka received the bachelor of com-
Authentication Scheme Using Smart Cards and Fingerprints,” puter science degree in 2001 and the master’s of
ACM SIGOPS Operating Systems Rev., vol. 37, no. 4, pp. 32-41, information techology (professional) degree in
Oct. 2003. 2005. He also received the PhD degree from
[13] M. Scott, “Cryptanalysis of an ID-Based Password Authentication Deakin University on 5 May 2010. He has
Scheme Using Smart Cards and Fingerprints,” ACM SIGOPS successfully published more than 20 peer-
Operating Systems Rev., vol. 38, no. 2, pp. 73-75, Apr. 2004. reviewed papers and is currently a lecturer at
[14] A. Bhargav-Spantzel, A.C. Squicciarini, E. Bertino, S. Modi, M. Deakin University. His research interests are in
Young, and S.J. Elliott, “Privacy Preserving Multi-Factor Authen- the area of Network security, MultiCore, Cyber-
tication with Biometrics,” J. Computer Security, vol. 15, no. 5, Warfare, Chaos Theory, and Honeypot systems.
pp. 529-560, 2007.
[15] S. Goldwasser, S. Micali, and C. Rackoff, “The Knowledge
Complexity of Interactive Proof-Systems,” SIAM J. Computing,
vol. 18, no. 1, pp. 186-208, Feb. 1989.
[16] U. Uludag, S. Pankanti, S. Prabhakar, and A.K. Jain, “Biometric
Cryptosystems: Issues and Challenges,” Proc. IEEE, Special Issue
on Multimedia Security for Digital Rights Management, vol. 92,
no. 6, pp. 948-960, June 2004.
[17] C.-I. Fan and Y.-H. Lin, “Provably Secure Remote Truly Three-
Factor Authentication Scheme with Privacy Protection on Bio-
metrics,” IEEE Trans. Information Forensics and Security, vol. 4,
no. 4, pp. 933-945, Dec. 2009.
[18] C.T. Li and M.-S. Hwang, “An Efficient Biometrics-Based Remote
User Authentication Scheme Using Smart Cards,” J. Network and
Computer Applications, vol. 33, no. 1, pp. 1-5, 2010.
[19] P.C. Kocher, J. Jaffe, and B. Jun, “Differential Power Analysis,”
Proc. Int’l Cryptology Conf. (CRYPTO), pp. 388-397, 1999.
[20] T.S. Messerges, E.A. Dabbish, and R.H. Sloan, “Examining
Smart-Card Security under the Threat of Power Analysis
Attacks,” IEEE Trans. Computers, vol. 51, no. 5, pp. 541-552,
May 2002.
[21] Y. Dodis, L. Reyzin, and A. Smith, “Fuzzy Extractors: How to
Generate Strong Keys from Biometrics and Other Noisy Data,”
Proc. Int’l Conf. Theory and Applications of Cryptographic Techniques
(Eurocrypt), pp. 523-540, 2004.
[22] N.K. Ratha, J.H. Connell, and R.M. Bolle, “Enhancing Security and
Privacy in Biometrics-Based Authentication Systems,” IBM Sys-
tems J., vol. 40, no. 3, pp. 614-634, 2001.
[23] M.-H. Lim and A.B.J. Teoh, “Cancelable Biometrics,” Scholarpedia,
vol. 5, no. 1, p. 9201, 2010.
Authorized licensed use limited to: Asia University. Downloaded on April 20,2024 at 02:35:31 UTC from IEEE Xplore. Restrictions apply.
HUANG ET AL.: A GENERIC FRAMEWORK FOR THREE-FACTOR AUTHENTICATION: PRESERVING SECURITY AND PRIVACY IN... 1397

Jianying Zhou received the PhD degree in Robert H. Deng received the bachelor’s degree
information security from the University of from National University of Defense Technology,
London, in 1997. He is a senior scientist at China, the MSc and PhD degrees from the
Institute for Infocomm Research (I2 R), and Illinois Institute of Technology. He has been with
heads the Network Security Group. His research the Singapore Management University since
interests are in computer and network security, 2004, and is currently professor, associate dean
cryptographic protocol, mobile and wireless for Faculty & Research, School of Information
communications security. He has published Systems. Prior to this, he was principal scientist
about 150 referred papers at international and manager of Infocomm Security Department,
conferences and journals. He is actively involved Institute for Infocomm Research, Singapore. He
in the academic community, having served in many international has 26 patents and more than 200 technical publications in international
conference committees as general chair, program chair and PC conferences and journals in the areas of computer networks, network
member, having been in the editorial board and as a regular reviewer security and information security. He has served as general chair,
for many international journals. He is a cofounder and steering program committee chair, and program committee member of numerous
committee member of International Conference on Applied Cryptogra- international conferences. He is an associate editor of the IEEE
phy and Network Security (ACNS). Transactions on Information Forensics and Security, associate editor
of Security and Communication Networks Journal (John Wiley), and
member of Editorial Board of Journal of Computer Science and
Technology (the Chinese Academy of Sciences). He received the
University Outstanding Researcher Award from the National University
of Singapore in 1999 and the Lee Kuan Yew Fellow for Research
Excellence from the Singapore Management University in 2006. He was
named Community Service Star and Showcased Senior Information
Security Professional by (ISC)2 under its Asia-Pacific Information
Security Leadership Achievements program in 2010. He is a senior
member of the IEEE.

. For more information on this or any other computing topic,


please visit our Digital Library at www.computer.org/publications/dlib.

Authorized licensed use limited to: Asia University. Downloaded on April 20,2024 at 02:35:31 UTC from IEEE Xplore. Restrictions apply.

You might also like