Unix
For the biometric authentication protocols illustrated in Figure 5.1 below (it is UNIX password [15%] scheme), note the biometric capture device is authenticated in the case of a static biometric but not authenticated for a dynamic biometric. Explain why authentication is useful in the case of a static biometric, but not needed in the case of a dynamic biometric. Client Host Host Client U. User U r. random number EO), function (r.E() r. random number x, random sequence challenge EO, function Ex. D'. BT) B.BSC Preturn of r k Br. BSW'))= EE.P.BT)- O.P.RT) (BSC) extract B if AND D-D from (r. BSC) AND BT-87(E) AND x-x then yes else no AND BU then yes else no U. User BBT biometric D' biometric device r. return of r yes/no Protocol for static biometric Figure 5.1 (r.x.E()) Er. BS(X) yes/no Protocol for dynamic biometric
Unix
-
- Site Admin
- Posts: 899603
- Joined: Mon Aug 02, 2021 8:13 am