PDA

View Full Version : If the New iPhone Has Fingerprint Authentication, Can It Be Hacked?



microrobert
09-10-2013, 11:26 AM
If the New iPhone Has Fingerprint Authentication, Can It Be Hacked?

When Apple bought AuthenTec for its biometrics (http://www.patentlyapple.com/patently-apple/2013/07/apples-acquired-fingerprint-sensor-patent-from-authentec-comes-to-light.html) technology — reported (http://www.wired.com/business/2012/09/apple-authentec-mobile-wallet/) as one of its most expensive purchases — there was a lot of speculation about how the company would incorporate biometrics in its product line. Many speculate (http://news.yahoo.com/iphone-5s-part-leak-points-fingerprint-scanner-170007979.html) that the new Apple iPhone to be announced tomorrow will come with a fingerprint authentication (http://www.bloomberg.com/news/2013-08-13/iphone-fingerprint-reader-talk-boosting-biometric-stocks.html) system, and there are several ways it could work, such as swiping your finger over a slit-sized reader to have the phone recognize you.

Apple would be smart to add biometric technology to the iPhone. Fingerprint authentication is a good balance between convenience and security for a mobile device.

Biometric systems are seductive, but the reality isn’t that simple. They have complicated (https://www.schneier.com/crypto-gram-9808.html#biometrics) security properties. For example, they are not keys (http://www.wired.com/opinion/2013/09/black-budget-what-exactly-are-the-nsas-cryptanalytic-capabilities/). Your fingerprint isn’t a secret; you leave it everywhere you touch.

And fingerprint readers have a long history of vulnerabilities as well. Some are better than others. The simplest ones just check the ridges of a finger; some of those can be fooled with a good photocopy (http://dsc.discovery.com/tv-shows/mythbusters/mythbusters-database/fingerprint-scanners-unbeatable.htm). Others check for pores as well. The better ones verify pulse, or finger temperature.

Fooling them with rubber fingers is harder, but often possible. A Japanese researcher had good luck doing this over a decade ago with the gelatin mixture (http://www.theregister.co.uk/2002/05/16/gummi_bears_defeat_fingerprint_sensors/) that’s used to make Gummi bears.

The best system I’ve ever seen was at the entry gates of a secure government facility. Maybe you could have fooled it with a fake finger, but a Marine guard with a big gun was making sure you didn’t get the opportunity to try. Disney World uses a similar system (http://boingboing.net/2008/03/15/fingertip-biometrics.html) at its park gates — but without the Marine guards.

A biometric system that authenticates you and you alone is easier to design than a biometric system that is supposed to identify unknown people. That is, the question “Is this the finger belonging to the owner of this iPhone?” is a much easier question for the system to answer than “Whose finger is this?”

There are two ways an authentication system can fail. It can mistakenly allow an unauthorized person access, or it can mistakenly deny access to an authorized person. In any consumer system, the second failure is far worse than the first. Yes, it can be problematic if an iPhone fingerprint system occasionally allows someone else access to your phone. But it’s much worse if you can’t reliably access your own phone — you’d junk the system after a week.

If it’s true that Apple’s new iPhone will have biometric security, the designers have presumably erred on the side of ensuring that the user can always get in. Failures will be more common in cold weather, when your shriveled fingers just got out of the shower, and so on. But there will certainly still be the traditional PIN system to fall back on.

So … can biometric authentication be hacked?

Almost certainly. I’m sure that someone with a good enough copy of your fingerprint and some rudimentary materials engineering capability — or maybe just a good enough printer — can authenticate his way into your iPhone. But, honestly, if some bad guy has your iPhone and your fingerprint, you’ve probably got bigger problems to worry about.

The final problem with biometric systems is the database. If the system is centralized, there will be a large database of biometric information that’s vulnerable to hacking. A system by Apple will almost certainly be local — you authenticate yourself to the phone, not to any network — so there’s no requirement for a centralized fingerprint database.

Apple’s move is likely to bring fingerprint readers into the mainstream. But all applications are not equal. It’s fine if your fingers unlock your phone. It’s a different matter entirely if your fingerprint is used to authenticate your iCloud account. The centralized database required for that application would create an enormous security risk.

If the New iPhone Has Fingerprint Authentication, Can It Be Hacked? | Wired Opinion | Wired.com (http://www.wired.com/opinion/2013/09/what-if-apples-new-phone-has-fingerprint-authentication/)