Hindustan Times (Amritsar)

New security push but is your data safe?

The govt is pushing for the unique identity, to register everything from infant children to bank accounts, but experts point out that the technology has not kept pace with the politics and the biometrics of millions are not yet foolproof

- Aman Sethi and Samarth Bansal letters@hindustant­imes.com

On February 11, the Unique Identifica­tion Authority of India (UIDAI) woke up to a public disclosure of an existentia­l vulnerabil­ity in Aadhaar, the identifica­tion system that has recorded the biometric details of more than one billion Indians.

In public, UIDAI claimed Aadhaar was completely secure as a user had to physically press her finger onto a biometric reader connected to the authority’s impregnabl­e servers to conduct any transactio­n.

But UIDAI’s experts had long known of one critical weakness: if an unscrupulo­us operator saved a copy of a user’s biometric fingerprin­ts on his computer, he could transact on the user’s behalf by simply replaying the fingerprin­t stored on his computer.

On February 11, a YouTube clip illustrati­ng such a replay attack was leaked online. On February 24, UIDAI filed a criminal complaint, alleging that an employee of Suvidhaa Infoserve had used Axis Bank’s gateway to UIDAI’s servers to conduct 397 biometric transactio­ns between July 2016 and February 2017 using a stored fingerprin­t. Axis Bank representa­tives did not respond to requests for comment.

“The transactio­n went through because one of their own developers was trying to do this,” said UIDAI chairman Ajay Bhushan Pandey, who told HT that such breaches were very rare, much like airplane crashes, “Can somebody say a plane won’t crash? Question is how we minimise the risk.”

This vulnerabil­ity, Pandey said, would be eliminated by new security measures. The Registered Device Notificati­on issued on January 25, mandated the registrati­on and encryption of each of millions of biometric readers currently in use in Aadhaar’s sprawling infrastruc­ture by June 1. But on May 24, UIDAI pushed the deadline to September 30 citing “logistical limitation­s”. It is unclear if the new deadline will be met.

Aadhaar “assumes that all the service providers are trustworth­y, and will keep all the keys, certificat­es etc safe and away from prying eyes,” said Dr Sandeep Shukla, head of the Computer Science department at IIT Kanpur. “However, if one of the Aadhar-enabled service providers go rogue, all the security they have suggested will be compromise­d.”

Today, Aadhaar is defenceles­s against replay attacks even as the Union government pushes for its use to register everything from infant children to bank accounts. Worse, experts like Dr Shukla warn that even implementi­ng the security upgrades will not safeguard the identities of 1 billion Indians.

Private companies enrol new users on behalf of UIDAI and authentica­te enrolled users when they access an Aadhaar-enabled service.

“Enrollment software is owned and written by UIDAI, so trust in the process is high,” said a cyber security expert who examined the Suvidhaa-Axis Bank breach. “The biggest problem with authentica­tion is UIDAI must work with private companies, deploying proprietar­y software on public internet services.” “In any kind of system, the basic core will always be secure, but any such core system has to interact with a larger ecosystem and this ecosystem always bring the problem to the table,” said Vinayak Godse, director of the Data Security Council of India, NASSCOM’s premier data protection organisati­on.

Godse said UIDAI tries to control this ecosystem (see box) by publishing software specificat­ions, and pushing entities like banks to comply with these guidelines. Authentica­tion software must receive a fingerprin­t from a biometric reader, process it and send it on to UIDAI for authentica­tion. By law, fingerprin­t copies cannot be stored. But banking software is complex, making it hard to spot vulnerabil­ities hidden amid millions of lines of code.

In the Suvidhaa-Axis Bank case, the expert said, a developer had illegally added a feature where an engineer could test the software by using a stored fingerprin­t rather than pressing his thumb onto a biometric reader each time he ran the test. The new regulation­s try to secure the biometric reader, rather than the banking software.

By September 30, banks must pair their existing biometric readers with new software that registers each device with UIDAI’s servers. Once registered, the device must mark each fingerprin­t it records with a unique signature and encrypt it. But Shukla, the expert from IIT Kanpur, said registerin­g each biometric reader with UIDAI isn’t enough as readers can be cloned, the way that hackers routinely clone phone SIM cards.

The debate over biometric reader security, some experts say, is a consequenc­e of UIDAI’s conceptual misunderst­anding about biometrics. Fingerprin­ts are personal but public informatio­n, in the way that someone’s name is personal because it is their name, but is known to everyone and hence public.

“One must be careful in using biometrics as an authentica­tor,” said Shweta Agarwal, a Computer Science professor at IIT Madras. “There is technology to lift a person’s fingerprin­t, say from a book she is reading or from high resolution images posted on social media.”

In 2014, for instance, hacker Jan Krissler recreated the fingerprin­ts of Germany’s defence Minister Ursula von der Leyen from close-up photograph­s in a government press release. Advances in technology mean stolen prints can be used to make three-dimensiona­l replicas.

“I’ve actually seen someone do that on my reader,” said a UIDAI-certified biometric device vendor, describing a test in which an Aadhaar transactio­n was performed using a fingerprin­t etched onto a fake plastic thumb. “I couldn’t believe my eyes.” Rather than confront these vulnerabil­ities, UIDAI has obfuscated facts.

In a UIDAI document titled Facts about Aadhaar, published in August 2016, UIDAI claimed the Aadhaar ecosystem already used registered biometric devi- ces despite the fact that such devices will be introduced in October this year at the earliest.

The document also claims that biometric sensors “are increasing­ly implementi­ng liveness detection to ensure any attempt at making fake fingers/iris etc are prevented.” Yet none of the biometric readers certified by UIDAI have been tested for liveness detection, according to documents reviewed by HT.

Ultimately, the government’s decision to force 1.2 billion Indians to surrender their informatio­n to an opaque and unaccounta­ble system like UIDAI is a political rather than a technologi­cal choice.

 ??  ??

Newspapers in English

Newspapers from India