FB pixel

FaceTec enhances UR Code security with support for second PKC algorithm

Ed25519 cryptographic standard added to protocol
FaceTec enhances UR Code security with support for second PKC algorithm
 

FaceTec has upgraded the cryptographic security of its UR Codes with support for the Ed25519 Elliptic Curve.

The addition of a second public-key cryptography algorithms to the biometric barcode UR Code protocol enhances their security against brute force attacks and PRNG (pseudorandom number generator) failures, while allowing their payload to remain small.

Ed25519 is a signature scheme used by the Edwards-curve Digital Signature Algorithm (EdDSA) for its fast performance and strong security. It is more efficient than alternatives like RSA, according to the announcement, for smaller system impact and reduced network traffic.

Network traffic and data security are important considerations for UR Codes, since they provide digitally signed, immutable biometric binding between an individual and their identity data that can be scanned by common mobile devices. As such, FaceTec says they are intended to empower secure, two-party remote identity verification at infinite scale.

“Adding the NIST-approved Ed25519 elliptic curve future proofs the security of UR Codes until at least 2035,” said Josh Rose, CTO of FaceTec. “We look forward to adding support for even more asymmetric encryption curves over the next few years.”

EdDSA also complies with NIST SP 800-186, the recommendation for technologies used by the U.S. Federal Government.

FaceTec launched Scan+Match apps to go with its UR Codes earlier in February, and the company’s VP of Global Standards Andrew Hughes discussed their unique properties and value proposition in an interview with Biometric Update.

Related Posts

Article Topics

 |   |   |   |   |   |   | 

Latest Biometrics News

 

Face biometrics use cases outnumbered only by important considerations

With face biometrics now used regularly in many different sectors and areas of life, stakeholders are asking questions about a…

 

Biometric Update Podcast explores identification at scale using browser fingerprinting

“Browser fingerprinting is this idea that modern browsers are so complex.” So says Valentin Vasilyev, Chief Technology Officer of Fingerprint,…

 

Passkeys now pervasive but passwords persist in enterprise authentication

Passkeys are here; now about those passwords. Specifically, passkeys are now prevalent in the enterprise, the FIDO Alliance says, with…

 

Pornhub returns to UK, but only for iOS users who verify age with Apple

In the UK, “wanker” is not typically a term of endearment. However, the case may be different for Pornhub, which…

 

Europol operated ‘shadow’ IT systems without data safeguards: Report

Europol has operated secret data analysis platforms containing large amounts of personal information, such as identity documents, without the security…

 

EU pushes AI Act deadlines for high-risk systems, including biometrics

The EU has reached a provisional agreement on changes to the AI Act that postpone rules on high-risk AI systems,…

Comments

Leave a Reply

This site uses Akismet to reduce spam. Learn how your comment data is processed.

Biometric Market Analysis and Buyer's Guides

Most Viewed This Week

Featured Company

Biometrics Insight, Opinion

Digital ID In-Depth

Biometrics White Papers

Biometrics Events