NIST.SP.800-63B

Overview#

NIST.SP.800-63B is a NIST Special Publication titled “Authentication & Lifecycle Management” and focuses on Best Practices Password

NIST.SP.800-63B is a publication from National Institute of Standards and Technology

NIST.SP.800-63B changes the requirements for memorized secrets (ie passwords) in several ways.

Session Bindings #

Secrets used for session binding:

NIST.SP.800-63B and Biometrics#

NIST.SP.800-63B has several hesitations on Biometrics.

NIST.SP.800-63B 4.2.1. Permitted Authenticator Types (Authenticator Assurance Level 2) states: Note: When biometric authentication implements the requirements in Section 5.2.3 the device has to be authenticated. Therefore, it is unnecessary to implement another Authentication Factor with biometrics as the device is “something you have”, which serves as a valid second factor of the authenticator.

NIST.SP.800-63B section 5.2.3. Use of Biometrics states:
For a variety of reasons, this document supports only limited use of biometrics for authentication. These include:

Therefore, the use of biometrics for authentication is supported with the following requirements and guidelines:

Biometrics SHALL be used with another Authentication Factor (something you have).

An authenticated protected channel between sensor (or endpoint containing a sensor that resists sensor replacement) and verifier SHALL be established and the sensor or endpoint authenticated prior to capturing the biometric sample from the claimant.

Empirical testing of the biometric system to be deployed SHALL demonstrate an EER of 1 in 1000 or better with respect to matching performance. The biometric system SHALL operate with an FMR of 1 in 1000 or better.

The biometric system SHOULD implement PAD. Testing of the biometric system to be deployed SHOULD demonstrate at least 90% resistance to Presentation Attacks for each relevant attack type (aka species), where resistance is defined as the number of thwarted presentation attacks divided by the number of trial presentation attacks.

Note: PAD is being considered as a mandatory requirement in future editions of this guideline.

The biometric system SHALL allow no more than 5 consecutive failed authentication attempts or 10 consecutive failed attempts if PAD meeting the above requirements is implemented. Once that limit has been reached, the biometric authenticator SHALL either:

OR Determination of sensor/endpoint performance, integrity, and authenticity can be accomplished in several different ways, any of which are acceptable under this guideline. These include but are not limited to: authentication of the sensor or endpoint, certification by an approved accreditation authority, or runtime interrogation of signed metadata (e.g., attestation) as described in Section 5.2.4.

Biometric matching SHOULD be performed locally on claimant’s device or MAY be performed at a central verifier.

If matching is performed centrally:

Biometric samples collected in the authentication process MAY be used to train matching algorithms or, with user consent, for other research purposes. Biometric samples (and any biometric data derived from the biometric sample such as a probe produced through signal processing) SHALL be erased from memory immediately after any training or research data has been derived.

Biometrics are also used in some cases to prevent repudiation of registration and to verify that the same individual participates in all phases of the registration process as described in SP 800-63A.

More Information#

There might be more information for this subject on one of the following: