Overview
Offline mode enables completely air-gapped operation where the boop scanner operates independently without any cloud connectivity. This mode uses fuzzy extractor technology to convert biometric data directly into cryptographic keys on the device itself.How Fuzzy Extractors Work
A fuzzy extractor is a cryptographic primitive that reliably extracts uniform randomness from noisy biometric data. It enables the same cryptographic key to be derived from slightly different biometric scans.Technical Architecture
Key Components
- Generation Phase
- Reproduction Phase
During enrollment, the fuzzy extractor:
- Extracts features from palm vein pattern
- Applies error correction using BCH codes
- Generates helper data (public, non-sensitive)
- Derives cryptographic key from biometric
- Stores helper locally (never transmitted)
Security Properties
Cryptographic Guarantees
| Property | Description | Guarantee |
|---|---|---|
| Key Uniformity | Generated keys are indistinguishable from random | 2^256 entropy |
| Biometric Privacy | Helper data reveals nothing about biometric | Information theoretic security |
| Error Tolerance | Handles natural biometric variance | Up to 20% feature deviation |
| Non-invertibility | Cannot recover biometric from key or helper | One-way function |
| Reusability | Same biometric produces same key | Deterministic generation |
Threat Model
Protected Against
- Helper data theft (reveals no biometric info)
- Network attacks (completely offline)
- Cloud compromise (no cloud dependency)
- Replay attacks (challenge-response protocol)
Requires Physical Security
- Device tampering protection
- Secure storage of scanner
- Physical access control
- Environmental monitoring
Implementation Details
Biometric Processing Pipeline
Error Correction Codes
We use BCH (Bose-Chaudhuri-Hocquenghem) codes for error correction:- Code parameters: BCH(511, 259, 61)
- Error correction capability: Up to 30 bit errors
- False acceptance rate: < 10^-9
- False rejection rate: < 0.01
Key Derivation
Offline Mode Setup
Prerequisites
Initialization Process
Use Cases
Cryptocurrency Cold Storage
Perfect for air-gapped cryptocurrency signing:Secure Document Signing
Encrypted Storage
Performance Characteristics
Timing Analysis
| Operation | Duration | Notes |
|---|---|---|
| Feature Extraction | 120ms | Palm vein pattern analysis |
| Error Correction | 35ms | BCH encoding/decoding |
| Key Derivation | 180ms | PBKDF2 with 100k iterations |
| Total Authentication | ~350ms | End-to-end offline auth |
Resource Requirements
- CPU: ARM Cortex-A53 or better
- RAM: 256MB minimum
- Storage: 128MB for firmware + helper data
- Power: 5V @ 500mA via USB-C
Security Considerations
Physical Security
Best practices:- Store scanner in tamper-evident enclosure
- Use security cameras for access monitoring
- Implement dual-control for sensitive operations
- Regular security audits
Backup and Recovery
Since offline mode has no cloud backup:- Export helper data to secure offline storage
- Create emergency recovery codes
- Store in multiple secure locations
- Test recovery procedures regularly
Limitations
| Feature | Online Mode | Offline Mode |
|---|---|---|
| Remote revocation | ✓ Instant | ✗ Not possible |
| Multi-device sync | ✓ Automatic | ✗ Manual only |
| Backup/Recovery | ✓ Cloud backup | ✗ Local only |
| Updates | ✓ Automatic | ✗ Manual firmware |
| Audit logs | ✓ Centralized | ✗ Local only |
Troubleshooting
Authentication failures after injury
Authentication failures after injury
Minor cuts or bruises shouldn’t affect authentication. For major injuries, use your backup palm or emergency recovery codes.
Helper data corruption
Helper data corruption
Restore from your secure backup. If no backup exists, re-initialization is required (all keys will be lost).
Key derivation takes too long
Key derivation takes too long
Reduce PBKDF2 iterations in configuration (minimum 10,000 for security). Consider hardware acceleration.
Scanner not recognized
Scanner not recognized
Verify USB connection and that offline firmware is properly installed. Check device permissions.