APIsPricingDocsWhite PaperTokenBlogAboutSecurity Demo
Log InGet API Key
BIOMETRICS

Why Every Biometric Vendor Decrypts to Compare

Every biometric system decrypts templates to compare them. That decryption is where breaches happen. There is another way.

Published April 27, 2026 · H33 Engineering

Every fingerprint scanner, face recognition camera, and voice authentication system on the market today shares the same fundamental vulnerability: at the moment of comparison, the biometric template is decrypted.

The template sits in plaintext in server memory while the matching algorithm runs. For milliseconds — sometimes longer — the most sensitive data a person possesses is exposed. Unencrypted. Readable. Stealable.

This is not a bug. It is how biometric authentication has always worked. And it is why biometric breaches are catastrophic in a way that password breaches are not.

You Can Change a Password. You Cannot Change Your Face.

When a password database leaks, users change their passwords. Inconvenient but recoverable. When a biometric database leaks, there is no recovery. Your fingerprint is permanent. Your face is permanent. Your voiceprint is permanent. A compromised biometric template is compromised forever, across every system that uses it.

The Office of Personnel Management breach in 2015 exposed 5.6 million fingerprint records. Those fingerprints still belong to the same people. They still work as authentication factors. And they are permanently compromised — not just for OPM systems, but for any system those individuals ever authenticate to with their fingerprints.

This is why regulators treat biometric data differently. BIPA (Illinois Biometric Information Privacy Act) imposes damages of $1,000 per negligent violation and $5,000 per intentional violation — per person, per incident. GDPR classifies biometric data as "special category" data requiring explicit consent and enhanced protection. CCPA gives consumers the right to delete biometric data entirely.

The legal and financial exposure is enormous. And it all stems from one architectural decision: decrypting templates to compare them.

How Traditional Biometric Matching Works

Every traditional biometric system follows the same pattern:

  1. Enrollment: The user provides a biometric sample (fingerprint, face, voice). The system extracts a mathematical template — a numerical representation of the biometric features. This template is encrypted and stored.
  2. Authentication: The user provides a new biometric sample. A fresh template is extracted from the live sample.
  3. Comparison: The stored template is decrypted. The fresh template is compared against the decrypted stored template. If the similarity score exceeds a threshold, the user is authenticated.
  4. Cleanup: The decrypted template is (supposedly) wiped from memory.

Step 3 is the breach surface. During comparison, both templates exist in plaintext in server memory. Any process running on that server — malware, a compromised library, a rogue employee with access, a kernel exploit, a memory dump — can read the template.

Encryption at rest protects the template in storage. Encryption in transit protects it during transmission. But encryption in use — protecting data while it is being computed on — is what every traditional biometric system lacks.

The "Secure Enclave" Illusion

Some vendors address this by running the comparison inside a hardware secure enclave (Intel SGX, ARM TrustZone, AWS Nitro). The template is decrypted inside the enclave, where other processes theoretically cannot access it.

This is better than plaintext comparison in general memory. But it has significant limitations:

Secure enclaves reduce the attack surface. They do not eliminate decryption.

What FHE Biometric Matching Actually Does

Fully Homomorphic Encryption (FHE) eliminates decryption entirely. The biometric template is encrypted on the user's device and never decrypted — not in transit, not at rest, and not during comparison.

Here is how H33's FHE biometric pipeline works:

  1. Enrollment: The biometric template is encrypted on the user's device using BFV fully homomorphic encryption. The encrypted template is transmitted and stored. The server never sees the plaintext template.
  2. Authentication: A fresh biometric sample is captured and encrypted on the user's device. The encrypted fresh template is transmitted to the server.
  3. Encrypted comparison: The server computes the similarity between the two encrypted templates — without decrypting either one. The mathematical operations (inner product, distance calculation) are performed directly on the ciphertext using FHE operations.
  4. Encrypted result: The server produces an encrypted match/no-match result. This result is returned to the client, which decrypts it locally. The server never knows whether the match succeeded or failed.

At no point does any plaintext biometric data exist on the server. Not during enrollment. Not during comparison. Not during result generation. The server processes ciphertext from start to finish.

If the server is breached, the attacker gets encrypted templates. Without the user's private key (which never leaves the device), these templates are computationally useless — even with quantum computers, thanks to the lattice-based hardness of BFV.

Performance: The Objection That No Longer Holds

The historical objection to FHE biometrics has been performance. Homomorphic operations are orders of magnitude slower than plaintext operations. A plaintext inner product takes nanoseconds. An FHE inner product takes milliseconds.

H33 solved this through engineering, not theory:

MetricH33 FHE BiometricTraditional (plaintext)
Per-auth latency42µs~10µs
Batch (32 users)1,345µs~300µs
Sustained throughput1,667,875 auth/sec~5M auth/sec
Template size~256KB (encrypted)~2KB (plaintext)
Plaintext exposureZeroDuring every comparison

42 microseconds per authentication. That is faster than most web API response times. The user experiences zero perceptible latency. The performance gap between FHE and plaintext has shrunk from 1,000,000x (five years ago) to approximately 4x — and the security gain is absolute.

The optimizations that make this possible:

What This Means for Compliance

BIPA (Illinois)

BIPA requires informed consent before collecting biometric data and imposes strict requirements on how it is stored, protected, and destroyed. The most litigated provision: biometric data must be protected with a "reasonable standard of care." With FHE, the biometric template never exists in plaintext on your servers. The data you store is ciphertext — computationally useless without the user's private key. This is not just a "reasonable standard of care." It is mathematically provable protection.

GDPR (European Union)

GDPR classifies biometric data as "special category" data requiring a lawful basis for processing and data protection impact assessment. Article 25 requires "data protection by design and by default." FHE biometric matching is data protection by design at the most fundamental level — the data is never accessible to the processor in readable form.

HIPAA (Healthcare)

For healthcare systems using biometric authentication (patient identification, clinician access), HIPAA requires technical safeguards for electronic PHI. Biometric templates used for authentication are PHI. FHE ensures these templates are protected even during the comparison operation — meeting the "encryption in use" standard that HIPAA's technical safeguards increasingly demand.

The Breach That Cannot Happen

Consider two scenarios:

Traditional system breach: An attacker compromises the biometric matching server. They extract stored templates (encrypted at rest) and also capture templates in memory during comparison (plaintext). They now possess the raw biometric data of every user who authenticated during the breach window. This data is permanent. It cannot be rotated. Every affected user is compromised for life.

H33 FHE system breach: An attacker compromises the biometric matching server. They extract stored templates (FHE encrypted). They capture templates in memory during comparison (still FHE encrypted — comparison happens on ciphertext). They have ciphertext that cannot be decrypted without user private keys that never existed on the server. The breach produces zero usable biometric data.

This is not a theoretical distinction. It is the difference between a $500 million class action and a non-event.

Post-Quantum: The Long-Term Guarantee

FHE biometric templates encrypted with H33's BFV scheme are quantum-resistant by construction. The security relies on the MLWE (Module Learning with Errors) lattice problem — the same mathematical foundation as NIST FIPS 203 (ML-KEM). Quantum computers cannot break it.

Every H33 biometric authentication is additionally signed with three independent post-quantum signature families (ML-DSA, FALCON, SPHINCS+). The attestation that a biometric match occurred — without revealing whether it succeeded — is independently verifiable and quantum-safe.

Templates enrolled today remain protected against quantum computers that may exist in 2035, 2045, or beyond. Your users' biometric data is not just protected now. It is protected permanently.

One API Call

You do not need to implement FHE. You do not need to understand lattice cryptography. You do not need to manage key pairs or configure polynomial rings.

POST https://api.h33.ai/v1/auth/verify
{
  "enrolled_template": "base64-encrypted-template",
  "fresh_template": "base64-encrypted-fresh-capture",
  "threshold": 0.85
}
→ {
  "match": true,
  "confidence": 0.93,
  "latency_us": 42,
  "proof": "h33-74-attestation",
  "plaintext_exposure": "zero"
}

The server never sees the templates. The result is attested. The proof is post-quantum. 42 microseconds.

Every biometric vendor decrypts to compare. H33 does not. That is the difference between compliance and catastrophe.

Biometric authentication that never decrypts. 42µs per auth. Production-ready.

Get API Key →