Why Every Biometric Vendor Decrypts to Compare
Every biometric system decrypts templates to compare them. That decryption is where breaches happen. There is another way.
Every fingerprint scanner, face recognition camera, and voice authentication system on the market today shares the same fundamental vulnerability: at the moment of comparison, the biometric template is decrypted.
The template sits in plaintext in server memory while the matching algorithm runs. For milliseconds — sometimes longer — the most sensitive data a person possesses is exposed. Unencrypted. Readable. Stealable.
This is not a bug. It is how biometric authentication has always worked. And it is why biometric breaches are catastrophic in a way that password breaches are not.
You Can Change a Password. You Cannot Change Your Face.
When a password database leaks, users change their passwords. Inconvenient but recoverable. When a biometric database leaks, there is no recovery. Your fingerprint is permanent. Your face is permanent. Your voiceprint is permanent. A compromised biometric template is compromised forever, across every system that uses it.
The Office of Personnel Management breach in 2015 exposed 5.6 million fingerprint records. Those fingerprints still belong to the same people. They still work as authentication factors. And they are permanently compromised — not just for OPM systems, but for any system those individuals ever authenticate to with their fingerprints.
This is why regulators treat biometric data differently. BIPA (Illinois Biometric Information Privacy Act) imposes damages of $1,000 per negligent violation and $5,000 per intentional violation — per person, per incident. GDPR classifies biometric data as "special category" data requiring explicit consent and enhanced protection. CCPA gives consumers the right to delete biometric data entirely.
The legal and financial exposure is enormous. And it all stems from one architectural decision: decrypting templates to compare them.
How Traditional Biometric Matching Works
Every traditional biometric system follows the same pattern:
- Enrollment: The user provides a biometric sample (fingerprint, face, voice). The system extracts a mathematical template — a numerical representation of the biometric features. This template is encrypted and stored.
- Authentication: The user provides a new biometric sample. A fresh template is extracted from the live sample.
- Comparison: The stored template is decrypted. The fresh template is compared against the decrypted stored template. If the similarity score exceeds a threshold, the user is authenticated.
- Cleanup: The decrypted template is (supposedly) wiped from memory.
Step 3 is the breach surface. During comparison, both templates exist in plaintext in server memory. Any process running on that server — malware, a compromised library, a rogue employee with access, a kernel exploit, a memory dump — can read the template.
Encryption at rest protects the template in storage. Encryption in transit protects it during transmission. But encryption in use — protecting data while it is being computed on — is what every traditional biometric system lacks.
The "Secure Enclave" Illusion
Some vendors address this by running the comparison inside a hardware secure enclave (Intel SGX, ARM TrustZone, AWS Nitro). The template is decrypted inside the enclave, where other processes theoretically cannot access it.
This is better than plaintext comparison in general memory. But it has significant limitations:
- Side-channel attacks: SGX has been broken repeatedly by side-channel attacks (Spectre, Meltdown, Foreshadow, Plundervault, LVI). The data inside the enclave is encrypted in memory, but the access patterns leak information through cache timing, power analysis, and speculative execution.
- Attestation trust: You must trust Intel (or ARM, or Amazon) that the enclave is implemented correctly and that no backdoor exists. This is a centralized trust assumption.
- The data is still decrypted: Inside the enclave, the template is plaintext. The enclave protects it from the host OS, but the computation itself operates on unencrypted data. A bug in the enclave code, a side-channel leak, or a compromised enclave binary exposes the template.
Secure enclaves reduce the attack surface. They do not eliminate decryption.
What FHE Biometric Matching Actually Does
Fully Homomorphic Encryption (FHE) eliminates decryption entirely. The biometric template is encrypted on the user's device and never decrypted — not in transit, not at rest, and not during comparison.
Here is how H33's FHE biometric pipeline works:
- Enrollment: The biometric template is encrypted on the user's device using BFV fully homomorphic encryption. The encrypted template is transmitted and stored. The server never sees the plaintext template.
- Authentication: A fresh biometric sample is captured and encrypted on the user's device. The encrypted fresh template is transmitted to the server.
- Encrypted comparison: The server computes the similarity between the two encrypted templates — without decrypting either one. The mathematical operations (inner product, distance calculation) are performed directly on the ciphertext using FHE operations.
- Encrypted result: The server produces an encrypted match/no-match result. This result is returned to the client, which decrypts it locally. The server never knows whether the match succeeded or failed.
At no point does any plaintext biometric data exist on the server. Not during enrollment. Not during comparison. Not during result generation. The server processes ciphertext from start to finish.
If the server is breached, the attacker gets encrypted templates. Without the user's private key (which never leaves the device), these templates are computationally useless — even with quantum computers, thanks to the lattice-based hardness of BFV.
Performance: The Objection That No Longer Holds
The historical objection to FHE biometrics has been performance. Homomorphic operations are orders of magnitude slower than plaintext operations. A plaintext inner product takes nanoseconds. An FHE inner product takes milliseconds.
H33 solved this through engineering, not theory:
| Metric | H33 FHE Biometric | Traditional (plaintext) |
|---|---|---|
| Per-auth latency | 42µs | ~10µs |
| Batch (32 users) | 1,345µs | ~300µs |
| Sustained throughput | 1,667,875 auth/sec | ~5M auth/sec |
| Template size | ~256KB (encrypted) | ~2KB (plaintext) |
| Plaintext exposure | Zero | During every comparison |
42 microseconds per authentication. That is faster than most web API response times. The user experiences zero perceptible latency. The performance gap between FHE and plaintext has shrunk from 1,000,000x (five years ago) to approximately 4x — and the security gain is absolute.
The optimizations that make this possible:
- SIMD batching: 32 users per ciphertext. The BFV polynomial ring (N=4096) has 4096 slots. Each user's 128-dimensional template uses 128 slots. 32 users fit in one ciphertext. One FHE multiply compares 32 users simultaneously.
- NTT-domain persistence: Templates are stored in NTT form. Forward NTT at enrollment time, never again. Multiply operations stay in NTT domain — one final INTT instead of per-chunk transforms.
- Montgomery multiplication: All modular arithmetic uses Montgomery form with Harvey lazy reduction. No division in the hot path.
- Batch attestation: One Dilithium sign+verify per 32-user batch instead of per individual. 31x signature overhead reduction.
What This Means for Compliance
BIPA (Illinois)
BIPA requires informed consent before collecting biometric data and imposes strict requirements on how it is stored, protected, and destroyed. The most litigated provision: biometric data must be protected with a "reasonable standard of care." With FHE, the biometric template never exists in plaintext on your servers. The data you store is ciphertext — computationally useless without the user's private key. This is not just a "reasonable standard of care." It is mathematically provable protection.
GDPR (European Union)
GDPR classifies biometric data as "special category" data requiring a lawful basis for processing and data protection impact assessment. Article 25 requires "data protection by design and by default." FHE biometric matching is data protection by design at the most fundamental level — the data is never accessible to the processor in readable form.
HIPAA (Healthcare)
For healthcare systems using biometric authentication (patient identification, clinician access), HIPAA requires technical safeguards for electronic PHI. Biometric templates used for authentication are PHI. FHE ensures these templates are protected even during the comparison operation — meeting the "encryption in use" standard that HIPAA's technical safeguards increasingly demand.
The Breach That Cannot Happen
Consider two scenarios:
Traditional system breach: An attacker compromises the biometric matching server. They extract stored templates (encrypted at rest) and also capture templates in memory during comparison (plaintext). They now possess the raw biometric data of every user who authenticated during the breach window. This data is permanent. It cannot be rotated. Every affected user is compromised for life.
H33 FHE system breach: An attacker compromises the biometric matching server. They extract stored templates (FHE encrypted). They capture templates in memory during comparison (still FHE encrypted — comparison happens on ciphertext). They have ciphertext that cannot be decrypted without user private keys that never existed on the server. The breach produces zero usable biometric data.
This is not a theoretical distinction. It is the difference between a $500 million class action and a non-event.
Post-Quantum: The Long-Term Guarantee
FHE biometric templates encrypted with H33's BFV scheme are quantum-resistant by construction. The security relies on the MLWE (Module Learning with Errors) lattice problem — the same mathematical foundation as NIST FIPS 203 (ML-KEM). Quantum computers cannot break it.
Every H33 biometric authentication is additionally signed with three independent post-quantum signature families (ML-DSA, FALCON, SPHINCS+). The attestation that a biometric match occurred — without revealing whether it succeeded — is independently verifiable and quantum-safe.
Templates enrolled today remain protected against quantum computers that may exist in 2035, 2045, or beyond. Your users' biometric data is not just protected now. It is protected permanently.
One API Call
You do not need to implement FHE. You do not need to understand lattice cryptography. You do not need to manage key pairs or configure polynomial rings.
POST https://api.h33.ai/v1/auth/verify
{
"enrolled_template": "base64-encrypted-template",
"fresh_template": "base64-encrypted-fresh-capture",
"threshold": 0.85
}
→ {
"match": true,
"confidence": 0.93,
"latency_us": 42,
"proof": "h33-74-attestation",
"plaintext_exposure": "zero"
}
The server never sees the templates. The result is attested. The proof is post-quantum. 42 microseconds.
Every biometric vendor decrypts to compare. H33 does not. That is the difference between compliance and catastrophe.
Biometric authentication that never decrypts. 42µs per auth. Production-ready.
Get API Key →