SKA-CaNPT: Secure Key Agreement using Cancelable and Noninvertible Biometrics based on Periodic Transformation

被引:1
|
作者
Eskandarian, Laleh [1 ]
Akdogan, Dilara [1 ]
Karaoglan Altop, Duygu [1 ]
Levi, Albert [1 ]
机构
[1] Sabanci Univ, Fac Engn & Nat Sci, Istanbul, Turkey
关键词
Biometrics; bio-cryptography; cancelable biometrics; noninvertible biometrics; periodic transformation; fingerprints; key agreement; security analysis; CIRCUITS;
D O I
10.1145/3292006.3300037
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Nowadays, many of the security-providing applications use biometrics-based authentication. However, since each person's biometrics is unique and non-replaceable, once it is compromised, it will be compromised forever. Therefore, it is hard for the users to trust biometrics. To overcome this problem, in this paper, we propose a novel secure key agreement protocol SKA-CaNPT. Here, we use a periodic transformation function to make biometrics cancelable and noninvertible. At the very end of our SKA-CaNPT protocol, the user and the server make an agreement on a symmetric shared key that is based on the feature points of the user's biometrics. Therefore, if the transformed data is compromised, then just by changing one of the inputs of the transformation function, we can renew the cryptographic key. As a proof of concept, we apply our SKA-CaNPT protocol on fingerprints. Besides, we apply different security analyses on our protocol. We use Shannon's entropy and Hamming distance metrics to analyze the randomness and the distinctiveness of the agreed keys. Moreover, according to the low IKGR (Incorrect Key Generation Rate), high CKGR (Correct Key Generation Rate) and high attack complexity possessed by our SKA-CaNPT protocol, we can conclude that our scheme is secure against brute-force, replay and impersonation attacks.
引用
收藏
页码:351 / 362
页数:12
相关论文
共 46 条
  • [1] Secure key agreement protocols: Pure biometrics and cancelable biometrics
    Akdogan, Dilara
    Altop, Duygu Karaoglan
    Eskandarian, Laleh
    Levi, Albert
    COMPUTER NETWORKS, 2018, 142 : 33 - 48
  • [2] Secure Key Agreement using Pure Biometrics
    Akdogan, Dilara
    Altop, Duygu Karaoglan
    Levi, Albert
    2015 IEEE CONFERENCE ON COMMUNICATIONS AND NETWORK SECURITY (CNS), 2015, : 191 - 199
  • [3] Cancelable Biometrics Vault: A Secure Key-Binding Biometric Cryptosystem based on Chaffing and Winnowing
    Ouda, Osama
    Nandakumar, Karthik
    Ross, Arun
    2020 25TH INTERNATIONAL CONFERENCE ON PATTERN RECOGNITION (ICPR), 2021, : 8735 - 8742
  • [4] SKA-PS: Secure key agreement protocol using physiological signals
    Altop, Duygu Karaoglan
    Seymen, Beste
    Levi, Albert
    AD HOC NETWORKS, 2019, 83 : 111 - 124
  • [5] A cancelable biometric based secure session key agreement protocol employing elliptic curve cryptography
    Arpita Sarkar
    Binod Singh
    International Journal of System Assurance Engineering and Management, 2019, 10 : 1023 - 1042
  • [6] A cancelable biometric based secure session key agreement protocol employing elliptic curve cryptography
    Sarkar, Arpita
    Singh, Binod
    INTERNATIONAL JOURNAL OF SYSTEM ASSURANCE ENGINEERING AND MANAGEMENT, 2019, 10 (05) : 1023 - 1042
  • [7] A Complete User Authentication and Key Agreement Scheme Using Cancelable Biometrics and PUF in Multi-Server Environment
    Zhang, Hui
    Bian, Weixin
    Jie, Biao
    Xu, Deqin
    Zhao, Jun
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2021, 16 : 5413 - 5428
  • [8] A provably secure biometrics and ECC-based authentication and key agreement scheme for WSNs
    Kumari, Saru
    Renuka, Km.
    INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2020, 33 (03)
  • [9] Neurokey: Towards a new paradigm of cancelable biometrics-based key generation using electroencephalograms
    Bajwa, Garima
    Dantu, Ram
    COMPUTERS & SECURITY, 2016, 62 : 95 - 113
  • [10] An Efficient Key Agreement Protocol for Secure Group Communications Using Periodic Array
    Jiang, Yi
    Huang, Qingsong
    Zhu, Cheng
    Wang, Yiqiu
    Shen, Jian
    PROCEEDINGS OF 2019 IEEE 13TH INTERNATIONAL CONFERENCE ON ANTI-COUNTERFEITING, SECURITY, AND IDENTIFICATION (IEEE-ASID'2019), 2019, : 36 - 40