Generation of 128-Bit Blended Key for AES Algorithm

被引:1
作者
Priya, S. Sridevi Sathya [1 ]
Karthigaikumar, P. [2 ]
SivaMangai, N. M. [1 ]
机构
[1] Karunya Univ, Dept Elect & Commun Engn, Coimbatore, Tamil Nadu, India
[2] Karpagam Coll Engn, Dept Elect & Commun Engn, Coimbatore, Tamil Nadu, India
来源
EMERGING ICT FOR BRIDGING THE FUTURE, VOL 2 | 2015年 / 338卷
关键词
Blended key; AES algorithm; IRIS based key; Biometric key;
D O I
10.1007/978-3-319-13731-5_47
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
The AES algorithm is most widely used algorithm for various security based applications. Security of the AES algorithm can be increased by using biometric for generating a key. To further increase the security, in this paper a 128 bit blended key is generated from IRIS and arbitrary key. An IRIS based 128 bit key is generated from IRIS features. Generated key is concealed using arbitrary key to form a blended key using Fuzzy Commitment scheme. Brute force attack is widely used against the encrypted data. This attack searches the entire key space. If the key is more random, then chances for getting attack is less. In this paper Generated key randomness is verified and compared with biometric key randomness. Blended key is 10% more random than IRIS based biometric key.
引用
收藏
页码:431 / 439
页数:9
相关论文
共 15 条
[1]  
[Anonymous], 2001, NIST SPECIAL PUBLICA
[2]  
[Anonymous], 2001, FEDERAL INFORM PROCE
[3]  
[Anonymous], INT J COMMUN NETW SY
[4]   How iris recognition works [J].
Daugman, J .
IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS FOR VIDEO TECHNOLOGY, 2004, 14 (01) :21-30
[5]  
Fatangare Mrunal, 2011, INT J COMPUTER APPL, V15
[6]   Combining crypto with biometrics effectively [J].
Hao, Feng ;
Anderson, Ross ;
Daugman, John .
IEEE TRANSACTIONS ON COMPUTERS, 2006, 55 (09) :1081-1088
[7]  
Jagadeesan A., 2010, International Journal of Computer Science and Information Security, V7, P28
[8]   An introduction to biometric recognition [J].
Jain, AK ;
Ross, A ;
Prabhakar, S .
IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS FOR VIDEO TECHNOLOGY, 2004, 14 (01) :4-20
[9]  
Juels A, 1999, 6TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, P28, DOI 10.1145/319709.319714
[10]  
Mali M., 2005, Journal of Electrical Engineering, V56, P265