An Approach to Protect Private Key using Fingerprint Biometric Encryption Key in BioPKI based Security System

被引:7
|
作者
Nguyen Thi Hoang Lan [1 ]
Nguyen Thi Thu Hang [1 ]
机构
[1] Hanoi Univ Technol, Fac Informat Technol, Hanoi, Vietnam
来源
2008 10TH INTERNATIONAL CONFERENCE ON CONTROL AUTOMATION ROBOTICS & VISION: ICARV 2008, VOLS 1-4 | 2008年
关键词
Biometric Security System; Cryptography; Fingerprint; Biometric Encryption Key (BEK); BioPKI system; User Authentication; Verification; Biometric sample; Biometric template;
D O I
10.1109/ICARCV.2008.4795763
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
In traditional Public Key Infrastructure (PKI) system, Private Key could be stored in central database or store distributed in smart-card and delivered to the users. The Private Key is usually protected by passwords that are easily guessed or stolen and thus lead to the collapse of the whole system. Current trend for PKI system is based on physiological and behavioral characteristics of persons, known as biometrics. This approach can increase the security of Private Key because in theory, the biometric features could not be guessed or forged. However, this approach still reveals a gap that is the vulnerability of storage device of Private Key and biometrics data. Malefactors can attack directly to these storage devices and steal user identification information. In this paper, we propose a solution that uses Biometric Encryption Key (BEK) to encrypt Private Key and protect Private Key in a secure way for both of two these kind of information. We also present the BEK generation algorithm and the BioPKI system to support this solution and then we illustrate the experimental results.
引用
收藏
页码:1595 / 1599
页数:5
相关论文
共 50 条
  • [31] Hybrid Security Approach for Database Security using Diffusion based cryptography and Diffie-Hellman key exchange Algorithm
    Rao, M. Somasundara
    Rao, K. Venkata
    Prasad, M. H. M. Krishna
    PROCEEDINGS OF THE 2021 FIFTH INTERNATIONAL CONFERENCE ON I-SMAC (IOT IN SOCIAL, MOBILE, ANALYTICS AND CLOUD) (I-SMAC 2021), 2021, : 1608 - 1612
  • [32] Optical image encryption using password key based on phase retrieval algorithm
    Zhao, Tieyu
    Ran, Qiwen
    Yuan, Lin
    Chi, Yingying
    Ma, Jing
    JOURNAL OF MODERN OPTICS, 2016, 63 (08) : 771 - 776
  • [33] AES Based Text Encryption Using 12 Rounds with Dynamic Key Selection
    Mathur, Nishtha
    Bansode, Rajesh
    PROCEEDINGS OF INTERNATIONAL CONFERENCE ON COMMUNICATION, COMPUTING AND VIRTUALIZATION (ICCCV) 2016, 2016, 79 : 1036 - 1043
  • [34] Face, Fingerprint, and Signature based Multimodal Biometric System using Score Level and Decision Level Fusion Approaches
    Kazi, Majharoddin
    Kale, Karbhari
    Mehsen, Raddam Sami
    Mane, Arjun
    Humbe, Vikas
    Rode, Yogesh
    Dabhade, Siddharth
    Bansod, Nagsen
    Razvi, Arshad
    Deshmukh, Prapti
    IETE JOURNAL OF RESEARCH, 2024, 70 (04) : 3703 - 3722
  • [35] Research on security enhancement methods of Internet of Things communication-based on whitelist and encryption key exchange
    Hsu, Tse-Chuan
    Lu, Han-Sheng
    2024 IEEE 48TH ANNUAL COMPUTERS, SOFTWARE, AND APPLICATIONS CONFERENCE, COMPSAC 2024, 2024, : 2254 - 2259
  • [36] Improving Digital Forensic Security: A Secure Storage Model With Authentication and Optimal Key Generation Based Encryption
    Alashjaee, Abdullah Mujawib
    Alqahtani, Fahad
    IEEE ACCESS, 2024, 12 : 29738 - 29747
  • [37] Security and key management in IoT-based wireless sensor networks: An authentication protocol using symmetric key
    Ghani, Anwar
    Mansoor, Khwaja
    Mehmood, Shahid
    Chaudhry, Shehzad Ashraf
    Rahman, Arif Ur
    Saqib, Malik Najmus
    INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2019, 32 (16)
  • [38] CASDC: A Cryptographically Secure Data System Based on Two Private Key Images
    Abu-Faraj, Mua'ad
    Al-Hyari, Abeer
    Al-Taharwa, Ismail
    Al-Ahmad, Bilal
    Alqadi, Ziad
    IEEE ACCESS, 2022, 10 : 126304 - 126314
  • [39] A novel image encryption algorithm based on hybrid chaotic maps using a key image
    Benaissi, Sellami
    Chikouche, Noureddine
    Hamza, Rafik
    OPTIK, 2023, 272
  • [40] Using the SHA-3 to Derive Encryption Keys Based on Key-file
    Zacek, Petr
    Jasek, Roman
    Malanik, David
    Kralik, Lukas
    Holbikova, Petra
    2018 2ND EUROPEAN CONFERENCE ON ELECTRICAL ENGINEERING AND COMPUTER SCIENCE (EECS 2018), 2018, : 348 - 351