An Approach to Cryptographic Key Exchange Using Fingerprint

被引:0
作者
Barman, Subhas [1 ]
Chattopadhyay, Samiran [2 ]
Samanta, Debasis [3 ]
机构
[1] Govt Coll Engg & Text Technol, Berhampur, W Bengal, India
[2] Jadavpur Univ, Kolkata, West Bengal, India
[3] Indian Inst Technol, Karagpur, West Bengal, India
来源
SECURITY IN COMPUTING AND COMMUNICATIONS | 2014年 / 467卷
关键词
GENERATION;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Cryptography is the most reliable tool in network and information security. The security of cryptography depends on the cryptographic key management. It consists of key generation, key storing and key sharing. A randomly generated long key (of 128, 190 or 256 bits) is difficult to remember. As a consequence, it is needed to be stored in a secured place. An additional authentication like knowledge or token based authentication is used to control the unauthorized access to the key. It is found that password is easy to break and token can be damaged or stolen. Moreover, knowledge or token based authentication does not assures the non-repudiation of a user. As an alternate, it is advocated to combine biometric with cryptography, known as crypto-biometric system (CBS), to address the above mentioned limitations of traditional cryptography as well as enhance the network security. This paper introduces a CBS to exchange a randomly generated cryptographic key with user's fingerprint data. Cryptographic key is hidden within fingerprint data using fuzzy commitment scheme and it is extracted from the cryptographic construction with the production of genuine fingerprint data of that user. Our work also protects the privacy and security of fingerprint identity of the user using revocable fingerprint template.
引用
收藏
页码:162 / 172
页数:11
相关论文
共 19 条
  • [1] Advance Encryption Standard (AES), 2001, AES FED INF PROC STA
  • [2] [Anonymous], 2004, Fingerprint Verification Competition
  • [3] [Anonymous], 2003, Handbook of fingerprint recognition
  • [4] Chen B., 2007, 9th Biennial Conference of the Australian Pattern Recognition Society on Digital Image Computing Techniques and Applications, P394, DOI DOI 10.1109/DICTA.2007.4426824
  • [5] Gaddam S. V. K., 2010, INT J NETW SECURITY, V11, P57
  • [6] Private key generation from on-line handwritten signatures
    Feng, Hao
    Wah, Chan Choong
    [J]. Information Management and Computer Security, 2002, 10 (04): : 159 - 164
  • [7] Combining crypto with biometrics effectively
    Hao, Feng
    Anderson, Ross
    Daugman, John
    [J]. IEEE TRANSACTIONS ON COMPUTERS, 2006, 55 (09) : 1081 - 1088
  • [8] Jagadeesan A., 2010, International Journal of Computer Science and Information Security, V7, P28
  • [9] Jain A.K., SECURITY PRIVACY BIO
  • [10] Juels A, 1999, 6TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, P28, DOI 10.1145/319709.319714