Total views : 604
Biometrics as a Cryptographic Method for Network Security
Background: Cryptography is considered as an effective method for secure transmission of data but falls prey to network attacks. The proposed biometrics-based Encryption/Decryption Scheme uses fingerprints to generate a unique key. Methods: The presented technique combines portions of fingerprint of the sender and the receiver to generate a random sequence, which is used as a public-key for Encryption as well as Decryption. The key thus generated is distinct as it is watermarked with sender's biometric signature. The encrypted message is then sent to the receiver along with the key. The receiver uses this key to decrypt the message to plain text. Findings: This system has a significant advantage as there is no requirement for the asymmetric key to be stored in a protected place, thus reducing the security threats to the minimum. The fingerprint is an inherent trait of every individual and is distinct. Hence billons of unique keys can be created, making it very hard for an attacker to guess the key. Applications: The biometric based system significantly increases the power of traditional crypto-systems.
Biometrics-based System, Distinct, Encryption, Fingerprint, Network Attacks.
- Chandra Sayani, Paul Sayan, Saha Bidyutmala, Mitra Sourish - Generate an Encryption Key by using Biometric Cryptosystems to secure transferring of Data over a Network. IOSR Journal of Computer Engineering.
- Michael T Simpson. Hands-on ethical hacking and network security. India: Cengage Learning Publications. 2012.
- Cryptography in VB.NET.. Date accessed: 10/09/2015: Available from: http://www.c-sharpcorner.com/cryptography-in-VB-Net-part-1.
- Encryption key generation. Date accessed: 05/08/2015: Available from: http://www.slidesearch.org/slide/d01211622.
- Biometric Cryptosystem. Date accessed: 12/08/2015: Available from: http://www.academia.edu/4814389/D01211622.
- Barman Subhas, Samanta Debasis and Chattopadhyay Samiran. Fingerprint-based crypto-biometric system for network security EURASIP. Journal on Information Security. 2015 April; Doi: 10.1186/s13635-015-0020-1.
- Processing Standards Publication: Announcing the Advanced Encryption Standard (AES) – Federal Information. 2001 November 26; 197.
- Soutar Colin, Roberge Danny, Stoianov Alex, Gilroy Rene and Vijaya Kumar BVK. Biometric Encryption™. McGraw-Hill publications: In: ICSA Guide to Cryptography. 1999; Ch-22.
- Mahalakshmi U, Shankar Sriram VS. An ECC Based Multibiometric System for Enhancing Security. Indian Journal of Science and Technology. 2013 Apr; 6(4). Doi: 10.17485/ijst/2013/v6i4/31857.
- Fingerprint-based crypto-biometric system. Date accessed: 06/08/2015: Available from: http://www.jis.eurasipjournals.com/content/2015/1/3.
- Nagati Khaled. LAP Lambert Academic Publication: Contribution to the Solution of Fingerprint Identification Problem: 2012 April.
- Understanding Biometrics. Date accessed: 12/09/2015: Available from: http://www.griaulebiometrics.com/en-us/book/understanding-biometrics/types/feature-extractio/minutiae.
- Ratha NK, Chikkerur S, Connell JH, Bolle RM. Generating Cancellable Fingerprint Templates. IEEE Trans. Pattern Anal. Mach. Intell. 2007; 29(4):561–72.
- Balakumar P and Venkatesan R. Secure Biometric Key Generation Scheme for Cryptography. International Journal on Computer Science and Engineering. 2010; 02(06):1992-95.
- TCP/IP tutorial. Date accessed: 07/10/2015: Available from: http://www.yaldex.com/tcp_ip/0672325659_ch20lev1sec1.html.
- Fingerprint Verification Competition FVC2002. [Online] Available from: http://bias.csr.unibo.it/fvc2002.
- There are currently no refbacks.
This work is licensed under a Creative Commons Attribution 3.0 License.