Overview of Methods of Biometric Based Key Protection


  • Gurgen Khachatrian American University of Armenia; Institute for Informatics and Automation Problems of NAS of RA
  • Narek Malkhasyan American University of Armenia; Institute for Informatics and Automation Problems of NAS RA


The security of any modern cryptosystem relies on the assumption that secret keys used for the system such as secret keys for message encryption and authentication as well as private keys of public key cryptosystem are unknown. This assumption is not easy to satisfy in most practical applications. The most widely applicable method uses conventional passwords to encrypt secure keys stored on the computer device. However passwords are vulnerable against many kinds of attacks since they can be either guessed or stolen. Another basic problem is the user authentication. It is well known that when using a traditional and widely used cryptographic methods the user authentication is achieved by challenge -response protocols, the essence of which consists in verifying that the party which wants to confirm his authentication possesses a secret key. In this paper an overview of methods of password generation from biometric data is presented along with the discussion of the remaining challenges and possible directions of future research.


M. Maslennikov, Practical Cryptography, Saint Petersburg, 2003.

G. Khachatrian and H. Khasikyan “Correlation based password generation from Fingerprints”, Proc. ITA-2012 conference “Classification, Forecasting, Data Mining “.

A. Juels and M. Wattenberg, “A fuzzy commitment scheme”, In Sixth ACM conference Computer and Communication Security”, pp. 28-36, 1999.

A. Juels and M. Sudan, “A fuzzy vault scheme” , Proc. IEEE International Symposium on Information Theory” , pp.408, 2002.

U. Uludag, S. Pankanti and A. Jein. “Fuzzy vault for fingerprints”, Lecture Notes on Computer Science, pp. 55-71, 2005.




How to Cite

Khachatrian, G. ., & Malkhasyan, N. . (2021). Overview of Methods of Biometric Based Key Protection. Mathematical Problems of Computer Science, 37, 83–87. Retrieved from http://mpcs.sci.am/index.php/mpcs/article/view/256