Overview of Methods of Biometric Based Key Protection
Abstract
The security of any modern cryptosystem relies on the assumption that secret keys used for the system such as secret keys for message encryption and authentication as well as private keys of public key cryptosystem are unknown. This assumption is not easy to satisfy in most practical applications. The most widely applicable method uses conventional passwords to encrypt secure keys stored on the computer device. However passwords are vulnerable against many kinds of attacks since they can be either guessed or stolen. Another basic problem is the user authentication. It is well known that when using a traditional and widely used cryptographic methods the user authentication is achieved by challenge -response protocols, the essence of which consists in verifying that the party which wants to confirm his authentication possesses a secret key. In this paper an overview of methods of password generation from biometric data is presented along with the discussion of the remaining challenges and possible directions of future research.
References
M. Maslennikov, Practical Cryptography, Saint Petersburg, 2003.
G. Khachatrian and H. Khasikyan “Correlation based password generation from Fingerprints”, Proc. ITA-2012 conference “Classification, Forecasting, Data Mining “.
A. Juels and M. Wattenberg, “A fuzzy commitment scheme”, In Sixth ACM conference Computer and Communication Security”, pp. 28-36, 1999.
A. Juels and M. Sudan, “A fuzzy vault scheme” , Proc. IEEE International Symposium on Information Theory” , pp.408, 2002.
U. Uludag, S. Pankanti and A. Jein. “Fuzzy vault for fingerprints”, Lecture Notes on Computer Science, pp. 55-71, 2005.
Downloads
Published
How to Cite
Issue
Section
License
This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License.