logo

Cryptographic Technique Assignment

   

Added on  2021-05-31

4 Pages3757 Words59 Views
ITC595 Research Project (Cryptographic Techniqueusing Biometric Authentication)A. AuthorITC595 MIT, School of Computing & Mathematics, Charles Sturt Universityauthor@first-third.edu.auABSTRACTThis report discusses about the security issuesand threats faced in the cryptographic technology through the useof biometric authentication and highlight the challenges that hascome across during the research of the whole process in theindividual projects. In the review part, the critical issuesaddressed in the current literature will be discussed and the issuethat are not addressed will be highlighted. In the final conclusionfuture research will be summarized based on the gaps that wereidentified. Keywordsprivacy, security, cryptography, authentication,biometricINTRODUCTIONWith the use of cryptography various transaction are done tomake the information secure through the internet. The processof encryption is used to encrypt the plain text into cipher text.At the receiver’s end, the sender will send the encrypted textwith the information or the key. The receiver then decrypts theencrypted key by using the information or the key. This papercontains the concept of cryptography where different algorithmexists for encryption or decryption. Thus, with the use ofencryption algorithm, the plain text would be encrypted and atext of information would be achieved. The fingerprint imageof the sender’s would be the key information. At the receiver’send the encrypted text with the key will be receive and get theinformation from the key with the use of senders Databasefingerprint images. The receiver would then match thefingerprint geometry of the sender’s with the key. If both thekey matches, then it is easier to derive the information from thekey. In the next step, the encrypted text would be decryptedthrough the information that has been achieve. Thus, the wholeprocess of cryptography is through a binary conversion thatmeans both the encryption and decryption process uses thebinary form for conversion. Cryptographic technique isapplicable to all data transmission for binary conversion. Thebinary conversion is applied on image, text, multimedia dataand lot more that are converted to binary form. In thecryptographic technique, with the key generation, the recentfingerprint geometry of the senders would be combined withthe information. Moreover, the sender’s Database fingerprintgeometry which is the collection of fingerprint image of thesender’s available at the receiver’s side that helps in derivingthe key information. The research paper concentrate on theperformance enhancement of the cryptographic technique usingbiometric authentication that has develop a key protocol usingthe ECC and design the robust watermark with embedded andextraction algorithm to achieve a secure communication andbetter authentication. The problem definition will behighlighted and adopt a methodology for the problem.A.Research Problem The use of cryptographic technique in the biometricauthentication need some improvement in the performance thathas been undertaken in the research problem for datatransaction with biometric authentication and securecommunication. There are various protocols for developmentof authentication that enhance the performance of the techniqueused such as symmetric and public key cryptography. Digitalwatermarking and cryptography both mechanism are usedtraditionally to authenticate the genuine user and secure theirinformation. The traditional cryptographic technique uses more than onekey and convert the plain text to the cipher text at the senderend. In reverse, at the receivers’ end, the plain text will retrieveback through the use of decryption key. The conversion isinfeasible in the absence of correct decryption keys when boththe cost and time is considered. Thus, when the intruder obtainsthe cipher text, it would not be able to extract any usefulinformation from the text as it is secure. The biggest drawbackof the scheme of information secure, which is a traditionalcryptography, is the illegal way of sharing the key between thesender and the receiver. This is the key problem of distribution.The above problem can be rectified by deriving thecryptographic keys with the use of biometric features. Througha genuine user the keys have been introduce with the use ofbiometric features. It increases the security of information anddecrease the possible illegal utilization. The research problem is for the improvement ofperformance of cryptographic technology using the biometrictechnique. This can be achieved byIntegrating conventional biometrics and cryptography that isdesign to have a strong authentication mechanism. Combining digital watermarking technique withcryptography is design to have a secure communication LITEERATURE REVIEWBased on the recent research on cryptographic technique, theauthor has derived a string from the typing pattern of the user’sand has combined the password forming a hard password. Eachfeature of the key-stroke is discretised in a single bit. The bitsare then concatenated that has formed by a short string. In oneof the paper of the author, a reliable implementation hasproposed based on the voice of biometrics with the use ofdiscretization methodology. The report contains animprovement in the performance. The biometric key entropyincrease from 12 bits to 46 bits and false rejection rate fallsfrom 48.4 % to 20 %. Another author had use handwritten signatures to define thefeatures of forty-three signature that was extracted from somedynamic information like the pressure, velocity, azimuth, andaltitude. Each feature has been quantizing to a bit by using afeature coding that has concatenated to binary string. The 40-bit key entropy was achieved with a rejection rate of 28%.

In the criminal cases, fingerprints are among the reliablebiometrics. The author has reported fingerprint as thebiometric-key system and the technology was firstcommercialize into a product called as Bioscrypt. From thefingerprint image the phase information is extracted usingFourier transform and majority coding is applied that reducesthe feature of variation.The use of biometric data in accessing the individual devicesincreases the limitations of using the password basedmechanism. Biometric data can be stolen and use in maliciousways. With experience and history, it is clear that extensive useof something can be monetized and misuse by the criminals. Numerous efforts were made in the past few years for anumber of research in integrating the biometric authenticationinto the cryptography technique. In one of the research, theauthor proposed a key binding algorithm in the systemmatching an optical correlation-based fingerprint matchingsystem. In this algorithm, a cryptographic key is bind with theusers’ fingerprint images during the enrollment. The key couldbe retrieve only when the authentication is successful. From theliterature review, the encryption and watermarking techniquescan be achieved. In the encryption technique, security is notprovided for the decrypted data. While in watermarkingtechnique, information is embedded into the host data in orderto achieve security for the decrypted data. The main problemwith the watermarking technique is the tracking mechanismthat can identify the biometric data. Therefore, with the use ofhybrid methodology, both the watermarking and encryptiontechniques have the advantage of designing a secure and betterauthentication system. Biometric need to be coupled to asystem that provide an identity. Such systems are vulnerable totraditional security threats and new ones. For a biometricvendor it is impossible or infeasible to claim and recreate theenrolled image. The reason for this is because of the recordfeature of the templates such as minutiae that are not an imageproprietary. With the use of small portion of the imagetemplate are calculated. The image appears much bigger thanthe template. The storage format of biometric has a proprietarynature that makes infeasible to hack the template.Davida proposed an iris biometric algorithm that has abinary representation for the texture of iris Code having alength of 2048 bits. The Hamming distance is compute by thebiometric matcher between the database template and the inputthat represents and compare the threshold in order to identifywhether the samples of biometric is of the same person or not.Is has been assume by the author that IrisCode can have 10% ofdifferent sample of iris from 2048 bits and also it differs of 45% of 2048 bits. According to Lifang Wu, developing acryptographic technology using biometric authentication is alsobased on face biometrics. At the encryption 128-bit binaryvector was achieved through threshold. From the face imagethe author has initially obtained the 128-dmensional for thefeature of Principle Component Analysis. With the use ofReed-Solomon algorithm, error correction code is produced.Monrose had proposed a method that has made the passwordmore secure with the combination of keystroke biometricpassword. The inspiration came from the password ‘salting’concept where user password is salted and prepending with 8-bit number that is random. Thus, it resulted in Harding thepassword. The week point of this technique is that it couldhandle only 15 bits password entropy to make them moresecure. Integrating biometric authentication in cryptographictechnique is the potential solution to overcome little changesbetween different acquirement that have generated a reliablekey. A technique has been developed by Sashank Singhvi thathas exploits features dependent on entropy with the process ofextraction, integrating with error correcting code of ReedSolomon. Monrose on the other hand, made somemodifications of the original scheme that were applied tobiometric voice. Through this, the cryptography keys aregenerated eventually till 60 bits, which is anyhow was higherthan the 15 bits that were achieve in their work earlier. Tuylshad assume a noise-free template for a biometric identifier forthe purpose of enrollment of the secret and generate the helperdata. A survey being conducted on the research of cryptographictechnique which is the symmetric and asymmetriccryptography and their associated problem. During the surveyit was found that the popularity of the ECC system isincreasing to secure the data and communication with the useof PKC. The public key cryptography implements the key sizeof ECC to devices like smart cards and RFID. Whencryptographic algorithm is incorporated with biometrictechnologies it strengthens the performance. Thus, with the useof ECC parameters through fingerprint, a new agreementprotocol is designed that can robust the session key agreementprotocol and iris the purpose of authentication. With the use ofMATLAB R2019B version, experimental research was carriedout to simulate the protocol for the same reason. When theprotocol was run a thorough analysis were made with the use ofsample database that contain 750 each images of iris andfingerprint. The age group of 20-50 of both male and femalewhose fingerprints are collected and from MMU1 and MMU2of public database, the iris images are collected. All thoseresults are projected in the table form as shown in figure 1. Certain challenges have come across with the BiometricEncryption. If considered technologically, BiometricEncryption is more difficult compare to standard biometric.The scheme of Biometric mostly work in ‘blind, mode. There isconsequent section to advance Biometric Encryption for aprototype making and testing. Generally, a standard biometricis chosen for low variability, high entropy, alignment andacceptance of the public. At present, the foremost encryption ofbiometric is the iris then comes the fingerprints and face. It hasbecome important to improve the image acquisition method.Against the attacks biometric encryption has created resilient. Itis better to improve the Biometric Encryption algorithm for theoverall security and accuracy of Biometric algorithms.Development with standard biometrics that has advanceswithin the algorithm and applied ECC to Biometric Encryption.B.Figures and Tables

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Cryptographic Techniques
|6
|2878
|62

CRYPTOGRAPHY ANALYSIS 2022
|6
|1073
|21

The Assignment on Basics of Cryptography
|12
|2602
|34

Encryption Symmetric Key Encryption
|9
|2853
|351

Cryptography and System Security .
|7
|1528
|232

Cryptography: Basic Concepts and Its Importance in Network and Web Security
|13
|3502
|242