A Crypto System Based On Revocable and Unique Session Key
Journal Title: International Journal for Research in Applied Science and Engineering Technology (IJRASET) - Year 2016, Vol 4, Issue 5
Abstract
To protect information resources from unauthorized acquisition or to prevent tampering with the information that is to be transmitted, cryptography is used. The most important aspect of any cryptographic method is the key management and its distribution. Randomly generated keys are used normally but if the generated key is short, it becomes easy to guess and if the key is long, then it becomes difficult to remember. In this approach, unique biometric traits from both the sender and the receiver are used to generate the cryptographic key from cancelable biometric templates. These generated templates are transmitted securely to either parties using key based steganography. Both these templates are concatenated using image fusion technique to form a combined template of both the sender and the receiver. A second shuffle is used to shuffle the elements of the combined template and a hash function is used generate a unique key for each session. Here the biometric data is obtained from the fingerprints of the communicating parties and processed through MATLAB. Experimental results show that the average value of hamming distance between the genuine and imposter’s key is 127 bits for a 256 bit cryptographic key. This biometric based cryptosystem generates a revocable key from irrevocable biometric data and ensures that the security requirements of cryptography are achieved by cancelable biometric template and unique session key.
Authors and Affiliations
Joans Annie Grace S, Jeyapiriya K
Quality of Work Life among Employees Working in Mahindra & Mahindra Auto Private Limited
The most interesting approach in Motivation is the Quality of work life. QWL induces the employees to participate actively in molding and shaping the work environment accordingly. This helps employees working in the org...
A Review Paper on Currency Recognition System
There are many type of currencies in the world, with each of them looking different with their features i.e. differ in the size of the banknotes, color, texture etc. the people who work in the money exchange have to dif...
slugAnalysis for Saturation Throughput Using Various Mechanisms for IEEE 802.11 WLAN'S
The IEEE has standardized the 802.11 protocol for Wireless Local Area Networks. The primary medium access control (MAC) technique of 802.11 is called distributed coordination function (DCF). DCF is a carrier sense multi...
An Intelligent System For Intrusion Detection By Svm And Ant Colony Using Neural Network
Intrusion detection systems in wireless, mobile ad hoc and sensor networks are determined greatly by classification argued in the previous chapter. Although, in contrast with wired networks, it is required to be noted i...
Design and Analysis of Solar-Powered Refrigeration System Using Parabolic Collector
Energy consumption increases very rapidly as the world developing. The ever increasing energy consumption worldwide makes it urgent to find new ways to use the energy resources in a more efficient and rational way. Solar...