A Crypto System Based On Revocable and Unique Session Key

Abstract

To protect information resources from unauthorized acquisition or to prevent tampering with the information that is to be transmitted, cryptography is used. The most important aspect of any cryptographic method is the key management and its distribution. Randomly generated keys are used normally but if the generated key is short, it becomes easy to guess and if the key is long, then it becomes difficult to remember. In this approach, unique biometric traits from both the sender and the receiver are used to generate the cryptographic key from cancelable biometric templates. These generated templates are transmitted securely to either parties using key based steganography. Both these templates are concatenated using image fusion technique to form a combined template of both the sender and the receiver. A second shuffle is used to shuffle the elements of the combined template and a hash function is used generate a unique key for each session. Here the biometric data is obtained from the fingerprints of the communicating parties and processed through MATLAB. Experimental results show that the average value of hamming distance between the genuine and imposter’s key is 127 bits for a 256 bit cryptographic key. This biometric based cryptosystem generates a revocable key from irrevocable biometric data and ensures that the security requirements of cryptography are achieved by cancelable biometric template and unique session key.

Authors and Affiliations

Joans Annie Grace S, Jeyapiriya K

Keywords

Related Articles

Improved Fuzzy Searching Technology

Instant searching technique finds answers to a query instantly when user types in keywords character-bycharacter. Fuzzy searching is advancement in instant searching which finds perfect match keywords of query keywords....

Ethno Botanical Study of Balrampur District of Uttar Pradesh

An Ethno natural study was led in Balrampur District of Uttar Pradesh state, India with the significant goal of Identifying distinctive nourishment and therapeutic plant species and furthermore to comprehend their progr...

ABC & HML Analysis for Inventory Management– Case Study of Sponge Iron Plant

An inventory management is most commonly used technique to manage inventory efficiently in company. The company wants to control their inventory cost, so they used to different type’s inventory techniques to control thi...

Integration of Multi Bank-User in Single Card with User Behavior Monitoring Using HMM & Formula Verification

The world we live in today is becoming more money oriented by the second where people tend to carry around multiple credit and debit cards for their bank account. This is in a way tiresome and risky as cards tend to get...

Advance Power Supply Management Through Power Supply Optimization to Significantly Improve the PUE at Multiple Datacenters

A complete methodology of running a data center by using various optimization algorithms to reduce energy consumption in data centers by considering the placement of virtual machines onto the servers in the data center...

Download PDF file
  • EP ID EP22091
  • DOI -
  • Views 175
  • Downloads 3

How To Cite

Joans Annie Grace S, Jeyapiriya K (2016). A Crypto System Based On Revocable and Unique Session Key. International Journal for Research in Applied Science and Engineering Technology (IJRASET), 4(5), -. https://europub.co.uk/articles/-A-22091