A Crypto System Based On Revocable and Unique Session Key

Abstract

To protect information resources from unauthorized acquisition or to prevent tampering with the information that is to be transmitted, cryptography is used. The most important aspect of any cryptographic method is the key management and its distribution. Randomly generated keys are used normally but if the generated key is short, it becomes easy to guess and if the key is long, then it becomes difficult to remember. In this approach, unique biometric traits from both the sender and the receiver are used to generate the cryptographic key from cancelable biometric templates. These generated templates are transmitted securely to either parties using key based steganography. Both these templates are concatenated using image fusion technique to form a combined template of both the sender and the receiver. A second shuffle is used to shuffle the elements of the combined template and a hash function is used generate a unique key for each session. Here the biometric data is obtained from the fingerprints of the communicating parties and processed through MATLAB. Experimental results show that the average value of hamming distance between the genuine and imposter’s key is 127 bits for a 256 bit cryptographic key. This biometric based cryptosystem generates a revocable key from irrevocable biometric data and ensures that the security requirements of cryptography are achieved by cancelable biometric template and unique session key.

Authors and Affiliations

Joans Annie Grace S, Jeyapiriya K

Keywords

Related Articles

Advanced Microwave Active & Passive Remote Sensing Application and Its Utilization

Microwave sensing circumscribes both active and passive forms of remote sensing. Long wavelengths, match up to the visible and infrared. Its radiation can penetrate through haze, cloud cover and dust. Longer wavelengths...

Reduction of Rejection Instances Using Particle Swarm Optimization in Ids

An intrusion detection system (IDS) is a tool or software function which examines a network or systems for malevolent action or policy infringements. An IDS mechanism by observing system action by probing vulnerabilitie...

Energy Monitoring System

Energy management is the means to controlling and reducing your organization's energy consumption... And controlling and reducing your organization's energy consumption is important because it enables you to: Reduce co...

Improving the Power Quality Based On VSCDSTATCOM with Back Propagation Algorithm through Neural Network

this paper presents a three phase three wire Distributed Static Compensators (DSTATCOM) is proposed for an Power Quality improvement. DSTATCOM is a shunt device which is generally used to minimize power quality problems...

Synthesis and Characterization of Silver Nanoparticles Using Celastrus Paniculatus Leaf Extract

This paper reports a rapid and ecofriendly green method for the synthesis of silver nanoparticles from silver nitrate solution using Celastrus Paniculatus leaf extract. Effect of Celastrus Paniculatus leaf extract , sil...

Download PDF file
  • EP ID EP22091
  • DOI -
  • Views 198
  • Downloads 3

How To Cite

Joans Annie Grace S, Jeyapiriya K (2016). A Crypto System Based On Revocable and Unique Session Key. International Journal for Research in Applied Science and Engineering Technology (IJRASET), 4(5), -. https://europub.co.uk/articles/-A-22091