A Crypto System Based On Revocable and Unique Session Key
Journal Title: International Journal for Research in Applied Science and Engineering Technology (IJRASET) - Year 2016, Vol 4, Issue 5
Abstract
To protect information resources from unauthorized acquisition or to prevent tampering with the information that is to be transmitted, cryptography is used. The most important aspect of any cryptographic method is the key management and its distribution. Randomly generated keys are used normally but if the generated key is short, it becomes easy to guess and if the key is long, then it becomes difficult to remember. In this approach, unique biometric traits from both the sender and the receiver are used to generate the cryptographic key from cancelable biometric templates. These generated templates are transmitted securely to either parties using key based steganography. Both these templates are concatenated using image fusion technique to form a combined template of both the sender and the receiver. A second shuffle is used to shuffle the elements of the combined template and a hash function is used generate a unique key for each session. Here the biometric data is obtained from the fingerprints of the communicating parties and processed through MATLAB. Experimental results show that the average value of hamming distance between the genuine and imposter’s key is 127 bits for a 256 bit cryptographic key. This biometric based cryptosystem generates a revocable key from irrevocable biometric data and ensures that the security requirements of cryptography are achieved by cancelable biometric template and unique session key.
Authors and Affiliations
Joans Annie Grace S, Jeyapiriya K
A Review on Water Absorption, Porosity and Sorptivity of Cement Mortar made with Copper Slag and Green Sand as Partial Replacement of Fine Aggregate.
Sustainability and resource efficiency are becoming increasing important issues within today’s construction industry. The possibility of substituting natural fine aggregate with industrial by-products such as copper sla...
Co-Primary Multi-Operator for Optimal Resources and Spectrum Sharing For Small Cell Networks
To deal with the challenge of providing higher data rates within limited spectral resources, the case of multiple operators sharing a common pool of radio resources is considered.Three algorithms are proposed to address...
Improving Copy-Move Forgery Detection Time by Using DCT, Correlation and SOBEL Edge Detector
Copy move image forgery is often used in which region of an image is copied and pasted at another location to hide an important scene, clone or duplicate the number of aspects in the same image. Block representing have...
An Overview of Different Types of Load Forecasting Methods and the Factors Affecting the Load Forecasting
load forecasting is vitally important for the electric industry in the deregulated economy. Load forecasting is about estimating future consumptions based on various data and information available and as per consumer be...
slugUniversal Query for Travel Information in Intelligent Transportation System
Intelligent Transportation System (ITS) applies on advanced technologies of electronics, communications, computers, control and sensing and detecting in all kinds of transportation system in order to improve safety, eff...