Survey of Biometric Based Key Generation to Enhance Security of Cryptosystems

被引:0
|
作者
Sadkhan, Sattar B. [1 ]
AL-Shukur, Baheeja K. [1 ]
Mattar, Ali K. [1 ]
机构
[1] Univ Babylon, Comp Software Dept, Babylon, Iraq
关键词
Key Generation; Key Binding; Biometric Cryptography; Biometric based-key generation; Biometric Security;
D O I
暂无
中图分类号
T [工业技术];
学科分类号
08 ;
摘要
Security of cryptosystems became more important issues in several applications, and need to be focused. Traditional cryptosystem used traditional ways to secure the data (pin, password,..etc.) while biometric features extracted from single biometric model or from merging more than one biometric features to produce strong keys for security. This paper provides a survey we tried to explore different method to construct keys (that's lead to a secure cryptosystem) with more resistance against attackers and how the system react with it.
引用
收藏
页数:6
相关论文
共 50 条
  • [31] Combining Steganography and Biometric Cryptosystems for Secure Mutual Authentication and Key Exchange
    Al-Assam, Hisham
    Rashid, Rasber
    Jassim, Sabah
    2013 8TH INTERNATIONAL CONFERENCE FOR INTERNET TECHNOLOGY AND SECURED TRANSACTIONS (ICITST), 2013, : 369 - 374
  • [32] Generalised Asynchronous Remote Key Generation for Pairing-Based Cryptosystems
    Frymann, Nick
    Gardham, Daniel
    Manulis, Mark
    Nartz, Hugo
    APPLIED CRYPTOGRAPHY AND NETWORK SECURITY, PT I, ACNS 2023, 2023, 13905 : 394 - 421
  • [33] Hardware accelerator approach towards efficient biometric cryptosystems for network security
    McGuffey, Charles
    Liu, Chen
    Schuckers, Stephanie
    Journal of Computing and Information Technology, 2015, 23 (04) : 329 - 340
  • [34] Biometric key generation and multi round AES crypto system for improved security
    Nagaraju S.
    Nagendra R.
    Balasundaram S.
    Kiran Kumar R.
    Measurement: Sensors, 2023, 30
  • [35] Secure distributed key generation for discrete-log based cryptosystems
    Gennaro, Rosario
    Jarecki, Stanislaw
    Krawczyk, Hugo
    Rabin, Tal
    JOURNAL OF CRYPTOLOGY, 2007, 20 (01) : 51 - 83
  • [36] Secure distributed key generation for discrete-log based cryptosystems
    Gennaro, R
    Jarecki, S
    Krawczyk, H
    Rabin, T
    ADVANCES IN CRYPTOLOGY - EUROCRYPT'99, 1999, 1592 : 295 - 310
  • [37] A Survey on Fault Attacks on Symmetric Key Cryptosystems
    Baksi, Anubhab
    Bhasin, Shivam
    Breier, Jakub
    Jap, Dirmanto
    Saha, Dhiman
    ACM COMPUTING SURVEYS, 2023, 55 (04)
  • [38] KEY GENERATION OF ALGEBRAIC-CODE CRYPTOSYSTEMS
    SUN, HM
    HWANG, TN
    COMPUTERS & MATHEMATICS WITH APPLICATIONS, 1994, 27 (02) : 99 - 106
  • [39] Attainable Unconditional Security for Shared-Key Cryptosystems
    Biondi, Fabrizio
    Given-Wilson, Thomas
    Legay, Axel
    2015 IEEE TRUSTCOM/BIGDATASE/ISPA, VOL 1, 2015, : 159 - 166
  • [40] Continuous key flux generation in symmetric cryptosystems
    Evdokimov, N.V.
    Komolov, V.P.
    Komolov, P.V.
    Rudenko, A.A.
    2001, Izdatel'stvo Moskovskogo Universiteta : 76 - 79