Biometric Knowledge Extraction for Multi-Factor Authentication and Key Exchange

被引:6
|
作者
Griffin, Phillip H. [1 ]
机构
[1] Griffin Informat Secur, 1625 Glenwood Ave, Raleigh, NC 27608 USA
来源
关键词
authenticated key exchange; biometrics; knowledge extraction;
D O I
10.1016/j.procs.2015.09.150
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
This paper describes a method for achieving strong, multi-factor and mutual authentication from a biometrics-based protocol for authenticated key exchange (B-AKE). Operation of the protocol relies on knowledge shared by communicating parties, extracted from data collected by biometric sensors. A Diffie-Hellman key-agreement scheme creates a symmetric encryption key using a weak secret, the extracted something-you-know data. This key protects the confidentiality of user credentials and other message data transferred during operation of the B-AKE protocol. If the message recipient possesses the same something-you-know information as the sender, a key is created, the message decrypted, and mutual authentication achieved. Biometric match data recovered from the encrypted message provides a second something-you-are authentication factor. The B-AKE protocol ensures users never reveal their knowledge or biometric credentials to imposter recipients or man-in-the-middle observers. Diffie-Hellman key establishment provides forward secrecy, a highly desirable protocol property, when participants choose fresh random values each time they operate the protocol. (C) 2015 The Authors. Published by Elsevier B.V.
引用
收藏
页码:66 / 71
页数:6
相关论文
共 50 条
  • [1] Symmetric-Key Multi-factor Biometric Authentication Scheme
    Iftikhar, Jawad
    Hussain, Sajid
    Mansoor, Khwaja
    Ali, Zeeshan
    Chaudhry, Shehzad Ashraf
    [J]. 2019 2ND INTERNATIONAL CONFERENCE ON COMMUNICATION, COMPUTING AND DIGITAL SYSTEMS (C-CODE), 2019, : 288 - 292
  • [2] A Modular Framework for Multi-Factor Authentication and Key Exchange
    Fleischhacker, Nils
    Manulis, Mark
    Azodi, Amir
    [J]. SECURITY STANDARDISATION RESEARCH, SSR 2014, 2014, 8893 : 190 - 214
  • [3] Biometric multi-factor authentication: On the usability of the FingerPIN scheme
    Marasco, Emanuela
    Albanese, Massimiliano
    Patibandla, Venkata Vamsi Ram
    Vurity, Anudeep
    Sriram, Sumanth Sai
    [J]. SECURITY AND PRIVACY, 2023, 6 (01):
  • [4] Secure biometric template generation for multi-factor authentication
    Khan, Salman H.
    Akbar, M. Ali
    Shahzad, Farrukh
    Farooq, Mudassar
    Khan, Zeashan
    [J]. PATTERN RECOGNITION, 2015, 48 (02) : 458 - 472
  • [5] Analysis and improvement of a multi-factor biometric authentication scheme
    Cao, Liling
    Ge, Wancheng
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2015, 8 (04) : 617 - 625
  • [6] Using Bayes Factors For Multi-factor, Biometric Authentication
    Giffin, A.
    Skuka, J. D.
    Lao, P. A.
    [J]. BAYESIAN INFERENCE AND MAXIMUM ENTROPY METHODS IN SCIENCE AND ENGINEERING (MAXENT 2014), 2015, 1641 : 611 - 615
  • [7] Multi-Factor Authentication in Key Management Systems
    de Souza, Rick Lopes
    Lung, Lau Cheuk
    Custodio, Ricardo Felipe
    [J]. 2013 12TH IEEE INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (TRUSTCOM 2013), 2013, : 746 - 752
  • [8] Implementing Open Source Biometric Face Authentication for Multi-factor Authentication Procedures
    Minakova, Natalya
    Mansurov, Alexander
    [J]. HIGH-PERFORMANCE COMPUTING SYSTEMS AND TECHNOLOGIES IN SCIENTIFIC RESEARCH, AUTOMATION OF CONTROL AND PRODUCTION, 2022, 1526 : 371 - 379
  • [9] Multi-factor authenticated key exchange
    Pointcheval, David
    Zimmer, Sebastien
    [J]. APPLIED CRYPTOGRAPHY AND NETWORK SECURITY, PROCEEDINGS, 2008, 5037 : 277 - 295
  • [10] Ensuring privacy of biometric factors in multi-factor authentication systems
    Apampa, Kikelomo Maria
    Zhang, Tian
    Wills, Gary B.
    Argles, David
    [J]. SECRYPT 2008: PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON SECURITY AND CRYPTOGRAPHY, 2008, : 44 - 49