Biometric Knowledge Extraction for Multi-Factor Authentication and Key Exchange

被引:6
|
作者
Griffin, Phillip H. [1 ]
机构
[1] Griffin Informat Secur, 1625 Glenwood Ave, Raleigh, NC 27608 USA
来源
关键词
authenticated key exchange; biometrics; knowledge extraction;
D O I
10.1016/j.procs.2015.09.150
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
This paper describes a method for achieving strong, multi-factor and mutual authentication from a biometrics-based protocol for authenticated key exchange (B-AKE). Operation of the protocol relies on knowledge shared by communicating parties, extracted from data collected by biometric sensors. A Diffie-Hellman key-agreement scheme creates a symmetric encryption key using a weak secret, the extracted something-you-know data. This key protects the confidentiality of user credentials and other message data transferred during operation of the B-AKE protocol. If the message recipient possesses the same something-you-know information as the sender, a key is created, the message decrypted, and mutual authentication achieved. Biometric match data recovered from the encrypted message provides a second something-you-are authentication factor. The B-AKE protocol ensures users never reveal their knowledge or biometric credentials to imposter recipients or man-in-the-middle observers. Diffie-Hellman key establishment provides forward secrecy, a highly desirable protocol property, when participants choose fresh random values each time they operate the protocol. (C) 2015 The Authors. Published by Elsevier B.V.
引用
收藏
页码:66 / 71
页数:6
相关论文
共 50 条
  • [21] Multi-Factor Authentication on Cloud
    Khan, Salman H.
    Akbar, M. Ali
    [J]. 2015 INTERNATIONAL CONFERENCE ON DIGITAL IMAGE COMPUTING: TECHNIQUES AND APPLICATIONS (DICTA), 2015, : 548 - 554
  • [22] Mobile Multi-Factor Authentication
    Bissada, Andrew
    Olmsted, Aspen
    [J]. 2017 12TH INTERNATIONAL CONFERENCE FOR INTERNET TECHNOLOGY AND SECURED TRANSACTIONS (ICITST), 2017, : 210 - 211
  • [23] Bypassing Multi-Factor Authentication
    Russell S.
    [J]. ITNOW, 2023, 65 (01) : 42 - 45
  • [24] Multi-Factor Authentication Modeling
    Dostalek, Libor
    [J]. 2019 9TH INTERNATIONAL CONFERENCE ON ADVANCED COMPUTER INFORMATION TECHNOLOGIES (ACIT'2019), 2019, : 443 - 446
  • [25] Security analysis and improvement of a multi-factor biometric-based remote authentication scheme
    Boonkrong, Sirapat
    [J]. IAENG International Journal of Computer Science, 2019, 46 (04): : 1 - 12
  • [26] Cryptanalysis and Improvement of a Multi-factor Authenticated Key Exchange Protocol
    Ma, Zhiqiang
    He, Jun
    [J]. International Journal of Network Security, 2023, 25 (05) : 764 - 776
  • [27] Two-factor (Biometric and password) authentication key exchange on lattice based on key consensus
    Zongqu Z.
    Shaoti M.
    Yongjun W.
    Yongli T.
    Qing Y.
    [J]. Qing, Ye (yeqing@hpu.edu.cn), 1600, Beijing University of Posts and Telecommunications (27): : 42 - 53
  • [28] Two-factor (biometric and password) authentication key exchange on lattice based on key consensus
    Zhao Zongqu
    Ma Shaoti
    Wang Yongjun
    Tang Yongli
    Ye Qing
    [J]. The Journal of China Universities of Posts and Telecommunications, 2020, 27 (06) : 42 - 53
  • [29] Ubiquitous Desktops with Multi-factor Authentication
    Doyle, Paul
    Deegan, Mark
    O'Driscoll, Ciaran
    Gleeson, Michael
    Gillespie, Brian
    [J]. 2008 THIRD INTERNATIONAL CONFERENCE ON DIGITAL INFORMATION MANAGEMENT, VOLS 1 AND 2, 2008, : 201 - 206
  • [30] Dynamic Multi-factor Authentication for Smartphone
    Yohan, Alexander
    Lo, Nai-Wei
    Lie, Henry Roes
    [J]. 2016 IEEE 27TH ANNUAL INTERNATIONAL SYMPOSIUM ON PERSONAL, INDOOR, AND MOBILE RADIO COMMUNICATIONS (PIMRC), 2016, : 2448 - 2453