Biometric Signcryption Using Hyperelliptic Curve and Cryptographically Secure Random Number

被引:0
|
作者
Sathya, K. [1 ]
Rajasekar, Vani [1 ]
Premalatha, J. [1 ]
机构
[1] Kongu Engn Coll, Dept Informat Technol, Perundurai, Tamil Nadu, India
关键词
Biometric signcryption; Hyperelliptic curve cryptography; Twining technique;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The biometric system stores physiological traits of user such as finger print, iris, palm, patterns of veins etc. Iris signcryption is the most successful way to improve the information security because iris consists of most accurate features compared to other authentication systems. In order to provide better security and less computational time lightweight cryptographic scheme called signcryption has introduced. Signcryption is a logical combination of encryption and signature. Cryptographically secure random numbers are used as private key in encryption segment and as key in generating signature of SHA-1 segment. Generally the random numbers passing the NIST Test suite fails to satisfy cryptographically secure requirements. An approach called twining technique along with AES in counter mode is used to generate cryptographically random numbers from the seed values of sensors. Twining technique is a novel method to minimize co linearity that occurs while extracting seed from multiple sensors housed in same environment. One of the most recent researches in the area of public key cryptography is HyperElliptic Curve Cryptography (HECC) because HECC uses smaller key size and less computational time. In the proposed biometric signcryption, biometric data, HECC and cryptographically secure random numbers are used to derive the signcrypted value of iris.
引用
收藏
页数:7
相关论文
共 50 条
  • [1] A Design for a Cryptographically Secure Pseudo Random Number Generator
    Williams, Benjamin
    Hiromoto, Robert E.
    Carlson, Albert
    [J]. PROCEEDINGS OF THE 2019 10TH IEEE INTERNATIONAL CONFERENCE ON INTELLIGENT DATA ACQUISITION AND ADVANCED COMPUTING SYSTEMS - TECHNOLOGY AND APPLICATIONS (IDAACS), VOL. 2, 2019, : 864 - 869
  • [2] Enhanced Biometric Recognition for Secure Authentication Using Iris Preprocessing and Hyperelliptic Curve Cryptography
    Rajasekar, Vani
    Premalatha, J.
    Sathya, K.
    [J]. WIRELESS COMMUNICATIONS & MOBILE COMPUTING, 2020, 2020 (2020):
  • [3] Cryptographically secure random number generator with chaotic additional input
    Fatih Özkaynak
    [J]. Nonlinear Dynamics, 2014, 78 : 2015 - 2020
  • [4] Cryptographically secure random number generator with chaotic additional input
    Ozkaynak, Fatih
    [J]. NONLINEAR DYNAMICS, 2014, 78 (03) : 2015 - 2020
  • [5] A HTTP-Enabled Cryptographically Secure Hardware Random Number Generator
    Bozicevic, Mislav
    Radovan, Aleksander
    [J]. 2013 36TH INTERNATIONAL CONVENTION ON INFORMATION AND COMMUNICATION TECHNOLOGY, ELECTRONICS AND MICROELECTRONICS (MIPRO), 2013, : 1268 - 1272
  • [6] Design of a cryptographically secure pseudo random number generator with grammatical evolution
    Ryan, Conor
    Kshirsagar, Meghana
    Vaidya, Gauri
    Cunningham, Andrew
    Sivaraman, R.
    [J]. SCIENTIFIC REPORTS, 2022, 12 (01)
  • [7] Design of a cryptographically secure pseudo random number generator with grammatical evolution
    Conor Ryan
    Meghana Kshirsagar
    Gauri Vaidya
    Andrew Cunningham
    R. Sivaraman
    [J]. Scientific Reports, 12
  • [8] RFID Authentication Scheme Based on Hyperelliptic Curve Signcryption
    Ali, Usman
    Bin Idris, Mohd Yamani Idna
    Bin Ayub, Mohamad Nizam
    Ullah, Insaf
    Ali, Ihsan
    Nandy, Tarak
    Yahuza, Muktar
    Khan, Nauman
    [J]. IEEE ACCESS, 2021, 9 : 49942 - 49959
  • [9] Testing Cryptographically Secure Pseudo Random Number Generators with Artificial Neural Networks
    Fischer, Tilo
    [J]. 2018 17TH IEEE INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (IEEE TRUSTCOM) / 12TH IEEE INTERNATIONAL CONFERENCE ON BIG DATA SCIENCE AND ENGINEERING (IEEE BIGDATASE), 2018, : 1214 - 1223
  • [10] A Hyperelliptic Curve Cryptosystem Based Proxy Promised Signcryption Scheme
    Khan, Farhad Ullah
    Algarni, Fahad
    Ullah, Insaf
    Karamti, Hanen
    Manzar, Muhammad Anwaar
    Alzahrani, Ahmed Saeed
    Aziz, Muhammad Adnan
    Khan, Muhammad Asghar
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2022, 2022