A Crypto System Based On Revocable and Unique Session Key
Journal Title: International Journal for Research in Applied Science and Engineering Technology (IJRASET) - Year 2016, Vol 4, Issue 5
Abstract
To protect information resources from unauthorized acquisition or to prevent tampering with the information that is to be transmitted, cryptography is used. The most important aspect of any cryptographic method is the key management and its distribution. Randomly generated keys are used normally but if the generated key is short, it becomes easy to guess and if the key is long, then it becomes difficult to remember. In this approach, unique biometric traits from both the sender and the receiver are used to generate the cryptographic key from cancelable biometric templates. These generated templates are transmitted securely to either parties using key based steganography. Both these templates are concatenated using image fusion technique to form a combined template of both the sender and the receiver. A second shuffle is used to shuffle the elements of the combined template and a hash function is used generate a unique key for each session. Here the biometric data is obtained from the fingerprints of the communicating parties and processed through MATLAB. Experimental results show that the average value of hamming distance between the genuine and imposter’s key is 127 bits for a 256 bit cryptographic key. This biometric based cryptosystem generates a revocable key from irrevocable biometric data and ensures that the security requirements of cryptography are achieved by cancelable biometric template and unique session key.
Authors and Affiliations
Joans Annie Grace S, Jeyapiriya K
A Novel Current Control Technique For A Three-Phase Statcom
This paper proposes an advanced control strategy to enhance performance of shunt active power filter (APF). The proposed control scheme requires only two current sensors at the supply side and does not need a harmonic d...
Improving Copy-Move Forgery Detection Time by Using DCT, Correlation and SOBEL Edge Detector
Copy move image forgery is often used in which region of an image is copied and pasted at another location to hide an important scene, clone or duplicate the number of aspects in the same image. Block representing have...
A Noval Architecture to Enable Both Cloud Providers and Consumers to Monitor and Control the Cloud Resources
Cloud computing resource monitoring is an important process in the cloud resource management to provide the efficient and flexible services without interruption. It would be more complex process to handle and allowing t...
slugSurvey on Video Based Fire Detection Systems
Detecting break out of fire rapidly is vital for prevention of material damage and human casualties. Traditional point sensors detect heat or smoke particles and are quite successful for indoor fire detection. They will...
slugDetection of Cosmic Dust Attack in MANET under AODV Routing Protocol
The cosmic dust attack problem is one of the security attacks that occur in mobile ad hoc networks (MANETs). We show two feasible solutions. The main is to find more than one route to the destination. The another is to...