A Crypto System Based On Revocable and Unique Session Key

Abstract

To protect information resources from unauthorized acquisition or to prevent tampering with the information that is to be transmitted, cryptography is used. The most important aspect of any cryptographic method is the key management and its distribution. Randomly generated keys are used normally but if the generated key is short, it becomes easy to guess and if the key is long, then it becomes difficult to remember. In this approach, unique biometric traits from both the sender and the receiver are used to generate the cryptographic key from cancelable biometric templates. These generated templates are transmitted securely to either parties using key based steganography. Both these templates are concatenated using image fusion technique to form a combined template of both the sender and the receiver. A second shuffle is used to shuffle the elements of the combined template and a hash function is used generate a unique key for each session. Here the biometric data is obtained from the fingerprints of the communicating parties and processed through MATLAB. Experimental results show that the average value of hamming distance between the genuine and imposter’s key is 127 bits for a 256 bit cryptographic key. This biometric based cryptosystem generates a revocable key from irrevocable biometric data and ensures that the security requirements of cryptography are achieved by cancelable biometric template and unique session key.

Authors and Affiliations

Joans Annie Grace S, Jeyapiriya K

Keywords

Related Articles

A Novel Current Control Technique For A Three-Phase Statcom

This paper proposes an advanced control strategy to enhance performance of shunt active power filter (APF). The proposed control scheme requires only two current sensors at the supply side and does not need a harmonic d...

Improving Copy-Move Forgery Detection Time by Using DCT, Correlation and SOBEL Edge Detector

Copy move image forgery is often used in which region of an image is copied and pasted at another location to hide an important scene, clone or duplicate the number of aspects in the same image. Block representing have...

A Noval Architecture to Enable Both Cloud Providers and Consumers to Monitor and Control the Cloud Resources

Cloud computing resource monitoring is an important process in the cloud resource management to provide the efficient and flexible services without interruption. It would be more complex process to handle and allowing t...

slugSurvey on Video Based Fire Detection Systems

Detecting break out of fire rapidly is vital for prevention of material damage and human casualties. Traditional point sensors detect heat or smoke particles and are quite successful for indoor fire detection. They will...

slugDetection of Cosmic Dust Attack in MANET under AODV Routing Protocol

The cosmic dust attack problem is one of the security attacks that occur in mobile ad hoc networks (MANETs). We show two feasible solutions. The main is to find more than one route to the destination. The another is to...

Download PDF file
  • EP ID EP22091
  • DOI -
  • Views 199
  • Downloads 3

How To Cite

Joans Annie Grace S, Jeyapiriya K (2016). A Crypto System Based On Revocable and Unique Session Key. International Journal for Research in Applied Science and Engineering Technology (IJRASET), 4(5), -. https://www.europub.co.uk/articles/-A-22091