Proceedings 2001 IEEE Symposium on Security and Privacy. S&P 2001
DOI: 10.1109/secpri.2001.924299
|View full text |Cite
|
Sign up to set email alerts
|

Cryptographic key generation from voice

Abstract: We propose a technique to reliably generate a cryptographic key from a user's voice while speaking a password.The key resists cryptanalysis even against an attacker who captures all system information related to generating or veribing the cryptographic key. Moreover; the technique is suficiently robust to enable the user to reliably regenerate the key by uttering her password again. We describe an empirical evaluation of this technique using 250 utterances recorded from 50 users.

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2

Citation Types

0
151
0

Publication Types

Select...
5
2
1

Relationship

0
8

Authors

Journals

citations
Cited by 238 publications
(151 citation statements)
references
References 14 publications
0
151
0
Order By: Relevance
“…Biometrics Other work in applying biometrics to cryptography has focused on the derivation of a secret from a biometric [12,11,10,6,9,7,4]. This secret can be then used for operations such as symmetric encryption or UNIX style password authentication.…”
Section: Related Workmentioning
confidence: 99%
“…Biometrics Other work in applying biometrics to cryptography has focused on the derivation of a secret from a biometric [12,11,10,6,9,7,4]. This secret can be then used for operations such as symmetric encryption or UNIX style password authentication.…”
Section: Related Workmentioning
confidence: 99%
“…In (Monrose et al, 2002;Monrose et al, 2001), a new approach is proposed, focusing on using keystroke features and voice characteristics to harden the passwords themselves. The work improves on previous schemes in that it is the first to offer better security against a stronger attacker.…”
Section: Related Workmentioning
confidence: 99%
“…In this context, a solution based on error-correcting codes and randomness extraction was developed (Juels and Wattenberg, 1999;Juels and Sudan, 2002;Dodis et al, 2004;Boyen, 2004). An alternative line of work based on secret sharing techniques was proposed in (Monrose et al, 2002;Monrose et al, 2001). While the former provides an information-theoretical optimal solution for error-tolerance, it at the same time requires a uniform level of error-tolerance for all users alike and as such poses significant challenges for use in practice.…”
Section: Introductionmentioning
confidence: 99%
“…Further, it is classified into two: Key-Binding biometric cryptosystem and Keygeneration biometric crypto system [9], [10], [11], [12], [14], [17], [23], [27].…”
mentioning
confidence: 99%