2012
DOI: 10.9790/3021-0202325330
|View full text |Cite
|
Sign up to set email alerts
|

Design of Secured Key Generation Algorithm using Fingerprint Based Biometric Modality

Abstract: Many high-secure applications are using biometrics for natural, user-friendly and quick authentication. Cryptography is meant to make sure the secrecy and authenticity of message and protecting the confidentiality of the cryptographic keys is one among the numerous problems to be dealt with. Researchers are examining suggests that to utilize biometric options of the user to get sturdy and repeatable cryptographic keys rather than a memorable password. This may be efficiently solved by the combination of biomet… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
3
0

Year Published

2012
2012
2024
2024

Publication Types

Select...
4
2

Relationship

0
6

Authors

Journals

citations
Cited by 6 publications
(6 citation statements)
references
References 10 publications
0
3
0
Order By: Relevance
“…Fingerprint based key generation algorithm was presented by extracting the minutiae points from three different scenarios. The final cryptographic key generated is complex and stable throughout a person's lifetime [3].…”
Section: Literature Viewmentioning
confidence: 99%
“…Fingerprint based key generation algorithm was presented by extracting the minutiae points from three different scenarios. The final cryptographic key generated is complex and stable throughout a person's lifetime [3].…”
Section: Literature Viewmentioning
confidence: 99%
“…But you can't take that product and reasonably guess the two original numbers, or guess one of the original primes if only the other is known. The public key and private keys are carefully generated using the RSA algorithm; they can be used to encrypt information [4].…”
Section: B Rsa Encryptionmentioning
confidence: 99%
“…Without proper security measures, unauthorized parties can access sensitive information, leading to serious consequences. Therefore, it is important to implement strong encryption and authentication methods to protect data from being compromised [1]. The basis for user authentication in conventional cryptosystems is holding secret keys; this mechanism breaks down if the secrets are shared with unauthorized users.…”
Section: Introductionmentioning
confidence: 99%
“…Furthermore, keys cannot offer non-repudiation because they might be misplaced, stolen, or forgotten [2]. The degree of security of a symmetric or asymmetric encryption system depends on how secret the cryptographic key or private key is [1,2]. The information is secure when using different cryptographic techniques, including Rivest-Shamir-Adleman (RSA), Data Encryption Standard (DES), Triple DES (3DES), and Advanced Encryption Standard [1,3].…”
Section: Introductionmentioning
confidence: 99%