2017
DOI: 10.3390/e19020070
|View full text |Cite
|
Sign up to set email alerts
|

User-Centric Key Entropy: Study of Biometric Key Derivation Subject to Spoofing Attacks

Abstract: Biometric data can be used as input for PKI key pair generation. The concept of not saving the private key is very appealing, but the implementation of such a system shouldn't be rushed because it might prove less secure then current PKI infrastructure. One biometric characteristic can be easily spoofed, so it was believed that multi-modal biometrics would offer more security, because spoofing two or more biometrics would be very hard. This notion, of increased security of multi-modal biometric systems, was di… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
4
0

Year Published

2017
2017
2023
2023

Publication Types

Select...
6
2

Relationship

0
8

Authors

Journals

citations
Cited by 10 publications
(4 citation statements)
references
References 72 publications
(71 reference statements)
0
4
0
Order By: Relevance
“…The 16 bytes which is produced from MixColumns is equal to 128 bits which is XORed with the round key of 128 bits. The above process has been repeated until final round to produce the corresponding cipher text [40].…”
Section: Add Round Keymentioning
confidence: 99%
“…The 16 bytes which is produced from MixColumns is equal to 128 bits which is XORed with the round key of 128 bits. The above process has been repeated until final round to produce the corresponding cipher text [40].…”
Section: Add Round Keymentioning
confidence: 99%
“…The strong channel established corresponding to a weak channel by the non-legitimate user could grab the original signals, and thus, the transmitter has no awareness at all about the interruption of the illegitimate entity in the system. For that, advanced security designs at the physical layer, the cryptanalysis solutions have also been implemented in the literature, 1,[35][36][37][38][39] but are considered as difficult implementations due to complexity of mathematical modeling for physical layer security. Although, almost all available cryptography solutions deployed for various communication systems are evaluated the best, regardless of massive complexities that are accounting during computations.…”
Section: Problem Statementmentioning
confidence: 99%
“…Fuzzy extractors are not only applied to key generation protocols based on biometrics [60,61,62] but also for generating keys for authentication purposes, by using Physical Unconlable Functions (PUFs) [63,64], and for key generation in Vehicular Ad-Hoc Networks (VANETs) [65]. Formally, a fuzzy extractor is a function f which takes as input a biometric signal w, and produces a random string R and a public parameter P .…”
Section: Fuzzy Extractormentioning
confidence: 99%