Saturday, March 30, 2019
Cryptography With Biometrics For Secure Key Exchange
 cryptogram With biometry For Secure Key Ex transmit biometry is the application of biometry techniques to the  enfranchisement and automatic identification of people in  gage  carcasss. The  conventional concept of biometry addresses the application of mathematical and statistical techniques to biological sciences. Biometrics on the other hand can be said to be the science of recognizing the  identicalness of a person establish on the  corporeal or behavioural attributes of the individual  much(prenominal) as face, fingerprints, voice and  flag (Jain et al).In Modern society, Biometrics has been important to large scale identity management systems whose functionality relies on the accurate determination of an individuals identity in several(prenominal) different applications context ().Traditional methods of establishing a persons identity includes knowledge  found (e.g., passwords) and token based (e.g., ID cards) mechanisms, but these substitute representations of identity can be    lost easily, sh ard, manipulated or stolen thereby compromising the intended security. By  utilise   biostatistics it is possible to establish an identity based on who you  are,  quite a than by what you possess, such as an ID card, or what you remember, such as a password (Poli et al, 2009).Biometrics is  non recommended for every application and user, and in some(a) cases biometric au whereforetication is simply the wrong solution. Defining those environments in which biometrics offers the strongest  clear to individuals and institutions is one of the major challenges facing the biometric industryAs time goes by, the increase success and affordability of biometric technologies has continually broadened the range of applications in which biometrics operate   effectively (). cryptogram is the science of writing in secret code and is an  antique art. The goal of cryptography extends beyond merely making   information unreadable. In this  couch it also extends into user authentication   .The security of a  cryptological system is dependent relatively on the secrecy of the cryptographic  attain and not ca utilize inconvenience when it falls in the hand of the enemy. Therefore, the  find out   run down in cryptography is key management (Dong et al, 2008).Biometrics can be used to protect the key in cryptography, while cryptography and  information hiding can be used to protect biometric templates ().Combining biometrics and cryptography together will have the potential to offer higher(prenominal) assurance of the legal information holder. Key management is an important  publicise in cryptographic systems.There are several ways to   trace biometrics with a cryptosystem, namelyBiometrics key releaseBiometrics key generationBiometrics key bindingIn a key release mode, biometrics plays a predetermined role in a cryptosystem. The key would be released to users only if biometric matching is successful. A key generation mode requires the key of a cryptosystem being derived    directly from a biometric template, hence the unique biometrics provides a unique key for the security system based on some transform or feature extraction. In the key binding mode, the system binds a cryptographic key with the users biometrics at the time of enrolment. The key would be retrieved only upon a successful authentication. The key generation/binding modes seem to be to a greater extent secure than the key release mode because in key release mode, the user authentication and key release are two  crystallize parts (Dong et al, 2008).The conventional cryptography systems do not need  either complex pattern recognition strategy as in biometric systems. They  just about always depend on an accurate key matching process. That is, it requires that keys are exactly correct and does not tolerate a single  scrap error. However, as biometric characteristics are known to be variable and noisy and  all(prenominal) new biometric sample is always different, only an approximate match  d   ownstairs a threshold between the input biometric data to a  alike stored template would lead the authentication successful.Aim and ObjectivesIntegrating only biometric authentication on systems exposes new problems. This project investigates how to enhance biometrics security using cryptographic encryption and attempts to present an overview of an up to date  question in this increasingly important  yield by putting biometrics, cryptography and data hiding in the same context of security enhancement.The Objectives in this project are toIdentify the  of import characteristics of Biometrics.Identify the briny security characteristics of Cryptography and Biometrics.Identify threats and attacks towards Biometrics.Propose countermeasures for securing Biometric Templates.Evaluate attack techniques against Crypto-Systems. explore QuestionThe  succeeding(a) research questions have been identified after some initial  probe and going through the initial literature  retread.Will the combinati   on of biometrics and cryptography secure a system from attacks and produce a secured  rut to exchange data.HypothesesThe hypotheses below have been created by extensive research into biometric systems, cryptographic encryption and the security. The hypotheses created in this project are the initial reviews and whitethorn change throughout the project.The identification of threats and attacks in biometrics and cryptographic systems security.The information  dispassionate will be used to create attack scenarios to conduct an experiment on the different threats faced by biometric systems and cryptographic encryption then identify any countermeasures that can be used to secure the system. preceptSection 2  Methods2.1. Secondary Research Method (Literature Review)The literature review will give a detailed insight into the combination of biometrics and cryptography for the purpose of securing data exchanges. By looking at the wider topic before the development will allow the study to take    a more furnished approach to a useful answer to the research question.The main objectives of the literature review will be toIdentify the main characteristics of Biometrics.Identify the main security characteristics of Cryptography and Biometrics.Identify threats and attacks towards Biometrics.Identify threats and attacks towards  cryptographic Encryption.Countermeasures for securing Biometric Templates.Evaluate attack techniques against Crypto-Systems.Identifying suitable data gathering techniques for the project.Identifying suitable data analyse techniques for the project.2.1.1 Literature SourcesBooks ledgersJournal of Applied Security Research, 2010International Journal of Computer Science and Network Security, 2009Information Forensics and Security, 2010ConferencesScience and Technology for  benevolence (TIC-STH), 2009 IEEE Toronto International Conference, 2009Computer Security Applications Conference, 2008WebsitesIEEE/IEE Electronic Library (IEL) via IEEE Xplore  http//www.ie   ee.org/ieeexploreProQuest  http//proquest.umi.comSpringerlink  www.springerlink.com2.2. Primary Research Method (Experiment)Section 3  Resources and Risks3.1. Required ResourcesThroughout this project, many resources are required for carrying out the experiment and the initial literature review.3.1.1. Literature based resourcesAccess to Glasgow Caledonian University library To gain access to computers to research literature on the internet, Athens, or access books which have been published by authors that may be relevant to Cryptography and Biometrics.Internet connectivity for any other research such as Google scholar Home and university based internet connectivity will be needed to further research any literature that may be needed.3.1.2. Experiment based resources3.2. RisksSection 4  Project PlanThe main tasks which have to be completed during the project, the estimated time to complete and any deliverables that may be available at that time of the project are shown below. A Gantt    chart will be produced to show the tasks to be done in parallel rather than in sequence to manage time effectively and avoid delays.4.1. Project Task  
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.