Saturday, March 30, 2019

Cryptography With Biometrics For Secure Key Exchange

cryptogram With biometry For Secure Key Ex transmit biometry is the application of biometry techniques to the enfranchisement and automatic identification of people in gage carcasss. The conventional concept of biometry addresses the application of mathematical and statistical techniques to biological sciences. Biometrics on the other hand can be said to be the science of recognizing the identicalness of a person establish on the corporeal or behavioural attributes of the individual much(prenominal) as face, fingerprints, voice and flag (Jain et al).In Modern society, Biometrics has been important to large scale identity management systems whose functionality relies on the accurate determination of an individuals identity in several(prenominal) different applications context ().Traditional methods of establishing a persons identity includes knowledge found (e.g., passwords) and token based (e.g., ID cards) mechanisms, but these substitute representations of identity can be lost easily, sh ard, manipulated or stolen thereby compromising the intended security. By utilise biostatistics it is possible to establish an identity based on who you are, quite a than by what you possess, such as an ID card, or what you remember, such as a password (Poli et al, 2009).Biometrics is non recommended for every application and user, and in some(a) cases biometric au whereforetication is simply the wrong solution. Defining those environments in which biometrics offers the strongest clear to individuals and institutions is one of the major challenges facing the biometric industryAs time goes by, the increase success and affordability of biometric technologies has continually broadened the range of applications in which biometrics operate effectively (). cryptogram is the science of writing in secret code and is an antique art. The goal of cryptography extends beyond merely making information unreadable. In this couch it also extends into user authentication .The security of a cryptological system is dependent relatively on the secrecy of the cryptographic attain and not ca utilize inconvenience when it falls in the hand of the enemy. Therefore, the find out run down in cryptography is key management (Dong et al, 2008).Biometrics can be used to protect the key in cryptography, while cryptography and information hiding can be used to protect biometric templates ().Combining biometrics and cryptography together will have the potential to offer higher(prenominal) assurance of the legal information holder. Key management is an important publicise in cryptographic systems.There are several ways to trace biometrics with a cryptosystem, namelyBiometrics key releaseBiometrics key generationBiometrics key bindingIn a key release mode, biometrics plays a predetermined role in a cryptosystem. The key would be released to users only if biometric matching is successful. A key generation mode requires the key of a cryptosystem being derived directly from a biometric template, hence the unique biometrics provides a unique key for the security system based on some transform or feature extraction. In the key binding mode, the system binds a cryptographic key with the users biometrics at the time of enrolment. The key would be retrieved only upon a successful authentication. The key generation/binding modes seem to be to a greater extent secure than the key release mode because in key release mode, the user authentication and key release are two crystallize parts (Dong et al, 2008).The conventional cryptography systems do not need either complex pattern recognition strategy as in biometric systems. They just about always depend on an accurate key matching process. That is, it requires that keys are exactly correct and does not tolerate a single scrap error. However, as biometric characteristics are known to be variable and noisy and all(prenominal) new biometric sample is always different, only an approximate match d ownstairs a threshold between the input biometric data to a alike stored template would lead the authentication successful.Aim and ObjectivesIntegrating only biometric authentication on systems exposes new problems. This project investigates how to enhance biometrics security using cryptographic encryption and attempts to present an overview of an up to date question in this increasingly important yield by putting biometrics, cryptography and data hiding in the same context of security enhancement.The Objectives in this project are toIdentify the of import characteristics of Biometrics.Identify the briny security characteristics of Cryptography and Biometrics.Identify threats and attacks towards Biometrics.Propose countermeasures for securing Biometric Templates.Evaluate attack techniques against Crypto-Systems. explore QuestionThe succeeding(a) research questions have been identified after some initial probe and going through the initial literature retread.Will the combinati on of biometrics and cryptography secure a system from attacks and produce a secured rut to exchange data.HypothesesThe hypotheses below have been created by extensive research into biometric systems, cryptographic encryption and the security. The hypotheses created in this project are the initial reviews and whitethorn change throughout the project.The identification of threats and attacks in biometrics and cryptographic systems security.The information dispassionate will be used to create attack scenarios to conduct an experiment on the different threats faced by biometric systems and cryptographic encryption then identify any countermeasures that can be used to secure the system. preceptSection 2 Methods2.1. Secondary Research Method (Literature Review)The literature review will give a detailed insight into the combination of biometrics and cryptography for the purpose of securing data exchanges. By looking at the wider topic before the development will allow the study to take a more furnished approach to a useful answer to the research question.The main objectives of the literature review will be toIdentify the main characteristics of Biometrics.Identify the main security characteristics of Cryptography and Biometrics.Identify threats and attacks towards Biometrics.Identify threats and attacks towards cryptographic Encryption.Countermeasures for securing Biometric Templates.Evaluate attack techniques against Crypto-Systems.Identifying suitable data gathering techniques for the project.Identifying suitable data analyse techniques for the project.2.1.1 Literature SourcesBooks ledgersJournal of Applied Security Research, 2010International Journal of Computer Science and Network Security, 2009Information Forensics and Security, 2010ConferencesScience and Technology for benevolence (TIC-STH), 2009 IEEE Toronto International Conference, 2009Computer Security Applications Conference, 2008WebsitesIEEE/IEE Electronic Library (IEL) via IEEE Xplore http//www.ie ee.org/ieeexploreProQuest http//proquest.umi.comSpringerlink www.springerlink.com2.2. Primary Research Method (Experiment)Section 3 Resources and Risks3.1. Required ResourcesThroughout this project, many resources are required for carrying out the experiment and the initial literature review.3.1.1. Literature based resourcesAccess to Glasgow Caledonian University library To gain access to computers to research literature on the internet, Athens, or access books which have been published by authors that may be relevant to Cryptography and Biometrics.Internet connectivity for any other research such as Google scholar Home and university based internet connectivity will be needed to further research any literature that may be needed.3.1.2. Experiment based resources3.2. RisksSection 4 Project PlanThe main tasks which have to be completed during the project, the estimated time to complete and any deliverables that may be available at that time of the project are shown below. A Gantt chart will be produced to show the tasks to be done in parallel rather than in sequence to manage time effectively and avoid delays.4.1. Project Task

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.