A multi-instance cancelable fingerprint biometric based secure session key agreement protocol employing elliptic curve c
- PDF / 2,266,876 Bytes
- 31 Pages / 439.642 x 666.49 pts Page_size
- 104 Downloads / 204 Views
A multi-instance cancelable fingerprint biometric based secure session key agreement protocol employing elliptic curve cryptography and a double hash function Arpita Sarkar1 · Binod K. Singh1 Received: 11 June 2019 / Revised: 2 July 2020 / Accepted: 16 July 2020 / © Springer Science+Business Media, LLC, part of Springer Nature 2020
Abstract The generation of cryptographic keys using the biometric features of both communicating parties throughout the sessions of communication avoids the process of key sharing through some insecure channel, difficulty in remembering the large key(256 or 1024 bits key), and storing the key in some safe place. At the same time preserving the safety of cryptographic keys. Nonetheless, the biometric-based cryptographic key formation contains few matters so as the secrecy of biometrics, distributing biometric data among both communicating users, and creating the revocable key of irrevocable biometric. The present work discusses the above-mentioned concerns. Here a structure for a reliable session key agreement protocol has been suggested. For this, communication a 256-bit session key is created by both communicating parties at their end. For the generation of the 256-bit key, each of the left and right thumb was captured in each session. The right thumb impressions of the communicating parties are used to generate the cancelable fingerprint biometric s and the left thumb impressions of each communicating parties are used to generate a 64-bit hash value by applying the proposed double hash function. After that both communicating parties generate secret value using elliptic curve cryptography from their cancelable biometrics data and share along with the generated hash value. At the end of the process generated secret value and the hash value are concatenated to generate the revocable key for session key agreement protocol. For better performance and security purposes, all the actions of this protocol are based on elliptic curve cryptography. Proposed protocol precludes undesired third-parties from requiring a key selection on this agreeing parties. Based on the experimental evaluation across four datasets of FVC2002, the proposed structure is privacy-preserving and is excellently fitting for various real-time biometric-based applicability. Keywords Biometrics · Cancelable template · Key agreement protocol · Elliptic curve cryptography · Network Security · Hash value
Arpita Sarkar
[email protected]
Extended author information available on the last page of the article.
Multimedia Tools and Applications
1 Introduction The collection of digital documents takes place in one computer system or database after they are brought over some information channel. Thus security of these documents while transport and in the storage location has utmost significance. To maintain data safety cryptographic methods like decryption -encryption is applied. The various methods of encryption and decryption can be broadly categorized into symmetric and asymmetric cryptography. In symmetric key crypto
Data Loading...