Monday, June 3, 2019

Cryptography With Biometrics For Secure Key Exchange

Cryptography With biometrics For Secure draw ExchangeBiometrics is the coating of biometry techniques to the stylemark and automatic identification of people in gage musical arrangements. The traditional concept of biometry addresses the exertion of mathematical and statistical techniques to biological sciences. Biometrics on the other hand can be said to be the science of recognizing the identicalness of a person based on the physical or behavioural attri neverthelesses of the individual such as face, fingerprints, voice and iris (Jain et al).In Modern society, Biometrics has been important to large scale identity management systems whose functionality relies on the accurate determination of an individuals identity in several different applications context ().Traditional methods of establishing a persons identity includes knowledge based (e.g., passwords) and token based (e.g., ID cards) mechanisms, but these substitute representations of identity can be lost easily, shared, manipulated or stolen thereby compromising the intended security. By using biometrics it is possible to establish an identity based on who you are, rather than by what you possess, such as an ID card, or what you remember, such as a password (Poli et al, 2009).Biometrics is not recommended for every application and user, and in some cases biometric authentication is simply the wrong solution. Defining those environments in which biometrics offers the strongest benefit to individuals and institutions is one of the major challenges facing the biometric industryAs magazine goes by, the increasing success and affordability of biometric technologies has continually broadened the range of applications in which biometrics operate effectively ().Cryptography is the science of writing in secret code and is an antiquated art. The goal of cryptology extends beyond merely making data unreadable. In this project it also extends into user authentication.The security of a cryptographic system is symbiotic relatively on the secrecy of the cryptographic separate and not causing inconvenience when it falls in the hand of the enemy. Therefore, the winder issue in steganography is lynchpin management (Dong et al, 2008).Biometrics can be used to protect the key in cryptography, while cryptography and data hiding can be used to protect biometric templates ().Combining biometrics and cryptography together will have the potential to offer higher assurance of the legal information holder. Key management is an important issue in cryptographic systems.There are several ways to combine biometrics with a cryptosystem, namelyBiometrics key releaseBiometrics key generationBiometrics key bindingIn a key release mode, biometrics plays a predetermined habit in a cryptosystem. The key would be released to users only if biometric learning is successful. A key generation mode requires the key of a cryptosystem being derived directly from a biometric template, hence the unique biometrics provides a unique key for the security system based on some transform or feature extraction. In the key binding mode, the system binds a cryptographic key with the users biometrics at the time of enrolment. The key would be retrieved only upon a successful authentication. The key generation/binding modes seem to be more secure than the key release mode because in key release mode, the user authentication and key release are two separate parts (Dong et al, 2008).The conventional cryptography systems do not need any complex pattern recognition dodging as in biometric systems. They almost always depend on an accurate key matching process. That is, it requires that keys are exactly correct and does not tolerate a single bit error. However, as biometric characteristics are known to be variable and noisy and each new biometric sample is always different, only an approximate match under a threshold between the input biometric data to a corresponding stored template would lead the authenti cation successful.Aim and ObjectivesIntegrating only biometric authentication on systems exposes new problems. This project investigates how to enhance biometrics security using cryptographic encryption and attempts to present an overview of an up to date research in this increasingly important topic by putting biometrics, cryptography and data hiding in the same context of security enhancement.The Objectives in this project are to happen upon the main characteristics of Biometrics.Identify the main security characteristics of Cryptography and Biometrics.Identify threats and attacks towards Biometrics.Propose countermeasures for securing Biometric Templates.Evaluate attack techniques against Crypto-Systems.Research QuestionThe following research questions have been set after some sign investigation and going through the initial literature review.Will the combination of biometrics and cryptography secure a system from attacks and produce a secured channel to exchange data.Hypothese sThe hypotheses below have been created by extensive research into biometric systems, cryptographic encryption and the security. The hypotheses created in this project are the initial reviews and may change throughout the project.The identification of threats and attacks in biometrics and cryptographic systems security.The information collected will be used to create attack scenarios to parcel out an experiment on the different threats faced by biometric systems and cryptographic encryption then identify any countermeasures that can be used to secure the system. principleSection 2 Methods2.1. Secondary Research Method ( books Review)The literature review will give a detailed insight into the combination of biometrics and cryptography for the purpose of securing data exchanges. By looking at the wider topic before the development will allow the study to take a more furnish approach to a useful answer to the research question.The main objectives of the literature review will be toI dentify the main characteristics of Biometrics.Identify the main security characteristics of Cryptography and Biometrics.Identify threats and attacks towards Biometrics.Identify threats and attacks towards Cryptographic Encryption.Countermeasures for securing Biometric Templates.Evaluate attack techniques against Crypto-Systems.Identifying suitable data gathering techniques for the project.Identifying suitable data analyse techniques for the project.2.1.1 Literature SourcesBooksJournalsJournal of use Security Research, 2010International Journal of Computer Science and Network Security, 2009Information Forensics and Security, 2010ConferencesScience and Technology for Humanity (TIC-STH), 2009 IEEE Toronto International Conference, 2009Computer Security Applications Conference, 2008WebsitesIEEE/IEE Electronic library (IEL) via IEEE Xplore http//www.ieee.org/ieeexploreProQuest http//proquest.umi.comSpringerlink www.springerlink.com2.2. Primary Research Method (Experiment)Section 3 Resources and Risks3.1. Required ResourcesThroughout this project, many resources are required for carrying out the experiment and the initial literature review.3.1.1. Literature based resourcesAccess to Glasgow Caledonian University library To gain access to computers to research literature on the internet, Athens, or access books which have been published by authors that may be relevant to Cryptography and Biometrics.Internet connectivity for any other research such as Google scholar Home and university based internet connectivity will be needed to further research any literature that may be needed.3.1.2. Experiment based resources3.2. RisksSection 4 Project PlanThe main tasks which have to be completed during the project, the estimated time to complete and any deliverables that may be available at that time of the project are shown below. A Gantt chart will be produced to show the tasks to be done in parallel rather than in sequence to manage time effectively and avoid delays.4 .1. Project Task

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.