Proposed Method to Generated Strong Keys by Fuzzy Extractor And Biometric

  • Abstract
  • Keywords
  • References
  • PDF
  • Abstract

    The typical scheme used to generated cryptographic key is a fuzzy extractor. The fuzzy extractor is the extraction of a stable data from biometric data or noisy data based on the error correction code (ECC) method. Forward error correction includes two ways are blocked and convolutional coding used for error control coding. “Bose_Chaudhuri_Hocquenghem” (BCH) is one of the error correcting codes employ to correct errors in noise data. In this paper use fuzzy extractor scheme to find strong key based on BCH coding, face recognition data used SVD method and hash function. Hash_512 converted a string with variable length into a string of fixed length, it aims to protect information against the threat of repudiation.



  • Keywords

    Fuzzy extractor, hashfunction, error correcting codes, BCH code, hamming distance, and biometric.

  • References

      [1] Maes R, Tuyls P & Verbauwhede I, “Low-overhead implementation of a soft decision helper data algorithm for SRAM PUFs”, Cryptographic Hardware and Embedded Systems-CHES (2009), pp.332-347.

      [2] Yasunaga K & Yuzawa K, “On the Limitations of Computational Fuzzy Extractors”, work, Vol.3, No.1,(2018), pp.7-9.

      [3] Bösch C, Guajardo J, Sadeghi AR, Shokrollahi J & Tuyls P, “Efficient helper data key extractor on FPGAs”, International Workshop on Cryptographic Hardware and Embedded Systems, (2008), pp.181-197.

      [4] Jain AK, Nandakumar K & Nagar A, “Biometric template security”, EURASIP Journal on advances in signal processing, (2008).

      [5] Tuyls P, Škoric B & Kevenaar T. eds., Security with noisy data: on private biometrics, secure key storage and anti-counterfeiting, Springer Science & Business Media, (2007).

      [6] Cavoukian A & Stoianov A, “Biometric encryption: The new breed of untraceable biometrics”, Biometrics: fundamentals, theory, and systems. Wiley, London, (2009).

      [7] Li N, Guo F, Mu Y, Susilo W & Nepal S, “Fuzzy Extractors for Biometric Identification”, IEEE 37th International Conference on Distributed Computing Systems, (2017), pp.667-677.

      [8] Yang W, Hu J & Wang S, “A delaunay triangle-based fuzzy extractor for fingerprint authentication”, IEEE 11th International Conference on Trust, Security and Privacy in Computing and Communications, (2012), pp.66-70.

      [9] Bennett CH, Brassard G & Robert JM, “Privacy amplification by public discussion”, SIAM journal on Computing, Vol.17, No.2, (1998), pp.210-229.

      [10] Brostoff S & Sasse MA, “Are Passfaces more usable than passwords? A field trial investigation”, People and Computers XIV—Usability or Else!, (2000), pp.405-424.

      [11] Daugman, J, “How iris recognition works”, The essential guide to image processing, (2009), pp.715-739.

      [12] Ellison C, Hall C, Milbert R & Schneier B, “Protecting secret keys with personal entropy”, Future Generation Computer Systems, Vol.16, No.4,(2000), pp.311-318.

      [13] Fuller B, Reyzin L & Smith A, “When are fuzzy extractors possible?”, International Conference on the Theory and Application of Cryptology and Information Security, (2016), pp.277-306.

      [14] Li Q, Guo M & Chang EC, “Fuzzy extractors for asymmetric biometric representations”, IEEE Computer Society Conference on Computer Vision and Pattern Recognition Workshops, (2008), pp.1-6.

      [15] Khalil MS, “Generating Public Key from Fingerprint using Fuzzy Extractor” International Journal of Scientific & Engineering Research, (2017).

      [16] Gupta NK & Kaur M, “A robust and secure multitrait based fuzzy extractor”, 8th International Conference on Computing, Communication and Networking Technologies, (2017), pp.1-6.

      [17] Kaur T & Kaur M, “Cryptographic key generation from multimodal template using fuzzy extractor”, Tenth International Conference on Contemporary Computing (IC3), (2017), pp.1-6.

      [18] Dodis Y, Ostrovsky R, Reyzin L & Smith A, “Fuzzy extractors: How to generate strong keys from biometrics and other noisy data”, SIAM journal on computing, Vol.38, No.1,(2008), pp.97-139.

      [19] Chen H, “CRT-based high-speed parallel architecture for long BCH encoding”, IEEE Transactions on Circuits and Systems II: Express Briefs, Vol.56, No.8,(2009), pp.684-686.

      [20] Prashanthi M & Samundiswary P, “An Area Efficient (31, 16) BCH Decoder for Three Errors”, International Journal of Engineering Trends and Technology (IJETT), (2014).

      [21] Shu L & Costello DJ, “Error control coding: fundamentals and applications”, Englewood Cliffs, New Jersey, (1983).

      [22] Kristian H, Wahyono H, Rizki K & Adiono T, “Ultra-fast-scalable BCH decoder with efficient-Extended Fast Chien Search”, 3rd IEEE International Conference on Computer Science and Information Technology (ICCSIT), (2010), pp.338-343.

      [23] Qamar RA, Maarof MA & Ibrahim S, “An efficient encoding algorithm for (n, k) binary cyclic codes”, Indian Journal of Science and Technology, Vol.5, No.5,(2012), pp.2757-2761.

      [24] Sahana C & Anandi V, “Error Detection Using Binary BCH (255, 215, 5) Codes”, IJESRT, (2015).

      [25] Edwards I, Newell P & Trufan C, “SRAM PUF Analysis and Fuzzy Extractors”, (2010).

      [26] Kodra S, “Fuzzy extractors: How to generate strong keys from biometrics and other noisy data”, 2015.

      [27] Algredo-Badillo I, Morales-Sandoval M, Feregrino-Uribe C & Cumplido R, “Throughput and efficiency analysis of unrolled hardware architectures for the sha-512 hash algorithm”, IEEE Computer Society Annual Symposium on VLSI, (2012), pp.63-68.

      [28] Vishnu, S., Vignesh, S., & Surendar, A. (2017). Design and implementation of ZETA micro-inverter for solar PV application. International Journal of Mechanical and Production Engineering Research and Development, 7(4), 215–222.

      [29] Kahri F, Mestiri H, Bouallegue B & Machhout M, “An efficient fault detection scheme for the secure hash algorithm SHA-512”, International Conference on Green Energy Conversion Systems (GECS), (2017), pp.1-5

      [30] Nguyen TAT & Dang TK, “Combining fuzzy extractor in biometric-kerberos based authentication protocol”, International Conference on Advanced Computing and Applications (ACOMP), (2015), pp.1-6.

      [31] G Ainabekova, Z Bayanbayeva, B Joldasbekova, A Zhaksylykov (2018). The author in esthetic activity and the functional text (on the basis of V. Mikhaylov’s narrative (“The chronicle of the great jute”). Opción, Año 33. 63-80.

      [32] D, Ibrayeva, Z Salkhanova, B Joldasbekova, Zh Bayanbayeva (2018). The specifics of the art autobiography genre. Opción, Año 33. 126-151.




Article ID: 17672
DOI: 10.14419/ijet.v7i3.27.17672

Copyright © 2012-2015 Science Publishing Corporation Inc. All rights reserved.