Proposed Method to Generated Strong Keys by Fuzzy Extractor And Biometric

  • Authors

    • Huda Saleem
    • Huda Albermany
    • Husein Hadi
    2018-08-15
    https://doi.org/10.14419/ijet.v7i3.27.17672
  • Fuzzy extractor, hashfunction, error correcting codes, BCH code, hamming distance, and biometric.
  • The typical scheme used to generated cryptographic key is a fuzzy extractor. The fuzzy extractor is the extraction of a stable data from biometric data or noisy data based on the error correction code (ECC) method. Forward error correction includes two ways are blocked and convolutional coding used for error control coding. “Bose_Chaudhuri_Hocquenghem†(BCH) is one of the error correcting codes employ to correct errors in noise data. In this paper use fuzzy extractor scheme to find strong key based on BCH coding, face recognition data used SVD method and hash function. Hash_512 converted a string with variable length into a string of fixed length, it aims to protect information against the threat of repudiation.

     

     

  • References

    1. [1] Maes R, Tuyls P & Verbauwhede I, “Low-overhead implementation of a soft decision helper data algorithm for SRAM PUFsâ€, Cryptographic Hardware and Embedded Systems-CHES (2009), pp.332-347.

      [2] Yasunaga K & Yuzawa K, “On the Limitations of Computational Fuzzy Extractorsâ€, work, Vol.3, No.1,(2018), pp.7-9.

      [3] Bösch C, Guajardo J, Sadeghi AR, Shokrollahi J & Tuyls P, “Efficient helper data key extractor on FPGAsâ€, International Workshop on Cryptographic Hardware and Embedded Systems, (2008), pp.181-197.

      [4] Jain AK, Nandakumar K & Nagar A, “Biometric template securityâ€, EURASIP Journal on advances in signal processing, (2008).

      [5] Tuyls P, Å koric B & Kevenaar T. eds., Security with noisy data: on private biometrics, secure key storage and anti-counterfeiting, Springer Science & Business Media, (2007).

      [6] Cavoukian A & Stoianov A, “Biometric encryption: The new breed of untraceable biometricsâ€, Biometrics: fundamentals, theory, and systems. Wiley, London, (2009).

      [7] Li N, Guo F, Mu Y, Susilo W & Nepal S, “Fuzzy Extractors for Biometric Identificationâ€, IEEE 37th International Conference on Distributed Computing Systems, (2017), pp.667-677.

      [8] Yang W, Hu J & Wang S, “A delaunay triangle-based fuzzy extractor for fingerprint authenticationâ€, IEEE 11th International Conference on Trust, Security and Privacy in Computing and Communications, (2012), pp.66-70.

      [9] Bennett CH, Brassard G & Robert JM, “Privacy amplification by public discussionâ€, SIAM journal on Computing, Vol.17, No.2, (1998), pp.210-229.

      [10] Brostoff S & Sasse MA, “Are Passfaces more usable than passwords? A field trial investigationâ€, People and Computers XIV—Usability or Else!, (2000), pp.405-424.

      [11] Daugman, J, “How iris recognition worksâ€, The essential guide to image processing, (2009), pp.715-739.

      [12] Ellison C, Hall C, Milbert R & Schneier B, “Protecting secret keys with personal entropyâ€, Future Generation Computer Systems, Vol.16, No.4,(2000), pp.311-318.

      [13] Fuller B, Reyzin L & Smith A, “When are fuzzy extractors possible?â€, International Conference on the Theory and Application of Cryptology and Information Security, (2016), pp.277-306.

      [14] Li Q, Guo M & Chang EC, “Fuzzy extractors for asymmetric biometric representationsâ€, IEEE Computer Society Conference on Computer Vision and Pattern Recognition Workshops, (2008), pp.1-6.

      [15] Khalil MS, “Generating Public Key from Fingerprint using Fuzzy Extractor†International Journal of Scientific & Engineering Research, (2017).

      [16] Gupta NK & Kaur M, “A robust and secure multitrait based fuzzy extractorâ€, 8th International Conference on Computing, Communication and Networking Technologies, (2017), pp.1-6.

      [17] Kaur T & Kaur M, “Cryptographic key generation from multimodal template using fuzzy extractorâ€, Tenth International Conference on Contemporary Computing (IC3), (2017), pp.1-6.

      [18] Dodis Y, Ostrovsky R, Reyzin L & Smith A, “Fuzzy extractors: How to generate strong keys from biometrics and other noisy dataâ€, SIAM journal on computing, Vol.38, No.1,(2008), pp.97-139.

      [19] Chen H, “CRT-based high-speed parallel architecture for long BCH encodingâ€, IEEE Transactions on Circuits and Systems II: Express Briefs, Vol.56, No.8,(2009), pp.684-686.

      [20] Prashanthi M & Samundiswary P, “An Area Efficient (31, 16) BCH Decoder for Three Errorsâ€, International Journal of Engineering Trends and Technology (IJETT), (2014).

      [21] Shu L & Costello DJ, “Error control coding: fundamentals and applicationsâ€, Englewood Cliffs, New Jersey, (1983).

      [22] Kristian H, Wahyono H, Rizki K & Adiono T, “Ultra-fast-scalable BCH decoder with efficient-Extended Fast Chien Searchâ€, 3rd IEEE International Conference on Computer Science and Information Technology (ICCSIT), (2010), pp.338-343.

      [23] Qamar RA, Maarof MA & Ibrahim S, “An efficient encoding algorithm for (n, k) binary cyclic codesâ€, Indian Journal of Science and Technology, Vol.5, No.5,(2012), pp.2757-2761.

      [24] Sahana C & Anandi V, “Error Detection Using Binary BCH (255, 215, 5) Codesâ€, IJESRT, (2015).

      [25] Edwards I, Newell P & Trufan C, “SRAM PUF Analysis and Fuzzy Extractorsâ€, (2010).

      [26] Kodra S, “Fuzzy extractors: How to generate strong keys from biometrics and other noisy dataâ€, 2015.

      [27] Algredo-Badillo I, Morales-Sandoval M, Feregrino-Uribe C & Cumplido R, “Throughput and efficiency analysis of unrolled hardware architectures for the sha-512 hash algorithmâ€, IEEE Computer Society Annual Symposium on VLSI, (2012), pp.63-68.

      [28] Vishnu, S., Vignesh, S., & Surendar, A. (2017). Design and implementation of ZETA micro-inverter for solar PV application. International Journal of Mechanical and Production Engineering Research and Development, 7(4), 215–222.

      [29] Kahri F, Mestiri H, Bouallegue B & Machhout M, “An efficient fault detection scheme for the secure hash algorithm SHA-512â€, International Conference on Green Energy Conversion Systems (GECS), (2017), pp.1-5

      [30] Nguyen TAT & Dang TK, “Combining fuzzy extractor in biometric-kerberos based authentication protocolâ€, International Conference on Advanced Computing and Applications (ACOMP), (2015), pp.1-6.

      [31] G Ainabekova, Z Bayanbayeva, B Joldasbekova, A Zhaksylykov (2018). The author in esthetic activity and the functional text (on the basis of V. Mikhaylov’s narrative (“The chronicle of the great juteâ€). Opción, Año 33. 63-80.

      [32] D, Ibrayeva, Z Salkhanova, B Joldasbekova, Zh Bayanbayeva (2018). The specifics of the art autobiography genre. Opción, Año 33. 126-151.

  • Downloads

  • How to Cite

    Saleem, H., Albermany, H., & Hadi, H. (2018). Proposed Method to Generated Strong Keys by Fuzzy Extractor And Biometric. International Journal of Engineering & Technology, 7(3.27), 129-131. https://doi.org/10.14419/ijet.v7i3.27.17672