A fingerprint based bio-cryptographic security protocol designed for client/server authentication in mobile computing environment
|
|
|
- Ashlie Robbins
- 10 years ago
- Views:
Transcription
1 SECURITY AND COMMUNICATION NETWORKS Security Comm. Networks (2010) Published online in Wiley Online Library (wileyonlinelibrary.com)..225 SPECIAL ISSUE PAPER A fingerprint based bio-cryptographic security protocol designed for client/server authentication in mobile computing environment Kai Xi, Tohari Ahmad, Fengling Han and Jiankun Hu * School of Computer Science and Information Technology, RMIT University, Melbourne 3001, Australia ABSTRACT With fast evolution of mobile devices and mobile network, the need of protecting user sensitive information locally and performing secure user authentication remotely become evermore increasing. Bio-cryptography is emerging as a powerful solution which can combine the advantages of conventional cryptography and biometric security. In this paper, we present an efficient bio-cryptographic security protocol designed for client/server authentication in current mobile computing environment, with a reasonable assumption that server is secure. In this protocol, fingerprint biometric is used in user verification, protected by a computationally efficient Public Key Infrastructure (PKI) scheme, Elliptic Curve Cryptography (ECC). The genuine fingerprint information is hidden in the feature vault which is the mixture of genuine and chaff features. Fingerprint features are not only used for biometric verification but also for cryptographic key generation. Our security analysis shows that the proposed protocol can provide a secure and trustworthy authentication of remote mobile users over insecure network. Experimental results on public domain database show an acceptable verification performance. We also tested the computational costs and efficiency of our protocol on the CLDC emulator using Java ME (previous J2ME) programming technology. The simulation results prove that the proposed protocol suits current mobile environment. Copyright 2010 John Wiley & Sons, Ltd. KEYWORDS bio-cryptography, mobile computing, biometric, fingerprint authentication * Correspondence Jiankun Hu, School of Computer Science and Information Technology, RMIT University, Melbourne 3001, Australia. [email protected] 1. INTRODUCTION Mobile devices such as mobile phones have evolved from simple voice communication dominate electronic devices to powerful digital handsets with multiple roles such as digital camera, video recorder, radio, MP3 player, web browser, gaming terminal, GPS navigator, and mobile TV. Recently, more and more data-centric services are provided over mobile networks. Mobile devices will store much more information such as personal data and financial information than pervious handsets. Mobile users could use the services such as trading stocks, processing micro-payment and managing bank accounts, and using online data storage services. The portability of mobile devices and the convenience of mobile services make them increasingly attractive. However, they are also exposed to the risk of information leakage and illegitimate use. When mobile devices are lost or stolen, not only the devices themselves but also the stored information may fall into the wrong hands. Such sensitive information can be a stored PIN or a cryptographic key belonging to a client account of an e-commerce system. Attackers may utilize the obtained handheld devices and stored information to cheat the remote server for authorization. It is widely recognized that current mobile computing environment requires higher levels of protection. In Reference [1], the authors organized a survey among 230 business professionals. It is reported that 81% were utilizing their handsets to store valuable data. Seventy per cent expected their handsets to possess security mechanism. Sixty nine per cent are pleased to pay extra for such security module while 1% only prefers free security service. Security has become a major concern in the Client-Server architecture [31,33,34,36,37]. Cryptography is a conventional method of authenticating users and protecting communication messages in insecure networks. Only the user who possesses the correct cryptographic key can access the encrypted content. Copyright 2010 John Wiley & Sons, Ltd.
2 Fingerprint based bio-cryptographic security protocol K. Xi et al. Cryptographic algorithms can be coarsely grouped into two types: symmetric key cryptography and public key cryptography. The symmetric key cryptography is fast which makes it suitable for encrypting long message. However, exchanging cryptographic keys between a sender and a receiver is a challenge. A public key cryptography is more promising since it does not require a secure exchange of session keys as when using symmetric key algorithms. Nevertheless, in practice, the slow computational speed restricts PKI to be applied in short message encryption/decryption only. The most widely used public key cryptographic algorithm is the RSA algorithm proposed in Reference [2]. Since the low processing efficiency, RSA is normally employed to encrypt short symmetric key. In 1985, Miller [3] and Koblitz [4] proposed a public key cryptographic scheme called elliptic curve cryptography (ECC). The ECC has a smaller key size which offers the same security strength as the RSA. This will make it more preferable for mobile devices where small memories and low computational powers are expected [29]. However, cryptography has its own drawbacks. For instance, an attacker may obtain the cryptographic key via illegal ways and then pretend to be an authentic user. It is difficult to detect and prevent this type of attack at the server side because most recent security system identifies users based on the (1) knowledge: something you know such as passwords, personal identification numbers (PIN) or a cryptographic key, (2) token: something you have such as Subscriber Identity Module (SIM) cards. Passwords, PIN and key can be guessed out while a SIM card is usually left in the handset which may be obtained by illegal users. Servers can only verify whether the knowledge and tokens provided from the remote client side are authentic or not. Nevertheless, it is extremely hard to identify who provides such knowledge or tokens [30,35,39,40]. Biometric techniques offer a natural and reliable solution for identifying individuals. Biometric based security systems recognize a person by physiological characteristics like fingerprint, face, iris, palm, etc. or behavioral characteristics like signature, voice, gait, keystroke dynamics, etc. In principal, biometrics can validate genuine user s presence, hence enhancing the authentication reliability. Biometric traits offer three main benefits: (1) universality---every person possesses the biometric features, (2) uniqueness---it is unique from person to person, (3) performance stability- --its properties remain stable during one s lifetime. These characteristics enable biometric-based authentication and identification systems to provide higher level protection than conventional knowledge based and token based system [5]. Biometric and cryptography could become complementary to each other. It is reasonable and feasible to incorporate biometric into the cryptographic infrastructure. Soutar et al. [6 8] proposed a key-binding algorithm using correlation-based fingerprint matching method. In the algorithm, a cryptographic key and the corresponding user s fingerprint image are bound at the enrollment stage. Key retrieval process is protected by fingerprint verification. Correct keys can only be released upon successful authentication. If the biometric authentication fails, an authentication failed message will be returned. However, the downside of this scheme is obvious. The biometric verification and cryptographic component are decoupled which result in that cryptographic key can be achieved easily if attackers bypass the biometric security module. In addition, their work is based on the unrealistic condition that the query fingerprint impression and template are perfectly aligned. No performance evaluation was reported in literature. Recent significant research outcome on biocryptographic includes biohashing, cancelable template, fuzzy extractor and fuzzy vault. For biohashing technique, Teoh et al. propose the Random Multispace Quantization (RMQ) method in Reference [9]. In the method, discriminative projections of the face template are extracted by PCA or FDA. Afterward, the obtained biometric feature vector is mapped onto a sequence of random subspaces. Savvides and Vijayakumar proposed the cancelable face filter method in Reference [10] where the authors convolve the training image with random convolution kernel. Different templates can be obtained from the same biometric by varying the convolution kernels thus enabling the cancelability of the templates. Other cancelable biometric can be found in References [11] and [12]. Fuzzy extractor [13] is a type of key generating approach designed to convert noisy data, e.g. biometric features, into cryptographic keys. It is a combination of a primitive called a Secure Sketch and a Strong Randomness Extractor. The Secure Sketch generates public help data which are related to the input but does not reveal biometric information. The Randomness Extractor is used to map the non-uniform input to a uniformly distributed string, in order to achieve the maximum information entropy. Juels and Sudan [14] proposed a cryptographic construction called fuzzy vault construct. In Reference [15], the authors presented its application for fingerprint-based security system, called fingerprint fuzzy vault. The general idea is to hide the cryptographic key in a scrambled list which is composed of genuine fingerprint features and fabricated chaff features. The security strength of the fuzzy vault is based on the infeasibility of the polynomial reconstruction problem. The variation of fingerprint fuzzy vault can be found in Reference [16]. Although there exist many bio-cryptographic methods, most of these solutions cannot be easily implemented on mobile devices. Also how to combine the advantages of biometrics and the conventional PKI framework has not been explored. This will be the focus of this paper. In this paper, a new bio-cryptographic protocol is proposed. In the authentication process of the protocol, the fingerprint biometric is employed to work with the ECC public key cryptography. The basic idea is to transfer the locally matched fuzzy vault index to the central server for biometric authentication using the PKI which offloads the computation demand to the central server. Biometric cancelable keys are generated while minutia details are never exposed externally. Establishment of symmetric session keys does not need a conventional key exchange process
3 K. Xi et al. Fingerprint based bio-cryptographic security protocol which further reduces the vulnerability risk. The accuracy of the proposed protocol is evaluated using the public domain fingerprint database NIST 24. Furthermore, we implement our algorithm on Java ME emulator for the test of memory usage and computational efficiency. Note that we assume that the central server is secure and computing resource rich. This assumption is practical due to following reasons: (i) a central server is often physically secure. This will significantly reduce the level of security challenge compared with the scenario such as mobile device where physical access to the attacker is allowed, (ii) in many PKI systems, a trust party is also needed or assumed. The rest of the paper is organized as follows. Section 2 introduces the proposed bio-cryptographic protocol. The related security analysis is presented in Section 3. Section 4 provides experimental results and the related issues of the Java ME implementation. Our conclusions and future work are in Section PROPOSED BIO-CRYPTOGRAPHIC SECURITY PROTOCOL Most existing biometric-cryptography systems are based on the idea of cryptographic key release where the biometric authentication is decoupled from the cryptographic part. The biometric module can only output either an accept or reject decision. If accept, the cryptographic key will be released from the key management module. If reject, the system will not release any key. Here, biometric module provides a wrapper mechanism for the cryptographic module which makes the whole system vulnerable to attacks like the Trojan horse. A Trojan horse program may tamper with the biometric authentication module and simply inject an accept command to the key management subsystem. In our protocol, biometrics and cryptography are seamlessly integrated. The proposed bio-cryptographic protocol consists of two phases namely user registration and user authentication, which are presented in the following subsections User registration In the user registration phase, a user U registers himself/herself into the system. The process should be attack free. It is a secure and feasible way that a new user is required to present at the server side to accomplish this process. User biometric template generation should be under the control of professionals, such as system administrators, in order to guarantee the high authentication accuracy. To register, at first system will randomly generate a unique ID ID u for a user U. For convenience we assume the length of ID u be 64 bits (8 bytes). Then U imprints multiple fingerprint impressions fg i (i = 1, 2...,N) where N is the total number of acquired impressions. Here the location (x, y) and orientation angle θ are used to represent one minutia. (x, y) is a Cartesian coordinate and θ (0, 2π). A minutia can be described as m = (x, y, θ). Each impression fg i generates a feature set M i = {m 1,m 2,...,m n }, where n is the total number of minutiae in a fingerprint impression. It should be noted that normally the input fingerprint impressions are not aligned. Shift and rotation usually exist among different impressions. Even the same minutia obtained from different impressions could show different (x, y) and θ. Alignment processing is necessary. Often, a reference point (usually the singular point) is required for alignment. Errors in locating the singular point could bring about false rejections. Commercial embedded fingerprint recognition products such as UPEK TCS5B [17] and AuthenTec AES 2510 [18] possess the capability of extracting the minutiae as well as singular point. These products are inexpensive, for example TCS5B only cost 8 US dollars [19]. The corresponding solutions have been successfully adopted by Toshiba, ASUS, Lenovo, mainly on laptops and PDAs. Because minutiae retrieval and singular point detection are not part of our intended contribution, a commercial software Verifinger 5.0 [20] for minutiae extraction and the FOMFE [21,32,38] approach for singular point detection were chosen for our experiment due to our available experience. Other commercial products can also be used. The singular point acquired from each impression is sp i, described using (x, y, θ). Each M i associates with one sp i. If no singular point is detected, the system will ask the user either to retry or to change a finger. For each {M i, sp i }, the system will create a new coordinate system whose origin is sp i. All minutiae points of M i are transformed based on the new coordinate system. The new obtained minutia point sets are Q i,(i = 1, 2,...,N). Multiple impressions are used to improve the authentication accuracy. We conduct a cross-matching on Q i to find the matched and unmatched minutiae. All minutiae will be given a unique index number SN and included in a lookup table T. The matched minutiae pair will be taken as one minutia. All minutiae should be fully separated. Two minutiae are considered separated if their distance d or orientation angle difference θ is greater than pre-defined thresholds d threshold and/or θ threshold. The distance between any two minutiae m i = (x i,y i,θ i ) and m j = ( x j,y j,θ j ) is defined as d ( m i,m j ) = (xi x j ) 2 + ( yi y j ) 2 (1) The angle difference of m i = (x i,y i,θ i ) and m j = ( xj,y j,θ j ) is θ ( m i,m j ) = min ( θi θ j, ( 2π θi θ j )) (2) In order to increase the security strength, a great number of chaff points are generated and inserted into T with a given index number. A chaff point c = (x, y, θ) is randomly generated under the condition that d or θ between c and any genuine minutiae are greater than d thershold and θ thershold, respectively. The central server stores another list
4 Fingerprint based bio-cryptographic security protocol K. Xi et al. L which records the index numbers in T that correspond to all genuine minutiae. At the client side, the mobile device also stores the lookup table T and ID u for the future authentication. However, it should be noted that the mobile client does not possess the list L. Therefore, without the help of L, it is infeasible to extract sufficient genuine biometric data, such as nine genuine minutiae, directly from the lookup table T. found on Sr cen, L will be compared with L that belongs to ID u. Suppose L and L has n matched index numbers. Authentication is successful if n is greater than n threshold and vice versa. After a successful authentication, Sr cen return the encrypted version of L,ID u and Ts to U. They are encrypted by the public key Ku pb of U obtained from CA. Encryption process can be expressed as 2.2. User authentication In the user authentication phase, a user U imprints multiple fingerprint impressions fp i (i = 1, 2,...,N) using the scanner equipped on the device where N is the total number of acquired impressions. The biometric module on the mobile device extracts the minutiae points and the singular point { M i i},sp from fp i. To perform an alignment, a new coordinate system, whose origin is sp i, is established. All minutiae points of M i are transformed based on the new coordinate system. The new obtained minutia point sets are Q i,(i = 1, 2,...,N). A cross matching is performed between each Q i pair in order to find reliable minutiae and remove spurious minutiae. It is reasonable that most reliable and stable minutiae points will appear multiple times in different impressions. After cross matching, new minutiae set Qs is acquired where minutiae points in Qs are the points that appear in at least two impressions. If the number of minutiae in Qs is less than the pre-defined threshold n threshold, it is considered as failure to capture and no further processing will be executed. All minutiae of Qs are compared with the points of lookup table T. If there is a match, the index number of matched point in Qs will be added to a list L 0. However, in our protocol the length of L 0 being sent to the central server must be capped. This is because too many minutiae selected from the fuzzy vault list T participating in the authentication will increase the false acceptance rate. It is often that the length of L 0 is larger that the cap value. Therefore, we must reduce this list to a shorter list L. The length of L can be determined experimentally by the demands on false acceptance and false rejection rate. To prevent information leakage, U only transmits the index numbers instead of matched minutiae information to the central server for an authentication. The process can be described as: U obtains the server s certificate from CA and encrypts L,ID u and a timestamp Ts using the server s public key Ksr pb. C 1 is the output ciphertext, where C 1 = E pb K (ID u,l,ts ) (3) sr C 1 is then transmitted to the central server Sr cen. When receives C 1,Sr cen decrypt C 1 using its private key Ksr pri. L and ID u is obtained as (ID u,l,ts ) = D pri K (C 1 ) (4) sr ID u is used to find the profile of the claimed user ID u. Ts is used to check if it is a replay attack. If ID u can be C 2 = E pb K (ID u L,Ts ) (5) u The ciphertext C 2 is then transmitted to U, as not only a acknowledgement but also an key agreement. U is able to decrypt C 2 successfully using his own private key K pri u only if Kpri u ID u and Ts from C 2 can be described as = Kpri u. The process that extracts L, (ID u L,Ts ) = D pb K (C 2 ) (6) u Here, U verifies whether the received L,ID u and Ts are exact the same as the original ones transmitted to Sr cen before. The purpose is the mutual authentication so that U is able to verify if C 2 comes from the genuine server Sr cen which he/she intends to connect to. If mutual authentication successful, both U and Sr cen will generate a biometric-based session key K bio (symmetric cryptographic key) using the minutiae whose index numbers present in L. Further communication between the mobile client U and the central server Sr cen will be protected by K bio. Figure 1 demonstrates the working flow of a successful user authentication process. 3. SECURITY STRENGTH Attacks have posed a grave threat to the current security system especially in mobile environment. For a biocryptosystem, not only the cryptographic information, e.g. the key, but also the biometric data should be protected against attacks. In this section, we list several typical attacks and analyze how the proposed protocol defends against them. In reality, most servers have been assumed and treated as secure even though they are not perfectly secure. Sensitive information is usually stored on the server e.g. personal information, banking details, password, etc. Most popular B2C, B2B, ERP systems are using client-server architecture, all on the basis of that the server is secure. Therefore, this is a reasonable assumption. In mobile computing architecture, the major security weak points are mobile devices and the transmission channel. Compared with them, servers can offer relatively higher security strength. Server-side attack is not our research focus and beyond the scope of this paper.
5 K. Xi et al. Fingerprint based bio-cryptographic security protocol Figure 1. Process of a successful user authentication Trojan horse attack In such type of attacks, attackers may use a Trojan horse program to replace the system module and bypass its security mechanism. Conventional biometric key release systems store a static key in the hardware that can be illegally captured by attackers via overriding the biometric authentication module. Our protocol overcomes this flaw from following three points: (1) Even in the worst case that an attacker compromise the private key of the PKI which has been stored in the mobile device, it does not help break the system as the attacker has to pass the biometric authentication at the central server in the first place. (2) In our protocol, the session key K bio is generated directly from biometric feature rather than pseudo-random number generator. Hence, K bio is unpredictable. Unless attackers obtain the genuine biometric data, otherwise they are not easy to guess out K bio. (3) We do not store any static symmetric key at either mobile client side or server side. K bio is dynamically generated which means each time a mobile user communicates with the server K bio tends to be different. In our protocol, the biometric and cryptography are seamlessly integrated. Cryptographic key cannot be independently generated without biometric information. Hence, it is robust against Trojan horse attacks Brute force attack In cryptanalysis, a brute force attack is a method of breaking a cryptographic scheme by systematically trying a great number of possibilities. The security strength of an algorithm cannot exceed its key length. In our protocol, K bio is generated from a set of minutia points. Three attributes x, y, and θ of a minutia are used for the design of K bio. Since the mobile environment is quite open, attackers may capture the K bio. There exists a risk that attackers trace K bio back to the original biometric data. To prevent it, we use a non-invertible (cancelable) transformed version of biometric data to generate the K bio. By the sake of computational efficiency we perform a simple transformation R xy = Hash(x y ) mod p (2048 <p<4096) (7) where Hash(x y ), a one-way bijective hash function, is used to increase the randomness. In our implementation, a widely used cryptographic hash function SHA-224 [22] is employed. SHA-224 can generate a 224 bits hash value from an input message. The modulo operation is a noninjective function that can map different inputs to a same R xy. p is a parameter that can be revoked. In real application, we could use time-stamp to generate p. By using different p, the output keys are uncorrelated with others. Both server and client do not require any pre-defined knowledge. For instance, when mobile client transmits an authentication request to the server, the moment t of sending out the message can be recorded and attached on the request message. After successfully verifying the client, the server sends an offset t back to client. Afterward, both server and client use the time t + t to obtain p and then generate the bio-key K bio. After performing Equation (7), the distribution of points become more random, as demonstrated in Figure 2. Generating K bio from R xy is more secure than using x, y directly. If attackers illegally obtain K bio, it is difficult for them to retrieve the original minutiae information from K bio because the process that transform x, y to R xy is noninvertible. In addition, when the system senses an attack, p will be revoked and reset so that a new group of K bio can be generated. Figure 2 illustrates the procedure of convert the raw biometric feature x, y to R xy via hash and modulo operations. The bar chart demonstrates the number of generated R xy falling into different value ranges. It can be observed that
6 Fingerprint based bio-cryptographic security protocol K. Xi et al. Figure 2. Perform hash function and modulo operation on minutia coordinates. the value of generated R xy trend to be evenly distributed. The location relations between each minutiae pair in the original image have been eliminated during Hash--Modulo operation. R xy and θ are expressed using 12-bit and 9-bit stream, respectively. This can be simply achieved by converting the decimal values of R xy and θ to the binary representations. For instance, a minutia (57, 164, 132 ) can be converted to (Hash(057164) mod 3849, 132) = (2846, 132) = ( ) (8) One minutia can contribute 21 bits to K bio. In our protocol, the number of selected minutiae for key generation is Both genuine minutiae and chaff points can be used to generate K bio. The key strength of K bio originating from biometric data is bits. Plus, the string ID usr contributes additional 64 bits (8 bytes). Total key length of K bio is bits, which is considered to be secure enough for popular symmetric schemes such as the AES scheme against brute force attack Biometric template attack In our protocol, K bio originates from fingerprint data, i.e. minutiae coordinates and angles. It is observed that one fingerprint can only contain limited number of minutia points,
7 K. Xi et al. Fingerprint based bio-cryptographic security protocol Figure 3. Insert chaff points evenly. usually If attackers acquire minutiae information successfully, they can narrow down the search range of K bio. In other words, the cryptographic key space created by minutiae points is small. There exist two solutions to solve this problem. One is increasing the total number of minutiae. The other is increasing the difficulty for attackers to capture the minutiae information. In our protocol, the second solution is adopted. We insert a large amount of chaff points (fake minutiae) into a template T so that genuine minutiae and fake minutiae are mixed, yielding the lookup table. In our protocol, the number of chaff points is greater than 200. A mobile device only stores T, without any indication of which nodes are genuine. The security strength of a lookup table is significantly determined by how we mix the inserted chaff points and genuine minutiae. When the overall point distribution trend to be uniform, the maximum information entropy is achieved, i.e. the template is with strongest security. To achieve this goal, we partition a fingerprint area into several small cells, as illustrated in Figure 3. We insert a certain number of chaff points into each cell ensuring that all cells contain same number of points (chaff and genuine). Therefore, the probability of each point being guessed out is the same, yielding the maximum randomness (security strength) of a template. Suppose a fingerprint of a mobile user U has 30 minutiae. The number of chaff minutiae is 300. Authentication threshold n threshold is 8 minutiae. The list L contains 14 minutiae index numbers. The list can provide C = combinations (9) To extract genuine minutiae from T, it is necessary to tried out all combinations. Suppose verifying one combination costs 5 s combinations will take s, around years. As the authentication is conducted in the server side, the number of allowable malicious attempts on such combinations will be further limited as a server can easily detect the anomaly of authentication attempts from the same ID. If an attacker randomly selects 14 points among all 330 points, the probability he passes the authentication test can be calculated as P = 14 i=8 C 330 i C 330 (14 i) C = (10) The Equation (9) and (10) indicate inserting chaff points can effectively prevent attackers obtaining the original biometric data and reduce the probability of illegally gaining access to the system. Thus, it is hard to break the system from biometric template Transmission channel attack The authentication messages exchange between U and Sr cen should be protected against channel attack since the broadcasting nature of mobile network. PKI can provide sufficient protections in terms of information confidentiality and integrity. The private keys ensure only the intended receivers are able to retrieve the original messages from ciphertext. The ECC algorithm employed in our protocol offers high security level without slowing down the system speed and consuming much resource. The 256-bit ECC have the same security level as 3072-bit RSA algorithm which is commonly used in current Internet Replay attack and man-in-the-middle attack Replay attack is prevented by the adoption of timestamps in our protocol. The system is breakable only when an attacker has obtained the private key as well as previous transmitted messages. The L will be broken. Even when this happens, the damage to future communication is limited. This is because there are many different L lists. Repetition of the same L or a couple of L s will be easily detected by the central server, which can trigger an alarm of security compromise. We can also produce a fuzzy template T based on cancelable template technology. This will make it in feasible to derive genuine minutia from L list, which also renders L list cancelable.
8 Fingerprint based bio-cryptographic security protocol K. Xi et al. MITM (man-in-the-middle) attack refers to active eavesdropping where attackers make independent connections and relays messages between legal users. The communication is controlled by attackers while legal users believe that they are talking directly to each other over a private connection. Traditionally, MITM attack can be prevented by using PKI, because in PKI the public keys with respective user identities are bound and stored in a certificate authority (CA). Before conducting encryption, each user is able to verify the public key with CA to ensure it is not from a malicious server. In addition, in the proposed protocol minutia index numbers are transmitted without any information leakage. Even if the PKI (public key infrastructure) has been compromised, the worst case is that malicious server could only obtain the transmitted index number. The final bio-key, used for client-server communication, relies on both index number and fuzzy template T. It means index numbers will be useless if without the possession of the registered fuzzy fingerprint template stored locally inside the client s mobile device and the server. Our protocol does not require to transmit template T hence it is impossible to obtain T using MITM attack. The protocol provides strong security strength. 4. EXPERIMENT The experiment of our proposed protocol consists of two stages. At first, the fingerprint verification algorithm used in our protocol was implemented in Matlab and tested on a PC with public domain database. The main purpose is to estimate the performance of authentication accuracy. In stage two, we evaluate the ECC scheme on Java ME emulator environment in order to investigate its feasibility, resource demand, and computational speed Verification accuracy The fingerprint sample sets we tested are from the NIST Special Database 24 [23] and FVC 2002 DB2 Database [24] Experiment on NIST 24. In this experiment, a subset of five finger subjects was chosen from the distortion set each having 150 different impressions. This results in 750 individual fingerprints in our experiments. In NIST Special Database 24, the livescanned fingerprints are obtained from an optical scanner of resolution 500 dpi with original dimension of pixels. For convenience, the selected fingerprints were first properly cropped, downsized via averaging and zero padding to a new size of We use four training impressions to generate one template. Firstly, we aligned training impressions according to their singular points. Then we take the union of minutiae in four training impressions as the template T. InT, if one minutia m i is too close to another m j, i.e. the distance d(m i,m j ) d threshold and θ(m i,m j ) θ threshold, m i and m j will be merged ( to a new minutia point m k, where (xi +x m k is defined as j ), (y i+y j ),θ 2 2 i ). On the other hand, we require that a user imprint the finger three times for authentication. Three test impressions will be combined to generate one test minutiae set Q. The procedure of minutiae combination is different from the procedure of generating template. Here we cross match the three query impressions to find all matched minutiae. Q only includes the matched minutiae so unmatched minutiae are discarded. This aim to ensure only the reliable minutiae can participate in the following matching process. For each subject, 100 templates were generated via selecting different combinations of training images. For each template, we randomly selected 40 impressions from the same subject as genuine test and 160 impressions from the rest four subjects (40 impressions from each) as imposter test. Therefore, a total of = genuine tests and = imposter tests were performed. The authentication accuracy of a biometric system can be assessed by several metrics. Two commonly used ones are false acceptance rate (FAR) and false rejection rate (FRR). Traditionally, FAR is defined as the ratio of the number of incorrectly accepted impostor tests to the total number of impostor tests. FRR is the ration of the number of incorrectly rejected genuine tests to the total number of genuine tests. Mobile device needs to make a selection from all matched minutiae. As L 0 is bigger than L, there exist many possible L lists derived from L 0. From these combinations the numbers of false acceptance authentication test results and false rejection authentication test results can be calculated. For each matching result, we calculate the probability of a genuine user/imposter passes the authentication test. We redefine the FAR and FRR as: FAR = FRR = Probability of a impostor passes a test Total number of impostor tests Probability of a genuine test be rejected Total number of genuine tests (11) (12) Figure 4 plots a set of FAR--FRR pairs produced by the authentication scheme of the proposed protocol with different matching threshold. As the threshold increases, the FAR decreases while FRR increases. The three curves describe the situation that 10, 12, 14, 16 minutiae are selected and sent to the central server. As can be seen, the more minutiae selected, the better authentication performance achieved. Since the total number of minutiae varies from one finger to another, different fingerprint may show different performance. Thus, in addition to overall system performance curve, we also conduct tests for each subject, respectively. The ROC curves are as shown in figures.
9 K. Xi et al. Fingerprint based bio-cryptographic security protocol Figure 4. ROC Curves of different number of selected minutiae. Figure 7. ROC curves of the subject fm pm3 5. Figure 5. ROC curves of the subject fm pm0 5. Figures 5--9 indicate that the performance improves when the number of selected minutiae increases. We consider two situations. One is when FAR and FRR tend to be equal and one is when FAR = 0.01%. The results are summarized in Table I. Figure 8. ROC curves of the subject fm pm Experiment on FVC FVC2002-DB2 contains 800 live-scanned fingerprints (100 fingers each give 8 different impressions) in total. All images are captured by an optical sensor with a resolution of 500 dpi. In the experiment we chose impression NO.1, 2, 7, 8 for our experiments. Impression 3, 4, 5, and 6 in this database were obtained by requesting users to provide fingerprints with exaggerated displacement and rotation [25]. It makes sense that the users are willing to provide good Figure 6. ROC curves of the subject fm pm2 5. Figure 9. ROC curves of the subject fm pm5 5.
10 Fingerprint based bio-cryptographic security protocol K. Xi et al. Table I. Matching performance for different subjects Number of EER FRR when Subject select minutiae (FAR = FRR) % FAR = 0.01% % fm pm fm pm fm pm fm pm fm pm Figure 10. Performance result on FVC 2002 database. Figure 11. GAR with FAR = 0.1%. quality biometric information to the server. Hence, it is reasonable that impression 3, 4, 5, and 6 were not considered for our experiment. The experimental process is slightly different from the one we conducted on NIST 24. This time we tested the GAR against FAR under different value of d threshold. For one subject, two impressions were combined to generate a template and the other two impressions are for a test. There were 3454 genuine tests and imposter tests in total. The minutiae combination process was conducted with the help of commercial fingerprint software Verifinger 5.0, in order to achieve the best registration effect. When generating either template or test sample, verifinger can help align two training impressions. In real application, this alignment operation can be done by hardware, for instance UPEK TCS5B [17]. In Figure 10, the genuine acceptance rate is plotted against false acceptance rate. The four curves are corresponding to the situation that d threshold = 8, d threshold = 10, d threshold = 12, and d threshold = 14, respectively. In theory, increasing the threshold d threshold would result in that more genuine users and imposters are accepted by the system, yielding high GAR and FAR. However, in our experiment higher FAR were not observed when bigger d threshold values were used. We believe that it is due to the usage of multiple impressions. The process of combining (find intersection) two impressions, in fact, eliminates the specious minutiae and significantly reduces the probability of the specious minutiae randomly match the template. Figure 11 demonstrates the GAR at FAR = 0.1%. GAR = 78.69% is achieved when d threshold = 14. We believe the performance is at an acceptable level. Better authentication accuracy can be achieved when more sophisticated image registration and matching algorithms are employed Resource demand and speed in Java ME Java Platform, Micro Edition (Java ME) is one of most popular mobile application development technology designed for mobile devices such as mobile phones. A major advantage of Java ME is its cross-platform nature which means the same source code can be executed on all platforms without modification. The Java ME platform has two versions [26], one for general mobile devices, named the Connected Limited Device Configuration (CLDC), and the other one for more capable mobile devices like smart-phones and set top boxes, named the Connected Device Profile (CDC). Our application is deployed based on CLDC because CLDC is more popular and is widely supported by nearly all Java-enabled mobile phones. We were using Sun Java Wireless Toolkit (WTK) 2.5 emulator as the development and test platform. WTK provides a perfect support to the latest Java ME CLDC technology and Mobile Information Device Profile (MIDP 2.0).
11 K. Xi et al. Fingerprint based bio-cryptographic security protocol Table II. Computational time of messages with different lengths ECC Encryption 256 bit message ECC Encryption 2700 bit message ECC Decryption 256 bit message ECC Decryption 2700 bit message Java ME (mobile-end application) Java SE (server-end application) 1.36 s s s 1.33 s 0.46 s s 8.21 s s We implemented the ECC from the scratch. A few basic functions in the open-source cryptographic libraries [27] have been utilized, to handle cryptography-related operations such as mathematical operations over the Galois Field. The domain parameter of ECC we used is secp256v1 which is specified in Reference [28]. One template is allowed to have up to 1024 minutiae therefore the minutiae index number can be represented by a 10-bit stream. If 16 minutiae are selected and transmitted to central servers, the length of a message is 256 bits (160 bit minutiae information, 64 bit user ID, and 32 bit time stamp). Note that publickey cryptography is sensitive to the message length. In real application, public-key algorithm is only applied in encrypting short-length messages. Transmitting the proposed bio-information (minutiae index number, user ID, and time stamp) is more computation efficient than raw minutiae information. In our experiment we compared the computational speed of encrypting/decrypting 256 bit message with the speed of operating on 2700 bits (raw minutiae information), as shown below. Besides Java ME, Java SE implementation has also been tested, as the simulation of encryption/decryption process on the server-side. In the Table II, it is apparent that encrypting/decrypting 2700 bit message consumes over 10 times longer time than 256 bit message. Assume in a real scenario that a server with 1000 simultaneous incoming requests, the processing time of handle 2700 bit message will be s 1000 = 743 s 13 min, which would likely incur a system timeout and show no-response to mobile client. If using the proposed 256 bit message, the processing time will be s 1000 = 42 s, which become quite acceptable. In addition, average memory usage is 1.14 MB where most recent mobile phones support more than 10 MB memory. It can be seen that the computational speed and resource demand are within acceptable range for both mobile client and server. 5. CONCLUSIONS We have presented a bio-cryptographic security protocol designed for client-server authentication in mobile computing environment. Different from existing key binding and key release schemes, user authentication of our protocol is conducted remotely at the server side. The proposed scheme assumes that the server is secure which is a common practice in most client-server applications. In order to handle different types of attacks, we designed or adopted different security mechanisms: ECC PKI is used to protect authentication process. Fuzzy template is proposed to secure the genuine biometric feature against attacks. The bio-key, dynamically generated from fingerprint, is designed to protect communication between client and server after successful authentication. Performance evaluation on NIST 24 database shows a reasonable matching accuracy has been achieved. The implementation on Java ME emulator proves the proposed protocol satisfies the resource-constrained mobile devices. Future work includes adopting more sophisticated fingerprint matching algorithm and cancelable biometric template protection schemes. ACKNOWLEDGEMENTS This paper is support by ARC (Australia Research Council) Discovery Grant DP REFERENCES 1. Shaw K. Data on PDAs mostly unprotected. Network World Fusion. Available from Rivest RL, Shamir A, Adleman L. A method for obtaining digital signatures and public-key cryptosystems. Communications of the ACM 1978; 21(2): Koblitz N. Elliptic curve cryptosystems, Mathematics of Computation 48, 1987; Miller V. Use of elliptic curves in cryptography, CRYPTO 85, Maltoni D, Maio D, Jain AK, Prabhakar S. Handbook of Fingerprint Recognition. Springer-Verlag: New York, Soutar C, Roberge D, Stojanov SA, Gilroy R, Vijaya Kumar BVK. Biometric encryption - enrollment and verification procedures. Proceedings of SPIE, Optical Pattern Recognition IX 1998; 3386: Soutar C, Roberge D, Stojanov SA, Gilroy R, Vijaya Kumar BVK. Biometric encryption using image processing. Proceedings of SPIE, Optical Security and Counterfeit Deterrence Techniques II, 1998; 3314: Soutar C, Roberge D, Stojanov SA, Gilroy R, Vijaya Kumar BVK. Biometric encryption. In ICSA Guide to Cryptography Nichols RK (ed.). McGraw Hill, New York, Teoh A, Goh A, Ngo D. Random multispace quantization as an analytic mechanism for biohashing of biometric and random identity inputs. IEEE Transactions on Pat-
12 Fingerprint based bio-cryptographic security protocol K. Xi et al. tern Analysis and Machine Intelligence 2006; 28(12): Savvides M, Vijayakumar B. Cancellable Biometric Filters forface Recognition. Proceedings of IEEE International Conference Pattern Recognition, volume 3, pages , Cambridge, UK, August Ratha N, Chikkerur S, Connell J, Bolle R. Generating Cancelable Fingerprint Templates. IEEE Transactions on Pattern Analysis and Machine Intelligence 2007; 29(4): Teoh A, Toh K, Yip W. 2N Discretisation of BioPhasor in Cancellable Biometrics, Proceedings of Second International Conference on Biometrics, Seoul, South Korea, 2007; Dodis Y, Ostrovsky R, Reyzin L, Smith A. Fuzzy extractors: how to generate strong keys from biometrics and other noisy data. SIAM Journal of Computing 2008; 38(1): Juels A, Sudan M. A fuzzy vault scheme. In Lapidoth A, Teletar E (eds). Proceedings of IEEE International Symposium on Information Theory, 2002; Uludag U, Pankanti S, Jain AK. Fuzzy vault for fingerprints, Proceedings of Audio- and Video-based Biometric Person Authentication. Rye Town: USA, 2005; Xi K, Hu J. Biometric mobile template protection: a composite feature based fingerprint fuzzy vault, IEEE International Conference on Communications, Dresden, Germany, sensors.asp avnetexpress.avnet.com/store/em/emcontroller/sensorsand-transducers-misc/upek/tcs5bb6a0/ /R /A /An-0?action=part& catalogid=500201& langid=-1& storeid= Wang Y, Hu J, Phillips D. A fingerprint orientation model based on 2D Fourier expansion (FOMFE) and its application to singular-point detection and fingerprint indexing. IEEE Transactions on PAMI 2007; 29(4): FIPS : Secure Hash Standard (SHS) 25 February Watson. NIST special database 24, live-scan digital video fingerprint database. Technical report, U.S. National Institute of Standards and Technology, Maio D, Maltoni D, Cappelli R, Wayman JL, Jain AK. FV C2002: Second Fingerprint Verification Competition, ICPR, vol. 3, pp , 16th International Conference on Pattern Recognition (ICPR 02) Volume 3, Nandakumar K, Jain AK, Pankanti S. Fingerprint-based Fuzzy Vault: Implementation and Performance, IEEE Transactions on on Informatics Forensics and Security, vol. 2, no. 4, pp , December Sun Website, URL: java.sun.com Bouncy Castle. Lightweight API, The Legion of the Bouncy Castle, Certicom. SEC 2: Recommended Elliptic Curve Domain Parameters, Certicom Corp., Ahmad T, Hu J, Han S. Efficient Mobile Voting System Security Scheme based on Elliptic Curve Cryptography, International Workshop on Intelligent Decision Support Systems and Applications in Networked and Distributed Systems, IEEE 3rd International Conference on Network & System Security (NSS09), Gold Coast, Australia, October 2009; Han F, Hu J, Yu X, Feng Y, Zhou J. A novel hybrid crypto-biometric authentication scheme for ATM based banking applications, IAPR International Conference on Biometrics (ICB2006), Hong Kong China, 5-7 January, Published at Lecture Notes in Computer Science, Springer, vol. 3832/2005, 2005; Mahmood A, Hu J, Tari Z, Leckie C. Critical infrastructure protection: Resource efficient sampling to improve detection of less frequent patterns in network traffic. Journal of Network and Computer Applications, Elsevier, Wang Y and Hu J. Global Ridge Orientation Modelling for Partial Fingerprint Identification. IEEE Transactions on Pattern Analysis and Machine Intelligence, Hu J, Chen H.H., Hou T.W. A hybrid public key infrastructure solution (HPKI) for HIPAA privacy/security regulations. Special Issue on Information and Communications Security, Privacy and Trust: Standards and Regulations. Computer Standards & Interfaces, Elsevier, Hoang X.D, Hu J, Bertok P. A Program based anomaly intrusion detection scheme using multiple detection engines and fuzzy inference. Journal of Network and Computer Applications, Elsevier, 32 (2009) Hu J, and Han F. A pixel-based scrambling scheme for digital medical images protection. Journal of Network and Computer Applications, Elsevier, 32(2009) Hu J, Qiu D, Chen H.H., Yu X. A simple and efficient data processing scheme for HMM based anomaly intrusion detection. Special Issue of Advances on Network Intrusion Detection. IEEE Network, vol.23, no.1, January, 2009, pp Hu J and Zambetta F, Security issues in massive online games, Journal of Security and Communication Networks, John Wiley, Issue 1, 2008, pp
13 K. Xi et al. Fingerprint based bio-cryptographic security protocol 38. Wang Y, Hu J, Han F. Enhanced gradient-based algorithm for the estimation of fingerprint orientation field. Applied Mathematics and Computation, Elsevier, Vol. 185, No. 2, pp , Feb Han F, Hu J, Yu X, Wang Y. Fingerprint images encryption via multi-scroll chaotic attractors. Applied Mathematics and Computation, Elsevier, Vol. 185, pp , Han F, Yu X, Feng Y, Hu J. On multi-scroll chaotic attractors in hysteresis-based piecewise linear systems. IEEE Transactions on Circuits and Systems-II, Vol. 54, Issue 11, Nov. 2007, pp
Analysis of Multimodal Biometric Fusion Based Authentication Techniques for Network Security
, pp. 239-246 http://dx.doi.org/10.14257/ijsia.2015.9.4.22 Analysis of Multimodal Biometric Fusion Based Authentication Techniques for Network Security R.Divya #1 and V.Vijayalakshmi #2 #1 Research Scholar,
Application-Specific Biometric Templates
Application-Specific Biometric s Michael Braithwaite, Ulf Cahn von Seelen, James Cambier, John Daugman, Randy Glass, Russ Moore, Ian Scott, Iridian Technologies Inc. Introduction Biometric technologies
Review Article Biometric Template Security
Hindawi Publishing Corporation EURASIP Journal on Advances in Signal Processing Volume 2008, Article ID 579416, 17 pages doi:10.1155/2008/579416 Review Article Biometric Template Security Anil K. Jain,
Mathematical Model Based Total Security System with Qualitative and Quantitative Data of Human
Int Jr of Mathematics Sciences & Applications Vol3, No1, January-June 2013 Copyright Mind Reader Publications ISSN No: 2230-9888 wwwjournalshubcom Mathematical Model Based Total Security System with Qualitative
Application of Biometrics to Obtain High Entropy Cryptographic Keys
1 Application of Biometrics to Obtain High Entropy Cryptographic Keys Sanjay Kanade, Danielle Camara, Dijana Petrovska-Delacrétaz, and Bernadette Dorizzi Abstract In this paper, a two factor scheme is
Multimodal Biometric Recognition Security System
Multimodal Biometric Recognition Security System Anju.M.I, G.Sheeba, G.Sivakami, Monica.J, Savithri.M Department of ECE, New Prince Shri Bhavani College of Engg. & Tech., Chennai, India ABSTRACT: Security
CRYPTOGRAPHY IN NETWORK SECURITY
ELE548 Research Essays CRYPTOGRAPHY IN NETWORK SECURITY AUTHOR: SHENGLI LI INSTRUCTOR: DR. JIEN-CHUNG LO Date: March 5, 1999 Computer network brings lots of great benefits and convenience to us. We can
Final Exam. IT 4823 Information Security Administration. Rescheduling Final Exams. Kerberos. Idea. Ticket
IT 4823 Information Security Administration Public Key Encryption Revisited April 5 Notice: This session is being recorded. Lecture slides prepared by Dr Lawrie Brown for Computer Security: Principles
Two-Factor Authentication or How to Potentially Counterfeit Experimental Results in Biometric Systems
Two-Factor Authentication or How to Potentially Counterfeit Experimental Results in Biometric Systems Christian Rathgeb and Andreas Uhl University of Salzburg, Department of Computer Sciences, A-5020 Salzburg,
Smart Card- An Alternative to Password Authentication By Ahmad Ismadi Yazid B. Sukaimi
Smart Card- An Alternative to Password Authentication By Ahmad Ismadi Yazid B. Sukaimi Purpose This paper is intended to describe the benefits of smart card implementation and it combination with Public
Multimedia Document Authentication using On-line Signatures as Watermarks
Multimedia Document Authentication using On-line Signatures as Watermarks Anoop M Namboodiri and Anil K Jain Department of Computer Science and Engineering Michigan State University East Lansing, MI 48824
Authentication Scheme for ATM Based On Biometric K. Kavitha, II-MCA IFET COLLEGE OF ENGINEERING DEPARTMENT OF COMPUTER APPLICATIONS
Authentication Scheme for ATM Based On Biometric K. Kavitha, II-MCA IFET COLLEGE OF ENGINEERING DEPARTMENT OF COMPUTER APPLICATIONS ABSTRACT: Biometrics based authentication is a potential candidate to
Single Sign-On Secure Authentication Password Mechanism
Single Sign-On Secure Authentication Password Mechanism Deepali M. Devkate, N.D.Kale ME Student, Department of CE, PVPIT, Bavdhan, SavitribaiPhule University Pune, Maharashtra,India. Assistant Professor,
A Proxy-Based Data Security Solution in Mobile Cloud
, pp. 77-84 http://dx.doi.org/10.14257/ijsia.2015.9.5.08 A Proxy-Based Data Security Solution in Mobile Cloud Xiaojun Yu 1,2 and Qiaoyan Wen 1 1 State Key Laboratory of Networking and Switching Technology,
Contents. Identity Assurance (Scott Rea Dartmouth College) IdM Workshop, Brisbane Australia, August 19, 2008
Identity Assurance (Scott Rea Dartmouth College) IdM Workshop, Brisbane Australia, August 19, 2008 Contents Authentication and Identity Assurance The Identity Assurance continuum Plain Password Authentication
MULTIMEDIA CONTENT PROTECTION VIA BIOMETRICS-BASED ENCRYPTION. Umut Uludag and Anil K. Jain
Copyright 22 IEEE. Published in the 23 International Conference on Multimedia and Expo (ICME 23), scheduled for July 6-9, 23 in Baltimore, Maryland, SA. Personal use of this material is permitted. However,
Chapter 11 Security+ Guide to Network Security Fundamentals, Third Edition Basic Cryptography
Chapter 11 Security+ Guide to Network Security Fundamentals, Third Edition Basic Cryptography What Is Steganography? Steganography Process of hiding the existence of the data within another file Example:
22 nd NISS Conference
22 nd NISS Conference Submission: Topic: Keywords: Author: Organization: Tutorial BIOMETRICS - DEVELOPING THE ARCHITECTURE, API, ENCRYPTION AND SECURITY. INSTALLING & INTEGRATING BIOMETRIC SYSTEMS INTO
Network Security. Computer Networking Lecture 08. March 19, 2012. HKU SPACE Community College. HKU SPACE CC CN Lecture 08 1/23
Network Security Computer Networking Lecture 08 HKU SPACE Community College March 19, 2012 HKU SPACE CC CN Lecture 08 1/23 Outline Introduction Cryptography Algorithms Secret Key Algorithm Message Digest
CIS 6930 Emerging Topics in Network Security. Topic 2. Network Security Primitives
CIS 6930 Emerging Topics in Network Security Topic 2. Network Security Primitives 1 Outline Absolute basics Encryption/Decryption; Digital signatures; D-H key exchange; Hash functions; Application of hash
Identity theft is a growing concern
IDENTITY SCIENCES Authentication: System Security and User Privacy Anil K. Jain Michigan State University Karthik Nandakumar Institute for Infocomm Research, Singapore While biometric systems aren t foolproof,
CSC 474 -- Network Security. User Authentication Basics. Authentication and Identity. What is identity? Authentication: verify a user s identity
CSC 474 -- Network Security Topic 6.2 User Authentication CSC 474 Dr. Peng Ning 1 User Authentication Basics CSC 474 Dr. Peng Ning 2 Authentication and Identity What is identity? which characteristics
Designing a Secure Client-Server System Master of Science Thesis in the Programme Software Engineering & Technology
Designing a Secure Client-Server System Master of Science Thesis in the Programme Software Engineering & Technology FREDRIK ANDERSSON Department of Computer Science and Engineering CHALMERS UNIVERSITY
Overview. SSL Cryptography Overview CHAPTER 1
CHAPTER 1 Note The information in this chapter applies to both the ACE module and the ACE appliance unless otherwise noted. The features in this chapter apply to IPv4 and IPv6 unless otherwise noted. Secure
Digital Identity & Authentication Directions Biometric Applications Who is doing what? Academia, Industry, Government
Digital Identity & Authentication Directions Biometric Applications Who is doing what? Academia, Industry, Government Briefing W. Frisch 1 Outline Digital Identity Management Identity Theft Management
SECURITY IMPROVMENTS TO THE DIFFIE-HELLMAN SCHEMES
www.arpapress.com/volumes/vol8issue1/ijrras_8_1_10.pdf SECURITY IMPROVMENTS TO THE DIFFIE-HELLMAN SCHEMES Malek Jakob Kakish Amman Arab University, Department of Computer Information Systems, P.O.Box 2234,
Dynamic Query Updation for User Authentication in cloud Environment
Dynamic Query Updation for User Authentication in cloud Environment Gaurav Shrivastava 1, Dr. S. Prabakaran 2 1 Research Scholar, Department of Computer Science, SRM University, Kattankulathur, Tamilnadu,
The Feasibility and Application of using a Zero-knowledge Protocol Authentication Systems
The Feasibility and Application of using a Zero-knowledge Protocol Authentication Systems Becky Cutler [email protected] Mentor: Professor Chris Gregg Abstract Modern day authentication systems
Key Hopping A Security Enhancement Scheme for IEEE 802.11 WEP Standards
White Paper Key Hopping A Security Enhancement Scheme for IEEE 802.11 WEP Standards By Dr. Wen-Ping Ying, Director of Software Development, February 2002 Introduction Wireless LAN networking allows the
Lecture 9: Application of Cryptography
Lecture topics Cryptography basics Using SSL to secure communication links in J2EE programs Programmatic use of cryptography in Java Cryptography basics Encryption Transformation of data into a form that
7 Network Security. 7.1 Introduction 7.2 Improving the Security 7.3 Internet Security Framework. 7.5 Absolute Security?
7 Network Security 7.1 Introduction 7.2 Improving the Security 7.3 Internet Security Framework 7.4 Firewalls 7.5 Absolute Security? 7.1 Introduction Security of Communications data transport e.g. risk
A Generic Framework for Three-Factor Authentication
A Generic Framework for Three-Factor Authentication Jiangshan Yu 1 Guilin Wang 2 Yi Mu 2 Wei Gao 3 1 School of Computer Science University of Birmingham, UK 2 School of Computer Science and Software Engineering
Design and Analysis of Methods for Signing Electronic Documents Using Mobile Phones
Design and Analysis of Methods for Signing Electronic Documents Using Mobile Phones Pramote Kuacharoen School of Applied Statistics National Institute of Development Administration 118 Serithai Rd. Bangkapi,
Overview of Cryptographic Tools for Data Security. Murat Kantarcioglu
UT DALLAS Erik Jonsson School of Engineering & Computer Science Overview of Cryptographic Tools for Data Security Murat Kantarcioglu Pag. 1 Purdue University Cryptographic Primitives We will discuss the
Cryptographic key generation using handwritten signature
Cryptographic key generation using handwritten signature M. Freire-Santos a, J. Fierrez-Aguilar a, J. Ortega-Garcia a a ATVS-Biometrics Research Lab., Escuela Politecnica Superior, Universidad Autonoma
Advanced Authentication
White Paper Advanced Authentication Introduction In this paper: Introduction 1 User Authentication 2 Device Authentication 3 Message Authentication 4 Advanced Authentication 5 Advanced Authentication is
Development of Attendance Management System using Biometrics.
Development of Attendance Management System using Biometrics. O. Shoewu, Ph.D. 1,2* and O.A. Idowu, B.Sc. 1 1 Department of Electronic and Computer Engineering, Lagos State University, Epe Campus, Nigeria.
addressed. Specifically, a multi-biometric cryptosystem based on the fuzzy commitment scheme, in which a crypto-biometric key is derived from
Preface In the last decade biometrics has emerged as a valuable means to automatically recognize people, on the base is of their either physiological or behavioral characteristics, due to several inherent
Overview of CSS SSL. SSL Cryptography Overview CHAPTER
CHAPTER 1 Secure Sockets Layer (SSL) is an application-level protocol that provides encryption technology for the Internet, ensuring secure transactions such as the transmission of credit card numbers
Part I. Universität Klagenfurt - IWAS Multimedia Kommunikation (VK) M. Euchner; Mai 2001. Siemens AG 2001, ICN M NT
Part I Contents Part I Introduction to Information Security Definition of Crypto Cryptographic Objectives Security Threats and Attacks The process Security Security Services Cryptography Cryptography (code
User Authentication using Combination of Behavioral Biometrics over the Touchpad acting like Touch screen of Mobile Device
2008 International Conference on Computer and Electrical Engineering User Authentication using Combination of Behavioral Biometrics over the Touchpad acting like Touch screen of Mobile Device Hataichanok
A secure email login system using virtual password
A secure email login system using virtual password Bhavin Tanti 1,Nishant Doshi 2 1 9seriesSoftwares, Ahmedabad,Gujarat,India 1 {[email protected]} 2 SVNIT, Surat,Gujarat,India 2 {[email protected]}
Application of Automatic Variable Password Technique in Das s Remote System Authentication Scheme Using Smart Card
Application of Automatic Variable Password Technique in Das s Remote System Authentication Scheme Using Smart Card C. Koner, Member, IACSIT, C. T. Bhunia, Sr. Member, IEEE and U. Maulik, Sr. Member, IEEE
Connected from everywhere. Cryptelo completely protects your data. Data transmitted to the server. Data sharing (both files and directory structure)
Cryptelo Drive Cryptelo Drive is a virtual drive, where your most sensitive data can be stored. Protect documents, contracts, business know-how, or photographs - in short, anything that must be kept safe.
Efficient construction of vote-tags to allow open objection to the tally in electronic elections
Information Processing Letters 75 (2000) 211 215 Efficient construction of vote-tags to allow open objection to the tally in electronic elections Andreu Riera a,,joseprifà b, Joan Borrell b a isoco, Intelligent
Biometric Authentication Platform for a Safe, Secure, and Convenient Society
472 Hitachi Review Vol. 64 (2015), No. 8 Featured Articles Platform for a Safe, Secure, and Convenient Society Public s Infrastructure Yosuke Kaga Yusuke Matsuda Kenta Takahashi, Ph.D. Akio Nagasaka, Ph.D.
Content Teaching Academy at James Madison University
Content Teaching Academy at James Madison University 1 2 The Battle Field: Computers, LANs & Internetworks 3 Definitions Computer Security - generic name for the collection of tools designed to protect
Design Notes for an Efficient Password-Authenticated Key Exchange Implementation Using Human-Memorable Passwords
Design Notes for an Efficient Password-Authenticated Key Exchange Implementation Using Human-Memorable Passwords Author: Paul Seymer CMSC498a Contents 1 Background... 2 1.1 HTTP 1.0/1.1... 2 1.2 Password
Associate Prof. Dr. Victor Onomza Waziri
BIG DATA ANALYTICS AND DATA SECURITY IN THE CLOUD VIA FULLY HOMOMORPHIC ENCRYPTION Associate Prof. Dr. Victor Onomza Waziri Department of Cyber Security Science, School of ICT, Federal University of Technology,
Capture Resilient ElGamal Signature Protocols
Capture Resilient ElGamal Signature Protocols Hüseyin Acan 1, Kamer Kaya 2,, and Ali Aydın Selçuk 2 1 Bilkent University, Department of Mathematics [email protected] 2 Bilkent University, Department
IDRBT Working Paper No. 11 Authentication factors for Internet banking
IDRBT Working Paper No. 11 Authentication factors for Internet banking M V N K Prasad and S Ganesh Kumar ABSTRACT The all pervasive and continued growth being provided by technology coupled with the increased
A PERFORMANCE EVALUATION OF COMMON ENCRYPTION TECHNIQUES WITH SECURE WATERMARK SYSTEM (SWS)
A PERFORMANCE EVALUATION OF COMMON ENCRYPTION TECHNIQUES WITH SECURE WATERMARK SYSTEM (SWS) Ashraf Odeh 1, Shadi R.Masadeh 2, Ahmad Azzazi 3 1 Computer Information Systems Department, Isra University,
Security Analysis of PLAID
Security Analysis of PLAID Dai Watanabe 1 Yokoyama Laboratory, Hitachi, Ltd., 292 Yoshida-cho, Totsuka-ku, Yokohama, 244-0817, Japan [email protected] Abstract. PLAID is a mutual authentication
Digital Certificates (Public Key Infrastructure) Reshma Afshar Indiana State University
Digital Certificates (Public Key Infrastructure) Reshma Afshar Indiana State University October 2015 1 List of Figures Contents 1 Introduction 1 2 History 2 3 Public Key Infrastructure (PKI) 3 3.1 Certificate
Chapter 23. Database Security. Security Issues. Database Security
Chapter 23 Database Security Security Issues Legal and ethical issues Policy issues System-related issues The need to identify multiple security levels 2 Database Security A DBMS typically includes a database
Keywords Cloud Storage, Error Identification, Partitioning, Cloud Storage Integrity Checking, Digital Signature Extraction, Encryption, Decryption
Partitioning Data and Domain Integrity Checking for Storage - Improving Cloud Storage Security Using Data Partitioning Technique Santosh Jogade *, Ravi Sharma, Prof. Rajani Kadam Department Of Computer
Fingerprint-based crypto-biometric system for network security
Barman et al. EURASIP Journal on Information Security (2015) 2015:3 DOI 10.1186/s13635-015-0020-1 RESEARCH Open Access Fingerprint-based crypto-biometric system for network security Subhas Barman 1, Debasis
Dr. Jinyuan (Stella) Sun Dept. of Electrical Engineering and Computer Science University of Tennessee Fall 2010
CS 494/594 Computer and Network Security Dr. Jinyuan (Stella) Sun Dept. of Electrical Engineering and Computer Science University of Tennessee Fall 2010 1 Introduction to Cryptography What is cryptography?
INVESTIGATIVE STUDY FOR ENHANCING SECURITY, PRIVACY USING AMBIENT INTELLIGENCE IN CONTEXT SENSITIVE SYSTEMS
INVESTIGATIVE STUDY FOR ENHANCING SECURITY, PRIVACY USING AMBIENT INTELLIGENCE IN CONTEXT SENSITIVE SYSTEMS Vijayakranthi Chinthala 1, Manas Kumar Yogi 2 1 M.Tech Scholar Department of Computer Science
White Paper. Enhancing Website Security with Algorithm Agility
ENHANCING WEBSITE SECURITY WITH ALGORITHM AGILITY White Paper Enhancing Website Security with Algorithm Agility Enhancing Website Security with Algorithm Agility Contents Introduction 3 Encryption Today
Chapter 23. Database Security. Security Issues. Database Security
Chapter 23 Database Security Security Issues Legal and ethical issues Policy issues System-related issues The need to identify multiple security levels 2 Database Security A DBMS typically includes a database
Security Levels for Web Authentication using Mobile Phones
Security Levels for Web Authentication using Mobile Phones Anna Vapen and Nahid Shahmehri Department of computer and information science Linköpings universitet, SE-58183 Linköping, Sweden {annva,nahsh}@ida.liu.se
1720 - Forward Secrecy: How to Secure SSL from Attacks by Government Agencies
1720 - Forward Secrecy: How to Secure SSL from Attacks by Government Agencies Dave Corbett Technical Product Manager Implementing Forward Secrecy 1 Agenda Part 1: Introduction Why is Forward Secrecy important?
DRAFT Standard Statement Encryption
DRAFT Standard Statement Encryption Title: Encryption Standard Document Number: SS-70-006 Effective Date: x/x/2010 Published by: Department of Information Systems 1. Purpose Sensitive information held
Common Pitfalls in Cryptography for Software Developers. OWASP AppSec Israel July 2006. The OWASP Foundation http://www.owasp.org/
Common Pitfalls in Cryptography for Software Developers OWASP AppSec Israel July 2006 Shay Zalalichin, CISSP AppSec Division Manager, Comsec Consulting [email protected] Copyright 2006 - The OWASP
Cryptography and Network Security Prof. D. Mukhopadhyay Department of Computer Science and Engineering Indian Institute of Technology, Kharagpur
Cryptography and Network Security Prof. D. Mukhopadhyay Department of Computer Science and Engineering Indian Institute of Technology, Kharagpur Module No. # 01 Lecture No. # 02 Overview on Modern Cryptography
Longmai Mobile PKI Solution
Longmai Mobile PKI Solution A quick Solution to External and Internal fraud in Insurance Industry Putting the client at the center of modernization Contents 1. INTRODUCTION... 3 1.1 Challenges... 3 1.2
PrivyLink Internet Application Security Environment *
WHITE PAPER PrivyLink Internet Application Security Environment * The End-to-end Security Solution for Internet Applications September 2003 The potential business advantages of the Internet are immense.
Secure Group Oriented Data Access Model with Keyword Search Property in Cloud Computing Environment
Secure Group Oriented Data Access Model with Keyword Search Property in Cloud Computing Environment Chih Hung Wang Computer Science and Information Engineering National Chiayi University Chiayi City 60004,
159.334 Computer Networks. Network Security 1. Professor Richard Harris School of Engineering and Advanced Technology
Network Security 1 Professor Richard Harris School of Engineering and Advanced Technology Presentation Outline Overview of Identification and Authentication The importance of identification and Authentication
Fingerprint s Core Point Detection using Gradient Field Mask
Fingerprint s Core Point Detection using Gradient Field Mask Ashish Mishra Assistant Professor Dept. of Computer Science, GGCT, Jabalpur, [M.P.], Dr.Madhu Shandilya Associate Professor Dept. of Electronics.MANIT,Bhopal[M.P.]
Savitribai Phule Pune University
Savitribai Phule Pune University Centre for Information and Network Security Course: Introduction to Cyber Security / Information Security Module : Pre-requisites in Information and Network Security Chapter
May 2010. For other information please contact:
access control biometrics user guide May 2010 For other information please contact: British Security Industry Association t: 0845 389 3889 f: 0845 389 0761 e: [email protected] www.bsia.co.uk Form No. 181.
The Misuse of RC4 in Microsoft Word and Excel
The Misuse of RC4 in Microsoft Word and Excel Hongjun Wu Institute for Infocomm Research, Singapore [email protected] Abstract. In this report, we point out a serious security flaw in Microsoft
WHITE PAPER Usher Mobile Identity Platform
WHITE PAPER Usher Mobile Identity Platform Security Architecture For more information, visit Usher.com [email protected] Toll Free (US ONLY): 1 888.656.4464 Direct Dial: 703.848.8710 Table of contents Introduction
Secure cloud access system using JAR ABSTRACT:
Secure cloud access system using JAR ABSTRACT: Cloud computing enables highly scalable services to be easily consumed over the Internet on an as-needed basis. A major feature of the cloud services is that
Research Article. Research of network payment system based on multi-factor authentication
Available online www.jocpr.com Journal of Chemical and Pharmaceutical Research, 2014, 6(7):437-441 Research Article ISSN : 0975-7384 CODEN(USA) : JCPRC5 Research of network payment system based on multi-factor
Mobile Office Security Requirements for the Mobile Office
Mobile Office Security Requirements for the Mobile Office [email protected] Alcatel SEL AG 20./21.06.2001 Overview Security Concepts in Mobile Networks Applications in Mobile Networks Mobile Terminal used
VICTORIA UNIVERSITY OF WELLINGTON Te Whare Wānanga o te Ūpoko o te Ika a Māui
VICTORIA UNIVERSITY OF WELLINGTON Te Whare Wānanga o te Ūpoko o te Ika a Māui School of Engineering and Computer Science Te Kura Mātai Pūkaha, Pūrorohiko PO Box 600 Wellington New Zealand Tel: +64 4 463
Security in Android apps
Security in Android apps Falco Peijnenburg (3749002) August 16, 2013 Abstract Apps can be released on the Google Play store through the Google Developer Console. The Google Play store only allows apps
Mobile OTPK Technology for Online Digital Signatures. Dec 15, 2015
Mobile OTPK Technology for Online Digital Signatures Dec 15, 2015 Presentation Agenda The presentation will cover Background Traditional PKI What are the issued faced? Alternative technology Introduction
10 Secure Electronic Transactions: Overview, Capabilities, and Current Status
10 Secure Electronic Transactions: Overview, Capabilities, and Current Status Gordon Agnew A&F Consulting, and University of Waterloo, Ontario, Canada 10.1 Introduction Until recently, there were two primary
Keywords: fingerprints, attendance, enrollment, authentication, identification
Volume 4, Issue 11, November 2014 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com 94 POS Terminal
Implementation of Biometric Techniques in Social Networking Sites
, pp.51-60 http://dx.doi.org/10.14257/ijsia.2014.8.6.05 Implementation of Biometric Techniques in Social Networking Sites Shilpi Sharma 1 and J. S. Sodhi 2 Computer Science and Engineering Department,
Module 7 Security CS655! 7-1!
Module 7 Security CS655! 7-1! Issues Separation of! Security policies! Precise definition of which entities in the system can take what actions! Security mechanism! Means of enforcing that policy! Distributed
Three Factor Scheme for Biometric-Based Cryptographic Key Regeneration Using Iris
Three Factor Scheme for Biometric-Based Cryptographic Key Regeneration Using Iris Sanjay KANADE, Danielle CAMARA, Emine KRICHEN, Dijana PETROVSKA-DELACRÉTAZ, and Bernadette DORIZZI TELECOM & Management
Biometric Authentication using Online Signature
University of Trento Department of Mathematics Outline Introduction An example of authentication scheme Performance analysis and possible improvements Outline Introduction An example of authentication
Data Protection: From PKI to Virtualization & Cloud
Data Protection: From PKI to Virtualization & Cloud Raymond Yeung CISSP, CISA Senior Regional Director, HK/TW, ASEAN & A/NZ SafeNet Inc. Agenda What is PKI? And Value? Traditional PKI Usage Cloud Security
Authentication protocol for fingerprint feature extraction and IBC in monitoring systems
Authentication protocol for fingerprint feature extraction and IBC in monitoring systems Changgeng Yu; Liping Lai School of Mechanical and Electronic Engineering, Hezhou University, No.8, xihuan Road,
