Professional Documents
Culture Documents
Efficient Cryptographic Key Generation Using Biometrics
Efficient Cryptographic Key Generation Using Biometrics
Efficient Cryptographic Key Generation Using Biometrics
Abstract
Biometrics gives a lot of methods in high-secure applications while using natural, user-friendly and fast
authentication. Cryptography is intended to ensure the secrecy and authenticity of message. The cryptographic
key will be long, so it is difficult to remember, protecting the confidentiality of the cryptographic keys is one of
the significant issues to be deal with. This can be efficiently solved by the integration of biometrics with
cryptography. Conventional techniques depend on biometric features like face, fingerprint, hand geometry, iris,
signature, keystroke, voice and the like for the extraction of key. Instead of storing key we will generate the key
dynamically with the help of biometrics. Here we will use Finger print to generate key, which is safe and fast.
This key can be used for any type of cryptography.
Key words: Cryptography, Minutiae points, ROI, Morphological operation, Histogram Equalization
1. Introduction
183
Dr.R.Seshadri,T.Raghu Trivedi, Int. J. Comp. Tech. Appl., Vol 2 (1), 183-187
To generate cryptographic key we are using fields. In such systems, while cryptography provides
biometric finger print. The uses are Easy to use high and adjustable security levels, biometrics brings
,Cheap ,Small size, Low power, Non-intrusive in non-repudiation and eliminates the need to
,Large database already available.Biometric remember passwords or to carry tokens etc. In
cryptosystems can operate in one of the biometric cryptosystems, a cryptographic key is
following three modes, (i) key release, (ii)key generated from the biometric template of a user
binding and (iii) key generation [7]. stored in the database in such a way that the key
cannot be revealed without a successful biometric
In the key release mode, the biometric template authentication.
and the key are stored as separate entities and the We are using fingerprint patterns because it is stable
key is released only if the biometric matching is throughout person‟s life time.
successful.
Principals of finger print biometrics
In the key binding mode, the key and
the template are monolithically bound within a A fingerprint is made of a number of ridges and
cryptographic frame work . It is computationally valleys on the surface of the finger. Ridges are the
infeasible to decode the key or the template upper skin layer segments of the finger and valleys
without any knowledge of the user‟s biometric are the lower segments. The ridges form so-called
data. A crypto- biometric matching algorithm is minutia points: ridge endings (where a ridge end) and
used to perform authentication and key release in ridge bifurcations (where a ridge splits in two). Many
a single step. types of minutiae exist, including dots (very small
ridges), islands (ridges slightly longer than dots,
Here we are using Key generation mode, in which occupying a middle space between two temporarily
key is derived directly from the biometric data and is divergent ridges), ponds or lakes (empty spaces
not store in the database. between two temporarily divergent ridges), spurs (a
It is easy to implement a biometric cryptosystem in notch protruding from a ridge), bridges (small ridges
the key release mode, such a system is not joining two longer adjacent ridges), and crossovers
appropriate for high security applications because it (two ridges which cross each other)[8].
has two major vulnerabilities. Firstly, the biometric
template is not secure. Template security is a critical
issue in biometric systems because stolen templates
cannot be revoked. Secondly, since authentication
and key release are decoupled, it is possible to
override the biometric matcher using a Trojan horse
program. Biometric cryptosystems that work in the
key binding/generation modes are more secure but
difficult to implement due to large intra-class
variations in biometric data, i.e., samples of the same
biometric trait of a user obtained over a period of Fig1.finger print image
time can differ substantially.
3. Cryptographic key generation from
2. Bio cryptosystem finger print
185
Dr.R.Seshadri,T.Raghu Trivedi, Int. J. Comp. Tech. Appl., Vol 2 (1), 183-187
Step5: value= KL / Np
Vector=KL % Np
For j=1 to Sp
References
Fig6: Minutiae point extraction 1]. Sunil V. K. Gaddam 1 and Manohar Lal
2,”Effecient Cancellable Biometric Key Generation
Matrix & key generation: Scheme for Cryptography” International Journal of
Network Security, Vol.11, No.2, PP.57{65, Sep.
The key generation algorithm is as follows 2010
Extracted minutiae points co-ordinates are [2].Advanced Encryption Standard.
maintained in a vector (http://en.wikipedia.org/wiki/Advanced Encryption
Mp- Minutiae points set Standard)
Sp - Size of Mp [3].AES Encryption information.
KL=key length (http://www.bitzipper.com/aes-encryption.html)
Kv -Key Vector [4] A. J. Menezes, P. C. V. Oorschot, and S.
Lk -Length of key vector A.Vanstone, Handbook of Applied Cryptography,
Z - (X, Y) co-ordinate of a minutiae point CRCPress, pp. 180, 1997
Step1: Read the Minutiae points [5]. U. Uludag, S. Pankanti, S. Prabhakar, and A.
K.Jain, \Biometric cryptosystems: Issues and
Step2: Find the point H with highest x+y challenges," Proceedings of the IEEE, vol. 92, pp.
948-960, 2004.
Step3: Draw a line from origin (0, 0) to the H and [6]Biometrics
call it as L (http://en.wikipedia.org/wiki/Biometrics#cite_note-
6)
186
Dr.R.Seshadri,T.Raghu Trivedi, Int. J. Comp. Tech. Appl., Vol 2 (1), 183-187
Authors Profile
Mr.T.RaghuTrivedi received
MCA degree from Andhra
University,Vizag He received his
M.Tech in Computer Science
from Nagarjuna University.He is
a research scholar in
S.V.University,Tirupathi, Andhra
Pradesh.
187