The present work deals with modern computing systems security issues, focusing on biometric based asymmetric keys generation process. Conventional PKI systems are based on private/public keys generated through RSA or similar algorithms. The present solution embeds biometric information on the private/public keys generation process. In addition the corresponding private key depends on physical or behavioural biometric features and it can be generated when it is needed. Starting from fingerprint acquisition, the biometric identifier is extracted, cyphered, and stored in tamper-resistant smartcard to overcome the security problems of centralized databases. Biometric information is then used for user authentication and for public/private keys generation. The initial trials have shown that the asymmetric keys generation distinctive power depends on biometric authentication accuracy, assuring unique asymmetric keys for each authenticated user.
Conti, V., Vitabile, S., Sorbello, F. (2012). Fingerprint Traits and RSA Algorithm Fusion Technique. In Proc. of 6th International Conference on Complex, Intelligent and Software Intensive Systems (pp.351-356). IEEE Press [10.1109/CISIS.2012.116].
Fingerprint Traits and RSA Algorithm Fusion Technique
VITABILE, Salvatore;SORBELLO, Filippo
2012-01-01
Abstract
The present work deals with modern computing systems security issues, focusing on biometric based asymmetric keys generation process. Conventional PKI systems are based on private/public keys generated through RSA or similar algorithms. The present solution embeds biometric information on the private/public keys generation process. In addition the corresponding private key depends on physical or behavioural biometric features and it can be generated when it is needed. Starting from fingerprint acquisition, the biometric identifier is extracted, cyphered, and stored in tamper-resistant smartcard to overcome the security problems of centralized databases. Biometric information is then used for user authentication and for public/private keys generation. The initial trials have shown that the asymmetric keys generation distinctive power depends on biometric authentication accuracy, assuring unique asymmetric keys for each authenticated user.File | Dimensione | Formato | |
---|---|---|---|
4687a351.pdf
Solo gestori archvio
Descrizione: File PDF IEEE Digital Library
Dimensione
924.65 kB
Formato
Adobe PDF
|
924.65 kB | Adobe PDF | Visualizza/Apri Richiedi una copia |
Front.pdf
Solo gestori archvio
Descrizione: Front and Index
Dimensione
1.7 MB
Formato
Adobe PDF
|
1.7 MB | Adobe PDF | Visualizza/Apri Richiedi una copia |
I documenti in IRIS sono protetti da copyright e tutti i diritti sono riservati, salvo diversa indicazione.