The present work deals with modern computing systems security issues, focusing on biometric based asymmetric keys generation process. Conventional PKI systems are based on private/public keys generated through RSA or similar algorithms. The present solution embeds biometric information on the private/public keys generation process. In addition the corresponding private key depends on physical or behavioural biometric features and it can be generated when it is needed. Starting from fingerprint acquisition, the biometric identifier is extracted, cyphered, and stored in tamper-resistant smartcard to overcome the security problems of centralized databases. Biometric information is then used for user authentication and for public/private keys generation. The initial trials have shown that the asymmetric keys generation distinctive power depends on biometric authentication accuracy, assuring unique asymmetric keys for each authenticated user.

Conti, V., Vitabile, S., Sorbello, F. (2012). Fingerprint Traits and RSA Algorithm Fusion Technique. In Proc. of 6th International Conference on Complex, Intelligent and Software Intensive Systems (pp.351-356). IEEE Press [10.1109/CISIS.2012.116].

Fingerprint Traits and RSA Algorithm Fusion Technique

VITABILE, Salvatore;SORBELLO, Filippo
2012-01-01

Abstract

The present work deals with modern computing systems security issues, focusing on biometric based asymmetric keys generation process. Conventional PKI systems are based on private/public keys generated through RSA or similar algorithms. The present solution embeds biometric information on the private/public keys generation process. In addition the corresponding private key depends on physical or behavioural biometric features and it can be generated when it is needed. Starting from fingerprint acquisition, the biometric identifier is extracted, cyphered, and stored in tamper-resistant smartcard to overcome the security problems of centralized databases. Biometric information is then used for user authentication and for public/private keys generation. The initial trials have shown that the asymmetric keys generation distinctive power depends on biometric authentication accuracy, assuring unique asymmetric keys for each authenticated user.
6-lug-2012
International Conference on Complex, Intelligent and Software Intensive Systems
Palermo, Italia
4-6 Luglio, 2012
6th
2012
6
Conti, V., Vitabile, S., Sorbello, F. (2012). Fingerprint Traits and RSA Algorithm Fusion Technique. In Proc. of 6th International Conference on Complex, Intelligent and Software Intensive Systems (pp.351-356). IEEE Press [10.1109/CISIS.2012.116].
Proceedings (atti dei congressi)
Conti, V.; Vitabile, S.; Sorbello, F.
File in questo prodotto:
File Dimensione Formato  
4687a351.pdf

Solo gestori archvio

Descrizione: File PDF IEEE Digital Library
Dimensione 924.65 kB
Formato Adobe PDF
924.65 kB Adobe PDF   Visualizza/Apri   Richiedi una copia
Front.pdf

Solo gestori archvio

Descrizione: Front and Index
Dimensione 1.7 MB
Formato Adobe PDF
1.7 MB Adobe PDF   Visualizza/Apri   Richiedi una copia

I documenti in IRIS sono protetti da copyright e tutti i diritti sono riservati, salvo diversa indicazione.

Utilizza questo identificativo per citare o creare un link a questo documento: https://hdl.handle.net/10447/73667
Citazioni
  • ???jsp.display-item.citation.pmc??? ND
  • Scopus 12
  • ???jsp.display-item.citation.isi??? ND
social impact