A Biometric Based Secure Session Key Agreement using Modified Elliptic Curve Cryptography
Journal: The International Arab Journal of Information Technology (Vol.12, No. 2)Publication Date: 2015-03-01
Authors : Usha Subramaniam; Kuppuswami Subbaraya;
Page : 155-161
Keywords : Active authentication; data originator; verifier; ECC; e-passport; ES; passive authentication.;
Abstract
Protection of data and network security has been greatly researched. To enhance the security in the case of border
control applications like E-Passport, conventional cryptographic concepts are integrated with biometrics. To avoid the intrusion of terrorists after the terrorists attack of 9/11, many countries begin to issue E-Passport to their citizens contains biometric data like face, fingerprint and iris. The first generation E-Passport developed as per the standards and specifications of international civil aviation organization is confirmed to be lacking confidence and has numerous threats. The second generation E-Passport, was designed as per the mechanism of extended access control also submits lots of threats especially in safety and confidentiality. In this article, security enhanced mechanism based on variation of Diffie-Hellman key agreement protocol using Elliptic Curve Cryptography (ECC) between E-Passport and the Examination System (ES) is suggested. In the proposed method elliptic curve parameters A, B and G are derived from the minutiae points of the fingerprint. From these parameters public key of E-Passport and session key between E-Passport and ES is generated. The security analysis of the proposed solution confirms the security goal of the biometric based system. The proposed protocol is developed using MATLAB (R2010b) tool.
Other Latest Articles
- Template Based Affix Stemmer for a Morphologically Rich Language
- Combination of Feature Selection and Optimized Fuzzy Apriori Rules: The Case of Credit Scoring
- Cloud Task Scheduling Based on Ant Colony Optimization
- A Multimodal Biometric System Based on Palmprint and Finger Knuckle Print Recognition Methods
- Chaotic Image Encryption using Modular Addition and Combinatorial Techniques
Last modified: 2019-11-14 22:07:46