Eng Sattar B. Sadkhan, Baheeja K. Al-Shukur, Ali K. Mattar
{"title":"Survey of biometrie based key generation to enhance security of cryptosystems","authors":"Eng Sattar B. Sadkhan, Baheeja K. Al-Shukur, Ali K. Mattar","doi":"10.1109/AIC-MITCSA.2016.7759942","DOIUrl":null,"url":null,"abstract":"Security of cryptosystems became more important issues in several applications, and need to be focused. Traditional cryptosystem used traditional ways to secure the data (pin, password, etc.) while biometric features extracted from single biometric model or from merging more than one biometric features to produce strong keys for security. This paper provides a survey we tried to explore different method to construct keys (that's lead to a secure cryptosystem) with more resistance against attackers and how the system react with it.","PeriodicalId":315179,"journal":{"name":"2016 Al-Sadeq International Conference on Multidisciplinary in IT and Communication Science and Applications (AIC-MITCSA)","volume":"2143 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2016-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"8","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2016 Al-Sadeq International Conference on Multidisciplinary in IT and Communication Science and Applications (AIC-MITCSA)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/AIC-MITCSA.2016.7759942","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 8
Abstract
Security of cryptosystems became more important issues in several applications, and need to be focused. Traditional cryptosystem used traditional ways to secure the data (pin, password, etc.) while biometric features extracted from single biometric model or from merging more than one biometric features to produce strong keys for security. This paper provides a survey we tried to explore different method to construct keys (that's lead to a secure cryptosystem) with more resistance against attackers and how the system react with it.