{"title":"一种在生物识别系统中用于安全信息检索的防止欺骗攻击的加密方法","authors":"R. Hosur, S. Hatture, R. Karchi","doi":"10.1109/WICT.2012.6409097","DOIUrl":null,"url":null,"abstract":"Biometric technologies' have become the basis for highly secure identification and personnel verification in authentication and identification systems, based on the physical identifiable details or behavioral characteristics which cannot be imposter easily. Hence, the system has been treated to be the tough security measures to identify the user being genuine by avoiding the third party attack. But these systems are unable to judge whether the user who is providing the required authentication details is an impostor or genuine. To eliminate this flaw in biometric based security systems, the model proposed in this paper can be embedded in existing security systems to prevent the spoof attack. The proposed model comprises of two independent models namely Cryptographic based authentication system (model 1) and Text prompted authentication system (model 2). Model 1 has been designed by the most efficient cryptographic algorithm RSA which generates a secret key by using a pseudo-random number given by user for secure system access. In model 2, the user is made interactive with the system by prompting a question from a set of 15 questions, and authenticating the user with the help of correct answer provided by user. To provide higher level of security, MD5 (Message Digest 5) algorithm is integrated with RSA. The developed models provide promising level of security along with a biometric trait.","PeriodicalId":445333,"journal":{"name":"2012 World Congress on Information and Communication Technologies","volume":null,"pages":null},"PeriodicalIF":0.0000,"publicationDate":"2012-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":"{\"title\":\"A cryptographic approach to prevent a spoof attack for secure information retrieval in a biometrie system\",\"authors\":\"R. Hosur, S. Hatture, R. Karchi\",\"doi\":\"10.1109/WICT.2012.6409097\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Biometric technologies' have become the basis for highly secure identification and personnel verification in authentication and identification systems, based on the physical identifiable details or behavioral characteristics which cannot be imposter easily. Hence, the system has been treated to be the tough security measures to identify the user being genuine by avoiding the third party attack. But these systems are unable to judge whether the user who is providing the required authentication details is an impostor or genuine. To eliminate this flaw in biometric based security systems, the model proposed in this paper can be embedded in existing security systems to prevent the spoof attack. The proposed model comprises of two independent models namely Cryptographic based authentication system (model 1) and Text prompted authentication system (model 2). Model 1 has been designed by the most efficient cryptographic algorithm RSA which generates a secret key by using a pseudo-random number given by user for secure system access. In model 2, the user is made interactive with the system by prompting a question from a set of 15 questions, and authenticating the user with the help of correct answer provided by user. To provide higher level of security, MD5 (Message Digest 5) algorithm is integrated with RSA. The developed models provide promising level of security along with a biometric trait.\",\"PeriodicalId\":445333,\"journal\":{\"name\":\"2012 World Congress on Information and Communication Technologies\",\"volume\":null,\"pages\":null},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2012-10-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"1\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2012 World Congress on Information and Communication Technologies\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/WICT.2012.6409097\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2012 World Congress on Information and Communication Technologies","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/WICT.2012.6409097","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
A cryptographic approach to prevent a spoof attack for secure information retrieval in a biometrie system
Biometric technologies' have become the basis for highly secure identification and personnel verification in authentication and identification systems, based on the physical identifiable details or behavioral characteristics which cannot be imposter easily. Hence, the system has been treated to be the tough security measures to identify the user being genuine by avoiding the third party attack. But these systems are unable to judge whether the user who is providing the required authentication details is an impostor or genuine. To eliminate this flaw in biometric based security systems, the model proposed in this paper can be embedded in existing security systems to prevent the spoof attack. The proposed model comprises of two independent models namely Cryptographic based authentication system (model 1) and Text prompted authentication system (model 2). Model 1 has been designed by the most efficient cryptographic algorithm RSA which generates a secret key by using a pseudo-random number given by user for secure system access. In model 2, the user is made interactive with the system by prompting a question from a set of 15 questions, and authenticating the user with the help of correct answer provided by user. To provide higher level of security, MD5 (Message Digest 5) algorithm is integrated with RSA. The developed models provide promising level of security along with a biometric trait.