一种在生物识别系统中用于安全信息检索的防止欺骗攻击的加密方法

R. Hosur, S. Hatture, R. Karchi
{"title":"一种在生物识别系统中用于安全信息检索的防止欺骗攻击的加密方法","authors":"R. Hosur, S. Hatture, R. Karchi","doi":"10.1109/WICT.2012.6409097","DOIUrl":null,"url":null,"abstract":"Biometric technologies' have become the basis for highly secure identification and personnel verification in authentication and identification systems, based on the physical identifiable details or behavioral characteristics which cannot be imposter easily. Hence, the system has been treated to be the tough security measures to identify the user being genuine by avoiding the third party attack. But these systems are unable to judge whether the user who is providing the required authentication details is an impostor or genuine. To eliminate this flaw in biometric based security systems, the model proposed in this paper can be embedded in existing security systems to prevent the spoof attack. The proposed model comprises of two independent models namely Cryptographic based authentication system (model 1) and Text prompted authentication system (model 2). Model 1 has been designed by the most efficient cryptographic algorithm RSA which generates a secret key by using a pseudo-random number given by user for secure system access. In model 2, the user is made interactive with the system by prompting a question from a set of 15 questions, and authenticating the user with the help of correct answer provided by user. To provide higher level of security, MD5 (Message Digest 5) algorithm is integrated with RSA. The developed models provide promising level of security along with a biometric trait.","PeriodicalId":445333,"journal":{"name":"2012 World Congress on Information and Communication Technologies","volume":null,"pages":null},"PeriodicalIF":0.0000,"publicationDate":"2012-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":"{\"title\":\"A cryptographic approach to prevent a spoof attack for secure information retrieval in a biometrie system\",\"authors\":\"R. Hosur, S. Hatture, R. Karchi\",\"doi\":\"10.1109/WICT.2012.6409097\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Biometric technologies' have become the basis for highly secure identification and personnel verification in authentication and identification systems, based on the physical identifiable details or behavioral characteristics which cannot be imposter easily. Hence, the system has been treated to be the tough security measures to identify the user being genuine by avoiding the third party attack. But these systems are unable to judge whether the user who is providing the required authentication details is an impostor or genuine. To eliminate this flaw in biometric based security systems, the model proposed in this paper can be embedded in existing security systems to prevent the spoof attack. The proposed model comprises of two independent models namely Cryptographic based authentication system (model 1) and Text prompted authentication system (model 2). Model 1 has been designed by the most efficient cryptographic algorithm RSA which generates a secret key by using a pseudo-random number given by user for secure system access. In model 2, the user is made interactive with the system by prompting a question from a set of 15 questions, and authenticating the user with the help of correct answer provided by user. To provide higher level of security, MD5 (Message Digest 5) algorithm is integrated with RSA. The developed models provide promising level of security along with a biometric trait.\",\"PeriodicalId\":445333,\"journal\":{\"name\":\"2012 World Congress on Information and Communication Technologies\",\"volume\":null,\"pages\":null},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2012-10-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"1\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2012 World Congress on Information and Communication Technologies\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/WICT.2012.6409097\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2012 World Congress on Information and Communication Technologies","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/WICT.2012.6409097","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 1

摘要

生物识别技术已经成为身份认证系统中高度安全的身份识别和人员验证的基础,它基于物理识别细节或行为特征,不易被冒名顶替。因此,该系统已被视为通过避免第三方攻击来识别用户真伪的严格安全措施。但这些系统无法判断提供所需身份验证细节的用户是冒名顶替者还是真货。为了消除基于生物特征的安全系统中的这一缺陷,本文提出的模型可以嵌入到现有的安全系统中,以防止欺骗攻击。模型由两个独立的模型组成,即基于密码的认证系统(模型1)和文本提示认证系统(模型2)。模型1由最有效的密码算法RSA设计,该算法利用用户给出的伪随机数生成密钥,用于安全访问系统。在模型2中,用户通过从一组15个问题中提示一个问题与系统进行交互,并借助用户提供的正确答案对用户进行身份验证。为了提供更高的安全性,MD5 (Message Digest 5)算法与RSA集成在一起。开发的模型提供了有希望的安全级别以及生物特征。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
A cryptographic approach to prevent a spoof attack for secure information retrieval in a biometrie system
Biometric technologies' have become the basis for highly secure identification and personnel verification in authentication and identification systems, based on the physical identifiable details or behavioral characteristics which cannot be imposter easily. Hence, the system has been treated to be the tough security measures to identify the user being genuine by avoiding the third party attack. But these systems are unable to judge whether the user who is providing the required authentication details is an impostor or genuine. To eliminate this flaw in biometric based security systems, the model proposed in this paper can be embedded in existing security systems to prevent the spoof attack. The proposed model comprises of two independent models namely Cryptographic based authentication system (model 1) and Text prompted authentication system (model 2). Model 1 has been designed by the most efficient cryptographic algorithm RSA which generates a secret key by using a pseudo-random number given by user for secure system access. In model 2, the user is made interactive with the system by prompting a question from a set of 15 questions, and authenticating the user with the help of correct answer provided by user. To provide higher level of security, MD5 (Message Digest 5) algorithm is integrated with RSA. The developed models provide promising level of security along with a biometric trait.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
Survey of QoS based web service discovery Copy-move forgery detection based on PHT Multi-camera based surveillance system Competency mapping in academic environment: A multi objective approach Performance analysis of IEEE 802.11e over WMNs
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1