{"title":"基于指纹的对称密码","authors":"Subhas Barman, Samiran Chattopadhyay, D. Samanta","doi":"10.1109/ICHPCA.2014.7045306","DOIUrl":null,"url":null,"abstract":"Key management is an important issue in traditional symmetric cryptography. It consists of key generation, key modification and key sharing to establish a message communication between partners. In general, a randomly generated key is shared with the counter partner by transmitting it along with the message or prior to the message communication. Maintaining privacy of cryptographic key determines the security of cryptography. Biometric is the alternate to maintain the privacy of key by protecting it with users biometric from unauthorized access. In this paper, a cryptographic key is linked with users fingerprint data. A string of binary number as cryptographic key is extracted from fingerprint template and this key is used to encrypt a message. During decryption process, the user is able to generate that cryptographic key from a fresh fingerprint instance to decrypt the encrypted message.","PeriodicalId":197528,"journal":{"name":"2014 International Conference on High Performance Computing and Applications (ICHPCA)","volume":null,"pages":null},"PeriodicalIF":0.0000,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"8","resultStr":"{\"title\":\"Fingerprint based symmetric cryptography\",\"authors\":\"Subhas Barman, Samiran Chattopadhyay, D. Samanta\",\"doi\":\"10.1109/ICHPCA.2014.7045306\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Key management is an important issue in traditional symmetric cryptography. It consists of key generation, key modification and key sharing to establish a message communication between partners. In general, a randomly generated key is shared with the counter partner by transmitting it along with the message or prior to the message communication. Maintaining privacy of cryptographic key determines the security of cryptography. Biometric is the alternate to maintain the privacy of key by protecting it with users biometric from unauthorized access. In this paper, a cryptographic key is linked with users fingerprint data. A string of binary number as cryptographic key is extracted from fingerprint template and this key is used to encrypt a message. During decryption process, the user is able to generate that cryptographic key from a fresh fingerprint instance to decrypt the encrypted message.\",\"PeriodicalId\":197528,\"journal\":{\"name\":\"2014 International Conference on High Performance Computing and Applications (ICHPCA)\",\"volume\":null,\"pages\":null},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2014-12-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"8\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2014 International Conference on High Performance Computing and Applications (ICHPCA)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICHPCA.2014.7045306\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2014 International Conference on High Performance Computing and Applications (ICHPCA)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICHPCA.2014.7045306","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Key management is an important issue in traditional symmetric cryptography. It consists of key generation, key modification and key sharing to establish a message communication between partners. In general, a randomly generated key is shared with the counter partner by transmitting it along with the message or prior to the message communication. Maintaining privacy of cryptographic key determines the security of cryptography. Biometric is the alternate to maintain the privacy of key by protecting it with users biometric from unauthorized access. In this paper, a cryptographic key is linked with users fingerprint data. A string of binary number as cryptographic key is extracted from fingerprint template and this key is used to encrypt a message. During decryption process, the user is able to generate that cryptographic key from a fresh fingerprint instance to decrypt the encrypted message.