Biometric Encryption Base RSA Algorithm Supervisor: Ass. Prof. Dr. Dang Tran Khanh Student: Dung Ngo Dinh.

Slides:



Advertisements
Similar presentations
Public Key Infrastructure and Applications
Advertisements

Security and Privacy over the Internet Chan Hing Wing, Anthony Mphil Yr. 1, CSE, CUHK Oct 19, 1998.
Public Key Infrastructure A Quick Look Inside PKI Technology Investigation Center 3/27/2002.
CS 483 – SD SECTION BY DR. DANIYAL ALGHAZZAWI (4) Information Security.
Cryptographic Security CS5204 – Operating Systems1.
OOP/Java1 Public Key Crytography From: Introduction to Algorithms Cormen, Leiserson and Rivest.
Dr Alejandra Flores-Mosri Message Authentication Internet Management & Security 06 Learning outcomes At the end of this session, you should be able to:
BY MUKTADIUR RAHMAN MAY 06, 2010 INTERODUCTION TO CRYPTOGRAPHY.
Public Key Crytography1 From: Introduction to Algorithms Cormen, Leiserson and Rivest.
Cryptographic Techniques Instructor: Jerry Gao Ph.D. San Jose State University URL: May,
Symmetric Key Distribution Protocol with Hybrid Crypto Systems Tony Nguyen.
Kemal AkkayaWireless & Network Security 1 Department of Computer Science Southern Illinois University Carbondale CS 591 – Wireless & Network Security Lecture.
Overview of Cryptography Oct. 29, 2002 Su San Im CS Dept. EWU.
ITIS 3200: Introduction to Information Security and Privacy Dr. Weichao Wang.
WS Algorithmentheorie 03 – Randomized Algorithms (Public Key Cryptosystems) Prof. Dr. Th. Ottmann.
How cryptography is used to secure web services Josh Benaloh Cryptographer Microsoft Research.
Cryptography1 CPSC 3730 Cryptography Chapter 9 Public Key Cryptography and RSA.
WS Algorithmentheorie 03 – Randomized Algorithms (Public Key Cryptosystems) Prof. Dr. Th. Ottmann.
Chapter 3 Encryption Algorithms & Systems (Part C)
Network Security – Part 2 V.T. Raja, Ph.D., Oregon State University.
Public Key Cryptography RSA Diffie Hellman Key Management Based on slides by Dr. Lawrie Brown of the Australian Defence Force Academy, University College,
TrustPort Public Key Infrastructure. Keep It Secure Table of contents  Security of electronic communications  Using asymmetric cryptography.
CSE 597E Fall 2001 PennState University1 Digital Signature Schemes Presented By: Munaiza Matin.
Overview of Digital Signatures Introduction To Networks and Communications (CS 555) Presented by Bharath Kongara.
CN8816: Network Security1 Confidentiality, Integrity & Authentication Confidentiality - Symmetric Key Encryption Data Integrity – MD-5, SHA and HMAC Public/Private.
Digital Signature Xiaoyan Guo/ Xiaohang Luo/
Introduction to Public Key Cryptography
 Introduction  Requirements for RSA  Ingredients for RSA  RSA Algorithm  RSA Example  Problems on RSA.
Andreas Steffen, , 4-PublicKey.pptx 1 Internet Security 1 (IntSi1) Prof. Dr. Andreas Steffen Institute for Internet Technologies and Applications.
1 Fluency with Information Technology Lawrence Snyder Chapter 17 Privacy & Digital Security Encryption.
Csci5233 Computer Security1 GS: Chapter 6 Using Java Cryptography for Authentication.
31.1 Chapter 31 Network Security Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
CS5204 – Fall Cryptographic Security Presenter: Hamid Al-Hamadi October 13, 2009.
The RSA Algorithm Rocky K. C. Chang, March
.Net Security and Performance -has security slowed down the application By Krishnan Ganesh Madras.
Secure r How do you do it? m Need to worry about sniffing, modifying, end- user masquerading, replaying. m If sender and receiver have shared secret.
_______________________________________________________________________________________________________________ E-Commerce: Fundamentals and Applications1.
© 2006 Cisco Systems, Inc. All rights reserved. Network Security 2 Module 3: VPN and Encryption Technology.
RSA Implementation. What is Encryption ? Encryption is the transformation of data into a form that is as close to impossible as possible to read without.
10/1/2015 9:38:06 AM1AIIS. OUTLINE Introduction Goals In Cryptography Secrete Key Cryptography Public Key Cryptograpgy Digital Signatures 2 10/1/2015.
Security+ Guide to Network Security Fundamentals, Third Edition Chapter 11 Basic Cryptography.
Midterm Review Cryptography & Network Security
CS526: Information Security Prof. Sam Wagstaff September 16, 2003 Cryptography Basics.
Introduction1-1 Data Communications and Computer Networks Chapter 6 CS 3830 Lecture 31 Omar Meqdadi Department of Computer Science and Software Engineering.
BASIC CRYPTOGRAPHIC CONCEPTS. Public Key Cryptography  Uses two keys for every simplex logical communication link.  Public key  Private key  The use.
Cryptography Wei Wu. Internet Threat Model Client Network Not trusted!!
1 Public-Key Cryptography and Message Authentication.
Cryptography and Network Security Chapter 13 Fifth Edition by William Stallings Lecture slides by Lawrie Brown.
11-Basic Cryptography Dr. John P. Abraham Professor UTPA.
Cryptography (2) University of Palestine Eng. Wisam Zaqoot April 2010 ITSS 4201 Internet Insurance and Information Hiding.
PUBLIC-KEY CRYPTOGRAPH IT 352 : Lecture 2- part3 Najwa AlGhamdi, MSc – 2012 /1433.
Advanced Database Course (ESED5204) Eng. Hanan Alyazji University of Palestine Software Engineering Department.
What is Digital Signature Building confidentiality and trust into networked transactions. Kishankant Yadav
31.1 Chapter 31 Network Security Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Chapter 3 – Public Key Cryptography and RSA (A). Private-Key Cryptography traditional private/secret/single-key cryptography uses one key shared by both.
Fall, Privacy&Security - Virginia Tech – Computer Science Click to edit Master title style Cryptographic Security Identity-Based Encryption.
ECE Prof. John A. Copeland fax Office: GCATT Bldg.
Cryptographic Security Aveek Chakraborty CS5204 – Operating Systems1.
Security. Cryptography (1) Intruders and eavesdroppers in communication.
1 The RSA Algorithm Rocky K. C. Chang February 23, 2007.
Information Systems Design and Development Security Precautions Computing Science.
CRYPTOGRAPHY Cryptography is art or science of transforming intelligible message to unintelligible and again transforming that message back to the original.
Cryptography and Network Security Chapter 13
Computer Communication & Networks
Information Security message M one-way hash fingerprint f = H(M)
Information Security message M one-way hash fingerprint f = H(M)
NET 311 Information Security
Information Security message M one-way hash fingerprint f = H(M)
Install AD Certificate Services
Chapter 3 - Public-Key Cryptography & Authentication
Presentation transcript:

Biometric Encryption Base RSA Algorithm Supervisor: Ass. Prof. Dr. Dang Tran Khanh Student: Dung Ngo Dinh

CONTENTS  Introduction  Symmetric & Asymmetric Encryption  Biometric and Bio-Crypto System  Biometric Signature using RSA algorithm  Conclusion

Introduction  Systems and their applications require high levels of security  Most of techniques probably in-use today, keys that are generated by algorithms or in random key generators  Merging biometrics with cryptography, we can generate an exclusive key Cryptography provides high and adjustable security levels to access and manage data, resources and services

 Symmetric Encryption  Only a secret key is used  Both sender and recipient know the secret key

 Asymmetric Encryption  Using a key pair  Both sender and recipient know the secret key

Biometric  A biometric is a person’s unique physical or behavioral characteristic  Include fingerprints, hand or palm geometry, retina, and iris and facial characteristics  Biometrics are being used in many applications: physical access control, national ID database to confirm identity, ticketless travel, commuting and maintaining health records, ATM,..etc.

Problems with PKI and Biometrics  The major problem associated with PKI algorithms is management of private keys  The private key is stored in a server or even smart device could be lost or stolen  This key management issue can be resolved by utilizing biometrics for private key access  To enhance security, this require integration of biometrics with some encryption algorithm

Digital Signature using Biometrics  Instead of transmitting the biometric templates over Internet. An unique private key is generated from Cryptograph Algorithm for digital signature  RSA algorithm can be used with 512 byte fingerprint template to generate a private key by finding the closest number which is relatively prime with Euler totient function, Ø(n)

Biometric Signature using RSA algorithm Sender: 1.Generate two prime numbers p and q, 256 bytes each. 2.Let modulus n = p*q and Ø(n) = (p-1)(q-1). 3.Generate decryption key, d from 512 byte iris template by incrementing it to get a closest number relatively prime with Ø(n). Private key = (d,n). 4.Compute encryption exponent, e as the multiplicative inverse of d modulo Ø(n) i.e. e = d -1 mod (Ø(n)) Public Key = (e,n)

Biometric Signature using RSA algorithm 5.Compute message hash H(m) using MD5 or SHA1 where m is the message to be signed digitally. Encrypt H(m) with d and n using the formula : S = (H(m)) d mod n, where S is the signature 6.Encrypt message and signature (m+S), with any previously agreed private key algorithm like DES and send it to the receiver. Note: n, e, hash function to generate H(m) and sender’s identity are made available to receiver in an authenticated manner e.g. using digital certificate

Biometric Signature using RSA algorithm Receiver: 7.Decrypt the message using the previously agreed private key algorithm like DES to retrieve the message and signature: (m+S). 8.Compute H’(m) from message, m. Decrypt signature to retrieve H(m) using: H(m) = S e mod n 9.Compare H(m) with H’(m) and verify the biometric signature (message data integrity and sender identity).

Biometric Signature using RSA algorithm

Conclusion  Biometric Signature has been introduced  It does not replace digital signatures completely but is only used to generate the private key and resolves the key management issue by avoiding storage of private keys anywhere  The generated keys are unique.

Reference  [1] Sayani Chandra, “Generate an Encryption Key by using Biometric Cryptosystems to secure transferring of Data over a Network”. IOSR Journal of Computer Engineering (IOSR-JCE) e-ISSN: , p- ISSN: Volume 12, Issue 1 (May. - Jun. 2013) [2] M Y SIYAL, “A Biometric Based e-security System for Internet-based applications”.

Course work  Building systems with fingerprint authentication by RSA Algorithm