Hardware Accelerator Approach Towards Efficient Biometric Cryptosystems for Network Security
نویسندگان
چکیده
منابع مشابه
Hardware Accelerator Approach Towards Efficient Biometric Cryptosystems for Network Security
Protecting data and its communication is a critical part of the modern network. The science of protecting data, known as cryptography, uses secret keys to encrypt data in a format that is not easily decipherable. However,most commonly secure logons for a workstation connected to a network use passwords to perform user authentication. These passwords are a weak link in the security chain, and ar...
متن کاملBiometric cryptosystems based fuzzy commitment scheme: a security evaluation
Biometric systems are developed in order to replace traditional authentication. However, protecting the stored templates is considered as one of the critical steps in designing a secure biometric system. When biometric data is compromised, unlike passwords, it can’t be revoked. One methodology for biometric template protection is ‘Biometric Cryptosystem’. Biometric cryptosystems benefit from bo...
متن کاملIris–Based Biometric Cryptosystems
As a result of the growing interest in biometrics a new field of research has emerged, entitled “biometric cryptosystems”. Within biometric cryptosystems the advantages of biometric authentication are introduced to generic cryptographic key management systems to enhance security. Only few work, which tends to be very custom-built according to the range of application, has been published in this...
متن کاملEfficient elliptic curve cryptosystems
Elliptic curve cryptosystems (ECC) are new generations of public key cryptosystems that have a smaller key size for the same level of security. The exponentiation on elliptic curve is the most important operation in ECC, so when the ECC is put into practice, the major problem is how to enhance the speed of the exponentiation. It is thus of great interest to develop algorithms for exponentiation...
متن کاملBiometric cryptosystems: authentication, encryption and signature for biometric identities
Zusammenfassung) Biometrics have been used for secure identification and authentication for more than two decades since biometric data is unique, non-transferable, unforgettable, and always with us. Recently, biometrics has pervaded other aspects of security applications that can be listed under the topic of “Biometric Cryptosystems”. Although the security of some of these systems is questionab...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Journal of Computing and Information Technology
سال: 2015
ISSN: 1330-1136,1846-3908
DOI: 10.2498/cit.1002764