Two-factor-based RSA key generation from fingerprint biometrics and password for secure communication
نویسندگان
چکیده
Abstract In an asymmetric-key cryptosystem, the secure storage of private keys is a challenging task. This paper proposes novel approach for generating same public and key pair on need basis. Hence, done away with. The proposed based two factors: fingerprint biometrics password. A stable binary string generated from distances among pairs minutiae points in using gray code-based method. Experiments show that code representation significantly reduces number inconsistencies between bit strings instances as against representation. Reed–Solomon error correction successfully corrects errors due to variations multiple induce stability string. Hash hashed password are XORed derive seed value. uses this value generate large prime numbers. These numbers used RSA generation ensures every time. experimental results can ensure key. It not required store either template or Moreover, also stored. be regenerated
منابع مشابه
Two Party RSA Key Generation
We present a protocol for two parties to generate an RSA key in a distributed manner. At the end of the protocol the public key: a modulus N = PQ, and an encryption exponent e are known to both parties. Individually, neither party obtains information about the decryption key d and the prime factors of N : P and Q. However, d is shared among the parties so that threshold decryption is possible.
متن کاملTwo Party RSA Key Generation
We present a protocol for two parties to generate an RSA key in a distributed manner. At the end of the protocol the public key: a modulus N = PQ, and an encryption exponent e are known to both parties. Individually, neither party obtains information about the decryption key d and the prime factors of N : P and Q. However, d is shared among the parties so that threshold decryption is possible.
متن کاملKey Generation for Secure High Speed Communication
-A new key generation technique for high speed communication is presented. Starting with a short random sequence it generates a pseudo random sequence over {0,1} with good properties for a one time pad encryption. Since this generation is based on extremely simple boolean operations it allows for even higher data rates than standard symmetric crypto algorithms.
متن کاملTwo Party RSA Key Generation ( Extended
We present a protocol for two parties to generate an RSA key in a distributed manner. At the end of the protocol the public key: a modulus N = PQ, and an encryption exponent e are known to both parties. Individually, neither party obtains information about the decryption key d and the prime factors of N : P and Q. However, d is shared among the parties so that threshold decryption is possible.
متن کاملMore Efficient Password Authenticated Key Exchange Based on RSA
In [17], Zhu, et al. proposed a RSA-based password authenticated key exchange scheme which supports short RSA public exponents. The scheme is the most efficient one among all the RSA-based schemes currently proposed when implemented on low-power asymmetric wireless networks. We observe that its performance can further be improved by proposing two modifications. The first modification shortens t...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Complex & Intelligent Systems
سال: 2022
ISSN: ['2198-6053', '2199-4536']
DOI: https://doi.org/10.1007/s40747-022-00663-3