Two-factor-based RSA key generation from fingerprint biometrics and password for secure communication

نویسندگان

چکیده

Abstract In an asymmetric-key cryptosystem, the secure storage of private keys is a challenging task. This paper proposes novel approach for generating same public and key pair on need basis. Hence, done away with. The proposed based two factors: fingerprint biometrics password. A stable binary string generated from distances among pairs minutiae points in using gray code-based method. Experiments show that code representation significantly reduces number inconsistencies between bit strings instances as against representation. Reed–Solomon error correction successfully corrects errors due to variations multiple induce stability string. Hash hashed password are XORed derive seed value. uses this value generate large prime numbers. These numbers used RSA generation ensures every time. experimental results can ensure key. It not required store either template or Moreover, also stored. be regenerated

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Two Party RSA Key Generation

We present a protocol for two parties to generate an RSA key in a distributed manner. At the end of the protocol the public key: a modulus N = PQ, and an encryption exponent e are known to both parties. Individually, neither party obtains information about the decryption key d and the prime factors of N : P and Q. However, d is shared among the parties so that threshold decryption is possible.

متن کامل

Two Party RSA Key Generation

We present a protocol for two parties to generate an RSA key in a distributed manner. At the end of the protocol the public key: a modulus N = PQ, and an encryption exponent e are known to both parties. Individually, neither party obtains information about the decryption key d and the prime factors of N : P and Q. However, d is shared among the parties so that threshold decryption is possible.

متن کامل

Key Generation for Secure High Speed Communication

-A new key generation technique for high speed communication is presented. Starting with a short random sequence it generates a pseudo random sequence over {0,1} with good properties for a one time pad encryption. Since this generation is based on extremely simple boolean operations it allows for even higher data rates than standard symmetric crypto algorithms.

متن کامل

Two Party RSA Key Generation ( Extended

We present a protocol for two parties to generate an RSA key in a distributed manner. At the end of the protocol the public key: a modulus N = PQ, and an encryption exponent e are known to both parties. Individually, neither party obtains information about the decryption key d and the prime factors of N : P and Q. However, d is shared among the parties so that threshold decryption is possible.

متن کامل

More Efficient Password Authenticated Key Exchange Based on RSA

In [17], Zhu, et al. proposed a RSA-based password authenticated key exchange scheme which supports short RSA public exponents. The scheme is the most efficient one among all the RSA-based schemes currently proposed when implemented on low-power asymmetric wireless networks. We observe that its performance can further be improved by proposing two modifications. The first modification shortens t...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Complex & Intelligent Systems

سال: 2022

ISSN: ['2198-6053', '2199-4536']

DOI: https://doi.org/10.1007/s40747-022-00663-3