Review of Security with Noisy Data by Pim Tuyls , Boris Skoric and Tom

نویسندگان

  • Pim Tuyls
  • Boris Skoric
  • Tom Kevenaar
  • Nadia El Mrabet
چکیده

This book describes how to use biometric features such as finger prints or iris patterns to construct private keys for cryptography. It is a very interesting topic, as, nowadays, cryptographic protocols can store/produce thousands of bits of secure information, while the user needs a password to make the exchange secure. The major weakness in a cryptographic protocols is the user himself. Biometric features are methods to efficiently provide a large unique private key for a user. Unfortunately, the measurement equipment to acquire biometric data is inherently noisy and consequently a biometric matching operation is only approximate. The aim of this book is to study how the presence of noise has an impact on information security and how it can be dealt with.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Robust Key Extraction from Physical Uncloneable Functions

Physical Uncloneable Functions (PUFs) can be used as a cost-e ective means to store key material in an uncloneable way. Due to the fact that the key material is obtained by performing measurements on a physical system, noise is inevitably present in each readout. In this paper we present a number of methods that improve the robustness of bit-string extraction from noisy PUF measurements in gene...

متن کامل

An efficient fuzzy extractor for limited noise

A fuzzy extractor is a security primitive that allows for reproducible extraction of an almost uniform key from a non-uniform noisy source. We analyze a fuzzy extractor scheme that uses universal hash functions for both information reconciliation and privacy amplification. This is a useful scheme when the number of error patterns likely to occur is limited, regardless of the error probabilities...

متن کامل

Information-theoretic analysis of coating PUFs

Physical Uncloneable Functions (PUFs) can be used as a cost-e ective means to store cryptographic key material in an uncloneable way. In coating PUFs, keys are generated from capacitance measurements of a coating containing many randomly distributed particles with di erent dielectric constants. We introduce a physical model of coating PUFs by simplifying the capacitance sensors to a parallel pl...

متن کامل

ALGSICS - Combining Physics and Cryptography to Enhance Security and Privacy in RFID Systems

RFID-tags can be seen as a new generation of bar codes with added functionality. They are becoming very popular tools for identification of products in various applications such as supply-chain management. The widespread deployment of RFID technology will depend to a large extent on its acceptance by the general public. Thus, developing privacy and security technologies specifically suited to t...

متن کامل

Anti-counterfeiting, key distribution, and key storage in an ambient world via physical unclonable functions

Virtually all applications which provide or require a security service need a secret key. In an ambient world, where (potentially) sensitive information is continually being gathered about us, it is critical that those keys be both securely deployed and safeguarded from compromise. In this paper, we provide solutions for secure key deployment and storage of keys in sensor networks and RFID syst...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2013