On the Generation of X.509v3 Certificates with Biometric Information
نویسندگان
چکیده
We present the kernel implementation of a Mobile Certification Authority (MCA). Our MCA kernel is able to issue digital certificates fully-complying with the X.509v3 standard; it supports either RSA or ECDSA as a public key cryptosystem engine and; it can incorporate biometric-based user identification information (in the form of fingerprint recognition) to the digital certificate. The MCA application was entirely written in C++ and it was tested in an iPAQ Pocket PC h5550. Our experiments show that an ECDSA-based digital certificate using the NIST recommended 163K elliptic curve constitutes an ideal selection for wireless environments. Such certificate can be generated with a size of 1635 bytes, and 592 bytes when including (or not) biometric information, respectively. keyword: X.509v3 digital certificates, mobile PKI, biometric authentication
منابع مشابه
Trust Revoked - Practical Evaluation of OCSP- and CRL-Checking Implementations
When deploying asymmetric cryptography robust ways to reliably link a public key to a certain identity have to be devised. The current standard for doing so are X.509v3 certificates. They are used in HTTPS and SSH as well as in code-, e-mail-, or PDF-signing. This widespread use necessitates the need for an efficient way of revoking such certificates in case of a compromised private key. Two me...
متن کاملDevelopment of a Unique Biometric-based Cryptographic Key Generation with Repeatability using Brain Signals
Network security is very important when sending confidential data through the network. Cryptography is the science of hiding information, and a combination of cryptography solutions with cognitive science starts a new branch called cognitive cryptography that guarantee the confidentiality and integrity of the data. Brain signals as a biometric indicator can convert to a binary code which can be...
متن کاملX.509v3 Certificates for Secure Shell Authentication
This document is subject to BCP 78 and the IETF Trust’s Legal Provisions Relating to IETF Documents (http://trustee.ietf.org/license-info) in effect on the date of publication of this document. Please review these documents carefully, as they describe your rights and restrictions with respect to this document. Code Components extracted from this document must include Simplified BSD License text...
متن کاملBiometric yet Privacy Protecting Person Authentication
Many eligibility or entitlement certificates in every day life are non-transferable between persons. However, they are usually implemented by personal physical tokens that owners can easily pass around (e.g. credit card), driver’s license). So there must either be negligible incentives to pass these certificates or the tokens around, or the tokens must allow to authenticate the persons who show...
متن کاملبررسی تأثیر خطاهای تکمیل گواهی فوت بر کدگذاری علت زمینه ای مرگ در بیمارستان شهید محمدی بندرعباس
Introduction: Death information plays a critical role in the adjustment of health plans, and the cause of death coding leads to organizing this information .The Purpose of this study was to review the impact of errors in the completion of death certificate on underlying the cause of death coding in Shahid Mohammadi hospital in Bandarabbas. Methods : This descriptive-cross sectional study...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2007