Biometric Based Network Security Using MIPS Cryptography Processor
نویسنده
چکیده
The empowerment in network on chip (NOC) and System on chip (SOC) in Microelectronics and Sensors have developed the various wireless communication Network technologies. In the past few years, many researchers have been focusing on building system architecture of network monitoring to improve the technical requirement specially designed for network security. Less research was found in providing the strong biometric based network security system to provide bulletproof security. The popular MIPS based cryptography processor is used for hardware and software products and standards require big cryptography keys length for higher security level. The major weakness of Normal cryptography system based on asymmetric algorithms need the storage of secret keys. Stored keys are often protected by poorly selected user passwords that can either be guessed or obtained through brute force attacks. Combining biometric with MIPS cryptography processor is as a possible solution. In this paper I propose a new approach to network security using MIPS based crypto processor based on contactless palm vein biometric system. This approach takes into account NOC constraints and its topology. It provides more security with less key length and there is no need to store any private key anywhere. Keywords— Biometric, Network Security, Cryptograph, MIPS Processor, System on Chip.
منابع مشابه
Development of a Unique Biometric-based Cryptographic Key Generation with Repeatability using Brain Signals
Network security is very important when sending confidential data through the network. Cryptography is the science of hiding information, and a combination of cryptography solutions with cognitive science starts a new branch called cognitive cryptography that guarantee the confidentiality and integrity of the data. Brain signals as a biometric indicator can convert to a binary code which can be...
متن کاملDesign of High Performance MIPS Cryptography Processor Based on T-DES Algorithm
The paper describes the design of high performance MIPS Cryptography processor based on triple data encryption standard. The organization of pipeline stages in such a way that pipeline can be clocked at high frequency. Encryption and Decryption blocks of triple data encryption standard (T-DES) crypto system and dependency among themselves are explained in detail with the help of block diagram. ...
متن کاملPerformance Evaluation of Low Power MIPS Crypto Processor based on Cryptography Algorithms
This paper presents the design and implementation of low power 32-bit encrypted and decrypted MIPS processor for Data Encryption Standard (DES), Triple DES, Advanced Encryption Standard (AES) based on MIPS pipeline architecture. The organization of pipeline stages has been done in such a way that pipeline can be clocked at high frequency. Encryption and Decryption blocks of three standard crypt...
متن کاملAn Efficient Biometric Certificateless Signcryption Scheme
Biometric signcryption, which enables a user using his biometric information as the identity to fulfills both the functions of encryption and digital signature simultaneously, and it provides better overall security and performance. However, almost all biometric signcryption schemes that have been proposed in the literature do not satisfy forward secrecy, known session-specific temporary inform...
متن کاملEnhancing Security in Biometric System Using Blind Authentication Protocol
-Biometric authentication system are used prevalently for its template security, retract ability and privacy. The Authentication process is reinforced by biometric cryptosystem. We propose a demonstrable secure and blind biometric authentication protocol which discloses only identity and not any other information to both client and server. To reduce the computational cost and enhance security w...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید
ثبت ناماگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید
ورودعنوان ژورنال:
- IACR Cryptology ePrint Archive
دوره 2016 شماره
صفحات -
تاریخ انتشار 2016