Multi-instance Based Cryptographic Key Regeneration System
DOI:
https://doi.org/10.14209/jcis.2014.4Abstract
This paper introduces a new multi-instance key regeneration system used to regenerate cryptographic keys from biometric data. The serial concatenation of Reed-Solomon and Hadamard codes is used with a single mechanism that improves the biometric performance and security of the system, also making possible the regeneration of longer and higher entropy cryptographic keys. The system was evaluated on two public databases: Casia-Biosecure and NIST-ICE 2005. On NIST-ICE 2005 it is possible to regenerate a 287 binary digit cryptographic key with estimated entropy of 160 bits at 0% False Acceptance Rate (FAR) and 0.34% False Rejection Rate (FRR).Downloads
Download data is not yet available.
Downloads
Published
2014-10-19
How to Cite
Paes Barretto de Arruda Camara, D., Sampaio de Lemos Neto, J., & C. da Rocha Jr, V. (2014). Multi-instance Based Cryptographic Key Regeneration System. Journal of Communication and Information Systems, 29(1). https://doi.org/10.14209/jcis.2014.4
Issue
Section
Regular Papers
License
Authors who publish in this journal agree to the following terms:
- Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a CC BY-NC 4.0 (Attribution-NonCommercial 4.0 International) that allows others to share the work with an acknowledgment of the work's authorship and initial publication in this journal.
- Authors can enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgment of its initial publication in this journal.
- Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) before and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (See The Effect of Open Access).
___________
Received 2012-09-12
Accepted 2014-09-15
Published 2014-10-19
Accepted 2014-09-15
Published 2014-10-19