Submit Search
Upload
IRJET- Cancelable Biometric based Key Generation for Symmetric Cryptography: Survey
•
0 likes
•
11 views
IRJET Journal
Follow
https://www.irjet.net/archives/V5/i11/IRJET-V5I11269.pdf
Read less
Read more
Engineering
Report
Share
Report
Share
1 of 4
Download now
Download to read offline
Recommended
Image Cryptography using RSA Algorithm
Image Cryptography using RSA Algorithm
ijtsrd
Security analysis of fbdk block cipher for digital images
Security analysis of fbdk block cipher for digital images
eSAT Journals
Symmetric-Key Based Privacy-Preserving Scheme For Mining Support Counts
Symmetric-Key Based Privacy-Preserving Scheme For Mining Support Counts
acijjournal
82 86
82 86
Editor IJARCET
A new hybrid text encryption approach over mobile ad hoc network
A new hybrid text encryption approach over mobile ad hoc network
IJECEIAES
IRJET- Data Transmission using RSA Algorithm
IRJET- Data Transmission using RSA Algorithm
IRJET Journal
IRJET- Comparison Among RSA, AES and DES
IRJET- Comparison Among RSA, AES and DES
IRJET Journal
Online paymentusingsteganographt&Visualcryptography
Online paymentusingsteganographt&Visualcryptography
Nagarjuna mahanti
Recommended
Image Cryptography using RSA Algorithm
Image Cryptography using RSA Algorithm
ijtsrd
Security analysis of fbdk block cipher for digital images
Security analysis of fbdk block cipher for digital images
eSAT Journals
Symmetric-Key Based Privacy-Preserving Scheme For Mining Support Counts
Symmetric-Key Based Privacy-Preserving Scheme For Mining Support Counts
acijjournal
82 86
82 86
Editor IJARCET
A new hybrid text encryption approach over mobile ad hoc network
A new hybrid text encryption approach over mobile ad hoc network
IJECEIAES
IRJET- Data Transmission using RSA Algorithm
IRJET- Data Transmission using RSA Algorithm
IRJET Journal
IRJET- Comparison Among RSA, AES and DES
IRJET- Comparison Among RSA, AES and DES
IRJET Journal
Online paymentusingsteganographt&Visualcryptography
Online paymentusingsteganographt&Visualcryptography
Nagarjuna mahanti
50120140507006
50120140507006
IAEME Publication
IRJET- A Probabilistic Model of Visual Cryptography Scheme for Anti-Phis...
IRJET- A Probabilistic Model of Visual Cryptography Scheme for Anti-Phis...
IRJET Journal
Image encryption using jumbling salting
Image encryption using jumbling salting
Mauryasuraj98
RSA and RC4 Cryptosystem Performance Evaluation Using Image and Text
RSA and RC4 Cryptosystem Performance Evaluation Using Image and Text
Yekini Nureni
Public key cryptography
Public key cryptography
Lilies DLiestyowati
online payment system using Steganography and Visual cryptography
online payment system using Steganography and Visual cryptography
Shahrukh Ali
Data security for any organization by using public key infrastructure compone...
Data security for any organization by using public key infrastructure compone...
eSAT Publishing House
Online Payment System using Steganography and Visual Cryptography
Online Payment System using Steganography and Visual Cryptography
IJCERT
researchpaperfinal1
researchpaperfinal1
Sumit Bajaj
IRJET- Symmetric Cryptography using Neural Networks
IRJET- Symmetric Cryptography using Neural Networks
IRJET Journal
Mini Project on Data Encryption & Decryption in JAVA
Mini Project on Data Encryption & Decryption in JAVA
chovatiyabhautik
IRJET- Cryptography Encryption and Decryption File Protection based on Mo...
IRJET- Cryptography Encryption and Decryption File Protection based on Mo...
IRJET Journal
PROVABLE SECURE IDENTITY BASED SIGNCRYPTION SCHEMES WITHOUT RANDOM ORACLES
PROVABLE SECURE IDENTITY BASED SIGNCRYPTION SCHEMES WITHOUT RANDOM ORACLES
IJNSA Journal
IRJET- Secure File Storage on Cloud using Cryptography
IRJET- Secure File Storage on Cloud using Cryptography
IRJET Journal
581 517-525
581 517-525
idescitation
G04944851
G04944851
IOSR-JEN
H42063743
H42063743
IJERA Editor
Comparative study of private and public key cryptography algorithms a survey
Comparative study of private and public key cryptography algorithms a survey
eSAT Publishing House
SIGNCRYPTION SCHEME BASED ON SCHNORR DIGITAL SIGNATURE
SIGNCRYPTION SCHEME BASED ON SCHNORR DIGITAL SIGNATURE
ijp2p
Mj3422172221
Mj3422172221
IJERA Editor
SYMMETRIC-KEY BASED PRIVACYPRESERVING SCHEME FOR MINING SUPPORT COUNTS
SYMMETRIC-KEY BASED PRIVACYPRESERVING SCHEME FOR MINING SUPPORT COUNTS
acijjournal
Emerging Trends In Cryptography And Digital Forensics
Emerging Trends In Cryptography And Digital Forensics
IRJET Journal
More Related Content
What's hot
50120140507006
50120140507006
IAEME Publication
IRJET- A Probabilistic Model of Visual Cryptography Scheme for Anti-Phis...
IRJET- A Probabilistic Model of Visual Cryptography Scheme for Anti-Phis...
IRJET Journal
Image encryption using jumbling salting
Image encryption using jumbling salting
Mauryasuraj98
RSA and RC4 Cryptosystem Performance Evaluation Using Image and Text
RSA and RC4 Cryptosystem Performance Evaluation Using Image and Text
Yekini Nureni
Public key cryptography
Public key cryptography
Lilies DLiestyowati
online payment system using Steganography and Visual cryptography
online payment system using Steganography and Visual cryptography
Shahrukh Ali
Data security for any organization by using public key infrastructure compone...
Data security for any organization by using public key infrastructure compone...
eSAT Publishing House
Online Payment System using Steganography and Visual Cryptography
Online Payment System using Steganography and Visual Cryptography
IJCERT
researchpaperfinal1
researchpaperfinal1
Sumit Bajaj
IRJET- Symmetric Cryptography using Neural Networks
IRJET- Symmetric Cryptography using Neural Networks
IRJET Journal
Mini Project on Data Encryption & Decryption in JAVA
Mini Project on Data Encryption & Decryption in JAVA
chovatiyabhautik
IRJET- Cryptography Encryption and Decryption File Protection based on Mo...
IRJET- Cryptography Encryption and Decryption File Protection based on Mo...
IRJET Journal
PROVABLE SECURE IDENTITY BASED SIGNCRYPTION SCHEMES WITHOUT RANDOM ORACLES
PROVABLE SECURE IDENTITY BASED SIGNCRYPTION SCHEMES WITHOUT RANDOM ORACLES
IJNSA Journal
IRJET- Secure File Storage on Cloud using Cryptography
IRJET- Secure File Storage on Cloud using Cryptography
IRJET Journal
581 517-525
581 517-525
idescitation
G04944851
G04944851
IOSR-JEN
H42063743
H42063743
IJERA Editor
Comparative study of private and public key cryptography algorithms a survey
Comparative study of private and public key cryptography algorithms a survey
eSAT Publishing House
SIGNCRYPTION SCHEME BASED ON SCHNORR DIGITAL SIGNATURE
SIGNCRYPTION SCHEME BASED ON SCHNORR DIGITAL SIGNATURE
ijp2p
What's hot
(19)
50120140507006
50120140507006
IRJET- A Probabilistic Model of Visual Cryptography Scheme for Anti-Phis...
IRJET- A Probabilistic Model of Visual Cryptography Scheme for Anti-Phis...
Image encryption using jumbling salting
Image encryption using jumbling salting
RSA and RC4 Cryptosystem Performance Evaluation Using Image and Text
RSA and RC4 Cryptosystem Performance Evaluation Using Image and Text
Public key cryptography
Public key cryptography
online payment system using Steganography and Visual cryptography
online payment system using Steganography and Visual cryptography
Data security for any organization by using public key infrastructure compone...
Data security for any organization by using public key infrastructure compone...
Online Payment System using Steganography and Visual Cryptography
Online Payment System using Steganography and Visual Cryptography
researchpaperfinal1
researchpaperfinal1
IRJET- Symmetric Cryptography using Neural Networks
IRJET- Symmetric Cryptography using Neural Networks
Mini Project on Data Encryption & Decryption in JAVA
Mini Project on Data Encryption & Decryption in JAVA
IRJET- Cryptography Encryption and Decryption File Protection based on Mo...
IRJET- Cryptography Encryption and Decryption File Protection based on Mo...
PROVABLE SECURE IDENTITY BASED SIGNCRYPTION SCHEMES WITHOUT RANDOM ORACLES
PROVABLE SECURE IDENTITY BASED SIGNCRYPTION SCHEMES WITHOUT RANDOM ORACLES
IRJET- Secure File Storage on Cloud using Cryptography
IRJET- Secure File Storage on Cloud using Cryptography
581 517-525
581 517-525
G04944851
G04944851
H42063743
H42063743
Comparative study of private and public key cryptography algorithms a survey
Comparative study of private and public key cryptography algorithms a survey
SIGNCRYPTION SCHEME BASED ON SCHNORR DIGITAL SIGNATURE
SIGNCRYPTION SCHEME BASED ON SCHNORR DIGITAL SIGNATURE
Similar to IRJET- Cancelable Biometric based Key Generation for Symmetric Cryptography: Survey
Mj3422172221
Mj3422172221
IJERA Editor
SYMMETRIC-KEY BASED PRIVACYPRESERVING SCHEME FOR MINING SUPPORT COUNTS
SYMMETRIC-KEY BASED PRIVACYPRESERVING SCHEME FOR MINING SUPPORT COUNTS
acijjournal
Emerging Trends In Cryptography And Digital Forensics
Emerging Trends In Cryptography And Digital Forensics
IRJET Journal
IRJET-Survey of Highly Secured Methods for Image Transmission using Image Seg...
IRJET-Survey of Highly Secured Methods for Image Transmission using Image Seg...
IRJET Journal
Jit dynamic cryptosystem
Jit dynamic cryptosystem
eSAT Publishing House
IRJET- I-Share: A Secure Way to Share Images
IRJET- I-Share: A Secure Way to Share Images
IRJET Journal
IRJET- Lossless Encryption Technique for Finger Biometric Images
IRJET- Lossless Encryption Technique for Finger Biometric Images
IRJET Journal
IRJET- Security Empowerment using QR Code and Session Tracking for Cued R...
IRJET- Security Empowerment using QR Code and Session Tracking for Cued R...
IRJET Journal
IRJET- Passmatrix Authentication to Overcome Shouldersurfing Attacks
IRJET- Passmatrix Authentication to Overcome Shouldersurfing Attacks
IRJET Journal
IRJET- FPGA Implementation of Image Encryption and Decryption using Fully Hom...
IRJET- FPGA Implementation of Image Encryption and Decryption using Fully Hom...
IRJET Journal
IRJET- Ensuring Security in Cloud Computing Cryptography using Cryptography
IRJET- Ensuring Security in Cloud Computing Cryptography using Cryptography
IRJET Journal
Email Encryption using Tri-Cryptosystem Based on Android
Email Encryption using Tri-Cryptosystem Based on Android
IRJET Journal
AWS Cloud Based Encryption Decryption System
AWS Cloud Based Encryption Decryption System
IRJET Journal
Advanced Security System for Bank Lockers using Biometric and GSM
Advanced Security System for Bank Lockers using Biometric and GSM
IRJET Journal
Secure Data Storage on Cloud System for Privacy Preserving
Secure Data Storage on Cloud System for Privacy Preserving
IRJET Journal
IRJET- Survey of Cryptographic Techniques to Certify Sharing of Informati...
IRJET- Survey of Cryptographic Techniques to Certify Sharing of Informati...
IRJET Journal
Securing Mobile Data using Cryptography
Securing Mobile Data using Cryptography
Eswar Publications
IRJET - Implementation of DNA Cryptography in Cloud Computing and using S...
IRJET - Implementation of DNA Cryptography in Cloud Computing and using S...
IRJET Journal
Stream-keys generation based on graph labeling for strengthening Vigenere en...
Stream-keys generation based on graph labeling for strengthening Vigenere en...
IJECEIAES
IRJET- A Shoulder Surfing Resistance using HMAC Algorithm
IRJET- A Shoulder Surfing Resistance using HMAC Algorithm
IRJET Journal
Similar to IRJET- Cancelable Biometric based Key Generation for Symmetric Cryptography: Survey
(20)
Mj3422172221
Mj3422172221
SYMMETRIC-KEY BASED PRIVACYPRESERVING SCHEME FOR MINING SUPPORT COUNTS
SYMMETRIC-KEY BASED PRIVACYPRESERVING SCHEME FOR MINING SUPPORT COUNTS
Emerging Trends In Cryptography And Digital Forensics
Emerging Trends In Cryptography And Digital Forensics
IRJET-Survey of Highly Secured Methods for Image Transmission using Image Seg...
IRJET-Survey of Highly Secured Methods for Image Transmission using Image Seg...
Jit dynamic cryptosystem
Jit dynamic cryptosystem
IRJET- I-Share: A Secure Way to Share Images
IRJET- I-Share: A Secure Way to Share Images
IRJET- Lossless Encryption Technique for Finger Biometric Images
IRJET- Lossless Encryption Technique for Finger Biometric Images
IRJET- Security Empowerment using QR Code and Session Tracking for Cued R...
IRJET- Security Empowerment using QR Code and Session Tracking for Cued R...
IRJET- Passmatrix Authentication to Overcome Shouldersurfing Attacks
IRJET- Passmatrix Authentication to Overcome Shouldersurfing Attacks
IRJET- FPGA Implementation of Image Encryption and Decryption using Fully Hom...
IRJET- FPGA Implementation of Image Encryption and Decryption using Fully Hom...
IRJET- Ensuring Security in Cloud Computing Cryptography using Cryptography
IRJET- Ensuring Security in Cloud Computing Cryptography using Cryptography
Email Encryption using Tri-Cryptosystem Based on Android
Email Encryption using Tri-Cryptosystem Based on Android
AWS Cloud Based Encryption Decryption System
AWS Cloud Based Encryption Decryption System
Advanced Security System for Bank Lockers using Biometric and GSM
Advanced Security System for Bank Lockers using Biometric and GSM
Secure Data Storage on Cloud System for Privacy Preserving
Secure Data Storage on Cloud System for Privacy Preserving
IRJET- Survey of Cryptographic Techniques to Certify Sharing of Informati...
IRJET- Survey of Cryptographic Techniques to Certify Sharing of Informati...
Securing Mobile Data using Cryptography
Securing Mobile Data using Cryptography
IRJET - Implementation of DNA Cryptography in Cloud Computing and using S...
IRJET - Implementation of DNA Cryptography in Cloud Computing and using S...
Stream-keys generation based on graph labeling for strengthening Vigenere en...
Stream-keys generation based on graph labeling for strengthening Vigenere en...
IRJET- A Shoulder Surfing Resistance using HMAC Algorithm
IRJET- A Shoulder Surfing Resistance using HMAC Algorithm
More from IRJET Journal
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
IRJET Journal
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
IRJET Journal
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
IRJET Journal
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
IRJET Journal
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
IRJET Journal
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
IRJET Journal
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
IRJET Journal
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
IRJET Journal
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
IRJET Journal
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
IRJET Journal
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
IRJET Journal
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
IRJET Journal
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
IRJET Journal
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
IRJET Journal
React based fullstack edtech web application
React based fullstack edtech web application
IRJET Journal
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
IRJET Journal
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
IRJET Journal
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
IRJET Journal
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
IRJET Journal
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
IRJET Journal
More from IRJET Journal
(20)
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
React based fullstack edtech web application
React based fullstack edtech web application
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Recently uploaded
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
slot gacor bisa pakai pulsa
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
ranjana rawat
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptx
wendy cai
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
null - The Open Security Community
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
ranjana rawat
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
João Esperancinha
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )
Tsuyoshi Horigome
main PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfid
NikhilNagaraju
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024
hassan khalil
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptx
upamatechverse
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
ranjana rawat
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
RajkumarAkumalla
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Low Rate Call Girls In Saket, Delhi NCR
Introduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptx
upamatechverse
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
9953056974 Low Rate Call Girls In Saket, Delhi NCR
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
Suhani Kapoor
chaitra-1.pptx fake news detection using machine learning
chaitra-1.pptx fake news detection using machine learning
misbanausheenparvam
Roadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and Routes
M Maged Hegazy, LLM, MBA, CCP, P3O
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
soniya singh
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptx
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptx
humanexperienceaaa
Recently uploaded
(20)
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )
main PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfid
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptx
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
Introduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptx
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
chaitra-1.pptx fake news detection using machine learning
chaitra-1.pptx fake news detection using machine learning
Roadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and Routes
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptx
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptx
IRJET- Cancelable Biometric based Key Generation for Symmetric Cryptography: Survey
1.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 05 Issue: 11 | Nov 2018 www.irjet.net p-ISSN: 2395-0072 © 2018, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 1387 CANCELABLE BIOMETRIC BASED KEY GENERATION FOR SYMMETRIC CRYPTOGRAPHY: SURVEY ASWATHY MADHU1, LASHMA K2 1M. Tech. Student, Computer Science and Engineering, Sree Buddha College of Engineering, Kerala, India. 2Assistant Professor, Computer Science and Engineering, Sree Buddha College of Engineering, Kerala, India. ---------------------------------------------------------------------***---------------------------------------------------------------------- Abstract - In order to solve the problem of attacking the data, cryptographic algorithms along with key generation would be proposed. For symmetric cryptography the sender and the receiver uses the same key for encryption and the decryption process. Strength of the cryptography is based on the hardness of the keys that are used in the cryptographic algorithms. A key should be strong enough so that it is not easily guessable and not feasible to break within real times. Cryptographic keys can be generated by different methods. In this paper, Biometrics are incorporated with cryptography to create better security system. The cryptographic key is generated by using the fingerprint features of the user. Tracing any candidate biometric trait from the cryptographic key is not feasible. One of the problem with biometrics is that once it gets compromised it cannot be reused. Key Words: Fingerprint Biometrics, Symmetric key cryptography, Cryptographic key generation. 1. INTRODUCTION These days, information travels so rapidly and the information to deal with is really huge too. So, information security is one of the biggest issues that are arising nowadays and thus cryptography is used to strengthen the fact that the volatile information does not fall into wrong hands. Cryptographic algorithms are divided intotwo types: symmetric keycryptography algorithmsandasymmetric key cryptography algorithms. In symmetric key cryptography, the sender and the receiver uses same key to encrypt and decrypt the data with the help of encryption and decryption algorithms whereas in asymmetric key cryptography pairof keys are used private key and the public key. The public key is announced publicly and the private key is set as secret. In a public-key encryption system, the public key is used for encryption process, while the private key i.e secret key is used for decryption process. Symmetric algorithmssuchthat data encryption standard(DES),3DESwhichuselongkeys of size 56 bit, 168 bits, advanced encryption standard (AES) uses 128,192 or 256 bits which make the user very difficult to keep in mind such a long key. To overcome these limitations, biometrics has been incorporated with cryptography to create better and robust security system. In a crypto-biometric system, cryptography provides high level security whereas biometrics incorporates non- repudiation so that no need to carry passwords or tokens. Cryptographic key is generated from biometric traitsofuser and the biometrics traits can be fingerprints, iris, retina, palm print, speech, face etc and stored in the database so that it is not possible to reveal the keys without biometric authentication. Since the biometric trait used in key generation must be private; it should not tell anythingabout the user’s biometric data. The biometric trait are fixed in a person and the key that is generated from thebiometrictrait is also fixed. So, if either the biometric trait or the cryptographic key is compromised anyway, it cannot be reused. Different transformation parameters are used in different applications to generate distinct transformed templates. Thus cancelablebiometriccanberevoked easilyif compromised. A cancelable template is generated from the original fingerprint template of both the communicating parties and the original template undergoes a one-way transformation so that it is not possible to recover from the cancelable template and the cancelable template is exchanged between them. The opposite communicating party by receiving the encrypted cancelable template from the other side first decrypts it and combined with its own cancelable template in order to generate a master template on both side. Then secret key is generated from master cancelable fingerprint template. Here the generated secret key is not necessary to store anywhere. 2. LITERATURE SURVEY Various methods are used for generating the cryptographic keys. Some of them are discussed below: 2.1 A matrix formulation for NTRU cryptosystem Rakesh Nayak et al. [2]suggesta methodtogeneratethe keys based on NTRU cryptosystem. In this system a pair of keys i.e both public and private key isgenerated. NTRUisthe first public key cryptosystem that uses lattice-based cryptography to encrypt and decrypt data. NTRU uses truncated polynomials to generate public and private keys based on – Truncated Polynomial Ring Units R=Z[X]/(X^N- 1)) and the basic tool is the reduction of polynomials with respect to two relatively prime moduli. First randomly choosing two matrices X and Y, User A creates a public/private key pair and keeps the matrices private, if anyone knows either one of them will be able to decrypt the messages sent to User A. Then computes matrix Xq as inverse of X modulo q and Xp as inverse X modulo p. And then he computes the product H = p* Xq *Y (modulo q) where p and q are the parameters. User A’s privatekeyisthe pair of matrices X and Xp, and his public key is the matrix H. By using User A’s public key H, User B can send a message to User A and for the encryption process User B first puts his
2.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 05 Issue: 11 | Nov 2018 www.irjet.net p-ISSN: 2395-0072 © 2018, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 1388 message in the form of a binary matrix M, (which is a matrix of order as X and Y).To send a message M, User B chooses a random matrix R (which is of same order as matrix X), and User A’s public key H to compute the matrix ,E = R*H + M (modulo q).The matrix E is the encrypted message which User B sends to User A and the decryption is the reverse of encryption process. 2.2 Classifying Iris Image Based on Feature Extraction and Encryption using Bio-Chaotic Algorithm Rashmi M. Mhatre et al. [3] suggest a method to generate secret key based on iris image feature extraction. Iris image can be classified based on feature extraction algorithms like SIFT i.e Scale-Invariant Feature Transform. Macro features can be retrieved from the iris template using SIFT algorithm. Then the iris images are stored into the database undergoes SIFT feature extractiontechnique.Here, iris image is used in the form of binary patternsandthenthis binary data is divided into number of blocks and the Bio- Chaotic Algorithm is applied to that input image. Firstly image is classified and one block israndomly selected to use as the secret encryption key. This key in return also encrypted using quantum cryptographic algorithm and the whole image is encrypted using the same key. The authorized user only knows aboutthe randomblock then the encrypted image is send to the receiver through e-mail, so that decryption can be done securely at the receiver side. The bio-chaotic stream cipher is used to encrypt the iris images and store them securely usingbiometric key and bio- chaotic function. Bio –chaotic algorithm is used to encrypt the iris image. Here, the initial condition is applied to generate the secret key by using the LFSR method. An LFSR of length n over a finite field Pq consist of n stages (an-1, an- 2, an-3,….…, a0) with ai Є of Pq, and a polynomial. Fig -1: System Architecture B(x) =1+c1x1+c2x2+…. + cnxn over Pq. The secret key and iris template is X-ored simultaneously to generate the biometric key. Biometric key=a1 xor b1, a2 xor b2,.…..., an xor bn. And the generated Biometric key is then Xored with the other blocks of the iris template which encryptstheimage in a way that no attacker can easily decrypt the image. 2.3 Fingerprint Based Symmetric Cryptography Subhas Barman et al. [4] suggest a method to maintain the privacy of key by protecting it with users biometric from unauthorized access. In this method, a cryptographic key is combined with users fingerprint data. A string of binary number is extracted from fingerprint template and this binary number as cryptographic key is used to encrypt a message. In the traditional cryptography, key is stored somewhere else with a protection of user specified password. If the passwordbecomescompromisedinanyway by the attacker then the key also becomescompromised.For that, Biometrics is combined with traditional cryptography to improve the information security with a stronger cryptosystem, known as crypto-biometric system (CBS). In CBS, either cryptographic key is generated from biometric features of the user or key is protected using biometric data. Here, the key is generated from fingerprint template of user so that the user does not require to store or remember the key. As the key is generated from user's key, it can provide non repudiation to information security. Fingerprint features are extracted from the fingerprint image of user A using feature extraction algorithm. Minutiae points are detected as features from the fingerprint image. Minutiae points are represented by the triplet of where is the coordinatevaluesusedas minutiae points and is the alignment angle of minutiae points. The fingerprint template ofuserAisgenerated from the minutiae points. At last, fingerprint template is generated with zero and non-zero values and it is used to generate cryptographic key. Fig -2: Key generation and message encryption process The key generation steps are described below: 1. User A generates fingerprint template from fingerprint features.
3.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 05 Issue: 11 | Nov 2018 www.irjet.net p-ISSN: 2395-0072 © 2018, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 1389 2. User selects an element [i] of template and puts 0 or 1 in the same location of key (i.e., K[i]). 3. User puts 1 in the first location of key vector K (i.e. K[i] = 1). 4. User puts 0 at K[i] if = 0 (i.e., K[i] = 0) and puts 1 if (i.e., K[i] = 1). This way, cryptographic key K is generated from fingerprint template . 2.4 Biometric BasedCryptographicKeyGeneration from Faces B. Chen et al. [5] proposed a method which uses an entropy based feature extraction process and coupled with Reed-Solomon error correcting codes.Sothatitcangenerate deterministic bit-sequences from the output of an iterative one-way transform. Iterative, chaotic, and bispectral are the one-way transform employed by the system that accepts a one-dimensional vector input and is used to produce a magnitude and angle pair per iteration. The output can be converted to binary to form a very large bit matrix andthese matrices are used to locate feature bits suitable to be used as part of the bio-key (Borig) usinganentropybasedcriteria. Fig -3: Biometric cryptosystem flowchart To create a lookup table, these bio-keys are then combined with the Reed-Solomon encoded version (Korig) of the protected cryptographic key (korig) and that can be used to regenerate korig given a slightly modified bio-key Bmod presented by the user in future. The technique is evaluated using 3D face data and produce keys of suitable length for 128-bit Advanced Encryption Standard (AES). 2.5 A Novel Algorithm towards Designing the Protocol for Generation of Secret key with Authentication in Collaboration (PGSAC) Shyamasree Mukherjee et al. [6] proposed an authentication technique for new nodes to an ad-hoc network. Here, the request-reply messages are used to generate a secret key at the two ends. It also estimates the distance of a node from the power loss of a message from node. Based on this distance, both the sender and the receiver separately compute the same secret key.Itdoes not use GPS and identifies location of nodes by distance and direction only. If a new node S with cryptographic key K want to communicate with an existing node R in an ad hoc network by using this key K node S encrypt message and transmits to node R and the encrypted message by node R decryptedbyS Using the same key k. This mechanism consists of two parts key generation and key management. Fig -4: Trust model Steps for key generation: Step 1: New node S sends request signal to node R with power of the signal P1 and simultaneously S also sends request signal to friend nodes A andBwithpowerP2and P3. Step 2: R can compute the power loss L1 and the distance D1 using the given equation. Step3: A can compute the power losses L2 and sends to R. Similarly B can compute the power losses L3 and send to R.
4.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 05 Issue: 11 | Nov 2018 www.irjet.net p-ISSN: 2395-0072 © 2018, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 1390 Step4: Using L2 and L3 node R computes the distanceD2, D3 and arranges the distances in ascending order to have the key k. Step5: A and B also send the same with power P2 andP3and S can compute distances D1, D2 and D3 from power losses L1, L2 and L3 and S arranges the distances D1, D2 and D3 in ascending order and makes the same key itself without any key transmission. 2.6SymmetricKeyAlgorithmUsingVernam Cipher : VSA Bhagyashri K. Pawar et al. [7] suggest a method to achieve security measures for data and information. In this, cryptosystem consists of threealgorithms:1)keygeneration 2) encryption process 3) decryption process. The key generation is dependent on current system time. Different keys are generated at different instances therefore time is a major factor in this system. The key generationisdoneusing public static long currentTimeMillis() method in java which makes the system more secure and at every start of the session the key will be different. Steps for key generation: Step1: Take current time in milliseconds. Step2: Pass this time value to simple random number generator. Step3: Calculate its absolute value Step4: Generate Key1. Step5: Take next instant of system’s time Step6: To generate Key2 follow step2 & 3. For every message a new pair of keys is generated therefore this system achieves a high level of secrecy as the system is symmetric which makes the proposed cryptosystem more unique. 3. CONCLUSION The literature survey could fetch a number of different methods to generate the cryptographic key. The limitations of the existing methods are: key is stored somewhere else with a protection of user specifiedpassword,ifthepassword becomes compromised in anyway by the attacker then the key also becomes compromised. For that, Biometrics is combined with traditional cryptography to ensure better security systems. Here the cryptographic key is strongly linked with the fingerprint traits of the user and the key is generated using cancelable fingerprint template of both the communicating parties at their sites. This cryptographic key is not required to be remembered and also not required to be stored. REFERENCES [1] A. Sarkar and B. K. Singh, "Cancelable biometric based key generation for symmetric cryptography," 2017 International Conference on Inventive Communication and Computational Technologies (ICICCT), Coimbatore, 2017, pp. 404-409. [2] R. Nayak, C. V. Sastry and J. Pradhan, "A matrix formulation for NTRU cryptosystem," 2008 16th IEEE International Conferenceon Networks, NewDelhi, 2008, pp. 1-5. [3] R. M. Mhatre and D. Bhardwaj, "Classifying Iris Image Based on Feature Extraction and Encryption Using Bio- Chaotic Algorithm (BCA)," 2015 International Conference on Computational Intelligence and Communication Networks (CICN), Jabalpur, 2015, pp. 1068-1073. [4] S. Barman, S. Chattopadhyay and D. Samanta, "Fingerprint based symmetric cryptography," 2014 International Conference on High Performance Computing and Applications (ICHPCA), Bhubaneswar, 2014, pp. 1-6. [5] B. Chen and V. Chandran, "Biometric Based Cryptographic Key Generation fromFaces," 9thBiennial ConferenceoftheAustralianPatternRecognitionSociety on Digital Image Computing Techniques and Applications (DICTA 2007), Glenelg, Australia,2007,pp. 394-401. [6] S. Mukherjee, S. Choudhury, N. Chaki and D. Mukhopadhyay, "A Novel Algorithm towards Designing the Protocol for Generation of Secret-Key with Authentication in Collaboration (PGSAC)," 2007 International Symposium on Information Technology Convergence (ISITC 2007), Joenju, 2007, pp. 353-327. [7] S. S. Hatkar and B. K. Pawar, "Symmetric key algorithm using vernam cipher: VSA," 2016 International Conference on Inventive Computation Technologies (ICICT), Coimbatore, 2016, pp. 1-5.
Download now