SlideShare a Scribd company logo
1 of 20
Biometrics Based Key Generation
Using DIFFIE HELLMAN Key Exchange for Enhanced Security Mechanism
By: YASH MODI(E004)
PIYUSH ROCHWANI(E030)
What is Biometrics
 Biometric system of identification uses unique feature of face, hands like iris, retina, finger print,
structure of the face to identify a person with a unique characteristic that differentiates the
concerned person from others
Why Biometrics is necessary?
 In non-biometric authentication process such as usage of passwords or PIN numbers, depending
upon the length of the key, the information is very much vulnerable to unauthorized access by
individuals
 Longer and random passwords are safer than short words that contain dictionary words
 Finger print is an impression left by the friction ridges of a human finger
 They are formed in humans in their definitive form before birth and are always unique. Finger prints
play an important role in forensic science
Finger Print(A type of Biometrics)
 Finger print matching methods are categorized into three classes.
1. They are correlation based matching
2. Minutiae based matching
3. Ridge feature based matching.
Sergey Tulyakov at al1 propose to use symmetric hash functions to secure biometric systems. Fuzzy extractor2
binds random data with biometric data to produce unique keys.
Diffie-Hellman algorithm
 Diffie-Hellman algorithm (DH algorithm) is a way of generating a shared secret key between two
people in such a way that the secret key cannot be intruded by observing the communication over
an insecure communication channel
 The distinguishing feature is that you are not sharing information during the key exchange, you are
creating key together. This is particularly useful because you can use this technique perform
encryption with public key of the receiver, and then start encrypting your incoming data with your
private key
Diffie-Hellman algorithm
 In Diffie Hellman algorithm, initially there will be one private key and public key this two keys on
combination a shared key is generated. In the generation process two common variables are used.
The two common variable here we are using as α and q.
 Constraints for the variable α & q:
1. Q-it should be the prime number.
2. α should be lesser than Q
3. α-it should be the primitive root of Q
Diffie-Hellman algorithm
 The Diffie-Hellman key exchange algorithm starts with the selection of a prime number plus one of
its primitive roots (sometimes called "primitive generators"). So, what's a primitive root?
 If the prime number is p, a primitive root (or generator) g is a number, that when n goes from 1 to
p-1, then gn mod p goes through all the numbers 1...(p-1) in some order.
 gn mod p means the remainder when you raise g to n and divide by p.
Diffie-Hellman algorithm
Diffie-Hellman algorithm
Degree of Security in DH Algorithm
DH Algorithm
Calculation Performed by Sender
Calculation Performed by Receiver
Key Generation Process
Why we have selected Finger Print as a Private
Key
 Proposed System Among all the recent biometric techniques, the fingerprint is the most successful
and secured feature for the personal authentication.
 This features enable us to use fingerprint authentication system where security is a prime
requirement.
 The following analysis made finger print as a choice of selection (Table- 1).
 Here we can use the finger print as the private key for the generation of key for encryption.
Why we have selected Finger Print as a Private
Key
Overall process of Key Generation
Conversion of Finger print to Numeric data:
Conclusion
 The research paper is proposed for enhanced network security.
 For this analysis, Diffie Hellman algorithm has been implemented which is based on shared key
concept. The usage of finger print instead of random number as a private key in the algorithm
provides better security for data transfer over the network with high confidentiality.
References:
 International Journal of ChemTech Research CODEN (USA): IJCRGG ISSN : 0974-4290 Vol.6, No.9,
pp 4359-4365, September 2014 |RTBCE 2014[12th August 2014] Recent Trends in Biotechnology
and Chemical Engineering
 Biometrics Based Key Generation using Diffie Hellman Key Exchange for Enhanced Security
Mechanism M.S.Durairajan1* , Dr.R. Saravanan2 1Departmentof Information Technology, Vel Tech
High Tech Dr.Rangarajan Dr.Sakunthala Engineering College, Avadi, Chennai, India 2Computer
Science and Engineering, RVS Educational’s Trusts Group of Institutions, Dindigul, TamilNadu, India
*Corres.author: M.S.Durairajan
 http://homepage.smc.edu/morgan_david/vpn/assignments/assgt-primitive-roots.htm

More Related Content

What's hot

Cryptography - Block cipher & stream cipher
Cryptography - Block cipher & stream cipherCryptography - Block cipher & stream cipher
Cryptography - Block cipher & stream cipherNiloy Biswas
 
Steganography - The art of hiding data
Steganography - The art of hiding dataSteganography - The art of hiding data
Steganography - The art of hiding dataSarin Thapa
 
Cryptography & Steganography
Cryptography & SteganographyCryptography & Steganography
Cryptography & SteganographyAnimesh Shaw
 
Steganography
Steganography Steganography
Steganography Uttam Jain
 
Trible data encryption standard (3DES)
Trible data encryption standard (3DES)Trible data encryption standard (3DES)
Trible data encryption standard (3DES)Ahmed Mohamed Mahmoud
 
Steganography and its techniques
Steganography and its techniquesSteganography and its techniques
Steganography and its techniquesFatema Panvelwala
 
Multi modal biometric system
Multi modal biometric systemMulti modal biometric system
Multi modal biometric systemAalaa Khattab
 
Learning for semantic parsing using statistical syntactic parsing techniques
Learning for semantic parsing using statistical syntactic parsing techniquesLearning for semantic parsing using statistical syntactic parsing techniques
Learning for semantic parsing using statistical syntactic parsing techniquesUKM university
 
Natural language processing: feature extraction
Natural language processing: feature extractionNatural language processing: feature extraction
Natural language processing: feature extractionGabriel Hamilton
 
Handwriting Recognition
Handwriting RecognitionHandwriting Recognition
Handwriting RecognitionBindu Karki
 
digital-watermarking-and-steganography syllabus . . . . . . .
digital-watermarking-and-steganography syllabus . . . . . . . digital-watermarking-and-steganography syllabus . . . . . . .
digital-watermarking-and-steganography syllabus . . . . . . . Praneeth Kumar
 

What's hot (20)

Cryptography - Block cipher & stream cipher
Cryptography - Block cipher & stream cipherCryptography - Block cipher & stream cipher
Cryptography - Block cipher & stream cipher
 
PPT steganography
PPT steganographyPPT steganography
PPT steganography
 
Steganography - The art of hiding data
Steganography - The art of hiding dataSteganography - The art of hiding data
Steganography - The art of hiding data
 
Cryptography & Steganography
Cryptography & SteganographyCryptography & Steganography
Cryptography & Steganography
 
Steganography
Steganography Steganography
Steganography
 
Trible data encryption standard (3DES)
Trible data encryption standard (3DES)Trible data encryption standard (3DES)
Trible data encryption standard (3DES)
 
Steganography
SteganographySteganography
Steganography
 
Elliptic curve cryptography
Elliptic curve cryptographyElliptic curve cryptography
Elliptic curve cryptography
 
Steganography and its techniques
Steganography and its techniquesSteganography and its techniques
Steganography and its techniques
 
Biometrics
BiometricsBiometrics
Biometrics
 
Biometrics Technology In the 21st Century
Biometrics Technology In the 21st CenturyBiometrics Technology In the 21st Century
Biometrics Technology In the 21st Century
 
Hybrid encryption
Hybrid encryption Hybrid encryption
Hybrid encryption
 
Multi modal biometric system
Multi modal biometric systemMulti modal biometric system
Multi modal biometric system
 
Learning for semantic parsing using statistical syntactic parsing techniques
Learning for semantic parsing using statistical syntactic parsing techniquesLearning for semantic parsing using statistical syntactic parsing techniques
Learning for semantic parsing using statistical syntactic parsing techniques
 
Natural language processing: feature extraction
Natural language processing: feature extractionNatural language processing: feature extraction
Natural language processing: feature extraction
 
Steganography ppt
Steganography pptSteganography ppt
Steganography ppt
 
Steganography
SteganographySteganography
Steganography
 
Handwriting Recognition
Handwriting RecognitionHandwriting Recognition
Handwriting Recognition
 
digital-watermarking-and-steganography syllabus . . . . . . .
digital-watermarking-and-steganography syllabus . . . . . . . digital-watermarking-and-steganography syllabus . . . . . . .
digital-watermarking-and-steganography syllabus . . . . . . .
 
Steganography
SteganographySteganography
Steganography
 

Viewers also liked

How to Backdoor Diffie-Hellman
How to Backdoor Diffie-HellmanHow to Backdoor Diffie-Hellman
How to Backdoor Diffie-HellmanDavid Wong
 
Cryptography - Simplified - Key Generation - Asymmetric Keys
Cryptography - Simplified - Key Generation - Asymmetric KeysCryptography - Simplified - Key Generation - Asymmetric Keys
Cryptography - Simplified - Key Generation - Asymmetric KeysAbdul Manaf Vellakodath
 
Rsa and diffie hellman algorithms
Rsa and diffie hellman algorithmsRsa and diffie hellman algorithms
Rsa and diffie hellman algorithmsdaxesh chauhan
 
Rsa algorithm key generation
Rsa algorithm key generation Rsa algorithm key generation
Rsa algorithm key generation swarnapatil
 
Booth’s algorithm.(a014& a015)
Booth’s algorithm.(a014& a015)Booth’s algorithm.(a014& a015)
Booth’s algorithm.(a014& a015)Piyush Rochwani
 
Data Science and Big Data Analytics Book from EMC Education Services
Data Science and Big Data Analytics Book from EMC Education ServicesData Science and Big Data Analytics Book from EMC Education Services
Data Science and Big Data Analytics Book from EMC Education ServicesEMC
 
Big Data/DIG: Domain-Specific Insight Graphs by Pedro Szekely of ISI/USC
Big Data/DIG: Domain-Specific Insight Graphs by Pedro Szekely of ISI/USCBig Data/DIG: Domain-Specific Insight Graphs by Pedro Szekely of ISI/USC
Big Data/DIG: Domain-Specific Insight Graphs by Pedro Szekely of ISI/USCETCenter
 

Viewers also liked (20)

Unit 2
Unit 2Unit 2
Unit 2
 
Unit 3
Unit 3Unit 3
Unit 3
 
06 floating point
06 floating point06 floating point
06 floating point
 
How to Backdoor Diffie-Hellman
How to Backdoor Diffie-HellmanHow to Backdoor Diffie-Hellman
How to Backdoor Diffie-Hellman
 
Binary numbers-7-12-2011
Binary numbers-7-12-2011Binary numbers-7-12-2011
Binary numbers-7-12-2011
 
Alu1
Alu1Alu1
Alu1
 
Cisc(a022& a023)
Cisc(a022& a023)Cisc(a022& a023)
Cisc(a022& a023)
 
Cryptography - Simplified - Key Generation - Asymmetric Keys
Cryptography - Simplified - Key Generation - Asymmetric KeysCryptography - Simplified - Key Generation - Asymmetric Keys
Cryptography - Simplified - Key Generation - Asymmetric Keys
 
Rsa and diffie hellman algorithms
Rsa and diffie hellman algorithmsRsa and diffie hellman algorithms
Rsa and diffie hellman algorithms
 
Rsa algorithm key generation
Rsa algorithm key generation Rsa algorithm key generation
Rsa algorithm key generation
 
Booth’s algorithm.(a014& a015)
Booth’s algorithm.(a014& a015)Booth’s algorithm.(a014& a015)
Booth’s algorithm.(a014& a015)
 
Android os
Android osAndroid os
Android os
 
8086 Microprocessor
8086 Microprocessor8086 Microprocessor
8086 Microprocessor
 
Big Data Analysis Starts with R
Big Data Analysis Starts with RBig Data Analysis Starts with R
Big Data Analysis Starts with R
 
Arithmetic circuits
Arithmetic circuitsArithmetic circuits
Arithmetic circuits
 
Data Science and Big Data Analytics Book from EMC Education Services
Data Science and Big Data Analytics Book from EMC Education ServicesData Science and Big Data Analytics Book from EMC Education Services
Data Science and Big Data Analytics Book from EMC Education Services
 
Big Data/DIG: Domain-Specific Insight Graphs by Pedro Szekely of ISI/USC
Big Data/DIG: Domain-Specific Insight Graphs by Pedro Szekely of ISI/USCBig Data/DIG: Domain-Specific Insight Graphs by Pedro Szekely of ISI/USC
Big Data/DIG: Domain-Specific Insight Graphs by Pedro Szekely of ISI/USC
 
EMC config Hadoop
EMC config HadoopEMC config Hadoop
EMC config Hadoop
 
05 multiply divide
05 multiply divide05 multiply divide
05 multiply divide
 
Raid
Raid Raid
Raid
 

Similar to Biometrics based key generation

Introduction-to-Diffie-Hellman-Key-Exchange.pptx
Introduction-to-Diffie-Hellman-Key-Exchange.pptxIntroduction-to-Diffie-Hellman-Key-Exchange.pptx
Introduction-to-Diffie-Hellman-Key-Exchange.pptxJayaLakshmi277
 
Introduction-to-Diffie-Hellman-Key-Exchange.pptx
Introduction-to-Diffie-Hellman-Key-Exchange.pptxIntroduction-to-Diffie-Hellman-Key-Exchange.pptx
Introduction-to-Diffie-Hellman-Key-Exchange.pptxJayaLakshmi277
 
SIGNCRYPTION SCHEME BASED ON SCHNORR DIGITAL SIGNATURE
SIGNCRYPTION SCHEME BASED ON SCHNORR DIGITAL SIGNATURESIGNCRYPTION SCHEME BASED ON SCHNORR DIGITAL SIGNATURE
SIGNCRYPTION SCHEME BASED ON SCHNORR DIGITAL SIGNATUREijp2p
 
E-VOTING PROTOCOL BASED ON PUBLIC-KEY CRYPTOGRAPHY
E-VOTING PROTOCOL BASED ON PUBLIC-KEY CRYPTOGRAPHYE-VOTING PROTOCOL BASED ON PUBLIC-KEY CRYPTOGRAPHY
E-VOTING PROTOCOL BASED ON PUBLIC-KEY CRYPTOGRAPHYIJNSA Journal
 
Comparative analysis of efficiency of fibonacci random number generator algor...
Comparative analysis of efficiency of fibonacci random number generator algor...Comparative analysis of efficiency of fibonacci random number generator algor...
Comparative analysis of efficiency of fibonacci random number generator algor...Alexander Decker
 
Unit - I cyber security fundamentals part -1.pptx
Unit - I cyber security fundamentals part -1.pptxUnit - I cyber security fundamentals part -1.pptx
Unit - I cyber security fundamentals part -1.pptxkarthikaparthasarath
 
Innovative field of cryptography: DNA cryptography
Innovative field of cryptography: DNA cryptography Innovative field of cryptography: DNA cryptography
Innovative field of cryptography: DNA cryptography cscpconf
 
Omlis fact sheet july 2014, Secure Mobile Payments
Omlis fact sheet july 2014, Secure Mobile PaymentsOmlis fact sheet july 2014, Secure Mobile Payments
Omlis fact sheet july 2014, Secure Mobile PaymentsSimon Cairns
 
APPLICATION OF HOMOMORPHIC ENCRYPTION ALGORITHM IN ELECTRONIC VOTING SYSTEM
APPLICATION OF HOMOMORPHIC ENCRYPTION ALGORITHM IN ELECTRONIC VOTING SYSTEMAPPLICATION OF HOMOMORPHIC ENCRYPTION ALGORITHM IN ELECTRONIC VOTING SYSTEM
APPLICATION OF HOMOMORPHIC ENCRYPTION ALGORITHM IN ELECTRONIC VOTING SYSTEMSIR SUCCESS PRINCE DUAH DUAH
 
Comparison of Various Encryption Algorithms and Techniques for improving secu...
Comparison of Various Encryption Algorithms and Techniques for improving secu...Comparison of Various Encryption Algorithms and Techniques for improving secu...
Comparison of Various Encryption Algorithms and Techniques for improving secu...IOSR Journals
 
Genetic algorithm based key generation for fully homomorphic encryption
Genetic algorithm based key generation for fully homomorphic encryptionGenetic algorithm based key generation for fully homomorphic encryption
Genetic algorithm based key generation for fully homomorphic encryptionMajedahAlkharji
 
Fingerprint Authentication Using Biometric And Aadhar Card Fingerprint
Fingerprint Authentication Using Biometric And Aadhar Card FingerprintFingerprint Authentication Using Biometric And Aadhar Card Fingerprint
Fingerprint Authentication Using Biometric And Aadhar Card FingerprintSonuSawant
 
A New Method for Encrypting Digital Data Using Symmetric Key in Information E...
A New Method for Encrypting Digital Data Using Symmetric Key in Information E...A New Method for Encrypting Digital Data Using Symmetric Key in Information E...
A New Method for Encrypting Digital Data Using Symmetric Key in Information E...Editor IJCATR
 
Chaos Based Direct Public Verifiable Signcryption Scheme
Chaos Based Direct Public Verifiable Signcryption SchemeChaos Based Direct Public Verifiable Signcryption Scheme
Chaos Based Direct Public Verifiable Signcryption SchemeIOSR Journals
 
Computer System Security (UNIT IV) For AKTU Lucknow
Computer System Security (UNIT IV) For AKTU LucknowComputer System Security (UNIT IV) For AKTU Lucknow
Computer System Security (UNIT IV) For AKTU LucknowBrijesh Vishwakarma
 

Similar to Biometrics based key generation (20)

Introduction-to-Diffie-Hellman-Key-Exchange.pptx
Introduction-to-Diffie-Hellman-Key-Exchange.pptxIntroduction-to-Diffie-Hellman-Key-Exchange.pptx
Introduction-to-Diffie-Hellman-Key-Exchange.pptx
 
Introduction-to-Diffie-Hellman-Key-Exchange.pptx
Introduction-to-Diffie-Hellman-Key-Exchange.pptxIntroduction-to-Diffie-Hellman-Key-Exchange.pptx
Introduction-to-Diffie-Hellman-Key-Exchange.pptx
 
SIGNCRYPTION SCHEME BASED ON SCHNORR DIGITAL SIGNATURE
SIGNCRYPTION SCHEME BASED ON SCHNORR DIGITAL SIGNATURESIGNCRYPTION SCHEME BASED ON SCHNORR DIGITAL SIGNATURE
SIGNCRYPTION SCHEME BASED ON SCHNORR DIGITAL SIGNATURE
 
E-VOTING PROTOCOL BASED ON PUBLIC-KEY CRYPTOGRAPHY
E-VOTING PROTOCOL BASED ON PUBLIC-KEY CRYPTOGRAPHYE-VOTING PROTOCOL BASED ON PUBLIC-KEY CRYPTOGRAPHY
E-VOTING PROTOCOL BASED ON PUBLIC-KEY CRYPTOGRAPHY
 
Comparative analysis of efficiency of fibonacci random number generator algor...
Comparative analysis of efficiency of fibonacci random number generator algor...Comparative analysis of efficiency of fibonacci random number generator algor...
Comparative analysis of efficiency of fibonacci random number generator algor...
 
Unit - I cyber security fundamentals part -1.pptx
Unit - I cyber security fundamentals part -1.pptxUnit - I cyber security fundamentals part -1.pptx
Unit - I cyber security fundamentals part -1.pptx
 
Innovative field of cryptography: DNA cryptography
Innovative field of cryptography: DNA cryptography Innovative field of cryptography: DNA cryptography
Innovative field of cryptography: DNA cryptography
 
Data encryption
Data encryptionData encryption
Data encryption
 
Omlis fact sheet july 2014, Secure Mobile Payments
Omlis fact sheet july 2014, Secure Mobile PaymentsOmlis fact sheet july 2014, Secure Mobile Payments
Omlis fact sheet july 2014, Secure Mobile Payments
 
APPLICATION OF HOMOMORPHIC ENCRYPTION ALGORITHM IN ELECTRONIC VOTING SYSTEM
APPLICATION OF HOMOMORPHIC ENCRYPTION ALGORITHM IN ELECTRONIC VOTING SYSTEMAPPLICATION OF HOMOMORPHIC ENCRYPTION ALGORITHM IN ELECTRONIC VOTING SYSTEM
APPLICATION OF HOMOMORPHIC ENCRYPTION ALGORITHM IN ELECTRONIC VOTING SYSTEM
 
Comparison of Various Encryption Algorithms and Techniques for improving secu...
Comparison of Various Encryption Algorithms and Techniques for improving secu...Comparison of Various Encryption Algorithms and Techniques for improving secu...
Comparison of Various Encryption Algorithms and Techniques for improving secu...
 
L017136269
L017136269L017136269
L017136269
 
logo ppt.pptx
logo ppt.pptxlogo ppt.pptx
logo ppt.pptx
 
Research
ResearchResearch
Research
 
(2006) Keystroke Dynamics Verification Using a Spontaneously Generated Password
(2006) Keystroke Dynamics Verification Using a Spontaneously Generated Password(2006) Keystroke Dynamics Verification Using a Spontaneously Generated Password
(2006) Keystroke Dynamics Verification Using a Spontaneously Generated Password
 
Genetic algorithm based key generation for fully homomorphic encryption
Genetic algorithm based key generation for fully homomorphic encryptionGenetic algorithm based key generation for fully homomorphic encryption
Genetic algorithm based key generation for fully homomorphic encryption
 
Fingerprint Authentication Using Biometric And Aadhar Card Fingerprint
Fingerprint Authentication Using Biometric And Aadhar Card FingerprintFingerprint Authentication Using Biometric And Aadhar Card Fingerprint
Fingerprint Authentication Using Biometric And Aadhar Card Fingerprint
 
A New Method for Encrypting Digital Data Using Symmetric Key in Information E...
A New Method for Encrypting Digital Data Using Symmetric Key in Information E...A New Method for Encrypting Digital Data Using Symmetric Key in Information E...
A New Method for Encrypting Digital Data Using Symmetric Key in Information E...
 
Chaos Based Direct Public Verifiable Signcryption Scheme
Chaos Based Direct Public Verifiable Signcryption SchemeChaos Based Direct Public Verifiable Signcryption Scheme
Chaos Based Direct Public Verifiable Signcryption Scheme
 
Computer System Security (UNIT IV) For AKTU Lucknow
Computer System Security (UNIT IV) For AKTU LucknowComputer System Security (UNIT IV) For AKTU Lucknow
Computer System Security (UNIT IV) For AKTU Lucknow
 

More from Piyush Rochwani

More from Piyush Rochwani (13)

Serial transmission
Serial transmissionSerial transmission
Serial transmission
 
Sequential and combinational alu
Sequential and combinational alu Sequential and combinational alu
Sequential and combinational alu
 
Memory virtualization
Memory virtualizationMemory virtualization
Memory virtualization
 
Risc
RiscRisc
Risc
 
Pipelining and co processor.
Pipelining and co processor.Pipelining and co processor.
Pipelining and co processor.
 
Paging and segmentation
Paging and segmentationPaging and segmentation
Paging and segmentation
 
Page replacement algorithms
Page replacement algorithmsPage replacement algorithms
Page replacement algorithms
 
Dma
DmaDma
Dma
 
Control unit
Control unitControl unit
Control unit
 
Memory types
Memory typesMemory types
Memory types
 
Solid state solid state drives
Solid state solid state drivesSolid state solid state drives
Solid state solid state drives
 
Coa INTERUPT
Coa INTERUPTCoa INTERUPT
Coa INTERUPT
 
Air pollution in mumbai
Air pollution in mumbaiAir pollution in mumbai
Air pollution in mumbai
 

Recently uploaded

Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Serviceranjana rawat
 
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )Tsuyoshi Horigome
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCall Girls in Nagpur High Profile
 
Porous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingPorous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingrakeshbaidya232001
 
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...roncy bisnoi
 
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130Suhani Kapoor
 
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)Suman Mia
 
UNIT-III FMM. DIMENSIONAL ANALYSIS
UNIT-III FMM.        DIMENSIONAL ANALYSISUNIT-III FMM.        DIMENSIONAL ANALYSIS
UNIT-III FMM. DIMENSIONAL ANALYSISrknatarajan
 
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
UNIT-II FMM-Flow Through Circular Conduits
UNIT-II FMM-Flow Through Circular ConduitsUNIT-II FMM-Flow Through Circular Conduits
UNIT-II FMM-Flow Through Circular Conduitsrknatarajan
 
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete RecordCCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete RecordAsst.prof M.Gokilavani
 
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSHARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSRajkumarAkumalla
 
Extrusion Processes and Their Limitations
Extrusion Processes and Their LimitationsExtrusion Processes and Their Limitations
Extrusion Processes and Their Limitations120cr0395
 
result management system report for college project
result management system report for college projectresult management system report for college project
result management system report for college projectTonystark477637
 
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 

Recently uploaded (20)

Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
 
Water Industry Process Automation & Control Monthly - April 2024
Water Industry Process Automation & Control Monthly - April 2024Water Industry Process Automation & Control Monthly - April 2024
Water Industry Process Automation & Control Monthly - April 2024
 
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
 
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
 
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
 
Porous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingPorous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writing
 
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
 
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
 
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
 
UNIT-III FMM. DIMENSIONAL ANALYSIS
UNIT-III FMM.        DIMENSIONAL ANALYSISUNIT-III FMM.        DIMENSIONAL ANALYSIS
UNIT-III FMM. DIMENSIONAL ANALYSIS
 
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
UNIT-II FMM-Flow Through Circular Conduits
UNIT-II FMM-Flow Through Circular ConduitsUNIT-II FMM-Flow Through Circular Conduits
UNIT-II FMM-Flow Through Circular Conduits
 
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete RecordCCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
 
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSHARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
 
Extrusion Processes and Their Limitations
Extrusion Processes and Their LimitationsExtrusion Processes and Their Limitations
Extrusion Processes and Their Limitations
 
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINEDJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
 
result management system report for college project
result management system report for college projectresult management system report for college project
result management system report for college project
 
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 

Biometrics based key generation

  • 1. Biometrics Based Key Generation Using DIFFIE HELLMAN Key Exchange for Enhanced Security Mechanism By: YASH MODI(E004) PIYUSH ROCHWANI(E030)
  • 2. What is Biometrics  Biometric system of identification uses unique feature of face, hands like iris, retina, finger print, structure of the face to identify a person with a unique characteristic that differentiates the concerned person from others
  • 3. Why Biometrics is necessary?  In non-biometric authentication process such as usage of passwords or PIN numbers, depending upon the length of the key, the information is very much vulnerable to unauthorized access by individuals  Longer and random passwords are safer than short words that contain dictionary words  Finger print is an impression left by the friction ridges of a human finger  They are formed in humans in their definitive form before birth and are always unique. Finger prints play an important role in forensic science
  • 4. Finger Print(A type of Biometrics)  Finger print matching methods are categorized into three classes. 1. They are correlation based matching 2. Minutiae based matching 3. Ridge feature based matching. Sergey Tulyakov at al1 propose to use symmetric hash functions to secure biometric systems. Fuzzy extractor2 binds random data with biometric data to produce unique keys.
  • 5. Diffie-Hellman algorithm  Diffie-Hellman algorithm (DH algorithm) is a way of generating a shared secret key between two people in such a way that the secret key cannot be intruded by observing the communication over an insecure communication channel  The distinguishing feature is that you are not sharing information during the key exchange, you are creating key together. This is particularly useful because you can use this technique perform encryption with public key of the receiver, and then start encrypting your incoming data with your private key
  • 6. Diffie-Hellman algorithm  In Diffie Hellman algorithm, initially there will be one private key and public key this two keys on combination a shared key is generated. In the generation process two common variables are used. The two common variable here we are using as α and q.  Constraints for the variable α & q: 1. Q-it should be the prime number. 2. α should be lesser than Q 3. α-it should be the primitive root of Q
  • 7. Diffie-Hellman algorithm  The Diffie-Hellman key exchange algorithm starts with the selection of a prime number plus one of its primitive roots (sometimes called "primitive generators"). So, what's a primitive root?  If the prime number is p, a primitive root (or generator) g is a number, that when n goes from 1 to p-1, then gn mod p goes through all the numbers 1...(p-1) in some order.  gn mod p means the remainder when you raise g to n and divide by p.
  • 10. Degree of Security in DH Algorithm
  • 15. Why we have selected Finger Print as a Private Key  Proposed System Among all the recent biometric techniques, the fingerprint is the most successful and secured feature for the personal authentication.  This features enable us to use fingerprint authentication system where security is a prime requirement.  The following analysis made finger print as a choice of selection (Table- 1).  Here we can use the finger print as the private key for the generation of key for encryption.
  • 16. Why we have selected Finger Print as a Private Key
  • 17. Overall process of Key Generation
  • 18. Conversion of Finger print to Numeric data:
  • 19. Conclusion  The research paper is proposed for enhanced network security.  For this analysis, Diffie Hellman algorithm has been implemented which is based on shared key concept. The usage of finger print instead of random number as a private key in the algorithm provides better security for data transfer over the network with high confidentiality.
  • 20. References:  International Journal of ChemTech Research CODEN (USA): IJCRGG ISSN : 0974-4290 Vol.6, No.9, pp 4359-4365, September 2014 |RTBCE 2014[12th August 2014] Recent Trends in Biotechnology and Chemical Engineering  Biometrics Based Key Generation using Diffie Hellman Key Exchange for Enhanced Security Mechanism M.S.Durairajan1* , Dr.R. Saravanan2 1Departmentof Information Technology, Vel Tech High Tech Dr.Rangarajan Dr.Sakunthala Engineering College, Avadi, Chennai, India 2Computer Science and Engineering, RVS Educational’s Trusts Group of Institutions, Dindigul, TamilNadu, India *Corres.author: M.S.Durairajan  http://homepage.smc.edu/morgan_david/vpn/assignments/assgt-primitive-roots.htm