Biometric key capsulation technique based on fingerprint vault: Anatomy and attack

M. S. AlTarawneh, W. L. Woo, S. S

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

1 Citation (Scopus)

Abstract

All cryptographic algorithms have a proven security but they suffer from the key management problems: hiding a key and unlocking it with biometric or other approximately matching data. We propose a practical key capsulation mechanism with a simple and intuitive design concept to overcome the management and security issues. Capsulation process solved the problems of key management and distributes level of security on capsulation shields. Keys entropy depends on level of shielding, secret key depend on degree of polynomial, while encryption key depend on constructed vault entropy, and it is slightly more efficient in terms of encryption/decryption speed because it used a heading capsulation technique on covering the ciphertexts. Our results in term of attack computation complexity analysis are encouraging, while it is acceptable for the authorized users.

Original languageEnglish
Title of host publication2008 3rd International Conference on Information and Communication Technologis
Subtitle of host publicationFrom Theory to Applications, ICTTA
PublisherIEEE
ISBN (Electronic)9781424417520
ISBN (Print)9781424417513
DOIs
Publication statusPublished - 23 May 2008
Event2008 3rd International Conference on Information and Communication Technologies: From Theory to Applications, ICTTA - Damascus, Syrian Arab Republic
Duration: 7 Apr 200811 Apr 2008

Conference

Conference2008 3rd International Conference on Information and Communication Technologies: From Theory to Applications, ICTTA
Country/TerritorySyrian Arab Republic
CityDamascus
Period7/04/0811/04/08

Keywords

  • Attack
  • Biometric
  • Complexity
  • Cryptography
  • Fuzzy vault
  • Security
  • Template

Fingerprint

Dive into the research topics of 'Biometric key capsulation technique based on fingerprint vault: Anatomy and attack'. Together they form a unique fingerprint.

Cite this