Abstract
All cryptographic algorithms have a proven security but they suffer from the key management problems: hiding a key and unlocking it with biometric or other approximately matching data. We propose a practical key capsulation mechanism with a simple and intuitive design concept to overcome the management and security issues. Capsulation process solved the problems of key management and distributes level of security on capsulation shields. Keys entropy depends on level of shielding, secret key depend on degree of polynomial, while encryption key depend on constructed vault entropy, and it is slightly more efficient in terms of encryption/decryption speed because it used a heading capsulation technique on covering the ciphertexts. Our results in term of attack computation complexity analysis are encouraging, while it is acceptable for the authorized users.
Original language | English |
---|---|
Title of host publication | 2008 3rd International Conference on Information and Communication Technologis |
Subtitle of host publication | From Theory to Applications, ICTTA |
Publisher | IEEE |
ISBN (Electronic) | 9781424417520 |
ISBN (Print) | 9781424417513 |
DOIs | |
Publication status | Published - 23 May 2008 |
Event | 2008 3rd International Conference on Information and Communication Technologies: From Theory to Applications, ICTTA - Damascus, Syrian Arab Republic Duration: 7 Apr 2008 → 11 Apr 2008 |
Conference
Conference | 2008 3rd International Conference on Information and Communication Technologies: From Theory to Applications, ICTTA |
---|---|
Country/Territory | Syrian Arab Republic |
City | Damascus |
Period | 7/04/08 → 11/04/08 |
Keywords
- Attack
- Biometric
- Complexity
- Cryptography
- Fuzzy vault
- Security
- Template