5 research outputs found

    Design of an Online authentication protocol using both fingerprint identification and identity based cryptography

    Get PDF
    One of the major limitations with the authentication of users via the internet is the inherent lack of security of traditional authentication techniques, passwords, PIN numbers and cookies. With the current development of the biometric fingerprint technology market, the possibility of identifying someone online has been addressed. However, recent publication in this field shows that the lack of aliveness detection mechanism in fingerprint sensors technology, may be used to mold and reproduce exact copy of a fingerprint with its detailed shape and extended characteristics (e.g. minutiae points location). The presented authentication system provides the solution to this problem by using IDbased cryptography. A complete online authentication system is developed presenting the registration, login and authentication phases. The security analysis of the system is also presented

    Authenticated Key Distribution: When the Coupon Collector is Your Enemy

    Get PDF
    We introduce new authenticated key exchange protocols which on the one hand do not resort to standard public key setups with corresponding assumptions of computationally hard problems, but on the other hand, are more efficient than distributing symmetric keys among the participants. To this end, we rely on a trusted central authority distributing key material whose size is independent of the total number of users, and which allows the users to obtain shared secret keys. We analyze the security of our construction, taking into account various attack models. Importantly, only symmetric primitives are needed in the protocol making it an alternative to quantum-safe key exchange protocols which rely on hardness assumptions

    Nouvelles Primitives de Sécurité et Meilleures Performances à travers des Compromis de Paramètres

    Get PDF

    ID-based Secret-Key Cryptography

    No full text
    . This paper introduces ID-based secret-key cryptography, in which secret keys are privately and uniquely binded to an identity. This enables to extend publickey cryptography features at the high throughput rate of secret-key cryptography. As applications, efficient login protocols, an enhanced version of Kerberos, and an ID-based MAC algorithm are presented. ID-based systems were initially developed in the context of public-key cryptography by removing the need of explicit public keys. The idea was to derive, in a publicly known way, a public key from an identity. Similarly, in secret-key cryptography, ID-based systems allow authorized entities to derive a secret key from an identity. So, large databases maintaining the correspondence between an identity and the corresponding secret key are no longer required, resulting in better performances and higher security. Indexing terms: ID-based systems, Secret-key cryptography, Authentication protocols, One-time passwords, Kerberos, MACs 1 ..

    ID-based secret-key cryptography

    No full text
    corecore