Eskandarian, Laleh and Akdoğan, Dilara and Karaoğlan Altop, Duygu and Levi, Albert (2019) SKA-CaNPT: secure key agreement using cancelable and noninvertible biometrics based on periodic transformation. In: 9th ACM Conference on Data and Application Security and Privacy (CODASPY), Dallas, TX, USA
PDF
CODASPY2019_proceedings.pdf
Restricted to Registered users only
Download (2MB) | Request a copy
CODASPY2019_proceedings.pdf
Restricted to Registered users only
Download (2MB) | Request a copy
Official URL: http://dx.doi.org/10.1145/3292006.3300037
Abstract
Nowadays, many of the security-providing applications use biometrics-based authentication. However, since each person's biometrics is unique and non-replaceable, once it is compromised, it will be compromised forever. Therefore, it is hard for the users to trust biometrics. To overcome this problem, in this paper, we propose a novel secure key agreement protocol SKA-CaNPT. Here, we use a periodic transformation function to make biometrics cancelable and noninvertible. At the very end of our SKA-CaNPT protocol, the user and the server make an agreement on a symmetric shared key that is based on the feature points of the user's biometrics. Therefore, if the transformed data is compromised, then just by changing one of the inputs of the transformation function, we can renew the cryptographic key. As a proof of concept, we apply our SKA-CaNPT protocol on fingerprints. Besides, we apply different security analyses on our protocol. We use Shannon's entropy and Hamming distance metrics to analyze the randomness and the distinctiveness of the agreed keys. Moreover, according to the low IKGR (Incorrect Key Generation Rate), high CKGR (Correct Key Generation Rate) and high attack complexity possessed by our SKA-CaNPT protocol, we can conclude that our scheme is secure against brute-force, replay and impersonation attacks.
Item Type: | Papers in Conference Proceedings |
---|---|
Uncontrolled Keywords: | Biometrics; bio-cryptography; cancelable biometrics; noninvertible biometrics; periodic transformation; fingerprints; key agreement; security analysis |
Divisions: | Faculty of Engineering and Natural Sciences > Academic programs > Computer Science & Eng. Faculty of Engineering and Natural Sciences |
Depositing User: | Albert Levi |
Date Deposited: | 27 Aug 2019 11:13 |
Last Modified: | 13 Jun 2023 12:18 |
URI: | https://research.sabanciuniv.edu/id/eprint/38094 |