SKA-CaNPT: secure key agreement using cancelable and noninvertible biometrics based on periodic transformation

Eskandarian, Laleh and Akdoğan, Dilara and Karaoğlan Altop, Duygu and Levi, Albert (2019) SKA-CaNPT: secure key agreement using cancelable and noninvertible biometrics based on periodic transformation. In: 9th ACM Conference on Data and Application Security and Privacy (CODASPY), Dallas, TX, USA

[thumbnail of CODASPY2019_proceedings.pdf] PDF
CODASPY2019_proceedings.pdf
Restricted to Registered users only

Download (2MB) | Request a copy

Abstract

Nowadays, many of the security-providing applications use biometrics-based authentication. However, since each person's biometrics is unique and non-replaceable, once it is compromised, it will be compromised forever. Therefore, it is hard for the users to trust biometrics. To overcome this problem, in this paper, we propose a novel secure key agreement protocol SKA-CaNPT. Here, we use a periodic transformation function to make biometrics cancelable and noninvertible. At the very end of our SKA-CaNPT protocol, the user and the server make an agreement on a symmetric shared key that is based on the feature points of the user's biometrics. Therefore, if the transformed data is compromised, then just by changing one of the inputs of the transformation function, we can renew the cryptographic key. As a proof of concept, we apply our SKA-CaNPT protocol on fingerprints. Besides, we apply different security analyses on our protocol. We use Shannon's entropy and Hamming distance metrics to analyze the randomness and the distinctiveness of the agreed keys. Moreover, according to the low IKGR (Incorrect Key Generation Rate), high CKGR (Correct Key Generation Rate) and high attack complexity possessed by our SKA-CaNPT protocol, we can conclude that our scheme is secure against brute-force, replay and impersonation attacks.
Item Type: Papers in Conference Proceedings
Uncontrolled Keywords: Biometrics; bio-cryptography; cancelable biometrics; noninvertible biometrics; periodic transformation; fingerprints; key agreement; security analysis
Divisions: Faculty of Engineering and Natural Sciences > Academic programs > Computer Science & Eng.
Faculty of Engineering and Natural Sciences
Depositing User: Albert Levi
Date Deposited: 27 Aug 2019 11:13
Last Modified: 13 Jun 2023 12:18
URI: https://research.sabanciuniv.edu/id/eprint/38094

Actions (login required)

View Item
View Item