A Biometric Key Generation Mechanism for Authentication Based on Face Image

Author(s):  
Yazhou Wang ◽  
Bing Li ◽  
Yan Zhang ◽  
Jiaxin Wu ◽  
Pengwei Yuan ◽  
...  
2021 ◽  
Vol 2021 ◽  
pp. 1-9
Author(s):  
Isha Batra ◽  
Hatem S. A. Hamatta ◽  
Arun Malik ◽  
Mohammed Baz ◽  
Fahad R. Albogamy ◽  
...  

Current research in Internet of Things (IoT) is focused on the security enhancements to every communicated message in the network. Keeping this thought in mind, researcher in this work emphasizes on a security oriented cryptographic solution. Commonly used security cryptographic solutions are heavy in nature considering their key size, operations, and mechanism they follow to secure a message. This work first determines the benefit of applying lightweight security cryptographic solutions in IoT. The existing lightweight counterparts are still vulnerable to attacks and also consume calculative more power. Therefore, this research work proposes a new hybrid lightweight logical security framework for offering security in IoT (LLSFIoT). The operations, key size, and mechanism used in the proposed framework make its lightweight. The proposed framework is divided into three phases: registration, authentication, and light data security (LDS). LDS offers security by using unique keys at each round bearing small size. Key generation mechanism used is comparatively fast making the compromise of keys as a difficult task. These steps followed in the proposed algorithm design make it lightweight and a better solution for IoT-based networks as compared to the existing solutions that are relatively heavy weight in nature.


2017 ◽  
Vol 7 (1.5) ◽  
pp. 237
Author(s):  
M. Siva Kumar ◽  
B. Murali Krishna ◽  
N. Sai Tejeswi ◽  
Sanath Kumar Tulasi ◽  
N. Srinivasulu ◽  
...  

In the present scenario information security has become a predominant issue. Cryptography is the process used for the purpose of information security. In cryptography message is encrypted with key produces cipher and decrypts the original message from cipher uses variety mechanisms and permutations. This paper presents a key generation mechanism suitable in cryptography applications which plays a vital role in data security. Random key generation techniques are multiplexed and configured in FPGA. In run time based on priority of section inputs randomly one method selectively produces a key which inputs to cryptosystem. Jitter process generates random numbers based on clock frequency triggered to oscillators, which produces pseudo random keys, but it consumes more resources when compared with other methods, but randomness in generated key is exponential. Pre stored random numbers in Block Memory are generated using IP core generator. The main advantage of the proposed model is to produce random keys which will be secure, predictable and attains high security. Due to its configurable nature, FPGA’s are suitable for wide variety of applications which can configure in runtime to implement custom designs and needs. Random number generation techniques are designed using Verilog HDL, simulated on Xilinx ISE simulator and implemented on Spartan FPGA.


Author(s):  
Kan Siew Leong ◽  
Paul Loh Ruen Chze ◽  
Ang Khoon Wee ◽  
Elizabeth Sim ◽  
Kan Ee May

2017 ◽  
Vol 7 (1.5) ◽  
pp. 62
Author(s):  
B. Murali Krishna ◽  
Habibulla Khan ◽  
G.L. Madhumati

Pseudo biotic cryptography will be an advanced crypto-analytic model, as it is presently increasing bimolecular computation, since its process energize and can verify future generation network computing. Nowadays, the data protection has become very important such that an unbreakable encryption technology should be designed in order to provide security for the data. A new paradigm in cryptography to secure information was introduced through biological structure called central dogma of molecular biology. DNA cryptographic system gains more popularity with enhanced features like, high storage capacity, security level, and more time to break the crypto system. This paper proposes new pseudo biotic DNA based crypto mechanism. This DNA computing created good path for storing large information, correspondence and high energy efficiency. The proposed method, message is converted to Deoxyribonucleic Acid (DNA), Messenger Ribonucleic acid (MRNA), and Transpose Ribonucleic acid (TRNA) standards. A part of converted message is spliced unsymmetrical to produce a random key at each stage. The sliced unsymmetrical key generation mechanism relies on the genetic information. The process involves in splicing the message and generating multiple sequence of keys from different stages which are random in order to enhance the degree of security. Cracking possibility of the algorithm is less due to pseudo random key generation mechanism and cipher both were merged in protein form. Proposed Algorithm utilizes less public key infrastructure, and communicated between Alice and Bob. Algorithm was designed, using Verilog HDL; Synthesized & Simulated in Vivado and hardware implementation is targeted to Zync FPGA architecture. 


Author(s):  
Yasuhiko IKEMATSU ◽  
Dung Hoang DUONG ◽  
Albrecht PETZOLDT ◽  
Tsuyoshi TAKAGI

Sign in / Sign up

Export Citation Format

Share Document