Abstract
Traditional authentication mechanisms are vulnerable to sophisticated attacks in the ever-changing cybersecurity paradigms. In this paper, a new three-factor quantum biometric system is proposed that were analysed to increase security level and reduce threats. This model employs multiple strategies, like quantum key distribution, a biometric identification system and machine learning which encrypts data based on their unique properties in an innovative way to provide not only one but two layers of encryption from unauthorized access. The system in its essence combines three critical elements: quantum generated cryptographic keys, biometric data (fingerprint or retinal scans) and dynamic behaviour-based identification using machine learning algorithms. By adding QKD to the hardware, an encryption key that should be practically impossible for anyone else (except sender and receiver) to intercept is securely generated and distributed through quantum mechanics principles of detection preventing possible eavesdropper. Secondly, the biometric data means that an imposter would have to not only steal your smartphone but also be able to authenticate themselves using unique physiology which takes even more of the likelihood out. Machine learning models study user behaviour patterns and work to adapt against evolving threats, gradually improving the accuracy of authentication with time. For added security, the system uses a double-layer encryption routine. The newly proposed system has a two-level encryption, and in the first layer, quantum keys encrypted bio-metric data while classical algorithms are applied to encrypt overall communication as well storage process. Besides ensuring the safety of private biometric information through dual encryption, this added redundancy also allows them to function as extra fail safe so that if one layer is breached, the entire system will still stand uncompromised. We evaluate the implementation of this new authentication scheme to a series-simulations and real-world test, showing the performance in different scenarios including high threat level environments. The results show major security enhancement compared to the traditional implementation of authentication methods with an observed amount decrease in data breaches and unsanctioned access attempts.
Published Version
Talk to us
Join us for a 30 min session where you can share your feedback and ask us any queries you have