Abstract

When two parties need to securely communicate over an insecure channel, Diffie-Hellman is often employed as the key exchange algorithm. This paper presents two novel approaches to generating Diffie-Hellman parameters for key exchange based on user biometrics, namely their fingerprint data. Fingerprint templates are extracted as bit strings via a fingerprint scanner and later used as inputs. In one approach, the whole fingerprint template is utilized as a user’s private key. In the second approach, fingerprint data is scrambled into smaller chunks and rearranged into two strings that serve as the user’s private key and the basis for prime p. Both approaches were implemented and tested experimentally. After analysis, the second approach that uses scrambled fingerprint data shows better execution times and improved security and usability considerations.

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.