Abstract

The biometric-based keys generation represents the utilization of the extracted features from the human anatomical (physiological) traits like a fingerprint, retina, etc. or behavioral traits like a signature. The retina biometric has inherent robustness, therefore, it is capable of generating random keys with a higher security level compared to the other biometric traits. In this paper, an effective system to generate secure, robust and unique random keys based on retina features has been proposed for cryptographic applications. The retina features are extracted by using the algorithm of glowworm swarm optimization (GSO) that provides promising results through the experiments using the standard retina databases. Additionally, in order to provide high-quality random, unpredictable, and non-regenerated keys, the chaotic map has been used in the proposed system. In the experiments, the NIST statistical analysis which includes ten statistical tests has been employed to check the randomness of the generated binary bits key. The obtained random cryptographic keys are successful in the tests of NIST, in addition to a considerable degree of aperiodicity.

Highlights

  • In order to design any cryptographic system, two significant parts are required; the cryptographic algorithm and cryptographic key 1

  • The National Institute of Standard and Technology (NIST) Test Suite which includes ten statistical tests has been employed to check the randomness of the generated binary bits key

  • Before the process of extracting the optimal features, there are two important stages: the first one is the pre-processing stage which works on detecting the blood vessels with high clarity, and the second stage is extracting the LL sub-bund after applying the 1-level Discrete Wavelet Haar Transform (DWHT)

Read more

Summary

Introduction

In order to design any cryptographic system, two significant parts are required; the cryptographic algorithm and cryptographic key 1. The strengthening of the cryptographic systems is based on the secrecy of the cryptographic keys. The most cryptographic algorithms require secure, random, hard to memorize and long keys 2. In the area of key generation, there are two classes: Pseudo-Random Number Generation (PRNG) and True-Random Number Generation (TRNG). In PRNG, the random keys are generated based on the randomness and security of the initial conditions. The security requirement cannot be satisfied in many PRNG, this disadvantage enables an attacker to attack the cryptographic system. While in TRNG, the random keys are generated based on the physical sources which are absolutely unpredictable 3

Methods
Results
Conclusion
Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call