Abstract

Identity authentication techniques based on password-authenticated key exchange (PAKE) protocols rely on weak secrets shared between users and host systems. In PAKE, a symmetric key is derived from the shared secret, used to mutually authenticate communicating parties, and then used to establish a secure channel for subsequent communications. A common source of PAKE weak secrets are password and passphrase strings. Though easily recalled by a user, these inputs typically require keyboard entry, limiting their utility in achieving universal access. This paper describes authentication techniques based on weak secrets derived from knowledge extracted from biometric sensors and brain-actuated control systems. The derived secrets are converted into a format suitable for use by a PAKE protocol. When combined with other authentication factors, PAKE protocols can be extended to provide strong, two-factor identity authentication that is easy to use by persons living in assistive environments.

Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call