2013
DOI: 10.1007/978-3-642-37949-9_73
|View full text |Cite
|
Sign up to set email alerts
|

Network Security Using ECC with Biometric

Abstract: Abstract. The popular asymmetric cryptography is RSA but most of the RSAbased hardware and software products and standards require big cryptographic keys length for higher security level. The existing asymmetric cryptography algorithms need the storage of the secret keys. Stored keys are often protected by poorly selected user passwords that can either be guessed or obtained through brute force attacks. This is a major weakness of the crypto-system. Combining biometrics with cryptography is seen as a possible … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
8
0

Year Published

2015
2015
2024
2024

Publication Types

Select...
3
3

Relationship

1
5

Authors

Journals

citations
Cited by 10 publications
(8 citation statements)
references
References 10 publications
0
8
0
Order By: Relevance
“…Palm vein recognition also has some outstanding features like universality, permanence, uniqueness and accuracy. As we are using ECC, so we can achieve high level security with very shorter key size [14] . Thus it also solves the key size problem.…”
Section: Results and Merits Of Proposed Modelmentioning
confidence: 99%
“…Palm vein recognition also has some outstanding features like universality, permanence, uniqueness and accuracy. As we are using ECC, so we can achieve high level security with very shorter key size [14] . Thus it also solves the key size problem.…”
Section: Results and Merits Of Proposed Modelmentioning
confidence: 99%
“…As shown in Fig. 4, the palm vein architecture is used to authenticate users [13]. Several investigations based on the palm vein structure have been done in the last decade [14].…”
Section: ) 32 Study Populationsmentioning
confidence: 99%
“…Several investigations based on the palm vein structure have been done in the last decade [14]. An individual's vein pattern is established in utero, and no two people have identical palm vein patterns [13]. Inside the vein vessels, there is deoxidized hemoglobin that retains light with a frequency of typically (7.6*10.4mm) in the near infrared area [19].…”
Section: ) 32 Study Populationsmentioning
confidence: 99%
“…In this tier, user authentication is provided. This requires a vein pattern (dorsal vein pattern), the MAC address, and the IP address of the host; it uses the ECC algorithm 35 via a trusted authority (TA) that authenticates users and provides a one‐time key (OTK) to access the network resources. Authentication is performed to avoid unnecessary loads from unauthorized users that could enter the network environment.…”
Section: System Modelmentioning
confidence: 99%
“…Elliptic curve cryptography (ECC) 35 was invented as a cryptography system and was released in 1985. It was independently developed by Victor Miller and Neal Koblitz.…”
Section: Introductionmentioning
confidence: 99%