ATM using fingerprint www.123arena.com www.123codeguru.blogspot.com.

Slides:



Advertisements
Similar presentations
Cryptography. 2 Objectives Explain common terms used in the field of cryptography Outline what mechanisms constitute a strong cryptosystem Demonstrate.
Advertisements

Principles of Information Security, 2nd edition1 Cryptography.
Feb 25, 2003Mårten Trolin1 Previous lecture More on hash functions Digital signatures Message Authentication Codes Padding.
Chapter 5 Cryptography Protecting principals communication in systems.
BY MUKTADIUR RAHMAN MAY 06, 2010 INTERODUCTION TO CRYPTOGRAPHY.
Mar 4, 2003Mårten Trolin1 This lecture Diffie-Hellman key agreement Authentication Certificates Certificate Authorities.
Wireless Encryption By: Kara Dolansky Network Management Spring 2009.
Computer and Network Security. Introduction Internet security –Consumers entering highly confidential information –Number of security attacks increasing.
Cryptographic Technologies
Mar 5, 2002Mårten Trolin1 Previous lecture More on hash functions Digital signatures Message Authentication Codes Padding.
Security Internet Management & Security 06 Learning outcomes At the end of this session, you should be able to: –Describe the reasons for having system.
Security Internet Management & Security 06 Learning outcomes At the end of this session, you should be able to: –Describe the reasons for having system.
Dr Alejandra Flores-Mosri Security Internet Management & Security 06 Learning outcomes At the end of this session, you should be able to: –Describe the.
Chapter 13: Electronic Commerce and Information Security Invitation to Computer Science, C++ Version, Fourth Edition SP09: Contains security section (13.4)
 2001 Prentice Hall, Inc. All rights reserved. Chapter 7 – Computer and Network Security Outline 7.1Introduction 7.2Ancient Ciphers to Modern Cryptosystems.
Chapter 8.  Cryptography is the science of keeping information secure in terms of confidentiality and integrity.  Cryptography is also referred to as.
Public Key Model 8. Cryptography part 2.
Authentication Approaches over Internet Jia Li
DNSSEC Cryptography Review Track 2 Workshop July 3, 2010 American Samoa Hervey Allen.
CS 736 A methodology for Analyzing the Performance of Authentication Protocol by Laseinde Olaoluwa Peter Department of Computer Science West Virginia.
Security+ Guide to Network Security Fundamentals, Third Edition Chapter 11 Basic Cryptography.
每时每刻 可信安全 1The DES algorithm is an example of what type of cryptography? A Secret Key B Two-key C Asymmetric Key D Public Key A.
Chapter 8: Scrambling Through Cryptography Security+ Guide to Network Security Fundamentals Second Edition.
CSCE 201 Introduction to Information Security Fall 2010 Data Protection.
Public / Private Keys was a big year… DES: Adopted as an encryption standard by the US government. It was an open standard. The NSA calls it “One.
Public Key Encryption.
+ Security. + What is network security? confidentiality: only sender, intended receiver should “understand” message contents sender encrypts message receiver.
Secure Messenger Protocol using AES (Rijndael) Sang won, Lee
Lecture 2 Page 1 CS 236, Spring 2008 More on Cryptography CS 236 On-Line MS Program Networks and Systems Security Peter Reiher Spring, 2008.
CS426Fall 2010/Lecture 51 Computer Security CS 426 Lecture 5 Cryptography: Cryptographic Hash Function.
Lecture 5 Page 1 CS 236 Online More on Cryptography CS 236 On-Line MS Program Networks and Systems Security Peter Reiher.
Computer Security By Rubel Biswas. Introduction History Terms & Definitions Symmetric and Asymmetric Attacks on Cryptosystems Outline.
Department of Computer Science Chapter 5 Introduction to Cryptography Semester 1.
Cryptography By: Nick Belhumeur. Overview What is Cryptography? What is Cryptography? 2 types of cryptosystems 2 types of cryptosystems Example of Encryption.
Symmetric-Key Cryptography CS 161: Computer Security Prof. Raluca Ada Popa Sept 13, 2016.
Security Outline Encryption Algorithms Authentication Protocols
Symmetric Cryptography
Crypto in information security
USAGE OF CRYPTOGRAPHY IN NETWORK SECURITY
Network Security.
Triple DES.
What is network security?
Authentication.
Outline Desirable characteristics of ciphers Uses of cryptography
Chapter 8 Network Security.
Cryptography and Security Technologies
Chapter-2 Classical Encryption Techniques.
Encryption
Outline Desirable characteristics of ciphers Uses of cryptography
by- A.Swetha (13FF1A0401) G.Pradeep (14FF5A0407) B.Gopi (14FF5A0402)
Lecture 3: Symmetric Key Encryption
Cryptography Basics and Symmetric Cryptography
Cryptography and Security Fall 2009 Steve Lai
Security through Encryption
Security in Network Communications
Network Security – Kerberos
Chapter -7 CRYPTOGRAPHIC HASH FUNCTIONS
DISSERTATION ON CRYPTOGRAPHY.
Chapter 29 Cryptography and Network Security
Unit 2: Cryptography & Cryptographic Algorithm
Fluency with Information Technology Lawrence Snyder
Operating Systems Concepts
Privacy Protection for E-Health Systems by
Review of Cryptography: Symmetric and Asymmetric Crypto Advanced Network Security Peter Reiher August, 2014.
A Quadratic-Residue-based Fragile Watermarking Scheme
10/7/2019 Created by Omeed Mustafa 1 st Semester M.Sc (Computer Science department) Cyber-Security.
Presentation transcript:

ATM using fingerprint www.123arena.com www.123codeguru.blogspot.com

Current Authentication Systems Online Authentication Name and Password Bank Authentication Token based ID Card Signature

ABSTRACT Crypto-Biometric authentication scheme for ATM banking systems The fingerprint image is enhanced and then encrypted using 128 bit private key algorithm The proposed scheme is fast and more secure Computer simulations and statistical analysis are presented

INTRODUCTION Biometrics based authentication is a potential candidate to replace password-based authentication Cryptography provides the necessary tools for accomplishing secure and authenticated transactions It not only protects the data from theft or alteration, but also can be used for user authentication The current system can only identify the maker’s belongings (cards) or what he remembers (passwords, PINs etc.) Automatic biometric authentication is an emerging field to address this problem

EMBEDDED CRYPTO-BIOMETRIC AUTHENTICATION PROTOCOL Two basic fingerprint authentication schemes namely the local and the centralized matching There are three stages in the protocol namely registration, login and authentication The encrypted image is transmitted to the central server via secured channel Encryption Decryption

Block schematic of embedded crypto biometric authentication system

AES Algorithm AES is also known as Rijndael algorithm It is a replacement to DES as the federal standard It has standard definition, high security and freedom patent entanglements It is an iterated block cipher which supports variable block length and key length

ENCRYPTION

DECRYPTION

Fingerprints Most commonly used biometric in the banking industry Used in all areas of the banking industry Transaction security Network security Access control Background checks Advantages Equipment is cheap Highly accurate Disadvantages Criminal stigma Universality

SIMULATION The first 3D permutation is performed with the key {32, 21, 0, 18, 35, 5, 15, 14, 9, 16, 12, 4, 18, 21, 6, 30} (a) Original image; The second round permutation is performed with the key {7, 16, 20, 12, 4, 8, 13, 8, 9, 39, 28, 27, 1, 16, 50, 42} (b) One round of iteration

The third round permutation is finished with a key {1, 23, 8, 19, 32, 3, 25, 12, 75, 31, 4, 10, 14, 5, 25, 13} (c) Two rounds of iterations This is random looking. (d)Three rounds of iterations.

Statistical analysis (a) Original fingerprint image; (b) One round of 3D iteration; (c)Three rounds of 3D iterations

STRENGTH ANALYSIS This technique is secure with respect to a known plaintext type of attack. With the diffusion methodology, the encryption technique is safe to cipher text type of attack. This use different keys in different rounds of iterations. The length is not constrained. It can be chosen according to the developer’s need.

CONCLUSION An embedded Crypto-Biometric authentication scheme for ATM The claimed user’s fingerprint is required during a transaction. The fingerprint image is encrypted via 3D chaotic map. It is transmitted to the central server using symmetric key algorithm . The encryption keys are extracted from the random pixel distribution in a raw image of fingerprint.

REFERENCES F.Han, J.Hu, X.Yu, Feng, Zhou: A novel hybrid cryptobiometric authentication scheme for ATM based banking applications, Springer-Verlag Berlin Heidelberg, (2005) 675-681. F.Han, J.Hu, X.Yu, Feng, Zhou: A New Way of Generating Grid-Scroll Chaos and its Application to Biometric Authentication, IEEE, (2005) 61-66. U.Uludag, S.Pankanti, S.Prabhakar andA. K.Jain,―Biometric cryptosystems: Issue and challenges,‖Proceedings of the IEEE, vol.92, no.6, 2004, pp.948-960. S. Hoque, M. Fairhurst, G. Howells and F. Deravi,―Feasibility of generating biometric encryption keys, Electronics Letters, vol. 41, no.6, 2005, pp.29-30.

Thank You