+ All Categories
Transcript
Page 1: Biometric authentication reiew

Biometrics-Based AuthenticationScheme for Multi-server

EnvironmentBy,

M.MUTHUKUMAR.

Page 2: Biometric authentication reiew

OBJECTIVEThe authentication scheme is an important

cryptographic mechanism, through which two parties could authenticate each other in the open network.

In practical many authentication schemes are using passwords and smart cards have been proposed.

However, password might be forgotten, and smart cards might be shared, lost, or stolen.

In contrast, biometric methods, such as fingerprints or iris, have no drawbacks.

Page 3: Biometric authentication reiew

OBJECTIVETherefore, biometrics-based authentication

schemes gain wide attention.Here we propose a biometrics-based

authentication scheme for multi-server environment using “elliptic curve cryptography”.

To the best of our knowledge, the proposed scheme is the first truly three-factor authenticated scheme for multi-server environment.

Page 4: Biometric authentication reiew

LITERATURE SURVEYS.NO PAPER TITLE OBJECTIVE TOOLS/TECHNIQUES

1.Robust biometrics-based multi-server authentication with key agreement scheme for smart cards on elliptic curve cryptosystem. The Journal of Supercomputing, (2013).

A new secure and efficient biometric based mutual authentication scheme for distributed multi-server network environments Proposed scheme is more secure, with reduced execution time and less storage requirement.

The authors have used biometrics, password, smart card and one way hash function and Elliptic Curve Cryptography (ECC) to ensure security of their scheme.

2. Cryptanalysis and improvement of a biometrics-based remote user authentication scheme using smart cards 2013

A new biometric authentication scheme eradicates all its security pitfalls, and brings in some additional features, which are suitable for real life applications.

The proposed scheme maintains the security of the secret key; provides session key agreement; can withstand insider attacks, man-in-the-middle attacks and replay attacks; and provides proper mutual authentication between the server and the user.

Page 5: Biometric authentication reiew

LITERATURE SURVEYS.NO PAPER TITLE OBJECTIVE TOOLS/TECHNIQUES

3

Provably Secure Remote Truly Three-Factor Authentication

Scheme With Privacy Protection on Biometrics 2013

Timestamps are not required anymore for synchronization. Users are free to choose their passwords.

The security of the scheme is strengthened using a strong cryptographic algorithm where the biometric template is used as an encryption key.

4

Remote Password Authentication Scheme with Smart Cards and Biometrics

2013

The authors here have proposed a new and improved remote three factor authentication scheme, compares its performance and security with the previously proposed three factor authentication schemes.

The fingerprint sensors are placed on the smart cards rather on the image capture devices, which prevents the invaders to steal the biometric traits.

Page 6: Biometric authentication reiew

EXISTING METHODS

• Fingerprint based person authentication• RSA public key cryptography• Discrete wavelet transform• Weber’s Local descriptors

Page 7: Biometric authentication reiew

DRAWBACKS• Less efficiency and not flexible in

authentication scheme• High computational load when key size

increases• Inefficient texture features due to shift

variance• Less accuracy for various lighting condition

of images due to the delivery of insufficient descriptors.

Page 8: Biometric authentication reiew

PROPOSED SYSTEM

FRAMEWORK OF A MULTISERVER AUTHENTICATION SYSTEM.

Page 9: Biometric authentication reiew

SOFTWARE& HARDWARE REQUIREMENTS

OPERATING SYSTEM : WINDOWS 8 CORE TECHNOLOGY : MATLAB PROCESSOR : i7 & ABOVE RAM : 4 GB

 

Page 10: Biometric authentication reiew

APPLICATIONS

• Defense weapon storage Area• Bank ATM security• Authentication and privacy protection

Page 11: Biometric authentication reiew

ADVANTAGES

• More information security via hybrid crypto systems• Better texture characterization of

palmprint • High efficiency and low complexity

Page 12: Biometric authentication reiew

D. Yang and B. Yang, “A biometric password-basedmulti-server authentication scheme with smart card,” in Proceedings of the International Conference on Computer Design and Applications (ICCDA ’10), vol. 5, pp. 554–559, Qinhuangdao, China, June 2010.

E.-J. Yoon and K.-Y. Yoo, “Robust biometrics-based multiserver authentication with key agreement scheme for smart cards on elliptic curve cryptosystem,” The Journal of Supercomputing, vol. 63, no. 1, pp. 235–255, 2013/

D. He, “Security flaws in a biometrics-based multi-server authentication with key agreement scheme,” IACR Cryptology

ePrint Archive, vol. 365, 2011.

References

Page 13: Biometric authentication reiew

Thank You


Top Related