File | Description | Size | Format | |
---|---|---|---|---|
Thesis | 4.47 MB | Adobe PDF | ||
Licence | 43.82 kB | Adobe PDF |
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.
Research output : Thesis › PhD Thesis - Research UT, graduation UT
Original language | English |
---|---|
Qualification | Doctor of Philosophy |
Awarding Institution | |
Supervisors/Advisors | , Supervisor , Advisor |
Thesis sponsors | |
Award date | 23 Oct 2008 |
Publisher | |
Print ISBNs | 978-9-03652-738-5 |
DOIs | |
Publication status | Published - 23 Oct 2008 |
T1 - Cryptographic keys from noisy data, theory and applications
AU - Buhan, I.R.
N1 - 10.3990/1.9789036527385
PY - 2008/10/23
Y1 - 2008/10/23
N2 - Biometric security systems that verify a person's identity by scanning fingers, hands, eye or face are becoming more and more common. As a result biometrics is one of the fastest growing industries. Applications for biometrics range from homeland security physical access to various facilities and health and social services.Utilizing biometrics for personal authentication is more convenient and than current methods such as passwords or PINs. Another important advantage of biometric authentication is that it links events to a user and is becoming socially acceptable and inexpensive.Biometric authentication requires comparing a registered or enrolled biometric sample against a newly captured biometric sample. However, biometric authentication is not perfect and the output of a biometric authentication system can be subject to errors due to imperfections of the classification algorithm, poor quality of biometric samples, or an intruder who has tampered with the biometric authentication systems. Although biometric authentication is intended primarily to enhance security, storing biometric information in a database introduces new security and privacy risks, which increase if the database is connected to a network. This is the case in most practical situations.This thesis looks at security aspects of biometric authentication and proposes solutions to mitigate the risk of an attacker who tries to misuse biometric information or who bypasses modules of biometric systems to achieve his malicious goals. Our contribution is threefold. Firstly we propose 3W-tree, an analysis tool used to identify critical attack scenarios for a biometric system. We apply the 3W-tree design tool to the SmartGun biometric recognition system with the purpose of identifying critical security issues. Secondly, we explore the challenges of secure template protection, which are both theoretical and practical and we put forward solutions to part of the issues. Thirdly, we present a practical solution to the secure template transfer, which should allow transfer of the biometric traits between two biometrically enabled devices when no security infrastructure is available and the users are no security experts.
AB - Biometric security systems that verify a person's identity by scanning fingers, hands, eye or face are becoming more and more common. As a result biometrics is one of the fastest growing industries. Applications for biometrics range from homeland security physical access to various facilities and health and social services.Utilizing biometrics for personal authentication is more convenient and than current methods such as passwords or PINs. Another important advantage of biometric authentication is that it links events to a user and is becoming socially acceptable and inexpensive.Biometric authentication requires comparing a registered or enrolled biometric sample against a newly captured biometric sample. However, biometric authentication is not perfect and the output of a biometric authentication system can be subject to errors due to imperfections of the classification algorithm, poor quality of biometric samples, or an intruder who has tampered with the biometric authentication systems. Although biometric authentication is intended primarily to enhance security, storing biometric information in a database introduces new security and privacy risks, which increase if the database is connected to a network. This is the case in most practical situations.This thesis looks at security aspects of biometric authentication and proposes solutions to mitigate the risk of an attacker who tries to misuse biometric information or who bypasses modules of biometric systems to achieve his malicious goals. Our contribution is threefold. Firstly we propose 3W-tree, an analysis tool used to identify critical attack scenarios for a biometric system. We apply the 3W-tree design tool to the SmartGun biometric recognition system with the purpose of identifying critical security issues. Secondly, we explore the challenges of secure template protection, which are both theoretical and practical and we put forward solutions to part of the issues. Thirdly, we present a practical solution to the secure template transfer, which should allow transfer of the biometric traits between two biometrically enabled devices when no security infrastructure is available and the users are no security experts.
KW - METIS-252064
KW - EWI-13622
KW - IR-59976
U2 - 10.3990/1.9789036527385
DO - 10.3990/1.9789036527385
M3 - PhD Thesis - Research UT, graduation UT
SN - 978-9-03652-738-5
PB - University of Twente
New citation alert added.
This alert has been successfully added and will be sent to:
You will be notified whenever a record that you have chosen has been cited.
To manage your alert preferences, click on the button below.
Please log in to your account
Bibliometrics & citations, view options, recommendations, novel fuzzy based crow search optimization algorithm for secure node-to-node data transmission in wsn.
Various sensor nodes are interconnected with each other in wireless sensor network (WSN). WSN communicates to every node within the network wirelessly to collect data regarding the surrounding environment and send the particular data to the ...
Secure and energy aware multi-hop routing protocol in wsn using taylor-based hybrid optimization algorithm.
The advancements of Wireless sensor network (WSN) in large number of applications made it common. However, the energy is a major challenge in the WSN environment as the battery-operated sensor nodes in the network consumes huge amount ...
Published in.
Pergamon Press, Inc.
United States
Author tags.
Other metrics, bibliometrics, article metrics.
Login options.
Check if you have access through your login credentials or your institution to get full access on this article.
Share this publication link.
Copying failed.
Affiliations, export citations.
We are preparing your search results for download ...
We will inform you here when the file is ready.
Your file of search results citations is now ready.
Your search export query has expired. Please try again.
IMAGES
VIDEO
COMMENTS
The main e ort is to identify tting applications and subsequently prove security of schemes or protocols (upper level designs based on forkcipher) and the concrete forkcipher security requirements for the new scenarios. This research direction is very recent and a successful thesis will be of a high academic and real-world impact. The thesis
A key cryptographic research interest is developing an automatic, black-box method to pro- ... for symmetric ciphers, particularly for proprietary cyber-physical systems (CPS) and lightweight block ciphers. This thesis work extends the work of the recently-developed neural cryptanalysis method, which trains neural networks ... application, many ...
proof that simultaneously addresses subtleties essential for robust applications, such as multiple cryptographic mechanisms, malicious corruption, and asynchronous commu-nication. Our approach offers a clear path toward leveraging Universal Composability to obtain end-to-end security with fully instantiated cryptographic mechanisms.
Elliptic curves and their cryptographic applications Samuel L. Wenberg Eastern Washington University Follow this and additional works at: https://dc.ewu.edu/theses Part of the Physical Sciences and Mathematics Commons Recommended Citation Wenberg, Samuel L., "Elliptic curves and their cryptographic applications" (2013). EWU Masters Thesis
read this thesis as the defense committee members. In addition, I greatly thank Keith Geddes, who gave me the opportunity to join the University of Waterloo, and Margaret Towell, who has signi cantly helped me with my scholarship and job applications. Special thanks to Timothy Lethbridge, my Master's thesis advisor, who has taught me a lot.
Abstract Post-Quantum Cryptography has gained attention in the recent years from the research community due to the disastrous consequences that effi- cient quantum computers would have on current public-key cryptosystems. In this work we explore the main aspects of lattice theory, provide defini- tions for some of the most relevant lattice ...
Signature schemes are fundamental cryptographic primitives, useful as a stand-alone application, and as a building block in the design of secure protocols and other cryptographic objects. In this thesis, we study both the uses that signature schemes find in protocols, and the design of signature schemes suitable for a broad range of applications.
Kaufer, Aaron H., "Applications of Continued Fractions in Cryptography and Diophantine Equations" (2009). Thesis. Rochester Institute of Technology. Accessed from This Thesis is brought to you for free and open access by the RIT Libraries. For more information, please contact [email protected]. RIT Digital Institutional Repository
This master's thesis discusses algorithms that solve certain cryptographic tasks and thus it illuminate the application's side as well, which outlines the constructive manner of this field. In this master's thesis the focus is on bringing together interesting results of different areas — ranging from computational complexity theory to quantum physics — about the role of linear codes in ...
I. INTRODUCTION Cryptography is the art of secret writing which is used since Roman times to hide information secret or keeping message secure. To keep information secret, a widely-used method is an encryption/decryption. Basically, encryption/decryption are the fundamental functions of cryptography.
This thesis works on three aspects of hash functions: design, cryptanalysis and applications with the following significant contributions: 1.Proposes a family of variants to the Damg{\aa}rd-Merkle construction called 3CG for better protection against specific and generic attacks. ... M3 - Ph.D. thesis. BT - Cryptographic Hash Functions ...
which permit the efficient realization of Elliptic Curve and Pairing-based Cryptography on the several new platforms and applications. This thesis deals with efficient methods and explicit formulas for computing elliptic curve scalar multiplication and pairings over fields of large prime characteristic with the objective of
In Section 4, we provide a list of possible applications of AI in cryptography. In Sections 5-8, we review the four prominent cryptosystems, namely AES, RSA, LWE, and Ascon, and present possible applications of AI to test and enhance their security. We conclude the paper in Section 9. 2.
Cryptography Master of Science Thesis, 47 Pages. February 2024. This thesis explores the complex world of blockchain technology and cryptocur-rencies, offeringan investigation of their ... cryptographic application were required, it would have primarily originated from the US national security com-munity, foreign entities, and a limited number ...
1.1 Quantum Cryptography: Motivation In this section, we give a brief overview of quantum cryptography. 1.1.1 Cryptography Information security has been a very important issue since ancient times. It is particularly crucial in diplomatic, military, and flnancial applications. In this so-called Information
for ubicomp applications only the least required amount of computing power will be realized. If computing power is fixed and cost are variable, Moore's Law leads to the paradox of an increasing demand for lightweight solutions. In this Thesis different approaches are followed to investigate new lightweight cryptographic
Available Projects. Students interested in a thesis with the group are kindly requested to send their transcript of records, along with a CV highlighting any relevant experience in cryptography, and either a preferred topic from the proposals below or a description of their interests within cryptography, to the contact noted under Student Projects. ...
Theses - bib-lattice - bib. of lattice-based cryptography ... Doctor Thesis
This thesis deals with the study of the elliptic curves over finite rings and their cryptographic applications. Firstly, we defined the elliptic curves Ea,b (Fq [ε]) and Ea,b (F3d [ε]) over the ...
Applications of the Blockchain using cryptography: Authors: McCorry, Patrick: Issue Date: 2018: Publisher: ... In this thesis, we consider cryptographic protocols that bootstrap trust from the blockchain. This includes secure end-to-end communication between two pseudonymous users, payment protocols, payment networks and decentralised internet ...
Student thesis: Doctoral Thesis › Doctor of Philosophy (PhD) File. ... Cryptographic Access Control: Security Models, Relations and Construction Author: Liu, B., 28 Nov 2019. ... Hydrological Applications of Multi-source Soil Moisture Products Author: Kwon, M., 25 Jun 2019.
Applications of visual cryptography are also examined and presented. This is an area within visual cryptography that has had very little attention in terms of research. The primary focus of the work presented within this thesis concentrates on applications of visual cryptography in real world scenarios.
T1 - Cryptographic keys from noisy data, theory and applications. AU - Buhan, I.R. N1 - 10.3990/1.9789036527385 PY - 2008/10/23. Y1 - 2008/10/23. N2 - Biometric security systems that verify a person's identity by scanning fingers, hands, eye or face are becoming more and more common. As a result biometrics is one of the fastest growing industries.
A public static agreement key based cryptography technique is introduced for secure data transmission. The proposed TABEESR is tested with MATLAB software to validate its performance. SMEER, SHER, SRPA and AFSA are the prior routing protocols in WSN that are considered to compare the performance of the proposed routing protocol.