Biometric cryptosystems: Overview, state-of-the-art and perspective directions

10Citations
Citations of this article
6Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Modern cryptographic systems are constantly evolving and improving. This is due to the development of new computing systems and advanced cryptographic analysis methods, as well as increasing requirements for speed, security and reliability of used tools. In particular, it was announced an advent of universal quantum computers, which will be able to provide cryptanalysis with advanced calculation methods based on fundamentally new physical principles. The possible use of such devices encourages the development, research and standardization of algorithms for post-quantum cryptographic information protection. Another factor for the development of advanced cryptographic systems is the biometric technologies popularization. In this work, a critical review and analysis of the current application of biometric technologies in cryptographic systems, is conducted. In particular, biometric cryptographic systems, which are designed to generate secure pseudorandom sequences that can be used as cryptographic keys, passwords etc., are investigated. A comparative analysis of various biometric cryptosystems with the determination of their advantages and disadvantages is carried out. The perspective directions for further research are substantiated. Also this work presents a new key generation scheme which uses fuzzy extractors from the biometric data of iris. The proposed method is based on the code-based public key cryptosystems which are considered to be resistant to quantum cryptanalysis. A software implementation of this method with experimental studies of the key generation algorithm and recommendations on the practical application are proposed.

Cite

CITATION STYLE

APA

Lutsenko, M., Kuznetsov, A., Kiian, A., Smirnov, O., & Kuznetsova, T. (2021). Biometric cryptosystems: Overview, state-of-the-art and perspective directions. In Lecture Notes in Networks and Systems (Vol. 152, pp. 66–84). Springer. https://doi.org/10.1007/978-3-030-58359-0_5

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free