Upload
muthukumar-manivannan
View
92
Download
0
Embed Size (px)
Citation preview
Biometrics-Based AuthenticationScheme for Multi-server
EnvironmentBy,
M.MUTHUKUMAR.
OBJECTIVEThe authentication scheme is an important
cryptographic mechanism, through which two parties could authenticate each other in the open network.
In practical many authentication schemes are using passwords and smart cards have been proposed.
However, password might be forgotten, and smart cards might be shared, lost, or stolen.
In contrast, biometric methods, such as fingerprints or iris, have no drawbacks.
OBJECTIVETherefore, biometrics-based authentication
schemes gain wide attention.Here we propose a biometrics-based
authentication scheme for multi-server environment using “elliptic curve cryptography”.
To the best of our knowledge, the proposed scheme is the first truly three-factor authenticated scheme for multi-server environment.
LITERATURE SURVEYS.NO PAPER TITLE OBJECTIVE TOOLS/TECHNIQUES
1.Robust biometrics-based multi-server authentication with key agreement scheme for smart cards on elliptic curve cryptosystem. The Journal of Supercomputing, (2013).
A new secure and efficient biometric based mutual authentication scheme for distributed multi-server network environments Proposed scheme is more secure, with reduced execution time and less storage requirement.
The authors have used biometrics, password, smart card and one way hash function and Elliptic Curve Cryptography (ECC) to ensure security of their scheme.
2. Cryptanalysis and improvement of a biometrics-based remote user authentication scheme using smart cards 2013
A new biometric authentication scheme eradicates all its security pitfalls, and brings in some additional features, which are suitable for real life applications.
The proposed scheme maintains the security of the secret key; provides session key agreement; can withstand insider attacks, man-in-the-middle attacks and replay attacks; and provides proper mutual authentication between the server and the user.
LITERATURE SURVEYS.NO PAPER TITLE OBJECTIVE TOOLS/TECHNIQUES
3
Provably Secure Remote Truly Three-Factor Authentication
Scheme With Privacy Protection on Biometrics 2013
Timestamps are not required anymore for synchronization. Users are free to choose their passwords.
The security of the scheme is strengthened using a strong cryptographic algorithm where the biometric template is used as an encryption key.
4
Remote Password Authentication Scheme with Smart Cards and Biometrics
2013
The authors here have proposed a new and improved remote three factor authentication scheme, compares its performance and security with the previously proposed three factor authentication schemes.
The fingerprint sensors are placed on the smart cards rather on the image capture devices, which prevents the invaders to steal the biometric traits.
EXISTING METHODS
• Fingerprint based person authentication• RSA public key cryptography• Discrete wavelet transform• Weber’s Local descriptors
DRAWBACKS• Less efficiency and not flexible in
authentication scheme• High computational load when key size
increases• Inefficient texture features due to shift
variance• Less accuracy for various lighting condition
of images due to the delivery of insufficient descriptors.
PROPOSED SYSTEM
FRAMEWORK OF A MULTISERVER AUTHENTICATION SYSTEM.
SOFTWARE& HARDWARE REQUIREMENTS
OPERATING SYSTEM : WINDOWS 8 CORE TECHNOLOGY : MATLAB PROCESSOR : i7 & ABOVE RAM : 4 GB
APPLICATIONS
• Defense weapon storage Area• Bank ATM security• Authentication and privacy protection
ADVANTAGES
• More information security via hybrid crypto systems• Better texture characterization of
palmprint • High efficiency and low complexity
D. Yang and B. Yang, “A biometric password-basedmulti-server authentication scheme with smart card,” in Proceedings of the International Conference on Computer Design and Applications (ICCDA ’10), vol. 5, pp. 554–559, Qinhuangdao, China, June 2010.
E.-J. Yoon and K.-Y. Yoo, “Robust biometrics-based multiserver authentication with key agreement scheme for smart cards on elliptic curve cryptosystem,” The Journal of Supercomputing, vol. 63, no. 1, pp. 235–255, 2013/
D. He, “Security flaws in a biometrics-based multi-server authentication with key agreement scheme,” IACR Cryptology
ePrint Archive, vol. 365, 2011.
References
Thank You