Design of an Online authentication protocol using both fingerprint identification and identity based cryptography

Authors

  • Media Abdul Razak Ali Computer and software Engineering Department Al-mustansiriya University

Keywords:

online authentication, Fingerprint authentication, ID-based cryptography, hash function

Abstract

One of the major limitations with the authentication of users via the internet is the inherent lack of security of traditional authentication techniques,
passwords, PIN numbers and cookies. With the current development of the biometric fingerprint technology market, the possibility of identifying
someone online has been addressed. However, recent publication in this field shows that the lack of aliveness detection mechanism in fingerprint sensors
technology, may be used to mold and reproduce exact copy of a fingerprint with its detailed shape and extended characteristics (e.g. minutiae points
location). The presented authentication system provides the solution to this problem by using IDbased cryptography. A complete online authentication
system is developed presenting the registration, login and authentication phases. The security analysis of the system is also presented.

Downloads

Download data is not yet available.

Downloads

Published

20-09-2019

How to Cite

[1]
M. A. R. Ali, “Design of an Online authentication protocol using both fingerprint identification and identity based cryptography”, NUCEJ, vol. 14, no. 2, pp. 199–204, Sep. 2019, Accessed: Dec. 27, 2024. [Online]. Available: https://oldjournal.eng.nahrainuniv.edu.iq/index.php/main/article/view/618

Similar Articles

91-100 of 150

You may also start an advanced similarity search for this article.