Biometric Sender Authentication in Public Key Cryptosystem to Overcome Man-In-The-Middle Attack and to Provide High Security

Jitendra Singh Laser*, Vinay Kumar Jain**
** Associate Professor, Department of Employment and Technical Education & Training, Shri Shankaracharya College of Engineering and Technology, Bhilai, India.
Periodicity:March - May'2016
DOI : https://doi.org/10.26634/jit.5.2.6000

Abstract

The objective of this work is to develop Biometric based sender authentication in public key cryptosystems to overcome the man-in-the-middle attack or hacking issues and provide a high level of security. Biometric Technologies are automated methods for verifying or recognizing the identity of a person based on physiological or behavioural characteristics. In public key cryptosystems, authentication is provided either by HASH function, MAC (Message Authentication Code) function or Digital Signature. In this work, the authors have used a Biometric based sender Authentication using Speech Feature in public key Cryptosystem. Here the public key cryptosystem uses Diffie Hellman (DH) algorithm. DH generates a shared secret key between two parties over an insured communication, but DH does not provide Encryption/Decryption and authentication. The man-in-the-middle attack or Hacking is possible in DH, because it does not authenticate the participants. In this work, the authors overcome the authentication and the man-in-middle attack problem by using Biometric based sender authentication. Also the speech encryption and decryption are performed with the message for high security.

Keywords

Biometric Sender Authentication, Speech Recognition, Diffie Hellman (DH) Public Key Cryptosystem, Man-In- The-Middle Attack, Speech and Message Encryption and Decryption.

How to Cite this Article?

Laser. J. S and Jain. V (2016). Biometric Sender Authentication in Public Key Cryptosystem to Overcome Man-In-The-Middle Attack and to Provide High Security. i-manager’s Journal on Information Technology, 5(2), 19-26. https://doi.org/10.26634/jit.5.2.6000

References

[1]. William Stallings, (2003). Cryptography and Network Security Principles and Practices, Fifth Edition. Pearson Education.
[2]. Whitfield Diffie and Martin E. Hellman, (1976). “New Directions in Cryptography”. Invited Paper.
[3]. M.S. Durairajan, and R. Saravanan, (2014). “Biometric based key generation using DH key algorithm” CODEN (USA): IJCRGG, ISSN : 0974-4290 Vol.6, No.9, pp. 4359- 4365.
[4]. Aparna J R, and Sonal Ayyappan, (2015). “Image watermarking using Diffie Hellman key exchange algorithm”. ELSEVIER, ICICT 2014, 1877 0509©2015.
[5]. P. Kartik, (2008). "Multimodal biometric person authentication system using speech and signature features". TENCON 2008-2008 IEEE Region 10 Conference,11/2008.
[6]. J.H. McClellan, R.W. Schafer, and M.A. Yoder, (2003). Signal Processing First. Prentice Hall, pp. 415-426.
[7]. Daoudi K., (2002). “Automatic Speech Recognition: t h The New Millennium”. Proceedings of the 15 International Conference on Industrial and Engineering, Applications of Artificial Intelligence and Expert Systems: Developments in Applied Artificial Intelligence, pp. 253- 263.
If you have access to this article please login to view the article or kindly login to purchase the article

Purchase Instant Access

Single Article

North Americas,UK,
Middle East,Europe
India Rest of world
USD EUR INR USD-ROW
Pdf 35 35 200 20
Online 35 35 200 15
Pdf & Online 35 35 400 25

Options for accessing this content:
  • If you would like institutional access to this content, please recommend the title to your librarian.
    Library Recommendation Form
  • If you already have i-manager's user account: Login above and proceed to purchase the article.
  • New Users: Please register, then proceed to purchase the article.