Saturday, April 20, 2019
Information and computer security Assignment Example | Topics and Well Written Essays - 1500 words
Information and computer trade protection - Assignment Examplee biometric user documentation system whereby the system is able to undertake automated authentication of users based on the biometric traits of their fleur-de-lys. The system curiously combines with use of cryptographic detects with the distinctive biometric traits of iris to develop authentication algorithms that can be utilise to fork up individuals with access permission to an information system or data. As opposed to the use of the traditional passwords and PINs, crypto-biometric systems much(prenominal) as the iris based cryptographic keys are significantly more stable and less susceptible to attacks. For example, the public key infrastructure (PKI) regularity of generation may use the iris biometric features to enhance the security of Private Key and protect the user authentication systems against potential intruders (Bowyer, Hollingsworth, and Flynn, 2006). This is a significant improvement on the traditio nal cryptosystems where user authentication primarily relies on the possession of secrete keys which may easily be forgotten, stolen or lost, and thus do not often come through nonrepudiation.Generally, the use of iris may provide a number of advantages and solutions to some of these challenges facing the traditional cryptosystems. For example, iris based key generation method for cryptanalytics together with generation algorithms can be used to effectively bind cryptographic keys with the biometric guide of a user in such a way that makes it significantly impossible to reveal the key without a successful biometric authentication.The process of using iris based key generation method for cryptography to develop a user authentication system usually involves a number of steps. Firstly, the biometric data of the iris of an individual is acquired using sensors and then the distinctive features are extracted before enrolling the user for biometric authentication. Next, the data is then used to generate cryptographic keys which can be released whenever an authorized user key presents
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.