Szczegóły publikacji

Opis bibliograficzny

Personalized cryptographic protocols - obfuscation technique based on the qualities of the individual / Radosław BUŁAT, Marek R. OGIELA // W: Advances in networked-based information systems : the 24th international conference on Network-Based Information Systems (NBiS-2021) : [Taichung, Taiwan, September 1–3, 2021] / eds. Leonard Barolli, Hsing-Chung Chen, Tomoya Enokido. — Cham : Springer Nature Switzerland, cop. 2022. — (Lecture Notes in Networks and Systems ; ISSN 2367-3370 ; vol. 313). — ISBN: 978-3-030-84912-2; e-ISBN: 978-3-030-84913-9. — S. 213–218. — Bibliogr., Abstr. — Publikacja dostępna online od: 2021-08-08

Autorzy (2)

Słowa kluczowe

personalized cryptographyuser-oriented security systemssecurity protocols

Dane bibliometryczne

ID BaDAP136640
Data dodania do BaDAP2021-10-01
DOI10.1007/978-3-030-84913-9_19
Rok publikacji2022
Typ publikacjimateriały konferencyjne (aut.)
Otwarty dostęptak
WydawcaSpringer
Czasopismo/seriaLecture Notes in Networks and Systems

Abstract

Most of the cryptographic protocols nowadays, mainly asymmetrical, have a generated user personal key as their basis, known only to them but still vulnerable to theft. There can be proposed an innovative solution, which hashes the cipher with chosen key and uses some personal characteristics of the person generating it (e.g., by voice sampling or biometrics, encoded as a bit vector). Such a private key would be usable only by its creator, making the design much safer and authenticating him personally, making the non-repudiation of encoded material possible. Also, with the proposed solution, another avenue of research has been opened by using such a technique in steganography - encoding information in the user-provided picture, secured by his biometric sequences (quality vectors). In both cases, the cryptographic protocols take on truly unique sequences, used instead of traditional salt values, also providing a layer of truly personal touch to an otherwise purely theoretical construct. It may find many applications in the growing world of IoT where people and their unique needs have to be incorporated into the growing web of security protocols.

Publikacje, które mogą Cię zainteresować

fragment książki
#138659Data dodania: 17.1.2022
User oriented protocols for data sharing and services management / Lidia Ogiela, Makoto Takizawa, Urszula Ogiela // W: Advances in networked-based information systems : the 22nd international conference on Network-Based Information Systems (NBiS-2019) : [5–7 September 2019, Oita, Japan] / eds. Leonard Barolli, [et al.]. — Cham : Springer Nature Switzerland AG, cop. 2020. — (Advances in Intelligent Systems and Computing ; ISSN 2194-5357 ; vol. 1036). — ISBN: 978-3-030-29028-3; e-ISBN: 978-3-030-29029-0. — S. 137-141. — Bibliogr., Abstr. — Publikacja dostępna online od: 2019-08-15. — L. Ogiela, U. Ogiela – afiliacja: Pedagogical University of Krakow
fragment książki
#138602Data dodania: 17.1.2022
Secure cognitive protocols for data fusion in transformative computing / Lidia Ogiela, Makoto Takizawa, Urszula Ogiela // W: Advances in Networked-Based Information Systems : the 23rd international conference on Network-Based Information Systems (NBiS-2020) : August 31st - September 2nd, 2020, Victoria, Canada / eds. Leonard Barolli [et al.]. — Switzerland : Springer Nature, cop. 2021. — (Advances in Intelligent Systems and Computing ; ISSN 2194-5357 ; vol. 1264). — ISBN: 978-3-030-57810-7; e-ISBN: 978-3-030-57811-4. — S. 89-93. — Bibliogr., Abstr. — -Publikacja dostępna online od: 2020-08-20. — L. Ogiela, U. Ogiela – afiliacja: Pedagogical University of Krakow, Poland