Szczegóły publikacji
Opis bibliograficzny
Personalized cryptographic protocols - obfuscation technique based on the qualities of the individual / Radosław BUŁAT, Marek R. OGIELA // W: Advances in networked-based information systems : the 24th international conference on Network-Based Information Systems (NBiS-2021) : [Taichung, Taiwan, September 1–3, 2021] / eds. Leonard Barolli, Hsing-Chung Chen, Tomoya Enokido. — Cham : Springer Nature Switzerland, cop. 2022. — (Lecture Notes in Networks and Systems ; ISSN 2367-3370 ; vol. 313). — ISBN: 978-3-030-84912-2; e-ISBN: 978-3-030-84913-9. — S. 213–218. — Bibliogr., Abstr. — Publikacja dostępna online od: 2021-08-08
Autorzy (2)
Słowa kluczowe
Dane bibliometryczne
| ID BaDAP | 136640 |
|---|---|
| Data dodania do BaDAP | 2021-10-01 |
| DOI | 10.1007/978-3-030-84913-9_19 |
| Rok publikacji | 2022 |
| Typ publikacji | materiały konferencyjne (aut.) |
| Otwarty dostęp | |
| Wydawca | Springer |
| Czasopismo/seria | Lecture Notes in Networks and Systems |
Abstract
Most of the cryptographic protocols nowadays, mainly asymmetrical, have a generated user personal key as their basis, known only to them but still vulnerable to theft. There can be proposed an innovative solution, which hashes the cipher with chosen key and uses some personal characteristics of the person generating it (e.g., by voice sampling or biometrics, encoded as a bit vector). Such a private key would be usable only by its creator, making the design much safer and authenticating him personally, making the non-repudiation of encoded material possible. Also, with the proposed solution, another avenue of research has been opened by using such a technique in steganography - encoding information in the user-provided picture, secured by his biometric sequences (quality vectors). In both cases, the cryptographic protocols take on truly unique sequences, used instead of traditional salt values, also providing a layer of truly personal touch to an otherwise purely theoretical construct. It may find many applications in the growing world of IoT where people and their unique needs have to be incorporated into the growing web of security protocols.