Generation of Encryption Keys Related to Encryption Algorithm Using The Most Important Features of Biometrics

Authors

  • Mohammad Hijaziya Tishreen University
  • Mazyye Shamout Tishreen University

Keywords:

Encryption, Decryption, AES Algorithm, Biometric Encryption Key, Mintuae Algorithm.

Abstract

    Cryptographic algorithms are under regular attacks due to poor cryptographic keys. The research introduces two new algorithms for generating cryptographic keys based on biometric descriptions developed from an original algorithm. The algorithms rely on fingerprint images and AES encryption algorithm. The research suggests extracting fingerprint features using the mintuae method and then generating cryptographic keys based on these features. Key generation operations include several steps that increase cipher strength such as switching and mixing operations, fingerprint image problems were avoided through pre-processing operations. The Extracted features from images were independent of shape, direction and rotation. The two modified algorithms were able to successfully encode and decode the texts with less implementation times than the original algorithm and with higher performance. They also increased the sobriety of the algorithm towards attacks as the algorithms were tested on fingerprint images of different people and show the algorithm's ability to address it. They prevented the decryption of the original text in case the fingerprint is not correct. The modified first algorithm outperformed the second modified one and the original algorithm in terms of time, performance, and attack. It also managed to decode the texts using inverted, rounded, partial and left-hand fingerprint images.

Author Biographies

Mohammad Hijaziya, Tishreen University

Associate Professor, Department of Computer and Automatic Control Engineering, Faculty of Mechanical and Electrical Engineering

Mazyye Shamout, Tishreen University

Master Student - Computer Engineering, Department of Computer and Automatic Control Engineering, Faculty of Mechanical and Electrical Engineering,

Published

2021-01-18

How to Cite

1.
حجازية م, شموط م. Generation of Encryption Keys Related to Encryption Algorithm Using The Most Important Features of Biometrics . Tuj-eng [Internet]. 2021Jan.18 [cited 2024Nov.27];42(6). Available from: https://journal.tishreen.edu.sy/index.php/engscnc/article/view/10228

Most read articles by the same author(s)

<< < 1 2 3 > >>