Skip to main content

Personalized Cryptographic Protocols - Obfuscation Technique Based on the Qualities of the Individual

  • Conference paper
  • First Online:
Advances in Networked-Based Information Systems (NBiS 2021)

Part of the book series: Lecture Notes in Networks and Systems ((LNNS,volume 313))

Included in the following conference series:

Abstract

Most of the cryptographic protocols nowadays, mainly asymmetrical, have a generated user personal key as their basis, known only to them but still vulnerable to theft. There can be proposed an innovative solution, which hashes the cipher with chosen key and uses some personal characteristics of the person generating it (e.g., by voice sampling or biometrics, encoded as a bit vector). Such a private key would be usable only by its creator, making the design much safer and authenticating him personally, making the non-repudiation of encoded material possible. Also, with the proposed solution, another avenue of research has been opened by using such a technique in steganography - encoding information in the user-provided picture, secured by his biometric sequences (quality vectors). In both cases, the cryptographic protocols take on truly unique sequences, used instead of traditional salt values, also providing a layer of truly personal touch to an otherwise purely theoretical construct. It may find many applications in the growing world of IoT where people and their unique needs have to be incorporated into the growing web of security protocols.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 259.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 329.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. Sfar, A.R., Natalizio, E., Challal, Y., Chtourou, Z.: A roadmap for security challenges in the Internet of Things. Digit. Commun. Netw. 4(2), 118–137 (2018)

    Article  Google Scholar 

  2. Loukil, F., Ghedira, C., Aïcha-Nabila, B., Boukadi, K., Maamar, Z.: Privacy-aware in the IoT applications: a systematic literature review. In: Panetto, H., et al. (eds.) On the Move to Meaningful Internet Systems. LNCS, vol. 10573, pp. 552–569. Springer, Heidelberg (2017). https://doi.org/10.1007/978-3-319-69462-7_35

    Chapter  Google Scholar 

  3. Traore, I., Ahmed, E.A.: Continuous Authentication Using Biometrics: Data, Models, and Metrics, 1st edn. IGI Global, Hershey (2011)

    Google Scholar 

  4. Ogiela, M.R., Ogiela, L.: Cognitive cryptography techniques for intelligent information management. Int. J. Inf. Manage. 40, 21–27 (2018)

    Article  Google Scholar 

  5. Menezes, A., Van Oorschot, P., Vanstone, S.: Handbook of Applied Cryptography. CRC, Boca Raton (1997)

    MATH  Google Scholar 

  6. Fierrez, J., Morales, A., Vera-Rodriguez, R., Camacho, D.: Multiple classifiers in biometrics. Part 2: trends and challenges. Inf. Fusion 44, 103–112 (2018). https://doi.org/10.1016/j.inffus.2017.12.005, ISSN: 1566–2535

  7. Szlósarczyk, S., Schulte, A.: Voice encrypted recognition authentication – VERA. In: 2015 9th International Conference on Next Generation Mobile Applications, Services and Technologies, pp. 270–274 (2015). https://doi.org/10.1109/NGMAST.2015.74

  8. Acien, A., Morales, A., Vera-Rodriguez, R., Fierrez, J., Tolosana, R.: MultiLock: mobile active authentication based on multiple biometric and behavioral patterns, pp. 53–59 (2019). https://doi.org/10.1145/3347450.3357663

  9. Cox, I., Miller, M., Bloom, J., Fridrich, J., Kalker, T.: Digital Watermarking and Steganography. Morgan Kaufmann Publishers, Burlington (2008)

    Google Scholar 

  10. Ogiela, M.R., Koptyra, K.: False and multi-secret steganography in digital images. Soft Comput. 19(11), 3331–3339 (2015). https://doi.org/10.1007/s00500-015-1728-z

    Article  Google Scholar 

  11. Bułat, R.: Zastosowanie metod ewolucyjnych w kryptografii – problem faktoryzacji. In: Metody analizy i oceny bezpieczeństwa oraz jakości informacji, Kraków (2012)

    Google Scholar 

Download references

Acknowledgments

This work has been supported by the AGH University of Science and Technology Research Grant No 16.16.120.773. This work has been supported by the AGH Doctoral School Grant No 10.16.120.7999.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Marek R. Ogiela .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2022 The Author(s), under exclusive license to Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Bułat, R., Ogiela, M.R. (2022). Personalized Cryptographic Protocols - Obfuscation Technique Based on the Qualities of the Individual. In: Barolli, L., Chen, HC., Enokido, T. (eds) Advances in Networked-Based Information Systems. NBiS 2021. Lecture Notes in Networks and Systems, vol 313. Springer, Cham. https://doi.org/10.1007/978-3-030-84913-9_19

Download citation

Publish with us

Policies and ethics