signature=3bed159966be4e0143cfc019c5f1b89b,基于加密安全保护并多重生物识别有效实施电子护照方案(IJIEEB-V4-N1-3)...

592e827e83014a544db94231a39ebcaf.png

I.J. Information Engineering and Electronic Business, 2012, 1, 18-24

Published Online February 2012 in MECS (http://www.doczj.com/doc/4ea123c7b0717fd5360cdcc0.html/)

DOI: 10.5815/ijieeb.2012.01.03

Efficient Implementation of Electronic Passport Scheme Using Cryptographic Security Along

With Multiple Biometrics

1 V.K. NARENDIRA KUMAR,

2 B. SRINIVASAN,

3 P.NARENDRAN

1Assistant Professor, Department of Information Technology,

2, 3Associate Professor, PG & Research Department of Computer Science,

Gobi Arts & Science College (Autonomous),

Gobichettipalayam – 638 453, Erode District, Tamil Nadu, India.

1 kumarmcagobi@http://www.doczj.com/doc/4ea123c7b0717fd5360cdcc0.html,

2 srinivasan_gasc@http://www.doczj.com/doc/4ea123c7b0717fd5360cdcc0.html,

3 narendranp@http://www.doczj.com/doc/4ea123c7b0717fd5360cdcc0.html

Abstract --Electronic passports have known a wide and fast deployment all around the world since the International Civil Aviation Organization the world has adopted standards whereby passports can store biometric identifiers. The use of biometrics for identification has the potential to make the lives easier, and the world people live in a safer place. The purpose of biometric passports is to prevent the illegal entry of traveler into a specific country and limit the use of counterfeit documents by more accurate identification of an individual. The paper analyses the face, fingerprint, palm print and iris biometric e-passport design. The paper also provides a cryptographic security analysis of the e-passport using face fingerprint, palm print and iris biometric that are intended to provide improved security in protecting biometric information of the e-passport bearer.

Index Terms — E-Passport, Biometrics, Cryptographic, Face, Fingerprint, Palm print and Iris.

1.Introduction

An electronic passport (e-Passport) is an identification document which possesses relevant biographic and biometric information of its bearer. It also has embedded

in it a Radio Frequency Identification (RFID) Tag which

is capable of cryptographic functionality. The successful implementation of biometric technologies in documents such as e-Passports aims to strengthen border security by reducing forgery and establishing without doubt the identity of the documents' bearer. Biometrics is measurable characteristics of an individual used to identify him or her. Biometric systems can function in verification or identification modes depending on their intended use. In a verification task, a person presents an identity claim to the system and the system only needs to verify the claim. In an identification task, an unknown individual presents himself or herself to the system, and it must identify them. In general, there are three approaches to authentication. In order of least secure and least convenient to most secure and most convenient, they are: Something you have - card, token, key. Something you know- PIN, password. Something you are - biometric [1]. Introduction to the three constituent technologies in E-Passports: Biometric and Public Key Infrastructure. Researcher also effectively summarizes the contents of three technical reports which describe the protocols and the functioning of the e-Passport specifications. The first work that analyses the protocols behind the e-Passport. Researcher also presents some feasible threats to the e-Passport protocol.

2.Literature Survey

Juels et al (2005) discussed security and privacy issues that apply to e-passports. They expressed concerns that, the contact-less chip embedded in an e-passport allows the e-passport contents to be read without direct contact with an IS and, more importantly, with the e-passport booklet closed. They argued that data stored in the chip could be covertly collected by means of “skimming” or “eavesdropping”. Because of low entropy, secret keys stored would be vulnerable to brute force attacks as demonstrated by Laurie (2007). Kc and Karger (2005) suggested that an e-passport may be susceptible to “splicing attack”, “fake finger attack” and other related attacks that can be carried out when an e-passport bearer presents the e-passport to hotel clerks. There has been considerable press coverage (Johnson, 2006; Knight, 2006; Reid, 2006) on security weaknesses in e-passports. These reports indicated that it might be possible to “clone” an e-passport.

2.1. Technical Challenges

你可能感兴趣的:(signature=3bed159966be4e0143cfc019c5f1b89b,基于加密安全保护并多重生物识别有效实施电子护照方案(IJIEEB-V4-N1-3)...)