Browsing by Author "Ismail, Mohammed"
Now showing 1 - 1 of 1
- Results Per Page
- Sort Options
Item Multimodal Biometrics Cryptosystem using Elliptic Curve(2014) Abdelhady, Ghada; Ismail, Mohammed; Elbehiery, HussamBiometrics is a technology that strives towards identifying or authenticating the identity of a living person based on biological key that make the process definitive and effortless. A person's live biometric data is being matched against a bio print in the database, such as a smart card. If it matches, it means that the person is who he or she claims to be and access is granted. This process is called verification. Using the password in one to many systems is checking against a full database of passwords. This process is called identification. The system only cares if the password is valid one, not if the person using the password is authorized to use it. Biometric Encryption is a best method to secure our data and information. It guarantees the identification and authentication of the encryption process. To implement this technology, a powerful mathematical is used which known as Ciphering. Ciphering algorithms can be divided into two categories: private-key (symmetric) and publickey (asymmetric). Private-key systems use a common private key shared between the communicating parties, while public-key do not require any key exchange [2]. The implementation of ciphering systems presents several requirements and challenges. First, the performance of the algorithms is often crucial. One needs encryption algorithms to run at the transmission rates of the communication links. Slow running cryptographic algorithms translate into consumer dissatisfaction and inconvenience. On the other hand, fast running encryption might mean high product costs since traditionally, higher speeds were achieved through custom hardware devices. In addition to performance requirements, guaranteeing security is a formidable challenge. Our study will present a new algorithm that will be added to the known symmetric encryption algorithms. This system is called New DES based on Elliptic curve. It has the benefits of DES and also the benefits of Elliptic Curve Cryptosystem (ECC) as a public key algorithm. It has the simplicity of DES algorithm also it has the strength of ECC. Except that the key in ECC is a public key but the key in our new algorithm is still private and generated by a new technique mentioned in details in [1]. Also we will use different keys as we are going to use three biometric scanners, Fingerprint, retina and iris scanners. Biometric Encryption is the most suitable method to secure our data and information, in which the security is forced to check the incoming objects by scanning of our body and the scanned objects are stored in database as an image. Then, the stored images are compared with the original image that already stored in database. The coming sections explain History and state of the art, how DES is modified to be secured. Also, we explain the flowchart of our system and the proposed prototype pictures. The last section demonstrates industry and market analysis including