Font Size: a A A

Authentication Protocol Design And Implementation Based On Fingerprint Identification And Digital Watermarking

Posted on:2012-07-30Degree:MasterType:Thesis
Country:ChinaCandidate:Y J LiuFull Text:PDF
GTID:2248330395955579Subject:Computer system architecture
Abstract/Summary:PDF Full Text Request
Authentication is the first barrier of the information system security field. It is akey field in the information age. There are many ways to achieve authentication.However, the identity authentication has got new requirement to discard the old way ofauthentication and design a integrative authentication system, which is also the currentdevelopment direction of identity authentication technology.The paper uses public key infrastructure (PKI) network security authenticationtechnology, combinding with characterics of fingerprint identification and digitalwatermarking, designs a network authentication protocol based on fingerprint featuresand digital watermarking, and achieves an authentication system in network digitaloffice environment. Details are as follows:1. The paper applied PKI development tool OpenSSL to implement a small selfsigned CA system, which is based on OpenSSL command-line on windows platformafter studying PKI, and combined OpenSSL encryption library with SSL protocollibrary, it realized a secure communication channel between the client and the server.2. The paper designed a authentication protocol based on fingerprint identificationand digital watermarking (FWAP, Fingerprint and Watermarking based AuthenticationProtocol). The protocol is secure against Stolen-verifier and Replay attacks and ensuresthe privacy and authenticity of users’ fingerprints information. Meanwhile, it achievedthe fuction modules of authentication system in secure digital office according toprotocol design.One of the innovations of the paper is that it used secure data exchange platformwhich is provided by PKI to ensure the confidentiality and authenticity of data duringthe registration and authentication section. The protocol can successfully avoid the twocommon attack measures: Stolen-verifier and Replay, through introducing enteringserial number. The second innovation is the protocol contains the second authenticationto users’ key operation in digital office environment, which effectively prevent thedisadvantage that one user may use others’ identity during the uses’s critical operation,and using the strict correlation between a user’s fingerprint and identity to achievedigital forensics function of user’s key operation.
Keywords/Search Tags:Authentication, Fingerprint Identification, Digital WatermarkingPKI
PDF Full Text Request
Related items