Fingerprint Based Cryptographic Key Generation

  • K. SureshEmail author
  • Rajarshi Pal
  • S. R. Balasundaram
Conference paper
Part of the Lecture Notes on Data Engineering and Communications Technologies book series (LNDECT, volume 38)


Secure storage of a cryptographic key is a challenging task. In this paper, a fingerprint based cryptographic key generation approach has been proposed. It can be used in a symmetric key setup. The use of gray code makes the approach interesting, as gray code reduces the mismatch of binary representations of two successive integers. It has been experimentally shown that it is impossible to generate the same key from the fingerprint of an intruder. Moreover, it does not require to store neither the fingerprint of the user nor the cryptographic key. It makes the scheme more secure.


Cryptographic key generation Bio-cryptosystem Securing cryptographic key 


  1. 1.
    Soutar, C., Roberge, D., Stoianov, A., Gilroy, R., Kumar, B.V.: Biomteric encryption - enrollment and verification procedures. In: Proceedings of SPIE, pp. 24–35 (1998)Google Scholar
  2. 2.
    Juels, A., Sudan, M.: A fuzzy vault scheme. Des. Codes Crypt. 38(2), 237–257 (2006)MathSciNetCrossRefGoogle Scholar
  3. 3.
    Jin, Z., Teoh, A.B.J., Goi, B.M., Tay, Y.H.: Biometric cryptosystems: a new biometric key binding and its implementation for fingerprint minutiae-based representation. Pattern Recogn. 56, 50–62 (2016)CrossRefGoogle Scholar
  4. 4.
    Juels, A., Wattenberg, M.: A fuzzy commitment scheme. In: Proceedings of the 6th ACM Conference on Computer and Communications Security, pp. 28–36. ACM (1999)Google Scholar
  5. 5.
    Sasa, A., Milosavljevic, M., Veinovic, M., Sarac, M., Jevremovic, A.: Fuzzy commitment scheme for generation of cryptographic keys based on iris biometrics. IET Biom. 6(2), 89–96 (2016)Google Scholar
  6. 6.
    Panchal, G., Samanta, D., Barman, S.: Biometric-based cryptography for digital content protection without any key storage. Multimed. Tools Appl. 1–22 (2017)Google Scholar
  7. 7.
    Panchal, G., Samanta, D.: A novel approach to fingerprint biometric-based cryptographic key generation and its applications to storage security. Comput. Electr. Eng. 69, 461–478 (2018)CrossRefGoogle Scholar
  8. 8.
    Panchal, G., Samanta, D.: Comparative features and same cryptographic key generation using biometric fingerprints. In: International Conference on Advances in Electrical, Electronics, Information, Communication and Bio-Informatics, Chennai, India, pp. 691–695 (2016)Google Scholar
  9. 9.
    Sarkar, A., Singh, B.K., Bhaumik, U.: Cryptographic key generation scheme from cancellable biometrics. In: Pattnaik, P., Rautaray, S., Das, H., Nayak, J. (eds.) Progress in Computing, Analytics and Networking. Advances in Intelligent Systems and Computing, vol. 710. Springer, Singapore (2018)Google Scholar
  10. 10.
    Barman, S., Chattopadhyay, S., Samanta, D., Panchal, G.: A novel secure key-exchange protocol using biometrics of the sender and receiver. Comput. Electr. Eng. 64, 65–82 (2017)CrossRefGoogle Scholar
  11. 11.
    Sarkar, A., Singh, B.K.: Cryptographic key generation from cancelable fingerprint templates. In: International Conference on Recent Advances in Information Technology (RAIT), pp. 1–6. IEEE (2018)Google Scholar
  12. 12.
    Sarkar, A., Singh, B.K.: A cancelable biometric based secure session key agreement protocol employing elliptic curve cryptography. Int. J. Syst. Assur. Eng. Manag. 1–20 (2019)Google Scholar
  13. 13.
    Sarkar, A., Singh, B.K.: A cancelable fingerprint biometric based session key establishment protocol. Multimed. Tools Appl. 1–27 (2019)Google Scholar
  14. 14.
    Wu, L., Liu, X., Yuan, S., Xiao, P.: A novel key generation cryptosystem based on face features. In: IEEE 10th International Conference on Signal Processing, pp. 1675–1678. IEEE (2010)Google Scholar
  15. 15.
    Karimian, N., Guo, Z., Tehranipoor, M., Forte, D.: Highly reliable key generation from electrocardiogram (ECG). IEEE Trans. Biomed. Eng. 64(6), 1400–1411 (2016)CrossRefGoogle Scholar
  16. 16.
    Moosavi, S.R., Nigussie, E., Levorato, M., Virtanen, S., Isoaho, J.: Low-latency approach for secure ECG feature based cryptographic key generation. IEEE Access 6, 428–442 (2017)CrossRefGoogle Scholar
  17. 17.
    Yip, W.K., Goh, A., Ngo, D.C.L., Teoh, A.: Generation of replaceable cryptographic keys from dynamic handwritten signatures. In: International Conference on Biometrics, pp. 509–515. Springer, Heidelberg (2006)CrossRefGoogle Scholar
  18. 18.
  19. 19.

Copyright information

© Springer Nature Switzerland AG 2020

Authors and Affiliations

  1. 1.Department of Computer ApplicationsNational Institute of TechnologyThiruchirapalliIndia
  2. 2.Centre of Excellence in Cyber SecurityInstitute for Development and Research in Banking TechnologyHyderabadIndia

Personalised recommendations