A Hardware-Implemented Truly Random Key Generator for Secure Biometric Authentication Systems
Recent advances in information security requires strong keys which are randomly generated. Most of the keys are generated by the softwares which use software-based random number generators. However, implementing a True Random Number Generator (TRNG) without using a hardware-supported platform is not reliable. In this paper, a biometric authentication system using a FPGA-based TRNG to produce a private key that encrypts the face template of a person is presented. The designed hardware can easily be mounted on standard or embedded PC via its PCI interface to produce random number keys. Random numbers forming the private key is guaranteed to be true because it passes a two-level randomness test. The randomness test is evaluated first on the hardware then on the PC by applying the full NIST test suite. The whole system implements an AES-based encryption scheme to store the person’s secret safely. Assigning a private key which is generated by our TRNG guarantees a unique and truly random password. The system stores the Wavelet Fourier-Mellin Transform (WFMT) based face features in a database with an index number that might be stored on a smart or glossary card. The objective of this study is to present a practical application integrating any biometric technology with a hardware-implemented TRNG.
KeywordsFace Image Random Number Generator Authentication Scheme Advance Encryption Standard Data Encryption Standard
Unable to display preview. Download preview PDF.
- 1.Jun, B., Kocher, P.: The Intel Random Number Generator. Cryptography Research, Inc. white paper prepared for Inter Corp. (1999), http://www.cryptography.com/resources/whitepapers/IntelRNG.pdf
- 3.Schneier, B.: Applied Cryptography, 2nd edn. John Wiley & Sons, Chichester (1996)Google Scholar
- 6.Dichtl, M., Janssen, N.: A High Quality Physical Random Number Generator. In: Proc. Sophia Antipolis Forum Microelectronics (SAME), pp. 48–53 (2000)Google Scholar
- 7.Petrie, C.S., Connelly, J.A.: Modeling and Simulation of Oscillator-Based Random Number Generators. In: Proc. IEEE Int. Symp. on Circuits & Systems (ISCAS), vol. 4, pp. 324–327 (1996)Google Scholar
- 11.Teoh, A.B.J., Ngo, D.C.L., Goh, A.: Personalised Cryptographic Key Generation Based on FaceHashing. Jour. of Computer & Security (2004)Google Scholar
- 12.Von Neumann, J.: Various Techniques Used in Connection With Random Digits. In: Forsythe, G.E. (ed.) National Bureau of Standards. Applied Math. Series, vol. 12, pp. 36–38 (1951)Google Scholar
- 13.National Institute of Standard and Technology. A Statistical Test Suite for Random and Pseudo Random Number Generators for Cryptographic Applications. NIST 800-22 (2001), http://csrc.nist.gov/rng/SP800-22b.pdf
- 14.Samaria, F., Harter, A.: Parameterisation of a Stochastic Model for Human Face Identification. In: 2nd IEEE Workshop on Applications of Computer Vision, Sarasota FL (December 1994)Google Scholar