Biometric Signature for Secure PKI Systems
Biometric Signature for Secure PKI Systems
Abstract— Digital signature is a technique that is utilized to the encryption key dissimilar from the decryption key that is
check the authenticity of a message transmitted electronically. preserved secret. The whole asymmetric algorithm is
The digital signature technique is based on a public key
dependent upon the generated two large prime numbers.
method. The meant transmitter signs his / her message of his /
her private key and the meant receiver checks that with the These are prime numbers that can be preserved secret.
public key of the transmitter. Digital signatures also ensure Everyone can always utilize the public key to encrypt
authentication of messages, integrity verification, and non- information but only with knowledge of both the prime
repudiation systems. This paper presents the concept of numbers, the information can be decrypted.
Biometric Signature: a recent technique to digitally sign a
Biometric methods that are focused on every single step
message utilizing biometrics- associated with digital signature
key creation, so, merging the benefits of Public Key of verification and identification gain extra interest in the
Infrastructure (PKI), through the utilize of biometric-based modern age, due to rapid technological progress and a high-
digital signature creation that is secure, reliable, quickly- security demand. Iris recognition system is more reliable and
comfortable, non-invasive, and clearly describes the accurate among various biometrics such as face recognition,
transaction creator. It also proposes biometric signature fingerprints, and ear [2]. Essentially a system is to be
algorithms utilizing the commonly utilized RSA digital performed to offer security to data utilizing iris images saved
signature technique and shows the problems related to them. in the IITD database. There is an important need for personal
This paper analyses the security of the modulus and the size of traits that can offer the highest possible protection toward
the keys used and computes the strength of RSA based on the
impersonation. The RSA algorithm is implemented with
number of bits in the key (iris template). The time of the
scheme is calculated and it is extremely small (in sec). utilize of the iris template as the key. The operations of
encryption and decryption operate independently including a
Keywords— Biometric Signatures, Digital Signatures, ICA key to encrypt and decrypt the data see Fig. 1. The security
algorithm, RSA algorithm.
of the encrypted data completely depends on the key's
confidentiality.
I. INTRODUCTION In biometric encryption, several corporations have
improved biometric with their user recognition and key-
Nowadays, security is a main concept in the digital generation principles [3]. They have designed a system
world. The Internet provides minimal cost but unreliable defined as biometric encryption, where the biometric photo is
medium of connecting people. An imposter can simply merged with a digital key (utilized as an encryption key) to
disguise as an authorized user and deceive the system. establish a more secure block of data named bioscrypt, in a
Robust security techniques and indisputable authentication real way that neither the key nor the biometric can be
methods are needed to supply end-to-end protection and separately obtained from it. During authentication, the
increase consumer trust in multiple internet-related business encryption key is obtained by merging the biometric photo
applications. This is required to encourage consumers to and the bioscrypt. This method solves the issue of key
move from the conventional way of doing business to web- management. Because the key is biometric independent,
based applications, and create e-commerce an entire utilize of the biometric is not lost, and though the key is
success. hacked [17].
The main challenge with PKI implementations is the
Cryptography techniques are utilized to avoid sensitive management of private keys. It is a good idea to save private
data from the attacker. Encryption transforms the keys on smart cards or floppy disks but they could also be
original messages into coded messages by creating a model misplaced or stolen. This can be solved by using biometrics
resistant to multiple attacks. At current, the best excellently- for private key access. Scientists have developed a new
method to reduce the risk of access to private key distributed
known and usually utilized public-key cryptosystem for
generation of RSA keys on more than one server, splitting the
secure data communication is RSA [1]. In this cryptosystem,
key into shares for every server. It will raise the effort needed
Authorized licensed use limited to: INDIAN INSTITUTE OF TECHNOLOGY DELHI. Downloaded on January 17,2023 at [Link] UTC from IEEE Xplore. Restrictions apply.
Third International Conference on Advanced Science and Engineering (ICOASE2020)
University of Zakho, Duhok Polytechnic University, Kurdistan Region, Iraq
by hackers to access the private key and discourage them by combining fingerprint features with the RSA algorithm
from trying to do, and can also be utilized to transfer the [6]. They suggested saving an encrypted biometric feature on
authority to sign documents to more than one person in the a smart card and utilizing it for authentication and key
organization to reduce errors or misuse by people inside the production purposes. They give a detailed approach to extract
organization. cores and deltas from the fingerprint picture and then utilizing
The advantages of the implemented system are as follows: them to create keys utilizing the Log-Gabor method. While
1. This approach will identify the person correctly
their experimental results show a very encouraging FAR of 0
and not the belonging of a person or what he
percent and FRR of 13.27 percent, they are unable to produce
knows.
robust results based only on core and delta traits. The main
2. No transmission of templates over the internet.
goal of the study is to present a detailed literature search of
3. No storing of the biometric template needed for
the most current biometric signature verification scientific
recovering each private key (because that can be
articles [7]. It discusses the most significant approaches and
reproduced on request).
describes differences in approaches and features that are
4. Offers extra flexibility when signing documents.
being utilized in the most current research in this field, along
You can also sign documents anywhere utilizing
with potential extensions. The researchers in [8] have
cams embedded in your device like PDAs, tablets,
implemented two stages of combination in finger and iris
mobile phones, etc. based on biometrics like Iris.
pictures for biometric authentication. Iris and fingerprint
features are calculated by a feature extraction module that has
updated the LDP and Gabor dependent features. Two
categories of combination are utilized, like SLF and FLF.
Strategies are utilized to combine the characteristics of iris
and fingerprints. In 2017, the researchers suggested the
approach of the digital signing of the document [9]. When the
user sends a document to any users who submit the document
must have their fingerprints on them. Sensor for Smartphone
Fingerprint and the document is expected to be encrypted.
Fig.1. Encryption and Decryption by RSA Then, the person who receives the encrypted file may decrypt
a document utilizing the public key of the person who is a
The paper is organized as follows: Section II contains a
sender. Biometrics is a channel to find the value of a private
review of the suggested methods. The achievement of the
user key from the dataset. This method's key pair technique
biometric digital signature system is defined in section III.
utilizing the RSA algorithm. The authors in [10] proposed a
Section IV discusses the results of the strategies
lightweight shortened complicated digital signature
implemented. The conclusion and future work are explained
mechanism to provide a safe connection with smart devices
in Section V.
in person-customized IoT. We have utilized less
II. RELATED WORK comprehensive procedures to perform signature as well as
verification operations, such as person beings signing legal
This study discusses security systems and digital papers and later checking as per claimant. Improve the
signature systems that depend on the biometric features security intensity to protect against an analysis of traffic. The
produced by various authors based on their experiments. researchers in [11] has developed a new definition of digital
The most significant studies related to this research. signature which the designers name fuzzy signature, which is
The authors in [4] have provided biometrics (iris and a signature system that utilizes a fuzzy string like biometric
fingerprint) to produce an encryption key. Next, the position data mostly as a private key, and therefore does not need user-
and texture features of the minutiae are defined from the specific accessory information (also named an assistance
position of the iris and the finger. So a 256-bit secure string in the sense of fuzzy applicator) to produce a signature.
encryption key was generated by merging the extracted The author in [12] paper gives a critical review of how
features and the key utilized in the BIS. BIS safety is strong biometrics can be effectively implemented to remove one
as well as the best reliability. Low-level encryption methods problem of cloud protection, identity theft. A broad range of
are often utilized in the method of biometrics. The biometric authentication method protocols and cloud-based
researchers in [5] suggested a system to combine the applications, particularly to combat identity theft have been
recognition of iris with a high-security access developed previously proposed [20-22].
smart card. The simulation circuit was constructed with its
software. In security terms, the suggested methodology has
superior efficiency, compared with other technologies. The
template signature was created utilizing the MD5 hash
function and stored on the smart card. In 2012, Conti et al.
suggested a technique for creating a private key on-the-fly
134
Authorized licensed use limited to: INDIAN INSTITUTE OF TECHNOLOGY DELHI. Downloaded on January 17,2023 at [Link] UTC from IEEE Xplore. Restrictions apply.
Third International Conference on Advanced Science and Engineering (ICOASE2020)
University of Zakho, Duhok Polytechnic University, Kurdistan Region, Iraq
B. Conversion of iris image to a unique code (Iris Code) 3) Image Normalization: Includes conversion from polar to
Every iris image has several features that make uniqueness cartesian coordinates and normalization of iris image. This is
to an individual iris. After executing several steps (like Image achieved utilizing the Daugman rubber sheet technique,
Segmentation and Normalization, Enhancement, where every point is in the iris region is repositioned into
Binarization, and Feature Extraction using the Flexible-ICA polar coordinates (r,θ) [16] as seen in Fig.3.
algorithm), our method creates a template binary code called 𝐼(𝑥(𝑟, θ), y(r, θ)) → I(r, θ) (4)
(Iris Code) from the extracted features. 𝑥(𝑟, θ) = (1 − r)𝑥𝑝 (θ)𝑟𝑥𝐼 (θ) (5)
𝑦(𝑟, θ) = (1 − 𝑟)𝑦𝑝 (θ)r𝑦𝐼 (θ) (6)
C. The basic stages of generating Iris Code
1) Image Acquisition: The first stage of the iris recognition In which I(x,y) in the region of the iris, (x,y) is the main
method is the acquisition of an image. This stage is really Cartesian, coordinates, (r,θ) is the conformable polar
difficult since the size and color of each person's iris is coordinates 𝑥𝑝 , 𝑦𝑝 & 𝑥𝐼 , 𝑦𝐼 are the pupil & iris region
different. It is also very hard to obtain clear images utilizing coordinates along θ the direction[19]
a typical CCD camera under various environmental
conditions. 800 images from the IITD iris dataset have been
used in this study
2) Image Segmentation: Involving the localization of the
internal and external borders of the iris. [15]. A robust
Circular Hough Transformation (CHT), is implemented to
determine both center coordinates & the radius of each pupil
& iris circles.
Fig. 3 Daugman’s rubber sheet algorithm
135
Authorized licensed use limited to: INDIAN INSTITUTE OF TECHNOLOGY DELHI. Downloaded on January 17,2023 at [Link] UTC from IEEE Xplore. Restrictions apply.
Third International Conference on Advanced Science and Engineering (ICOASE2020)
University of Zakho, Duhok Polytechnic University, Kurdistan Region, Iraq
In which X is a vector parameter of dimension N, and S is a The NIST suggested the highest strength value is 112 and
vector parameter of dimension M, in which every parameter above, so that the encryption is considered strong, while the
it's the source signal. We're assuming that N > M. Mixing it values less than 112 are considered easily hackable (this is the
Matrix A determines the linear transformation of S. Rang).
In another very powerful algorithm, AES (only brute force
breaks it), this algorithm is used as a reference for encryption
strength. The meaning of this is the strength of the RSA of n=
2048 bit in length in front of the method of breaking GNFS is
equivalent to the strength of the AES with a key length of
112bit with respect of the brute force breaking method.
136
Authorized licensed use limited to: INDIAN INSTITUTE OF TECHNOLOGY DELHI. Downloaded on January 17,2023 at [Link] UTC from IEEE Xplore. Restrictions apply.
Third International Conference on Advanced Science and Engineering (ICOASE2020)
University of Zakho, Duhok Polytechnic University, Kurdistan Region, Iraq
1024 2048
bits(in sec) bits(in sec)
Key generation (n,d,e) 11.23 50.05
Signature S 0.32 1.29
Verification 0.13 1.196
Note: SHA1 is utilized as the hash function to produce message-
digest
Fig. 6 Comparison of execution time of different template size
TABLE II shows the cryptographic algorithm provides The experiments of the system have been performed on
different security “strengths” based on a modulus and the key a Laptop PC (64-bit operating system, x64-based CPU, (4)
size utilized. GB RAM, Core i3-7900 processor, 2.40GHz) with the help
of python (hmac, hashlib, sympy, skimage, and rsa) libraries
and Jupyter notebook environment.
TABLE II .SECURITY STRENGTH IN CONNECTION WITH MODULUS
Template No of iris modulus Security
size image Size levels(in bits)
Time(s) V. CONCLUSION
256 1 n=256 40 8.99 A new method for implementing digital signatures
512 2 n=512 60 10.2 utilizing biometrics has been developed as well as named as
1024 4 n=1024 80 12.50 biometric signatures. It's doesn't completely change digital
2048 5 n=2048 112 50.50
signatures but is only utilized to produce a private key. So,
the biometric signature identifies a unique person and solves
Figure 5 Shows the RSA algorithm strength(bits) in relation key management problems by preventing the storage of
with (512,1024,2048,4096,7680) modulus size. private keys or biometric templates anyplace. The uniqueness
of every person's iris, reliability, and high accuracy enable iris
recognition system a completely matchless approach for the
biometric security of e-commerce implementations. The iris
is then utilized as a biometric to be combined with the PKI
for digitally signing of documents. The biometric signature
system utilizes the current and commonly utilized RSA
digital signature that has been introduced. Speed of Biometric
Signatures utilizing iris image and comparison key generation
speeds for different biometrics are provided. Biometric
signatures can ensure long-term stability and high accuracy
without limiting the size of the template. Private keys may be
Fig. 5 RSA strength (bits) with different modulus size easily updated periodically or on request.
The implemented system confirms that it is possible to create
a public / private key pair in less than a minute. Such that, it
Figure 6 shows the comparison speed of signature confirms that is capable of supporting real-time
key generation for the different iris templates. As well as the communication.
increase in the size of the template, the time taken for the key This paper explains on the cryptographic algorithm
generation is also increasing as predicted. Biometric provides different security “strengths” based on the modulus
Signature utilizing RSA can therefore be applied with any and the key size utilized. Also, the time performance of the
biometric without limiting on template size. And, because the keys and the result experiment data is discussed and
verification time is very smaller, the validity of the private examined in detail.
key produced could be tested locally in a very short time (in In the future, the use of biometric could be modified to
a millisecond). utilize DNA as the best biometric to be combined with a
digital signature that will aid to improve the system
performance.
137
Authorized licensed use limited to: INDIAN INSTITUTE OF TECHNOLOGY DELHI. Downloaded on January 17,2023 at [Link] UTC from IEEE Xplore. Restrictions apply.
Third International Conference on Advanced Science and Engineering (ICOASE2020)
University of Zakho, Duhok Polytechnic University, Kurdistan Region, Iraq
138
Authorized licensed use limited to: INDIAN INSTITUTE OF TECHNOLOGY DELHI. Downloaded on January 17,2023 at [Link] UTC from IEEE Xplore. Restrictions apply.