DOI QR코드

DOI QR Code

Practically Secure and Efficient Random Bit Generator Using Digital Fingerprint Image for The Source of Random

디지털 지문 이미지를 잡음원으로 사용하는 안전하고 효율적인 난수 생성기

  • 박승배 (초당대학교 컴퓨터과학과) ;
  • 주낙근 (동신대학교 인터넷정보학과) ;
  • 강문설 (강주대학교 컴퓨터전자통신공학부)
  • Published : 2003.06.01

Abstract

We present a random bit generator that uses fingerprint image as the source of random, and the random bit generator is the first generator in the world that uses biometric information for the source of random in the world. The generator produces, on the average, 9,334 bits a fingerprint image in 0.03 second, and the produced bit sequence passes all 16 statistical tests that are recommended by NIST for testing the randomness.

본 논문에서는 디지털 지문 이미지를 잡음원으로 하는 난수 생성기를 제안한다. 생체 정보를 잡음원으로 하는 난수 생성기는 아직까지 세계적으로 제안되지 않고 있다. 제안한 난수 생성기는 한 지문에 대하여 평균 9,334 비트를 0.03초에 생성하며, 생성된 비트 열은 NIST에서 권장한 16개의 난수성 통계 검증들을 모두 통과하였다.

Keywords

References

  1. G. B. Agnew, 'Ransom sources for cryptographic systems,' Eurocrypt'87, Springer-Verlag, LNCS Vol.304, pp.77-81, 1988
  2. L. Blum, M. Blum and M. Shub, 'A simple unpredictable pseudo random generator,' SIAM Journal on Computing, 15, pp.364-383, 1986 https://doi.org/10.1137/0215025
  3. D. Davis, R. Ihaka and P. Fenstermacher, 'Cryptographic randomness from air turbulence in disk drives,' Crypto'94, Springer-Verlag, LNCS Vol.839, pp.114-120, 1994
  4. FIPS 186, 'Digital signature standard,' Federal Information Processing Standards 186, U.S. Department of Commerce/NIST, National Technical Information Service, Springfield, 1994
  5. J. Hastad, 'Pseudo random number generators under uniform assumptions,' In Proceedings of the Twenty Second Annual ACM Symposium on Theory of Computing, pp.395-404, 1990 https://doi.org/10.1145/100216.100270
  6. M. Jakobsson, E. Shriver, B. K. Hillyer and A. Juels, 'A practical secure Random bit generator,' ACM Conference on Computer and Communications Security, pp.103-111, 1998 https://doi.org/10.1145/288090.288114
  7. L. Hong, Y. Wan and A. K. Jain, 'Fingerprint enhancement : algorithm and performance evaluation,' IEEE Trans. Pattern Anal. Mach. Intell., 20, p.777, 1998 https://doi.org/10.1109/34.709565
  8. J. B. Lacy, D. P. Mitchell and W. M. Schell, 'Cryptolib : Cryptography in software,' In USENIX Security Symposium IV Proceedings, USENIX Association, pp.1-17, 1993
  9. M. Luby, Pseudorandomness and Cryptographic Applications, Princeton University Press, New Jersey, 1996
  10. D. Mario and D. Maltoni, 'Direct Gray-Scale Minutiae Detection In Fingerprints,' IEEE Trans. Pattern Analysis and Machine Intelligence, Vol.19, No.1, pp.27-40, 1997 https://doi.org/10.1109/34.566808
  11. S. Micali and C. P. Schnorr, 'Efficient perfect polynomial random number generators,' Journal of Cryptology, 3, pp.157-172, 1991 https://doi.org/10.1007/BF00196909
  12. NIST Special Publication 800-12, A statistical test suite for random and pseudorandom number generators for cryptographic applications, 2000
  13. RSA Data Security, Inc., 'RSA Secure PC for Windows95 Users Manual,' 1997
  14. A. Shamir, 'On the generation of cryptographically strong pseudorandom sequences,' ACM Transactions on Computer Science, pp.38-44, 1983 https://doi.org/10.1145/357353.357357
  15. M. R. Verma, A. K. Majumdar and B. Chatterjeee, 'Edge detection in fingerprints,' Pattern Recognition 20, p.513, 1987 https://doi.org/10.1016/0031-3203(87)90078-1
  16. D. M. Weber, 'A cost effective fingerprint verification algorithm for commercial application,' Proceedings of the South African Symposium on Communication and Signal Processing, p.9, 1992 https://doi.org/10.1109/COMSIG.1992.274304

Cited by

  1. Design and Implementation of Pinpad using Secure Technology from Shoulder Surfing Attack vol.17D, pp.2, 2010, https://doi.org/10.3745/KIPSTD.2010.17D.2.167