• Login
    View Item 
    •   Mak IR Home
    • College of Computing and Information Sciences (CoCIS)
    • School of Computing and Informatics Technology (CIT)
    • School of Computing and Informatics Technology (CIT) Collection
    • View Item
    •   Mak IR Home
    • College of Computing and Information Sciences (CoCIS)
    • School of Computing and Informatics Technology (CIT)
    • School of Computing and Informatics Technology (CIT) Collection
    • View Item
    JavaScript is disabled for your browser. Some features of this site may not work without it.

    Integration of biometrics with cryptographic techniques for secure authentication of networked data access

    Thumbnail
    View/Open
    abanti-cyrus-makori_cit-conf.pdf (325.4Kb)
    Date
    2009
    Author
    Makori, Abanti Cyrus
    Metadata
    Show full item record
    Abstract
    The modern Information Technology evolution demands the use of computer networks with strict security performance. The password-based authentication system and the token-based systems that are current deployed, are not able to meet this performance. Achieving higher levels of security requires authentication. Today’s standard security mechanism is a password that you create, remember it, and change it frequently. These passwords are not foolproof because they can be stolen, forgotten, cracked, sniffed and even tampered with. In fact it is quicker to gain access to electronically held data, copy or print it out than it is to search through or photocopy manually held files. The problems of traditional personal authentication systems may be solved by biometric systems. Biometric identification is extremely effective authentication. It is an important weapon to protect against credit card fraud and phantom withdraws. Biometrics can identify a person’s unique physical characteristics, including fingerprints, facial features, voice pattern, retinal, irises DNA and keystroke. The problem with biometrics approach is that the biometric properties cannot reasonably be kept secret. Although biometric systems have advantages over traditional system, one of the unsolved issues is how we can combine cryptography with biometrics to increase overall system security The objectives of this paper are: 1. To critically examine the attacks on traditional personal identification authentication systems in order to determine the risks of using password based authentication. 2. To examine the biometric technologies and how they are used in authentication with an aim to improvise a secure model. 3. To apply cryptographic techniques in biometric system with a view to increase its security on networked data access.
    URI
    http://hdl.handle.net/10570/849
    Collections
    • School of Computing and Informatics Technology (CIT) Collection

    DSpace 5.8 copyright © Makerere University 
    Contact Us | Send Feedback
    Theme by 
    Atmire NV
     

     

    Browse

    All of Mak IRCommunities & CollectionsTitlesAuthorsBy AdvisorBy Issue DateSubjectsBy TypeThis CollectionTitlesAuthorsBy AdvisorBy Issue DateSubjectsBy Type

    My Account

    LoginRegister

    Statistics

    Most Popular ItemsStatistics by CountryMost Popular Authors

    DSpace 5.8 copyright © Makerere University 
    Contact Us | Send Feedback
    Theme by 
    Atmire NV