12.07.2015 Views

Biometric Cryptography

Biometric Cryptography

Biometric Cryptography

SHOW MORE
SHOW LESS
  • No tags were found...

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

KEY CONCEPTS IN BCS• Current cryptosystems depends on the secrecy of thesecret or private key and authentication is possession-based• Systems don’t know if the user is a legitimate person or anattacker.• <strong>Biometric</strong>s replaces password-based authentication•They can also be used to generate a cryptographic key orbiometric hash

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!