Biometric Cryptography
Biometric Cryptography
Biometric Cryptography
- No tags were found...
You also want an ePaper? Increase the reach of your titles
YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.
KEY CONCEPTS IN BCS• Current cryptosystems depends on the secrecy of thesecret or private key and authentication is possession-based• Systems don’t know if the user is a legitimate person or anattacker.• <strong>Biometric</strong>s replaces password-based authentication•They can also be used to generate a cryptographic key orbiometric hash