Academic Integrity: tutoring, explanations, and feedback — we don’t complete graded work or submit on a student’s behalf.

Assume that users obtain access through biometric authentication. There is a fin

ID: 664516 • Letter: A

Question

Assume that users obtain access through biometric authentication. There is a fingerprint reader that validates the identity and uses the fingerprint to construct a private key. You may assume that the fingerprint reader is accurate and that there is a means for securely computing the private key and keeping it only during the session, after which it is erased and recomputed the next time the user logs in. There is a certificate for the corresponding public key that exists beyond sessions. Describe the authentication protocol used between the bank and the user's computer to authenticate the user.

Answer One page

Explanation / Answer

in fingerprint biometric , during login process symmetric key is generated between user and server.

biometric system allows the identity of a person based on trait to recognized automatically.

by using image processing system user can extract biometric measurement called minutiae.

users finger print image is measured by using cartesian co - ordinate.

users fingerprint image is converted and stored as encrypted binary format. its used for authentication purpose by server.

biometric verification data are stored in server database during registration

during login authentication is done between user and server side.

then user and server communicate with each other with a secret key from biometric transactions