Hide your crypto keys in your fingers
-
An important advance on Crypto Biometrics is the paper Fuzzy Vault for Fingerprints published by U. Uludag, S. Pankanti and A. Jain. of the Michigan State University Biometrics Research Group. You can read an overview [^], but essentially the algorithm allows to retrieve a 128 bit key from a new construct called the fuzzy vault using biometrics matching of fingerprint. Eduardo Diaz site | english blog | spanish blog
-
An important advance on Crypto Biometrics is the paper Fuzzy Vault for Fingerprints published by U. Uludag, S. Pankanti and A. Jain. of the Michigan State University Biometrics Research Group. You can read an overview [^], but essentially the algorithm allows to retrieve a 128 bit key from a new construct called the fuzzy vault using biometrics matching of fingerprint. Eduardo Diaz site | english blog | spanish blog
-
An important advance on Crypto Biometrics is the paper Fuzzy Vault for Fingerprints published by U. Uludag, S. Pankanti and A. Jain. of the Michigan State University Biometrics Research Group. You can read an overview [^], but essentially the algorithm allows to retrieve a 128 bit key from a new construct called the fuzzy vault using biometrics matching of fingerprint. Eduardo Diaz site | english blog | spanish blog
I wouldnt trust it. If someone wanted to read your encrypted data, they could just get your fingerprints.
Pumk1nh3ad illustrates that Intelligent Design oft goes awry. - Ed Gadziemski You did'nt get it. I over estimated you. - Josh Gray
-
Well, your keys are public, there are some sensors that can detect live fingers, and can't be fouled with gummy fingers o things like that. The algorithm is not aware of the fingerprint capture technology, it just requires the image, or the minutia to work.
-
I wouldnt trust it. If someone wanted to read your encrypted data, they could just get your fingerprints.
Pumk1nh3ad illustrates that Intelligent Design oft goes awry. - Ed Gadziemski You did'nt get it. I over estimated you. - Josh Gray
You are right, but you can implement this algorithm in an token with and embedded fingerprint sensor. The idea of the algorithm is to replace passwords, but you can use as a complement to passwords, too, so you can implements a two factor schema, something I know (the password), something I am (biometrics).