A novel authentication protocol based on biometric and identity-based cryptography

Aljeaid, D., 2015. A novel authentication protocol based on biometric and identity-based cryptography. PhD, Nottingham Trent University.

Dania.Aljeaid.2015.pdf - Published version

Download (8MB) | Preview


Recently, considerable attention has been devoted to distributed systems. It has become obvious that a high security level should be a fundamental prerequisite for organisations' processes, both in the commercial and public sectors. A crucial foundation for securing a network is the ability to reliably authenticate ommunication parties. However, these systems face some critical security risks and challenges when they attempt to stabilise between security, efficiency and functionality. Developing a secure authentication protocol can be challenging; this thesis proposes an authentication scheme that employs two authentication factors involving something you know (password) and something you are (biometric) based on Identity-Based Cryptography and Elliptic Curve Cryptography. Two protocols have been chosen that provide mutual authentication and secure key exchange, which are the equivalent to the Diffie-Hellman key exchange. Due to a potential flaw in the protocols, guarding against attacks can be challenging. In order to alleviate some of the issues encountered with the new protocol, this thesis uses the encrypt-then-authenticate method. Formal verification methods are used to evaluate the new protocol. First, finite-state machines are used to examine and predict the behaviour of the protocol. Modelling with this method shows that the new protocol can function correctly and behave correctly within the protocol description, even with invalid input or time delay. Second, Petri nets are used to model, simulate and analyse the new protocol. This thesis formulates several attack models via Petri nets in which the security of the proposed protocols is discussed precisely. Ultimately, this novel work ensures that the new protocol provides a coherent security concept and can be implemented over insecure channels while offering secure mutual authentication.

Item Type: Thesis
Creators: Aljeaid, D.
Date: March 2015
Divisions: Schools > School of Science and Technology
Record created by: Linda Sullivan
Date Added: 29 Jun 2016 11:38
Last Modified: 29 Jun 2016 11:38
URI: https://irep.ntu.ac.uk/id/eprint/28041

Actions (login required)

Edit View Edit View


Views per month over past year


Downloads per month over past year