3rd International ICST Conference on COMmunication System SoftWAre and MiddlewaRE

Research Article

A Robust Finger Print based Two-Server Authentication and Key Exchange System

  • @INPROCEEDINGS{10.1109/COMSWA.2008.4554400,
        author={Rajeswari Mukesh and Dr.A. Damodaram and Dr.V.Subbiah Bharathi},
        title={A Robust Finger Print based Two-Server Authentication and Key Exchange System},
        proceedings={3rd International ICST Conference on COMmunication System SoftWAre and MiddlewaRE},
        publisher={IEEE},
        proceedings_a={COMSWARE},
        year={2008},
        month={6},
        keywords={},
        doi={10.1109/COMSWA.2008.4554400}
    }
    
  • Rajeswari Mukesh
    Dr.A. Damodaram
    Dr.V.Subbiah Bharathi
    Year: 2008
    A Robust Finger Print based Two-Server Authentication and Key Exchange System
    COMSWARE
    IEEE
    DOI: 10.1109/COMSWA.2008.4554400
Rajeswari Mukesh1,*, Dr.A. Damodaram2,*, Dr.V.Subbiah Bharathi3,*
  • 1: Dept of Computer Science & Engg Easwari Engineering College Chennai- 600 089
  • 2: Vice Principal JNTU College of Engineering Hyderabad-500 072
  • 3: Dean Academics DMI College of engineering Chennai-601 302
*Contact email: rajimukesh95@yahoo.co.in, adamodaram@jntu.ap.ac.in, yughasurya@yahoo.co.in

Abstract

The Biometric based user authentication systems are highly secured and efficient to use and place total trust on the authentication server where bio-metric verification data are stored in a central database. Such systems are, prone to dictionary attacks initiated at the server side. Compromise of the authentication server by either outsiders or insiders do all user private data to exposure and may have serious repercussions to an organization. In this paper, we present a practical fingerprint based user authentication and key exchange system employing a novel two-server architecture. Here, we make use of Image processing techniques to extract a biometric measurement from fingerprint image. In this system, only a front-end service server engages directly with users while a control server stays behind the scene; therefore, can be directly applied to strengthen existing single-server biometric systems without requiring additional computation by the users. In addition, the system is secure against offline dictionary attacks mounted by either of the two servers.