Cryptographic Key Exchange Using Blockchain Technology
DOI:
https://doi.org/10.32792/jeps.v14i1.385Abstract
Abstract:
Cryptographic key management systems (KMS) are an important component of secure communications
systems and organisations must protect sensitive information by maintaining confidentiality, integrity,
and reliability. In this paper, we create an efficient cryptographic key management application that uses
blockchain technology (BC) and fingerprint biometrics to meet this demand. A private network of ten
authorised users is created according to the Fingerprint Verification Competition 2000 (FVC2000)
database. They create and exchange encrypted keys according to security standards that include
confidentiality, authenticity, trust, and limited access to the system. The system requires each authorized
user to log in using their email and password, in addition to their fingerprint.
The fingerprint is converted to binary if it is grayscale. If the fingerprint already exists in binary format, the system will extract the fingerprint features in matrix form by processing any missing or incorrect
information with an emphasis on accurate representation. A 256-bit encrypted key is produced from this
matrix after feature retrieval, by converting the feature matrix into a long string which is then fed through
the secure hash algorithm 256 (SHA256) function. The app uses blockchain technology to encrypt the
key, apply additional encryption, and associate it with a unique hash. The encrypted key is contained within a block. Users then securely exchange this encrypted block. The application strictly accepts
authorised users and rejects unauthorised users. The encryption KMS application provides a high level of
security and reliability for organizations looking to protect their encryption keys by combining the use of
fingerprint biometrics and BC technology.
References
S. S. Chaeikar, M. Alizadeh, M. H. Tadayon, and A. Jolfaei, “An intelligent cryptographic key management model for secure communications in distributed industrial intelligent systems,” Int. J. Intell. Syst., vol. 37, no. 12, pp. 10158–10171, 2022.
T. W. van der Schaaf, “a Framework for Designing Near Miss Management Systems,” Near Miss Report. As a Saf. Tool, no. April, pp. 27–34, 1991, doi: 10.1016/b978-0-7506-1178- 7.50007-1.
M. A. Engelhardt, “Hitching healthcare to the chain: An introduction to blockchain technology in the healthcare sector,” Technol. Innov. Manag. Rev., vol. 7, no. 10, 2017.
C. M. Bruhner, O. Linnarsson, M. Nemec, M. Arlitt, and N. Carlsson, “Changing of the guards: Certificate and public key management on the internet,” in International Conference on Passive and Active Network Measurement, Springer, 2022, pp. 50–80.
S. Barman, S. Chattopadhyay, and D. Samanta, “An approach to cryptographic key distribution through fingerprint based key distribution center,” Proc. 2014 Int. Conf. Adv. Comput. Commun. Informatics, ICACCI 2014, no. November, pp. 1629–1635, 2014, doi: 10.1109/ICACCI.2014.6968299.
V. Ribeiro, R. Holanda, A. Ramos, and J. J. P. C. Rodrigues, “Enhancing key management in LoRaWAN with permissioned blockchain,” Sensors, vol. 20, no. 11, p. 3068, 2020
C. Jia, H. Ding, C. Zhang, and X. Zhang, “Design of a dynamic key management plan for intelligent building energy management system based on wireless sensor network and blockchain technology,” Alexandria Eng. J., vol. 60, no. 1, pp. 337–346, 2021, doi: 10.1016/j.aej.2020.08.019.
O. Pal, B. Alam, V. Thakur, and S. Singh, “Key management for blockchain technology,” ICT express, vol. 7, no. 1, pp. 76–80, 2021.
R. Fotohi and F. S. Aliee, “Securing communication between things using blockchain technology based on authentication and SHA-256 to improving scalability in large-scale IoT,” Comput. Networks, vol. 197, p. 108331, 2021.
Q. Liu, L. Luo, J. Wang, W. Li, R. Liu, and M. Yu, “Key management scheme of distributed IoT devices based on blockchains,” IET Commun., 2023.
M. J. Mihaljević, M. Knežević, D. Urošević, L. Wang, and S. Xu, “An Approach for Blockchain and Symmetric Keys Broadcast Encryption Based Access Control in IoT,” Symmetry (Basel)., vol. 15, no. 2, p. 299, 2023.
Q. Xiao and H. Raafat, “Fingerprint image postprocessing: a combined statistical and structural approach,” Pattern Recognit., vol. 24, no. 10, pp. 985–992, 1991.
J. Abraham, P. Kwan, and J. Gao, “Fingerprint Matching using A Hybrid Shape and Orientation Descriptor,” State art Biometrics, no. June 2014, 2011, doi: 10.5772/19105.
A. M. Bazen and S. H. Gerez, “Fingerprint matching by thin-plate spline modelling of elastic deformations,” Pattern Recognit., vol. 36, no. 8, pp. 1859–1867, 2003.
P. Kwan and J. Gao, “Fingerprint matching using a hybrid shape and orientation descriptorAbraham, Joshua,” State art Biometrics, pp. 25–56, 2011.
J. Hilton, “The Hex Factor: The NIST Hash Function Competition”.
R. C. Merkle, “A digital signature based on a conventional encryption function,” in Conference on the theory and application of cryptographic techniques, Springer, 1987, pp. 369–378.
A. Yadav, “Comprehensive Study on Incorporation of Blockchain Technology With IoT Enterprises,” 2021, pp. 22–33. doi: 10.4018/978-1-7998-3295-9.ch002.
S. S. Panda, D. Jena, B. K. Mohanta, S. Ramasubbareddy, M. Daneshmand, and A. H. Gandomi, “Authentication and Key Management in Distributed IoT Using Blockchain Technology,” IEEE Internet Things J., vol. 8, no. 16, pp. 12947–12954, 2021, doi: 10.1109/JIOT.2021.3063806.
H. Tan and I. Chung, “Secure authentication and key management with blockchain in VANETs,” IEEE access, vol. 8, pp. 2482–2498, 2019.
Downloads
Published
Issue
Section
License
Copyright (c) 2024 Journal of Education for Pure Science- University of Thi-Qar

This work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License.
Copyright Policy
Authors retain copyright of their articles published in the Journal of Education for Pure Science (JEPS).
By submitting their work, authors grant the journal a non-exclusive license to publish, distribute, and archive the article in all formats and media.
License
All articles published in JEPS are licensed under the Creative Commons Attribution 4.0 International License (CC BY 4.0).
This license permits unrestricted use, distribution, and reproduction in any medium, provided that the original author(s) and the source are properly credited.
Author Rights
Authors have the right to:
-
Share their articles on personal websites, institutional repositories, and academic platforms
-
Reuse their work in future research and publications
-
Distribute the published version without restriction
Journal Rights
The journal retains the right to:
-
Publish and archive the articles
-
Include them in indexing and archiving systems such as LOCKSS and CLOCKSS
-
Promote and disseminate the published work
Responsibility
The contents of all articles are the sole responsibility of the authors. The journal, editors, and editorial board are not responsible for any errors, opinions, or statements expressed in the published articles.
Open Access Statement
JEPS provides immediate open access to its content, supporting the principle that making research freely available to the public enhances global knowledge exchange.
This work is licensed under a Creative Commons Attribution 4.0 International License.
https://creativecommons.org/licenses/by/4.0/